SlideShare a Scribd company logo
International Journal of Modern Research in Engineering & Management (IJMREM)
||Volume|| 1||Issue|| 5 ||Pages|| 01-06 ||May 2018|| ISSN: 2581-4540
www.ijmrem.com IJMREM Page 1
CMAC Neural Networks
1,
Amira Elsir Tayfour Ahmed, 2,
Omer Elsir Tayfour Ahmed
1,
Information System Department, King Khalid University, Saudi Arabia
2,
Engineering & Networks Department, King Khalid University, Saudi Arabia
-----------------------------------------------------ABSTRACT----------------------------------------------------
The Cerebellar Model Articulation Controller (CMAC) is an influential cerebrum propelled processing model in
numerous pertinent fields. There are different researches done using CMAC in many applications using its
characteristics in easy implementation and good results for example: facial expression recognition, pattern
recognition etc. In this paper we have presented some methods of using CMAC and presents their results.
KEYWORDS: Artificial Neural Networks (ANN), Cerebella Model Articulation (CMAC).
------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: Date, 03 May 2017 Date of Accepted: 08 May 2018
------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
An artificial neural network (ANN), also called a simulated neural network (SNN) or commonly just neural
network (NN) is an interconnected group of artificial neurons that uses a mathematical or computational model
for information processing based on a connectionist. There are various types of neural networks one of them is
the Cerebellar Model Articulation Controller (CMAC). The CMAC model has been intensively examined and
numerous variations of the model such as KCMAC, MCMAC, and LCMAC, have been proposed. The CMAC
was first proposed as a function modeler for robotic controllers by James Albus in 1975[1] , but has been
extensively used in reinforcement learning and also as for automated classification in the machine
learning community. CMAC computes a function , where is the number of input dimensions.
The input space is divided up into hyper-rectangles, each of which is associated with a memory cell. The
contents of the memory cells are the weights, which are adjusted during training. Usually, more than one
quantization of input space is used, so that any point in input space is associated with a number of hyper-
rectangles, and therefore with a number of memory cells. The output of a CMAC is the algebraic sum of the
weights in all the memory cells activated by the input point.
The basic operation of a two-input two-output CMAC network is illustrated in fig. (1a). It has three layers,
labeled L1, L2, L3 in the figure. The inputs are the values and . Layer 1 contains an array of “feature
detecting” neurons for each input . Each of these outputs one for inputs in a limited range, otherwise they
output zero (figure 3.1b). For any input a fixed number of neurons ( ) in each layer 1 array will be activated
( = 5 in the example). The layer 1 neurons effectively quantize the inputs. Layer 2 contains association
neurons which are connected to one neuron from each layer 1 input array ( ; ). Each layer 2 neuron
outputs 1.0 when all its inputs are nonzero, otherwise it outputs zero—these neurons compute the logical AND
of their inputs. They are arranged so exactly are activated by any input (5 in the example).
Layer 3 contains the output neurons, each of which computes a weighted sum of all layer 2 outputs, i.e.:
(1)
CMAC Neural Networks.
www.ijmrem.com IJMREM Page 2
Figure 1: (a) An example two-input two-output CMAC, in neural network form
( = 2, = 5, = 72, = 2).
(b) Responses of the feature detecting neurons for input 1
The parameters are the weights which parameterize the CMAC mapping ( connects to output i).
There are weights for every layer 2 association neuron, which makes weights in total.
Only a fraction of all the possible association neurons is used. They are distributed in a pattern which conserves
weight parameters without degrading the local generalization properties too much. Each layer 2 neuron has a
receptive field that is × units in size, i.e. this is the size of the input space region that activates the
neuron.
The CMAC has the following properties: Limited input space, Piecewise constant, Local generalization,
Training sparsity, Training interference, and Multidimensional inflexibility. The advantages when using
CMASC is the mapping and training operations are extremely fast, the time taken is proportional to the number
of association units, the algorithms are easy to implement and Local generalization prevents over-training in one
area of the input space from degrading the mapping in another (unless there are too few physical weights). While
the disadvantages are: Many more weight parameters are needed than for, say, the multi-layer perceptron, the
generalization is not global, so useful interpolation will only occur if there are enough training points—points
further apart than the local generalization distance will not be correctly interpolated, the input-to-output mapping
is discontinuous, without analytical derivatives, although this can be remedied with higher order CMACs [2],
and the selection of CMAC parameters to prevent excessive hash collision can be a large design problem.
