Essays about: "Dolda Markovmodeller"
Showing result 1 - 5 of 15 essays containing the words Dolda Markovmodeller.
-
1. Hidden Markov Models for Intrusion Detection Under Background Activity
University essay from KTH/Matematisk statistikAbstract : Detecting a malicious hacker intruding on a network system can be difficult. This challenge is made even more complex by the network activity generated by normal users and by the fact that it is impossible to know the hacker’s exact actions. READ MORE
-
2. Preprocessing of Nanopore Current Signals for DNA Base Calling
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : DNA is a molecule containing genetic information in all living organisms and many viruses. The process of determining the underlying genetic code in the DNA of an organism is known as DNA sequencing, and is commonly used for instance to study viruses, perform forensic analysis, and for medical diagnosis. READ MORE
-
3. Estimating the probability of event occurrence
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In complex systems anomalous behaviors can occur intermittently and stochastically. In this case, it is hard to diagnose real errors among spurious ones. These errors are often hard to troubleshoot and require close attention, but troubleshooting each occurrence is time-consuming and is not always an option. READ MORE
-
4. Towards disease progression sub-typing via responsibility sampling for robust expectation-maximisation learning
University essay from KTH/Optimeringslära och systemteoriAbstract : Most diseases have different heterogeneous effects on patients. Broadly, one may conclude what manifested symptoms correspond to which diagnosis, but usually there is more than one disease progression pattern. READ MORE
-
5. Feature Analysis in Online Signature Verification on Digital Whiteboard : An analysis on the performance of handwritten signature authentication using local and global features with Hidden Markov models
University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)Abstract : The usage of signatures for authentication is widely accepted, and remains one of the most familiar biometric in our society. Efforts to digitalise and automate the verification of these signatures are hot topics in the field of Machine Learning, and a plethora of different tools and methods have been developed and adapted for this purpose. READ MORE