Essays about: "HMMs"
Showing result 6 - 10 of 21 essays containing the word HMMs.
-
6. Preprocessing of Nanopore Current Signals for DNA Base Calling
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : DNA is a molecule containing genetic information in all living organisms and many viruses. The process of determining the underlying genetic code in the DNA of an organism is known as DNA sequencing, and is commonly used for instance to study viruses, perform forensic analysis, and for medical diagnosis. READ MORE
-
7. HMMs and LSTMs for On-line Gesture Recognition on the Stylaero Board : Evaluating and Comparing Two Methods
University essay from Linköpings universitet/Artificiell intelligens och integrerade datorsystemAbstract : In this thesis, methods of implementing an online gesture recognition system for the novel Stylaero Board device are investigated. Two methods are evaluated - one based on LSTMs and one based on HMMs - on three kinds of gestures: Tap, circle, and flick motions. READ MORE
-
8. Feature Analysis in Online Signature Verification on Digital Whiteboard : An analysis on the performance of handwritten signature authentication using local and global features with Hidden Markov models
University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)Abstract : The usage of signatures for authentication is widely accepted, and remains one of the most familiar biometric in our society. Efforts to digitalise and automate the verification of these signatures are hot topics in the field of Machine Learning, and a plethora of different tools and methods have been developed and adapted for this purpose. READ MORE
-
9. Can hidden Markov models be used for inference about operational risk?
University essay from Umeå universitet/Institutionen för matematik och matematisk statistikAbstract : This thesis aims to investigate the possibility if hidden Markov models (HMM) can be used for inference about operational risk given financial time series data of Auditchanges and Audit prices. The models tested vary in the number of possible states each underlying latent process can take. READ MORE
-
10. Anomaly detection in user behavior of websites using Hierarchical Temporal Memories : Using Machine Learning to detect unusual behavior from users of a web service to quickly detect possible security hazards.
University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)Abstract : This Master's Thesis focuses on the recent Cortical Learn-ing Algorithm (CLA), designed for temporal anomaly detection. It is here applied to the problem of anomaly detec-tion in user behavior of web services, which is getting moreand more important in a network security context. READ MORE