II. METHODS USING CMAC NEURAL NETWORK:
Method 1: Facial Expression Recognition using Gabor wavelets and Neural Networks : Amira Tayfour [3]
presented method for identifying emotional classification using a combination of texture oriented method with
dimensional reduction and use for training three (ANN) which are BPN, SLN Cerebellar Model Articulation
Controller (CMAC) for recognizing facial emotions to suit the varieties in the facial emotions and consequently
end up being better for untrained facial expressions. Gabor wavelet is used in different angles to extract possible
textures of the facial expression. The higher dimensions of the extracted texture features are further reduced by
using Fisher’s linear discriminant function for increasing the accuracy of the proposed method. Different facial
exprssions considered are angry, disgust, happy, sad, surprise and fear are used. Amira Tayfour [3] found that
the combined CMAC provides highest emotion expression identification when compared to emotion expression
identification accuracy of FLD/SLN/BPA. Also, the output of CMAC depends upon the number of nodes used in
the hidden layer. The results for method in different 6 exaprssions using JAFEE databses are shown in fig. (2)
CMAC Neural Networks.
www.ijmrem.com IJMREM Page 3
Figure (2) The Accuracy Percentage for the 6 Experssins uning CMAC
Method 2: Hazardous Odor Recognition by CMAC Based Neural Networks: İhsan Ömür Buck, and Bekir
Karlık [4], The electronic nose developed in this research consists of a sensor array in which each sensor gives a
different electrical response for a particular target vapor introduced into the sensing chamber. Pattern recognition
techniques based on the principal component analysis and the CMAC neural network model have been
developed for learning different chemical odor vapors. This study has shown the attainability of an electronic
nose and the CMAC neural network to distinguish and recognize a portion of the hazardous odors. Hundred
percent achievement rate of classification was expert with the outline of CMAC ANN design for hazardous odor
recognition system. The other normal MLP design is additionally ready to sum up with high recognition
accuracy. However, the training time of MLP is longer than CMAC.
The CMAC algorithm is demonstrated as follows:
Step 1: Design configuration of the CMAC odor recognition system.
Step 2: Normalize, load and input the training data, through quantization, memory addressing, and the weights
of the summation of excited memory addresses to produce the output nodes.
Step 3: Calculate the difference between actual output and desired output to find the weights, which minimize
the error as based on the LMS rule
Step 4: Training is done! Save the memory weights.
Step 5: Normalize, load and input the testing data, through quantization, memory addressing, and the weights of
the summation of excited memory addresses to produce the output nodes. (If the input signals are the same as the
training patterns, they will excite the same memory addresses.)
Step 6: Output the testing result.
“Table (1)” Described the results when using four different gases is:
Table (1) Results of using four different gases
Types of Gas Recognition rates for Validation
(%)
Recognition rate for Test (%)
CO 97 85
Acetone 98 99
Ammonia 99 100
Lighter 98.5 99
CMAC Neural Networks.
www.ijmrem.com IJMREM Page 4
Method 3: Applying CMAC-Based On-Line Learning to Intrusion Detection :Innovative work of IDSs has
been continuous since the mid 1980's and the difficulties looked by planners increment as the focused-on
frameworks since more various and complex. The outcomes exhibit the potential for a capable new investigation
part of an entire IDS that would be fit for distinguishing priori and from the a priori denial of service attack
patterns. Based on the results of the tests that were conducted on James Cannady [5] approach there were several
significant advances in the detection of network attacks:
• On-line learning of attack patterns - The approach has shown the capability to quickly learn new attack
pattern without the total retraining required in other neural network approaches. This is a critical advantage that
could enable the IDS to constantly enhance its explanatory capacity without the prerequisite for outside updates.
• Extremely accurate in identifying priori attack patterns – The utilization of the dynamic learning factor
brought about a normal error of 0.12%, contrasted and a normal error of 15% in existing IDSs. Since other data
security segments depend on the exact recognition of computer attacks the capability to precisely recognize
network events could incredibly upgrade the overall security of computer systems.
• Rapid learning of data – The CMAC could precisely recognize the data vectors after just a single training
iteration. This is a huge change over other neural system approaches that may require a large number of
preparing training iterations to precisely learn patterns of data.
• Immediate identification of a priori attacks - The approach has exhibited the capability to successfully
recognize potential attacks during initial presentation prior to receiving feedback from the protected host. While
the error in the reaction was higher than during subsequent presentations of the pattern after feedback had been
received, the average error rate of 15.2% is consistent with normal results from existing IDSs. Moreover, the
capability of this way to deal with use speculation to give some sign of attacks is favorable position over expert’s
system approaches that require a correct match to coded patterns to give an alarm.
• Adaptive learning algorithm– The utilization of an adaptive learning factor, based on the current state of the
protected host, gives the capability to quickly learn new attacks, in this way altogether diminishing learning time
in periods when rapid attacks identification is required.
