SVM, KNN, and Neural Networks Investigated for Machine Learning in Written Word Decoding

Gottipati Ajay; Srungavarapu Bhuvanesh Babu; Madala Narasimha Rao; Magam Satya Siva Krishna; Dr. M. D Gouse1

1

Publication Date: 2024/08/05

Abstract: The capacity of a device to recognise and understand legible handwriting input from a variety of origins, including written material, snap shots, displays, and other electronics, is known as handwritten reputation. In this study, we investigate three classification algorithms: Support Vector Machines (SVM), K-Nearest_Neighbours (KNN), and Neural Networks for handwritten character recognition, and we will identify the best one among these three.

Keywords: Handwritten popularity, SVM, Neural Network, K-Nearest Neighbor;

DOI: https://doi.org/10.38124/ijisrt/IJISRT24JUL929

PDF: https://ijirst.demo4.arinfotech.co/assets/upload/files/IJISRT24JUL929.pdf

REFERENCES

  1. Shakoor, U., Mim, S. S., & Logofatu, D. (2023). Use of machine learning algorithms to analyze the digit recognizer problem in an effective manner. Artificial Neural Networks and Machine Learning – ICANN 2023, 496-507. https://doi.org/10.1007/978-3-031-44201-8\_40
  2. Ilmi, N., Budi, W. T., & Nur, R. K. (2016). Handwriting digit recognition using local binary pattern variance and k-nearest neighbor classification. 2016 4th International Conference on Information and Communication Technology (ICoICT). https://doi.org/10.1109/icoict.2016.7571937
  3. Chherawala, Y., Roy, P. P., & Cheriet, M. (2016). Feature set evaluation for offline handwriting recognition systems: Application to the recurrent neural network. IEEE Transactions on Cybernetics, 46(12), December 2016.
  4. Kutzner, T., Dietze, M., Bönninger, I., Travieso, C. M., Dutta, M. K., & Singh, A. (2016). Online handwriting verification with safe password and increasing number of features. 2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN).
  5. Yao, Y., & Cao, J. (2017). An adaptive scheduling mechanism for analytical workflow model. Communications in Computer and Information Science, 31-45. https://doi.org/10.1007/978-981-10-3996-6\_3
  6. Belavagi, M. C., & Muniyal, B. (2016). Performance evaluation of supervised machine learning algorithms for intrusion detection. Procedia Computer Science, 89, 117-123. https://doi.org/10.1016/j.procs.2016.06. 016
  7. El-Bendary, N., Zawbaa, H. M., Daoud, M. S., Hassanien, A. E., & Nakamatsu, K. (2010). ArSLAT: Arabic sign language alphabets translator.2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM). https://doi.org/10.1109/cisim.2010.5643519
  8. Seiderer, A., Flutura, S., & André, E. (2017). Development of a mobile multi-device nutrition logger. Proceedings of the 2nd ACM SIGCHI International Workshop on Multisensory Approaches to Human-Food Interaction. https://doi.org/10.1145/ 3141788.3141790
  9. Fallah, B., & Khotanlou, H. (2016). Identify human personality parameters based on handwriting using neural network. 2016 Artificial Intelligence and Robotics (IRANOPEN). https://doi.org/10.1109/rios. 2016.7529501