Let assume that we’re working on a simple classification problem using deep learning. We gave the picture (blueberry) as an input to the model and get our prediction results (with probability) as follows.
How will you evaluate your model? Do you know about the difference between the top-1 and top-5 accuracy?
true
, because it predicted a cherry.false
, because blueberry is among the top-5 guesses.We test the model on 5 images and get the following results. …
A convolutional neural network (CNN or ConvNet) is a specific kind of deep learning architecture. At the moment, there are many tech companies have developed active research groups for exploring new architectures of CNN such as Google, Microsoft, and Facebook and they demonstrated that CNNs are one of the best learning algorithms for understanding and analyzing image content that has shown high performance in image segmentation, classification, detection, and retrieval related tasks.
CNNs were designed for image recognition tasks were originally applied to the challenge of handwritten digit recognition¹ ². The basic design goal of CNNs was to create a network where the neurons in the early layer of the network would extract local visual features, and neurons in later layers would combine these features to form higher-order features. …
Structural design patterns are concerned with how classes and objects can be composed, to form larger structures. They enable you to create systems without rewriting or customizing the code because these patterns provide the system with enhanced reusability and robust functionality.
Each pattern describes a problem which occurs over and over again in our environment, and then describes the core of the solution to that problem, in such a way that you can use this solution a million times over, without ever doing it the same way twice. —Christopher Alexander
There are following 10 types of structural design patterns.
Thanks to the quick advance in technology, especially in computer science and electronics. Nowadays, facial recognition is becoming the second most largely deployed biometric authentication method at the world level in terms of market quota right after fingerprints. Each day more and more manufacturers are including face recognition in their products, such as Apple with its Face-ID technology, the banks with the implementation of eKYC solutions for the onboarding process.
Contrary to the main aim of research in face recognition has been given to the improvement of the performance at the verification and identification tasks, the security vulnerabilities of face recognition systems have been much less studied in the past, and only over the recent few years, some attention has been given to detecting different types of attacks consists of detecting whether a biometric trait comes from a living person or it is a fake. …
Biometric has been for long the target of future authentication that expected that biometric authentication will largely displace other means of our current authentication and access control. Biometric systems can be used in two distinct modes as follows.
There is one theorem in computer science called the CAP theorem states that it is impossible for a distributed data store to simultaneously provide more than two out of the following three guarantees.
In 2011, Nathan Marz proposed an important approach to tackling the limitations of the CAP theorem in his blog¹, it called the Lambda architecture. …
An architectural pattern is a general, reusable solution to a commonly occurring problem in software architecture within a given context.
A pattern is a solution to a problem in a context.
Many programmers are nowadays still confused about the difference between architecture patterns or don’t even know much about it.
Let me explain to you…!
The most common architecture pattern is the layered architecture or known as the n-tier architecture. It is widely known by most software architects, designers, developers. Although, there are no specific restrictions in terms of the number and type of layers that must exist, most layered architecture consists of four tiers: presentation, business, persistence and database as follows. …
There are the following six steps to determine what object does the image contains?
Nowadays we have many options when it comes to architecture design patterns. After developing many apps using Model-View- ViewModel (MVVM), Model-View-Presenter (MVP), and Model-View-Controller (MVC), I finally feel qualified to talk about the differences between them. For easier to understand, we can use a simple example like developing a screen to search books in the BookSearch App.
Let’s begin now…!
First of all, we need to understand briefly MVC, MVP, and MVVM architecture before dive into them.
The aim of these architectures is to separate the responsibilities of visualizing, processing, and data management for UI applications.
Recursion is a problem-solving technique, where the solution of a larger problem is defined in terms of smaller instances of itself. You can try to imagine an example in the real world when you’re digging through your home and come across a mysteriously locked suitcase, the key for the suitcase is probably in this other box. This box contains more boxes, with more boxes inside those boxes. The key is in a box somewhere.
There are two popular approaches for us to solve this problem.
In this solution, we use a while-loop algorithm: “while the pile isn’t empty, grab a box, and look through it.” …
About