Method 3: Applying CMAC-Based On-Line Learning to Intrusion Detection : Innovative work of IDSs has
been continuous since the mid 1980's and the difficulties looked by planners increment as the focused-on
frameworks since more various and complex. The outcomes exhibit the potential for a capable new investigation
part of an entire IDS that would be fit for distinguishing priori and from the a priori denial of service attack
patterns. Based on the results of the tests that were conducted on James Cannady [5] approach there were several
significant advances in the detection of network attacks:
• On-line learning of attack patterns - The approach has shown the capability to quickly learn new attack
pattern without the total retraining required in other neural network approaches. This is a critical advantage that
could enable the IDS to constantly enhance its explanatory capacity without the prerequisite for outside updates.
• Extremely accurate in identifying priori attack patterns – The utilization of the dynamic learning factor
brought about a normal error of 0.12%, contrasted and a normal error of 15% in existing IDSs. Since other data
security segments depend on the exact recognition of computer attacks the capability to precisely recognize
network events could incredibly upgrade the overall security of computer systems.
• Rapid learning of data – The CMAC could precisely recognize the data vectors after just a single training
iteration. This is a huge change over other neural system approaches that may require a large number of
preparing training iterations to precisely learn patterns of data.
• Immediate identification of a priori attacks - The approach has exhibited the capability to successfully
recognize potential attacks during initial presentation prior to receiving feedback from the protected host. While
the error in the reaction was higher than during subsequent presentations of the pattern after feedback had been
received, the average error rate of 15.2% is consistent with normal results from existing IDSs. Moreover, the
capability of this way to deal with use speculation to give some sign of attacks is favorable position over expert’s
system approaches that require a correct match to coded patterns to give an alarm.
CMAC Neural Networks.
www.ijmrem.com IJMREM Page 5
• Adaptive learning algorithm – The utilization of an adaptive learning factor, based on the current state of the
protected host, gives the capability to quickly learn new attacks, in this way altogether diminishing learning time
in periods when rapid attacks identification is required.
The results of the a priori attacks resulted in an average error of the CMAC output of 0.4% (fig. 3)
Figure 3: The Desired Response via Events
Method 4: Handwritten Chinese Character Recognition Technology based on CMAC
Neural Network
Yan Shen, Lina Liu, Guoqiang Li [6] used 2000 Chinese characters as a template for training. The result is
found that the handwritten character recognition accuracy rate of writing neat, appropriate proportion and
straight strokes was up to 89.76%, however, the free writing recognition effect is not very good, to be corrected
manually. With the improvement of the CMAC neural network theory and the depth study of the character
feature extraction technology, CMAC neural network will be better used in the field of handwritten character
recognition and has a very good application prospects. The figure below describes the flow chart of the proposed
system. Fig. 4 described the flow chart for the proposed system.
Figure1: Flowchart of character recognition based on neural network
1000 and 2000 Chinese characters are used as a template for training in the study. It is found that the
handwritten character recognition accuracy rate of writing neat, appropriate proportion and straight strokes was
up to 95.52 % in using 1000 characters and 89.76% in using 2000 charcaters, “Table” (2) describes the
recognition rates of these characters using the BP and CMAC ANN.
CMAC Neural Networks.
www.ijmrem.com IJMREM Page 6
Table (2) Recognition Rates using BP & CMAC
Test Text Recognition rates
(1000 Character) (%)
Recognition rates
(12000 Character) (%)
Text text1 (BP) 83.68 68.64
Text text2 (CMAC) 95.52 89.76
III. CONCLUSION
Four methods were presented as an example in this paper to declare the advantages of using CMAC ANN. Every
method has proved and showed the good and accurate results were found when using the CMAC neural network.
For Future works for more method using different neural networks comparing with CMAC will be presented.
REFERENCES
1. J. S. Albus, A theory of cerebellar function, Math. Biosci. 10 pp 25_61, (1971).
2. Albus J.S., Mechanisms of Planning and Problem Solving in the Brain, Mathematical Biosciences,
Vol.45, pp.247-293, 1979.
3. Ahmed, Amira Elsir Tayfour, Facial Expression Recognition using Gabor wavelets and Neural
Networks, University of Sudan for Science and Tchnologies, Phd thesis, 2016.
4. İhsan Ömür Bucak, and Bekir Karlık , Hazardous Odor Recognition by CMAC Based Neural Networks
Sensors 9, 7308-7319; doi:10.3390/s90907308, 2009.
5. James Cannady, Applying CMAC-Based On-Line Learning to Intrusion Detection, Ph.D. Candidate,
Nova Southeastern University Fort Lauderdale, FL 33314
6. Yan Shen, Lina Liu, Guoqiang Li, Handwritten Chinese Character Recognition Technology based on
CMAC Neural Network, Atlantis Press, 2013.

