Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《China Computer & Communication》 2019-17
Add to Favorite Get Latest Update

Realization of Handwritten Number Recognition Based on KNN Algorithms

Chi Dianwei;Shandong Vocational University of Foreign Affairs;  
KNN is a mature classification algorithm. Many of the applications of KNN handwritten digit recognition are based on sklearns handwritten digit recognition data set traningdigits. In this paper, we use Python to realize the recognition process of handwritten numerals based on the KNN algorithm principle, and support the recognition of handwritten numerals with photography and drawing software. The method is to process the pictures into the format of data set provided by sklearn, and then use them as test samples to predict in the classification model, and run the verification algorithm. Good classification effect.
【CateGory Index】: TP391.41
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 1 Hits
1 HE Qing;LI Ning;LUO Wen-Juan;SHI Zhong-Zhi;Key Laboratory of Intelligent Information Processing,Institute of Computing Technology,Chinese Academy of Sciences;University of Chinese Academy of Sciences;College of Mathematics and Computer Science,Hebei University;;A Survey of Machine Learning Algorithms for Big Data[J];模式识别与人工智能;2014-04
Chinese Journal Full-text Database 10 Hits
1 Zhao Xia;Chen Yao;Liao Jun;Yu Feng;Lin Sheng;Department of Management and Economic,Tianjin University;;Signal mining for adverse drug reactions based on healthcare big data:methodology and applications[J];中华医院管理杂志;2017-05
2 XUE Zhi-yun;HE Jun;ZHANG Dang-yang;CAO Wei-zhuo;School of Electronic and Information Engineering,Nanjing University of Information Science and Technology;;The Deployment and Performance Evaluation of Hadoop and Spark in Laboratory Environment[J];实验室研究与探索;2015-11
3 LIANG Hong;GE Yufei;CHEN Lin;WANG Wenjiao;College of Computer and Communication Engineering, China University of Petroleum;;Intrusion detection based on dendritic cell algorithm and twin support vector machine[J];计算机应用;2015-11
4 WU Cong;CUI Jun;SHI Weifeng;The 28th Research Institute of CETC;;An Analysis Method of Moving Object Trajectories Based on Data Dimensionality Reduction[J];舰船电子工程;2015-09
5 LIU Pingguang;WEN Chengyu;DU Hong;College of Communication Engineering, Chengdu University of Information Technology;;Improved detection algorithm of Ada Boost[J];计算机应用;2015-08
6 LI Fengdan;LI Chaoling;WU Liang;LI Jianqiang;Lü Xia;School of Earth Sciences and Resources,China University of Geosciences;Development and Research Center of China Geological Survey;China University of Geosciences;;Data integration and services of digital geological mapping based on big data[J];地质通报;2015-07
7 Shen Xin;Huang Ying;Wang Feng;Bes TV New Media Co., Ltd.;Veri Silicon Holdings Co., Ltd.;;Key Technology Application of OTT TV Service Traffic Marketing[J];电信科学;2015-04
8 MENG Xiang-wu;JI Wei-yu;ZHANG Yu-jie;Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia,Beijing University of Posts and Telecommunications;;A Survey of Recommendation Systems in Big Data[J];北京邮电大学学报;2015-02
9 Xiao Shibo;Yang Yumei;Lan Ying;Lyu Sishu;North Sichuan Medical College Library;;Research of Multi-label Attribute-based Academic Document Recommendation[J];情报探索;2015-04
10 ZHOU Hong-zhi;College of Information Engineering,Fuyang Teachers College;;The Optimization Model Of The Wsn Network Lifecycle Based On Multi-objective Optimization[J];淮阴工学院学报;2015-01
【Secondary Citations】
Chinese Journal Full-text Database 1 Hits
1 Li Guojie Cheng Xueqi (Institute of Computing Technology,CAS 100190 Beijing);Research Status and Scientific Thinking of Big Data[J];中国科学院院刊;2012-06
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved