Fig. 1 Architecture of KSOM controller[3]
Fig. 2 Example of the handwritten digit data
Fig. 3 Comparing training methods with different quantity of input data
Fig. 4 Comparing kneighbor with other methods
Table 1. Contents of the dataset
Table 1. Euclidean distance method
Table 2. Result of the training methods
References
- Y. Jung and Y. Bae, "Analysis of Fault Diagnosis for Current and Vibration Signals in Pumps and Motors using a Reconstructed Phase Portrait," Int. J. of Fuzzy Logic and Intelligent Systems, vol. 15, no. 3, 2015, pp. 166-171. https://doi.org/10.5391/IJFIS.2015.15.3.166
- R. Sathya, and A. Annamma, "Comparison of Supervised and Unsupervised Learning Algorithms for Pattern Classification," International Journal of Advanced Research in Artificial Intelligence, vol. 2, no. 2, 2013, pp. 34-38.
- R. Sathya and A. Abraham, "Unsupervised Control Paradigm for Performance Evaluation," International Journal of Computer Application, vol. 44, no. 20, 2012, pp. 27-31. https://doi.org/10.5120/6380-8850
- C. Neocleous, and C. Schizas, "Artificial Neural Network Learning: A Comparative, Methods and Applications of Artificial Intelligence.," Hellenic Conference on Artificial Intelligence SETN, Springer, 2002.
- N. Kim and Y. Bae, "Status Diagnosis of Pump and Motor Applying K-Nearest Neighbors," J. of the Korea Institute of Electronic Communication Science, vol. 13, no. 6, 2018, pp. 1249-1255. https://doi.org/10.13067/JKIECS.2018.13.6.1249
- J. M. Keller, M. R. Gray, and J. A. Givens, "A Fuzzy K-Nearest Neighbor Algorithm," IEEE Trans. Systems, Man, and Cybernetics, vol. 15, no. 4, 1985, pp. 581-585.
- S. Bang, "Implementation of Image based Fire Detection System Using Convolution Neural Network," J. of the Korea Institute of Electronic Communication Science, vol. 12, no. 2, 2017, pp. 331-336. https://doi.org/10.13067/JKIECS.2017.12.2.331
- Y. Kim, S. Park, and D. Kim, "Research on Robust Face Recognition against Lighting Variation using CNN," J. of the Korea Institute of Electronic Communication Science, vol. 12, no. 2, 2017, pp. 325-330. https://doi.org/10.13067/JKIECS.2017.12.2.325
- C. Jung, R. Jang, D. Nyang, and K. Lee " A Study of User Behavior Recognition-Based PIN Entry Using Machine Learning Technique," Korea Information Processing Society review, computer and communication systems, vol. 7, no. 5, 2018, pp. 127-136.
- G. Lee, H. Ha, H. Hong, and H. Kim "Exploratory Research on Automating the Analysis of Scientific Argumentation Using Machine Learning," J. of the Korean Association for Science Education, vol. 38, no. 2, 2018, pp. 219-234. https://doi.org/10.14697/JKASE.2018.38.2.219
- S. Shamim, M. Miah, A. Sarker, and M. Rana, "Handwritten Digit Recognition Machine Algorithms," Global Journal of Computer Science and Technology, vol. 18, 2018, pp. 17-23. https://doi.org/10.24215/16666038.18.e17