More Related Content

PDF
Cerebellar Model Articulation Controller
PDF
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
PDF
Extended Fuzzy C-Means with Random Sampling Techniques for Clustering Large Data
PDF
A0270107
PDF
MEDIAN BASED PARALLEL STEERING KERNEL REGRESSION FOR IMAGE RECONSTRUCTION
PDF
Median based parallel steering kernel regression for image reconstruction
PDF
Fpga implementation of optimal step size nlms algorithm and its performance a...
PDF
Design and Implementation of Efficient Ternary Content Addressable Memory
Cerebellar Model Articulation Controller
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
Extended Fuzzy C-Means with Random Sampling Techniques for Clustering Large Data
A0270107
MEDIAN BASED PARALLEL STEERING KERNEL REGRESSION FOR IMAGE RECONSTRUCTION
Median based parallel steering kernel regression for image reconstruction
Fpga implementation of optimal step size nlms algorithm and its performance a...
Design and Implementation of Efficient Ternary Content Addressable Memory

What's hot (20)

PDF
Performance comparison of row per slave and rows set
PDF
ECG beats classification using multiclass SVMs with ECOC
PDF
Fpga implementation of optimal step size nlms algorithm and its performance a...
PDF
Report Simulations of Communication Systems
PDF
Performance comparison of row per slave and rows set per slave method in pvm ...
PDF
Parallel Algorithms
PDF
E046012533
PDF
master-thesis
PDF
PPT
Lec 6-bp
PDF
GPU Parallel Computing of Support Vector Machines as applied to Intrusion Det...
PDF
HAWQ-V3: Dyadic Neural Network Quantization
PDF
An Algorithm for Optimized Cost in a Distributed Computing System
PDF
Area, Delay and Power Comparison of Adder Topologies
PDF
11.[10 14]dynamic instruction scheduling for microprocessors having out of or...
PDF
Hardware/software co-design for a parallel three-dimensional bresenham’s algo...
PDF
VauhkonenVohraMadaan-ProjectDeepLearningBenchMarks
PDF
Local Binary Fitting Segmentation by Cooperative Quantum Particle Optimization
PDF
B43030508
PDF
Analysis of low pdp using SPST in bilateral filter
Performance comparison of row per slave and rows set
ECG beats classification using multiclass SVMs with ECOC
Fpga implementation of optimal step size nlms algorithm and its performance a...
Report Simulations of Communication Systems
Performance comparison of row per slave and rows set per slave method in pvm ...
Parallel Algorithms
E046012533
master-thesis
Lec 6-bp
GPU Parallel Computing of Support Vector Machines as applied to Intrusion Det...
HAWQ-V3: Dyadic Neural Network Quantization
An Algorithm for Optimized Cost in a Distributed Computing System
Area, Delay and Power Comparison of Adder Topologies
11.[10 14]dynamic instruction scheduling for microprocessors having out of or...
Hardware/software co-design for a parallel three-dimensional bresenham’s algo...
VauhkonenVohraMadaan-ProjectDeepLearningBenchMarks
Local Binary Fitting Segmentation by Cooperative Quantum Particle Optimization
B43030508
Analysis of low pdp using SPST in bilateral filter
Ad

Similar to CMAC Neural Networks (20)

PDF
SYSTEM IDENTIFICATION USING CEREBELLAR MODEL ARITHMETIC COMPUTER
PDF
Lecture3 xing fei-fei
PPTX
lecture13-NN-basics.pptx
PPTX
Artificial Neural Network
PDF
Neural Networks
PPTX
MODULE-3_intelligent control_Module_3_KTU
PDF
Early detection of adult valve disease mitral stenosis using the elman artifi...
PDF
Early detection of adult valve disease mitral stenosis
PDF
Early detection of adult valve disease–mitral
PPT
neural networking and factor analysis.ppt
PPT
neural1Advanced Features of Neural Network.ppt
PPT
Artificial neural networks and deep learning.ppt
PPT
Data mining techniques power point presentation
PPT
SOFT COMPUTERING TECHNICS -Unit 1
PDF
KeithWiley_NeuromorphicComputing_and_CM1K_and_emulator_talk_wide
PPT
chapter one introduction to nueral networks
PPTX
Neural Networks.pptx
PPTX
Neural network
PDF
14 Machine Learning Single Layer Perceptron
PDF
10-Perceptron.pdf
SYSTEM IDENTIFICATION USING CEREBELLAR MODEL ARITHMETIC COMPUTER
Lecture3 xing fei-fei
lecture13-NN-basics.pptx
Artificial Neural Network
Neural Networks
MODULE-3_intelligent control_Module_3_KTU
Early detection of adult valve disease mitral stenosis using the elman artifi...
