Fig. 1 Illustration of the decomposition. (a) An original layer with complexity O(dk2c). (b) An approximated layer with complexity reduced to O(d0k2c) + O(dd0) [1]
Fig. 2 Result of the normalization(0, 3, 9, 12)
Fig. 3 Result of the normalization(0, 3, 9, 12)
Fig. 4 Enhancement by the normalization
Table 1. Scikit-learn utilities used in training
Table 2. Std. Dev. and accuracy result of columns
References
- X. Zhang, J. Zou, K. He, and J. Sun, "Accelerating very deep convolutional networks for classification and detection," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 38, 2015, pp. 1943-1955. https://doi.org/10.1109/TPAMI.2015.2502579
- R. Sathya, and A. Annamma, "Comparison of Supervised and Unsupervised Learning Algorithms for Pattern Classification," IJARAI, vol. 2, no. 2, 2013, pp.34-38.
- R. Sathya and A. Abraham, "Unsupervised Control Paradigm for Performance Evaluation," International Journal of Computer Application, vol. 44, no. 20, 2012, pp. 27-31. https://doi.org/10.5120/6380-8850
- X. C. Yin, X. Yin, K. Huang, and H. W. Hao, "Robust text detection in natural scene images," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 36, no. 5, 2014, pp. 970-983. https://doi.org/10.1109/TPAMI.2013.182
- N. Kim and Y. Bae, "Status Diagnosis of Pump and Motor Applying K-Nearest Neighbors," J. of the Korea Institute of Electronic Communication Science, vol. 13, no. 6, 2018, pp. 1249-1255. https://doi.org/10.13067/JKIECS.2018.13.6.1249
- J. M. Keller, M. R. Gray, and J. A. Givens, "A Fuzzy K-Nearest Neighbor Algorithm," IEEE Trans. Systems, Man, and Cybernetics, vol. 15, no. 4, 1985, pp. 581-585.
- S. Bang, "Implementation of Image based Fire Detection System Using Convolution Neural Network," J. of the Korea Institute of Electronic Communication Science, vol. 12, no. 2, 2017, pp. 331-336. https://doi.org/10.13067/JKIECS.2017.12.2.331
- Y. Kim, S. Park, and D. Kim, "Research on Robust Face Recognition against Lighting Variation using CNN," J. of the Korea Institute of Electronic Communication Science, vol. 12, no. 2, 2017, pp. 325-330. https://doi.org/10.13067/JKIECS.2017.12.2.325
- C. Jung, R. Jang, D. Nyang, and K. Lee "A Study of User Behavior Recognition-Based PIN Entry Using Machine Learning Technique," Korea Information Processing Society review, computer and communication systems, vol. 7, no. 5, 2018, pp. 127-136.
- G. Lee, H. Ha, H. Hong, and H. Kim "Exploratory Research on Automating the Analysis of Scientific Argumentation Using Machine Learning," J. of the Korean Association for Science Education, vol. 38, no. 2, 2018, pp. 219-234. https://doi.org/10.14697/JKASE.2018.38.2.219