SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Advanced Research in
Computer Science & Technology (IJARCST 2015)
25
Vol. 3, Issue 4 (Oct. - Dec. 2015)
ISSN : 2347 - 8446 (Online)
ISSN : 2347 - 9817 (Print)
www.ijarcst.com Š All Rights Reserved, IJARCST 2013
Noisy Character Recognition Using Artificial Neural Network
I
Anand Kumar Sharma, II
Bhaskar Gupta
I,II
Research Scholar (M.Tech. Student), SET, NIU, Gr. Noida Associate Professor, SET, NIU, Greater Noida
I. Introduction
One of the classical applications of Artificial Neural Network is
Noisy Character Recognition. Character Recognition finds its
applications in a number if area, such as in banking, security
products, hospitals, evaluations of examination papers, answer
sheets and even in robotics.
Inthisprojectweaimtodesignandimplementaneuralnetworkfor
performing character recognition. Because of the great flexibility
in MATLAB’s Neural Network Toolbox, we will be using it for
the whole implementation.
II. Neural Networks
NeuralNetworkisformedbyinterconnectinganumberofelements
called neurons in different layers together. These neurons work in
a same manner as they do in biological terms. Consider a system
in which a neural network is formed using three layers –Input ,
Hidden and Output as Shown in figure where Input layer is used
to fed all the input data. which is followed by a hidden layers
of neurons for further processing of data and finally the output
layer of neurons for calculating the desired response of the Neural
network Created.
Fig. Diagram of a neural network
The above figure shows the three layers of a neural network-input,
hidden and output layer.The output of individual neuron can be given
by:
Fig. Output of individual Neuron
OUTPUT=f(X1W1+X2W2+X3W3) as shown in the above figure
, where X1,X2and X3 are the inputs whereas W1,W2 and W3 are
weight in that layer.
Some functions used in Neural Network are as follows:-
In Multilayer neural networks , Log-sigmoid transfer functioncalled
Logsig are frequently used.
Fig. Log-Sigmoid Transfer Function
The above figure shows that the logsig function gives the outputs
between 0 and 1 whenever the neuron’s net input goes from negative
to positive infinity as shown in the above figure.Tan –sigmoid transfer
function Tansig can also be used in Multilayer networks.
Fig. Tan-Sigmoid Transfer Function
III. Some of the features of MATLAB include:
Ability to zip and unzip files and folders in the Current Folder•	
browser to simplify sharing of files
New visual cues in the Current Folder browser to show•	
directories on the MATLAB path
EnhancedtabcompletionintheMATLABEditorwithsupport•	
for local variables, subfunctions, and nested functions .
Expanded access in the plot selector to plots from the•	
Curve Fitting, Filter Design, Image Processing, and Signal
Processing Toolboxes.
IV. Basically we are roughly dividing the whole project
in three parts:
The first part consists of creating a simple neural network•	
using MATLAB, thus getting acquainted with the functions
and tools that MATLAB has to offer.
The second part will focus on character recognition, in which•	
Abstract
In This research aims at designing and developing a Neural Network based Character recognition system, capable of recognizing
a character correctly from noise. Neural Networks which bears highly parallel architecture, are becoming more and more fault
tolerant; thus making it very suitable for problems like pattern matching, character recognition etc. We assume that we have
acquired images of different English Alphabets, and during this acquisition the images get distorted due to various reasons. We
used Neural Network Toolbox in MATLAB. MATLAB has very powerful environment for supporting Neural Network Algorithms.
MATLAB provides various tools for designing & training Neural Network. The following screenshot shows the GUI (Graphical
User Interface) of the application developed.
Keywords