Early detection of adult valve disease mitral stenosis
Early detection of adult valve disease–mitral
neural networking and factor analysis.ppt
neural1Advanced Features of Neural Network.ppt
Artificial neural networks and deep learning.ppt
Data mining techniques power point presentation
SOFT COMPUTERING TECHNICS -Unit 1
KeithWiley_NeuromorphicComputing_and_CM1K_and_emulator_talk_wide
chapter one introduction to nueral networks
Neural Networks.pptx
Neural network
14 Machine Learning Single Layer Perceptron
10-Perceptron.pdf
Ad

More from IJMREMJournal (20)

PDF
Anti-Smog Radar Application for Vehicles
PDF
IoT based Environmental Monitoring and Control System
PDF
Analysis and Implementation of Solid-State Relays in Industrial application F...
PDF
MIM (Mobile Instant Messaging) Classification using Term Frequency-Inverse Do...
PDF
Is Lean Management applicable to the hospital and for which results?
PDF
Fabrication and Performance Analysis of Solar Tracking System by Using By-Pas...
PDF
Reactivity Feedback Effect on the Reactor Behaviour during SBLOCA in a 4-loop...
PDF
Lyapunov-type inequalities for a fractional q, -difference equation involvin...
PDF
The Policies of Government Intervention as Third-Party for Conflict in Bike-S...
PDF
Epidemiological study for Trichomonas Vaginalis for Discrete time model and C...
PDF
Energy Conservation through Smart Building and Smart Lighting System
PDF
The Effect of Workplace Relationship toward Job Satisfaction of Divine Word C...
PDF
Semi-automatic Picture Book Generation based on Story Model and Agent-based S...
PDF
Efficiency Evaluation of Thailand Gross Domestic Product Using DEA
PDF
Predicting Trade Conflict Outcomes using a Third-Party Intervention Model
PDF
Proposed Framework for Effective Management of End-User Stakeholders’ in Publ...
PDF
Fresh and Hardened Properties of Ground Granulated Blast Furnace Slag Made Co...
PDF
Design and Evaluation of Open Graded Hot Mix Asphalt Using Cement as A Grout...
PDF
Design of Cold Recycled Emulsified Asphalt Mixtures Using Portland Cement as ...
PDF
Thermodynamic Analysis of Cooling Tower with Air to Air Heat Exchanger for Re...
Anti-Smog Radar Application for Vehicles
IoT based Environmental Monitoring and Control System
Analysis and Implementation of Solid-State Relays in Industrial application F...
MIM (Mobile Instant Messaging) Classification using Term Frequency-Inverse Do...
Is Lean Management applicable to the hospital and for which results?
Fabrication and Performance Analysis of Solar Tracking System by Using By-Pas...
Reactivity Feedback Effect on the Reactor Behaviour during SBLOCA in a 4-loop...
Lyapunov-type inequalities for a fractional q, -difference equation involvin...
The Policies of Government Intervention as Third-Party for Conflict in Bike-S...
Epidemiological study for Trichomonas Vaginalis for Discrete time model and C...
Energy Conservation through Smart Building and Smart Lighting System
The Effect of Workplace Relationship toward Job Satisfaction of Divine Word C...
Semi-automatic Picture Book Generation based on Story Model and Agent-based S...
Efficiency Evaluation of Thailand Gross Domestic Product Using DEA
Predicting Trade Conflict Outcomes using a Third-Party Intervention Model
Proposed Framework for Effective Management of End-User Stakeholders’ in Publ...
Fresh and Hardened Properties of Ground Granulated Blast Furnace Slag Made Co...
Design and Evaluation of Open Graded Hot Mix Asphalt Using Cement as A Grout...
Design of Cold Recycled Emulsified Asphalt Mixtures Using Portland Cement as ...
Thermodynamic Analysis of Cooling Tower with Air to Air Heat Exchanger for Re...

Recently uploaded (20)

PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
additive manufacturing of ss316l using mig welding
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
UNIT 4 Total Quality Management .pptx
PPT
Project quality management in manufacturing
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Current and future trends in Computer Vision.pptx
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Well-logging-methods_new................
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPT
Mechanical Engineering MATERIALS Selection
PDF
composite construction of structures.pdf
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
III.4.1.2_The_Space_Environment.p pdffdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
additive manufacturing of ss316l using mig welding
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
UNIT 4 Total Quality Management .pptx
Project quality management in manufacturing
bas. eng. economics group 4 presentation 1.pptx
Current and future trends in Computer Vision.pptx
Safety Seminar civil to be ensured for safe working.
R24 SURVEYING LAB MANUAL for civil enggi
Well-logging-methods_new................
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Mechanical Engineering MATERIALS Selection
composite construction of structures.pdf
Operating System & Kernel Study Guide-1 - converted.pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT

CMAC Neural Networks

  • 1. International Journal of Modern Research in Engineering & Management (IJMREM) ||Volume|| 1||Issue|| 5 ||Pages|| 01-06 ||May 2018|| ISSN: 2581-4540 www.ijmrem.com IJMREM Page 1 CMAC Neural Networks 1, Amira Elsir Tayfour Ahmed, 2, Omer Elsir Tayfour Ahmed 1, Information System Department, King Khalid University, Saudi Arabia 2, Engineering & Networks Department, King Khalid University, Saudi Arabia -----------------------------------------------------ABSTRACT---------------------------------------------------- The Cerebellar Model Articulation Controller (CMAC) is an influential cerebrum propelled processing model in numerous pertinent fields. There are different researches done using CMAC in many applications using its characteristics in easy implementation and good results for example: facial expression recognition, pattern recognition etc. In this paper we have presented some methods of using CMAC and presents their results. KEYWORDS: Artificial Neural Networks (ANN), Cerebella Model Articulation (CMAC). ------------------------------------------------------------------------------------------------------------------------------------------ Date of Submission: Date, 03 May 2017 Date of Accepted: 08 May 2018 ------------------------------------------------------------------------------------------------------------------------------------------ I. INTRODUCTION An artificial neural network (ANN), also called a simulated neural network (SNN) or commonly just neural network (NN) is an interconnected group of artificial neurons that uses a mathematical or computational model for information processing based on a connectionist. There are various types of neural networks one of them is the Cerebellar Model Articulation Controller (CMAC). The CMAC model has been intensively examined and numerous variations of the model such as KCMAC, MCMAC, and LCMAC, have been proposed. The CMAC was first proposed as a function modeler for robotic controllers by James Albus in 1975[1] , but has been extensively used in reinforcement learning and also as for automated classification in the machine learning community. CMAC computes a function , where is the number of input dimensions. The input space is divided up into hyper-rectangles, each of which is associated with a memory cell. The contents of the memory cells are the weights, which are adjusted during training. Usually, more than one quantization of input space is used, so that any point in input space is associated with a number of hyper- rectangles, and therefore with a number of memory cells. The output of a CMAC is the algebraic sum of the weights in all the memory cells activated by the input point. The basic operation of a two-input two-output CMAC network is illustrated in fig. (1a). It has three layers, labeled L1, L2, L3 in the figure. The inputs are the values and . Layer 1 contains an array of “feature detecting” neurons for each input . Each of these outputs one for inputs in a limited range, otherwise they output zero (figure 3.1b). For any input a fixed number of neurons ( ) in each layer 1 array will be activated ( = 5 in the example). The layer 1 neurons effectively quantize the inputs. Layer 2 contains association neurons which are connected to one neuron from each layer 1 input array ( ; ). Each layer 2 neuron outputs 1.0 when all its inputs are nonzero, otherwise it outputs zero—these neurons compute the logical AND of their inputs. They are arranged so exactly are activated by any input (5 in the example). Layer 3 contains the output neurons, each of which computes a weighted sum of all layer 2 outputs, i.e.: (1)
  • 2. CMAC Neural Networks. www.ijmrem.com IJMREM Page 2 Figure 1: (a) An example two-input two-output CMAC, in neural network form ( = 2, = 5, = 72, = 2). (b) Responses of the feature detecting neurons for input 1 The parameters are the weights which parameterize the CMAC mapping ( connects to output i). There are weights for every layer 2 association neuron, which makes weights in total. Only a fraction of all the possible association neurons is used. They are distributed in a pattern which conserves weight parameters without degrading the local generalization properties too much. Each layer 2 neuron has a receptive field that is × units in size, i.e. this is the size of the input space region that activates the neuron. The CMAC has the following properties: Limited input space, Piecewise constant, Local generalization, Training sparsity, Training interference, and Multidimensional inflexibility. The advantages when using CMASC is the mapping and training operations are extremely fast, the time taken is proportional to the number of association units, the algorithms are easy to implement and Local generalization prevents over-training in one area of the input space from degrading the mapping in another (unless there are too few physical weights). While the disadvantages are: Many more weight parameters are needed than for, say, the multi-layer perceptron, the generalization is not global, so useful interpolation will only occur if there are enough training points—points further apart than the local generalization distance will not be correctly interpolated, the input-to-output mapping is discontinuous, without analytical derivatives, although this can be remedied with higher order CMACs [2], and the selection of CMAC parameters to prevent excessive hash collision can be a large design problem. II. METHODS USING CMAC NEURAL NETWORK: Method 1: Facial Expression Recognition using Gabor wavelets and Neural Networks : Amira Tayfour [3] presented method for identifying emotional classification using a combination of texture oriented method with dimensional reduction and use for training three (ANN) which are BPN, SLN Cerebellar Model Articulation Controller (CMAC) for recognizing facial emotions to suit the varieties in the facial emotions and consequently end up being better for untrained facial expressions. Gabor wavelet is used in different angles to extract possible textures of the facial expression. The higher dimensions of the extracted texture features are further reduced by using Fisher’s linear discriminant function for increasing the accuracy of the proposed method. Different facial exprssions considered are angry, disgust, happy, sad, surprise and fear are used. Amira Tayfour [3] found that the combined CMAC provides highest emotion expression identification when compared to emotion expression identification accuracy of FLD/SLN/BPA. Also, the output of CMAC depends upon the number of nodes used in the hidden layer. The results for method in different 6 exaprssions using JAFEE databses are shown in fig. (2)
  • 3. CMAC Neural Networks. www.ijmrem.com IJMREM Page 3 Figure (2) The Accuracy Percentage for the 6 Experssins uning CMAC Method 2: Hazardous Odor Recognition by CMAC Based Neural Networks: İhsan Ömür Buck, and Bekir Karlık [4], The electronic nose developed in this research consists of a sensor array in which each sensor gives a different electrical response for a particular target vapor introduced into the sensing chamber. Pattern recognition techniques based on the principal component analysis and the CMAC neural network model have been developed for learning different chemical odor vapors. This study has shown the attainability of an electronic nose and the CMAC neural network to distinguish and recognize a portion of the hazardous odors. Hundred percent achievement rate of classification was expert with the outline of CMAC ANN design for hazardous odor recognition system. The other normal MLP design is additionally ready to sum up with high recognition accuracy. However, the training time of MLP is longer than CMAC. The CMAC algorithm is demonstrated as follows: Step 1: Design configuration of the CMAC odor recognition system. Step 2: Normalize, load and input the training data, through quantization, memory addressing, and the weights of the summation of excited memory addresses to produce the output nodes. Step 3: Calculate the difference between actual output and desired output to find the weights, which minimize the error as based on the LMS rule Step 4: Training is done! Save the memory weights. Step 5: Normalize, load and input the testing data, through quantization, memory addressing, and the weights of the summation of excited memory addresses to produce the output nodes. (If the input signals are the same as the training patterns, they will excite the same memory addresses.) Step 6: Output the testing result. “Table (1)” Described the results when using four different gases is: Table (1) Results of using four different gases Types of Gas Recognition rates for Validation (%) Recognition rate for Test (%) CO 97 85 Acetone 98 99 Ammonia 99 100 Lighter 98.5 99
  • 4. CMAC Neural Networks. www.ijmrem.com IJMREM Page 4 Method 3: Applying CMAC-Based On-Line Learning to Intrusion Detection :Innovative work of IDSs has been continuous since the mid 1980's and the difficulties looked by planners increment as the focused-on frameworks since more various and complex. The outcomes exhibit the potential for a capable new investigation part of an entire IDS that would be fit for distinguishing priori and from the a priori denial of service attack patterns. Based on the results of the tests that were conducted on James Cannady [5] approach there were several significant advances in the detection of network attacks: • On-line learning of attack patterns - The approach has shown the capability to quickly learn new attack pattern without the total retraining required in other neural network approaches. This is a critical advantage that could enable the IDS to constantly enhance its explanatory capacity without the prerequisite for outside updates. • Extremely accurate in identifying priori attack patterns – The utilization of the dynamic learning factor brought about a normal error of 0.12%, contrasted and a normal error of 15% in existing IDSs. Since other data security segments depend on the exact recognition of computer attacks the capability to precisely recognize network events could incredibly upgrade the overall security of computer systems. • Rapid learning of data – The CMAC could precisely recognize the data vectors after just a single training iteration. This is a huge change over other neural system approaches that may require a large number of preparing training iterations to precisely learn patterns of data. • Immediate identification of a priori attacks - The approach has exhibited the capability to successfully recognize potential attacks during initial presentation prior to receiving feedback from the protected host. While the error in the reaction was higher than during subsequent presentations of the pattern after feedback had been received, the average error rate of 15.2% is consistent with normal results from existing IDSs. Moreover, the capability of this way to deal with use speculation to give some sign of attacks is favorable position over expert’s system approaches that require a correct match to coded patterns to give an alarm. • Adaptive