Character Recognition, Neural Network, Character Extraction algorithm, Edge Detection algorithm, Image acquisition.
International Journal of Advanced Research in
Computer Science & Technology (IJARCST 2015)
26
Vol. 3, Issue 4 (Oct. - Dec. 2015)
ISSN : 2347 - 8446 (Online)
ISSN : 2347 - 9817 (Print)
www.ijarcst.comŠ 2013, IJARCST All Rights Reserved
the difference between training a network with data that is
noisy or not noisy will be highlighted, (and optionally the
interpretation and response to English letters under five
different noise levels).
The last part will deal with designing and creating a neural•	
network in which we will focus on how parameter changes
and data manipulation can influence our design.
V. Figures of praposed model And Steps:
a. Design steps :
Fig. Proposed Design Model
b: 	 Figures of varrious activities during the perfomances of
project research are attached as the process of reviews.
Fig: Screenshot of Input stage ANN system.
C.	 Table Captions
Table: Specific parameter of the system
VI. Results and Applications-
Fig. Screenshot of noisy character
Fig. Noisy input X
Fig. Noise level of X
International Journal of Advanced Research in
Computer Science & Technology (IJARCST 2015)
27
Vol. 3, Issue 4 (Oct. - Dec. 2015)
ISSN : 2347 - 8446 (Online)
ISSN : 2347 - 9817 (Print)
www.ijarcst.com Š All Rights Reserved, IJARCST 2013
Fig. Recovered Output X
Fig. Noisy input T
Fig. Noise level of T
Fig. Recovered Output T
One of the classical applications of Artificial Neural Network is
Noisy Character Recognition. Character Recognition finds its
applications in a number if area, such as in banking, security
products, hospitals, evaluations of examination papers, answer
sheets and even in robotics.
VII. Conclusions
Our preliminary research in noisy character recognition clearly
indicates that Neural Network can be a most important tool for
the implementation of the Character Recognition System. Further
the latest CAD tools such as MATLAB, can provide us with
greater flexibility and enhance the efficiency and productivity
of the developers by reducing the complexity of coding.finaly
in future the entire algorithm will be implemented on embedded
system (AVR MICROCONTROLLER BOARD WITH USB
PROGRAMMER).
References :
	 Simon Haykin, Neural Networks: A comprehensive[1].
foundation, 2nd Edition, Prentice Hall, 1998
	 Shashank Araokar, ‘Visual Character Recognitionusing[2].
Artificial Neural Networks’
	 Srinivasa Kumar Devireddy, Settipalli Appa Rao, ‘HAND[3].
WRITTEN CHARACTER RECOGNITION USING BACK
PROPAGATION NETWORK’
	 WOJCIECH KACALAK, Department of Mechanical[4].
Engineering Raclawicka 15-17, 75-620 Koszalin, Poland
‘NEW METHODS FOR HANDWRITING RECOGNITION
USING ARTIFICIAL NEURAL NETWORKS’.
	 Hentrich, Michael (2015). “Methodology and Coronary[5].
Artery Disease Cure” (https://www.researchgate.net/
publication/281017979_Methodology_and_Coronary_
Artery_Disease_Cure).
	 McCulloch, Warren; Walter Pitts (1943). “A Logical[6].
Calculus of Ideas Immanent in Nervous Activity”.Bulletin	
of Mathematical Biophysics 5(4):115133.doi:10.1007/
BF02478259 https://dx.doi.org/10.1007%2FBF02478259
	 Hebb, Donald (1949). The Organization of Behavior. New[7].
York:Wiley.
	 Farley, B.G.; W.A. Clark (1954). “Simulation of[8].
Self­ Organizing Systems by Digital Computer”.IRE
TransactionsonInformationTheory4(4):7684.doi:10.1109/
TIT.1954.1057468 (https://dx.doi.org/10.1109%2FTIT.195
4.1057468).
	 Rochester, N.Íž J.H. HollandÍž L.H. HabitÍž W.L. Duda (1956).[9].
“Testsonacellassemblytheoryoftheactionofthebrain,using
a large digital computer”.IRE Transactionson Information
Theory 2(3):8093.doi:10.1109/TIT.1956.1056810 (https://
dx.doi.org/10.1109%2FTIT.1956.1056810).
	Rosenblatt, F. (1958). “The Perceptron: A Probabilistic[10].
Model For Information Storage And Organization In The
Brain”.PsychologicalReview65(6):386–408.doi:10.1037/
h0042519 (https://dx.doi.org/10.1037%2Fh0042519).
PMID 13602029 (https://www.ncbi.nlm.nih.gov/
pubmed/13602029).
	 Werbos, P.J. (1975). Beyond Regression: New Tools for[11].
Prediction and Analysis in the Behavioral Sciences.
	Minsky, M.Íž S. Papert (1969). An Introduction to[12].
Computational Geometry. MIT Press.ISBN0­262­63022­2.
	Rumelhart, D.EÍž James McClelland (1986). Parallel[13].
DistributedProcessing:ExplorationsintheMicrostructureof
Cognition. Cambridge: MIT	 Press.
	Russell,Ingrid.“NeuralNetworksModule”(http://uhaweb.[14].
hartford.edu/compsci/neural­networksdefinition.html).
Retrieved 2012.
	Yang, J. J.Íž Pickett, M. D.Íž Li, X. M.Íž Ohlberg, D. A. A.Íž[15].
Stewart, D. R. Íž Williams, R.S. Nat.Nanotechnol. 2008, 3,
International Journal of Advanced Research in
Computer Science & Technology (IJARCST 2015)
28
Vol. 3, Issue 4 (Oct. - Dec. 2015)
ISSN : 2347 - 8446 (Online)
ISSN : 2347 - 9817 (Print)
www.ijarcst.comŠ 2013, IJARCST All Rights Reserved
429–433.
	Strukov, D. B.Íž Snider, G. S.Íž Stewart, D. R.Íž Williams, R.[16].
S. Nature 2008, 453, 80–83.
	2012 Kurzweil AI Interview (http://www.kurzweilai.net/[17].
how­bio­inspired­deep­learning­keeps­winningcompetitions)
with JĂźrgen Schmidhuber on the eight competitions won
by his Deep	Learning team 2009–2012.
	http://www.kurzweilai.net/how­bio­inspired­deep­[18].
learning­keeps­winning­competitions 2012 Kurzweil AI
InterviewwithJĂźrgenSchmidhuberontheeightcompetitions
won by his Deep Learning team 2009–2012
	Graves, AlexÍž and Schmidhuber, JĂźrgenÍž Offline[19].
Handwriting Recognition with Multidimensional Recurrent
Neural Networks (http://www.idsia.ch/~juergen/nips2009.
pdf), in Bengio, YoshuaÍž Schuurmans, DaleÍž Lafferty,
JohnÍž Williams, Chris K. I.Íž and Culotta, Aron (eds.),
Advances in Neural Information Processing Systems
22(NIPS’22), 7–10 December 2009, Vancouver, BC, Neural
Information Processing Systems (NIPS) Foundation,2009,
pp. 545–552.
	A.Graves,M.Liwicki,S.Fernandez,R.Bertolami,H.Bunke,[20].
J.Schmidhuber.ANovelConnectionistSystemforImproved
Unconstrained Handwriting	 Recognition (http://www.
idsia.ch/~juergen/tpami_2008.pdf). IEEE Transactions on
Pattern Analysis and Machine Intelligence, vol. 31, no. 5,
2009.
	Graves, AlexÍž and Schmidhuber, JĂźrgenÍž Offline[21].
Handwriting Recognition with Multidimensiona Recurrent
Neural Networks, in Bengio, YoshuaÍž Schuurmans, DaleÍž
Lafferty,JohnÍž Williams,ChrisK.I.ÍžandCulotta,Aron(eds.),
Advances in Neural Information Processing Systems 22
(NIPS’22), December 7th–10th,2009,Vancouver, BC,
NeuralInformationProcessingSystems(NIPS)Foundation,
2009,pp.545–552.
	A. Graves, M. Liwicki, S. Fernandez, R. Bertolami, H.[22].
Bunke, J. Schmidhuber. A Novel Connectionist System for
Improved Unconstrained Handwriting Recognition. IEEE
TransactionsonPatternAnalysisandMachineIntelligence,
vol. 31, no.5,2009.
	D. C. Ciresan, U. Meier, J. Masci, J. Schmidhuber. Multi­[23].
ColumnDeepNeuralNetworkforTrafficSignClassification.
Neural Networks,2012.
	D.Ciresan,A.Giusti,L.Gambardella,J.Schmidhuber.Deep[24].
NeuralNetworksSegmentNeuronalMembranesinElectron
Microscopy Images. In Advances in Neural Information
Processing Systems (NIPS 2012), Lake Tahoe,2012.
Author's Profilels:
Andnd Kumar Sharma is currently pursuing
M.Tech. from Noida International University,
Greater Noida (India), in the area fo Digital
Communication Department of Electronics and
Communication Engineering.
Mr. Bhaskar Gupta is currently working
as an Associate Professor in Electronics &
Communication Engineering department
(School of Technology). He is looking after
M.Tech. Programmes too. He is having more
than 15 years of experience in teaching and
research area. He has more than 40 publications
in International and National Journals. He has
reviewed many papers from outside India like China, Korea etc.
His areas of interest are image processing, face recognition and
artificialintelligence.Hewasactivelyinvolvedinroboticsprojects
of KAIS, South Korea for too long time. He has guided more than
10 M.Tech. in UPTU, Jamia Hamdard and various other reputed
Universities.

More Related Content

What's hot

Predictive Metabonomics
Predictive MetabonomicsPredictive Metabonomics
Predictive MetabonomicsMarilyn Arceo
 
Deep learning - A Visual Introduction
Deep learning - A Visual IntroductionDeep learning - A Visual Introduction
Deep learning - A Visual IntroductionLukas Masuch
 
Introduction to Deep learning
Introduction to Deep learningIntroduction to Deep learning
Introduction to Deep learningleopauly
 
dagrep_v006_i004_p057_s16152
dagrep_v006_i004_p057_s16152dagrep_v006_i004_p057_s16152
dagrep_v006_i004_p057_s16152Lenore Mullin
 
Intro to Deep Learning for Computer Vision
Intro to Deep Learning for Computer VisionIntro to Deep Learning for Computer Vision
Intro to Deep Learning for Computer VisionChristoph KĂśrner
 
IRJET - Object Detection using Deep Learning with OpenCV and Python
IRJET - Object Detection using Deep Learning with OpenCV and PythonIRJET - Object Detection using Deep Learning with OpenCV and Python
IRJET - Object Detection using Deep Learning with OpenCV and PythonIRJET Journal
 
Handwritten Recognition using Deep Learning with R
Handwritten Recognition using Deep Learning with RHandwritten Recognition using Deep Learning with R
Handwritten Recognition using Deep Learning with RPoo Kuan Hoong
 
Deep Learning: Application Landscape - March 2018
Deep Learning: Application Landscape - March 2018Deep Learning: Application Landscape - March 2018
Deep Learning: Application Landscape - March 2018Grigory Sapunov
 
Constructing Operating Systems and E-Commerce
Constructing Operating Systems and E-CommerceConstructing Operating Systems and E-Commerce
Constructing Operating Systems and E-CommerceIJARIIT
 
Dataset creation for Deep Learning-based Geometric Computer Vision problems
Dataset creation for Deep Learning-based Geometric Computer Vision problemsDataset creation for Deep Learning-based Geometric Computer Vision problems
Dataset creation for Deep Learning-based Geometric Computer Vision problemsPetteriTeikariPhD
 
Introduction of Deep Learning
Introduction of Deep LearningIntroduction of Deep Learning
Introduction of Deep LearningMyungjin Lee
 
Deep learning
Deep learning Deep learning
Deep learning Rajgupta258
 
From Conventional Machine Learning to Deep Learning and Beyond.pptx
From Conventional Machine Learning to Deep Learning and Beyond.pptxFrom Conventional Machine Learning to Deep Learning and Beyond.pptx
From Conventional Machine Learning to Deep Learning and Beyond.pptxChun-Hao Chang
 
Jz3118501853
Jz3118501853Jz3118501853
Jz3118501853IJERA Editor
 
UNSUPERVISED LEARNING MODELS OF INVARIANT FEATURES IN IMAGES: RECENT DEVELOPM...
UNSUPERVISED LEARNING MODELS OF INVARIANT FEATURES IN IMAGES: RECENT DEVELOPM...UNSUPERVISED LEARNING MODELS OF INVARIANT FEATURES IN IMAGES: RECENT DEVELOPM...
UNSUPERVISED LEARNING MODELS OF INVARIANT FEATURES IN IMAGES: RECENT DEVELOPM...ijscai
 
Deep learning frameworks v0.40
Deep learning frameworks v0.40Deep learning frameworks v0.40
Deep learning frameworks v0.40Jessica Willis
 