learning algorithm– The utilization of an adaptive learning factor, based on the current state of the protected host, gives the capability to quickly learn new attacks, in this way altogether diminishing learning time in periods when rapid attacks identification is required. Method 3: Applying CMAC-Based On-Line Learning to Intrusion Detection : Innovative work of IDSs has been continuous since the mid 1980's and the difficulties looked by planners increment as the focused-on frameworks since more various and complex. The outcomes exhibit the potential for a capable new investigation part of an entire IDS that would be fit for distinguishing priori and from the a priori denial of service attack patterns. Based on the results of the tests that were conducted on James Cannady [5] approach there were several significant advances in the detection of network attacks: • On-line learning of attack patterns - The approach has shown the capability to quickly learn new attack pattern without the total retraining required in other neural network approaches. This is a critical advantage that could enable the IDS to constantly enhance its explanatory capacity without the prerequisite for outside updates. • Extremely accurate in identifying priori attack patterns – The utilization of the dynamic learning factor brought about a normal error of 0.12%, contrasted and a normal error of 15% in existing IDSs. Since other data security segments depend on the exact recognition of computer attacks the capability to precisely recognize network events could incredibly upgrade the overall security of computer systems. • Rapid learning of data – The CMAC could precisely recognize the data vectors after just a single training iteration. This is a huge change over other neural system approaches that may require a large number of preparing training iterations to precisely learn patterns of data. • Immediate identification of a priori attacks - The approach has exhibited the capability to successfully recognize potential attacks during initial presentation prior to receiving feedback from the protected host. While the error in the reaction was higher than during subsequent presentations of the pattern after feedback had been received, the average error rate of 15.2% is consistent with normal results from existing IDSs. Moreover, the capability of this way to deal with use speculation to give some sign of attacks is favorable position over expert’s system approaches that require a correct match to coded patterns to give an alarm.
  • 5. CMAC Neural Networks. www.ijmrem.com IJMREM Page 5 • Adaptive learning algorithm – The utilization of an adaptive learning factor, based on the current state of the protected host, gives the capability to quickly learn new attacks, in this way altogether diminishing learning time in periods when rapid attacks identification is required. The results of the a priori attacks resulted in an average error of the CMAC output of 0.4% (fig. 3) Figure 3: The Desired Response via Events Method 4: Handwritten Chinese Character Recognition Technology based on CMAC Neural Network Yan Shen, Lina Liu, Guoqiang Li [6] used 2000 Chinese characters as a template for training. The result is found that the handwritten character recognition accuracy rate of writing neat, appropriate proportion and straight strokes was up to 89.76%, however, the free writing recognition effect is not very good, to be corrected manually. With the improvement of the CMAC neural network theory and the depth study of the character feature extraction technology, CMAC neural network will be better used in the field of handwritten character recognition and has a very good application prospects. The figure below describes the flow chart of the proposed system. Fig. 4 described the flow chart for the proposed system. Figure1: Flowchart of character recognition based on neural network 1000 and 2000 Chinese characters are used as a template for training in the study. It is found that the handwritten character recognition accuracy rate of writing neat, appropriate proportion and straight strokes was up to 95.52 % in using 1000 characters and 89.76% in using 2000 charcaters, “Table” (2) describes the recognition rates of these characters using the BP and CMAC ANN.
  • 6. CMAC Neural Networks. www.ijmrem.com IJMREM Page 6 Table (2) Recognition Rates using BP & CMAC Test Text Recognition rates (1000 Character) (%) Recognition rates (12000 Character) (%) Text text1 (BP) 83.68 68.64 Text text2 (CMAC) 95.52 89.76 III. CONCLUSION Four methods were presented as an example in this paper to declare the advantages of using CMAC ANN. Every method has proved and showed the good and accurate results were found when using the CMAC neural network. For Future works for more method using different neural networks comparing with CMAC will be presented. REFERENCES 1. J. S. Albus, A theory of cerebellar function, Math. Biosci. 10 pp 25_61, (1971). 2. Albus J.S., Mechanisms of Planning and Problem Solving in the Brain, Mathematical Biosciences, Vol.45, pp.247-293, 1979. 3. Ahmed, Amira Elsir Tayfour, Facial Expression Recognition using Gabor wavelets and Neural Networks, University of Sudan for Science and Tchnologies, Phd thesis, 2016. 4. İhsan Ömür Bucak, and Bekir Karlık , Hazardous Odor Recognition by CMAC Based Neural Networks Sensors 9, 7308-7319; doi:10.3390/s90907308, 2009. 5. James Cannady, Applying CMAC-Based On-Line Learning to Intrusion Detection, Ph.D. Candidate, Nova Southeastern University Fort Lauderdale, FL 33314 6. Yan Shen, Lina Liu, Guoqiang Li, Handwritten Chinese Character Recognition Technology based on CMAC Neural Network, Atlantis Press, 2013.