184816386 x mining
184816386 x mining184816386 x mining
184816386 x mining496573
 

What's hot (19)

Predictive Metabonomics
Predictive MetabonomicsPredictive Metabonomics
Predictive Metabonomics
 
Deep learning - A Visual Introduction
Deep learning - A Visual IntroductionDeep learning - A Visual Introduction
Deep learning - A Visual Introduction
 
Introduction to Deep learning
Introduction to Deep learningIntroduction to Deep learning
Introduction to Deep learning
 
dagrep_v006_i004_p057_s16152
dagrep_v006_i004_p057_s16152dagrep_v006_i004_p057_s16152
dagrep_v006_i004_p057_s16152
 
Intro to Deep Learning for Computer Vision
Intro to Deep Learning for Computer VisionIntro to Deep Learning for Computer Vision
Intro to Deep Learning for Computer Vision
 
IRJET - Object Detection using Deep Learning with OpenCV and Python
IRJET - Object Detection using Deep Learning with OpenCV and PythonIRJET - Object Detection using Deep Learning with OpenCV and Python
IRJET - Object Detection using Deep Learning with OpenCV and Python
 
Handwritten Recognition using Deep Learning with R
Handwritten Recognition using Deep Learning with RHandwritten Recognition using Deep Learning with R
Handwritten Recognition using Deep Learning with R
 
Deep Learning: Application Landscape - March 2018
Deep Learning: Application Landscape - March 2018Deep Learning: Application Landscape - March 2018
Deep Learning: Application Landscape - March 2018
 
V01 i010411
V01 i010411V01 i010411
V01 i010411
 
Constructing Operating Systems and E-Commerce
Constructing Operating Systems and E-CommerceConstructing Operating Systems and E-Commerce
Constructing Operating Systems and E-Commerce
 
AlexNet
AlexNetAlexNet
AlexNet
 
Dataset creation for Deep Learning-based Geometric Computer Vision problems
Dataset creation for Deep Learning-based Geometric Computer Vision problemsDataset creation for Deep Learning-based Geometric Computer Vision problems
Dataset creation for Deep Learning-based Geometric Computer Vision problems
 
Introduction of Deep Learning
Introduction of Deep LearningIntroduction of Deep Learning
Introduction of Deep Learning
 
Deep learning
Deep learning Deep learning
Deep learning
 
From Conventional Machine Learning to Deep Learning and Beyond.pptx
From Conventional Machine Learning to Deep Learning and Beyond.pptxFrom Conventional Machine Learning to Deep Learning and Beyond.pptx
From Conventional Machine Learning to Deep Learning and Beyond.pptx
 
Jz3118501853
Jz3118501853Jz3118501853
Jz3118501853
 
UNSUPERVISED LEARNING MODELS OF INVARIANT FEATURES IN IMAGES: RECENT DEVELOPM...
UNSUPERVISED LEARNING MODELS OF INVARIANT FEATURES IN IMAGES: RECENT DEVELOPM...UNSUPERVISED LEARNING MODELS OF INVARIANT FEATURES IN IMAGES: RECENT DEVELOPM...
UNSUPERVISED LEARNING MODELS OF INVARIANT FEATURES IN IMAGES: RECENT DEVELOPM...
 
Deep learning frameworks v0.40
Deep learning frameworks v0.40Deep learning frameworks v0.40
Deep learning frameworks v0.40
 
184816386 x mining
184816386 x mining184816386 x mining
184816386 x mining
 

Similar to M tech published paper

IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...IRJET Journal
 
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXINGPERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXINGijesajournal
 
Image transformation using grid(synopsis)
Image transformation using grid(synopsis)Image transformation using grid(synopsis)
Image transformation using grid(synopsis)Mumbai Academisc
 
research Paper face recognition attendance system
research Paper face recognition attendance systemresearch Paper face recognition attendance system
research Paper face recognition attendance systemAnkitRao82
 
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...ijcsit
 
Deep Learning Demystified
Deep Learning DemystifiedDeep Learning Demystified
Deep Learning DemystifiedAffine Analytics
 
A survey of research on cloud robotics and automation
A survey of research on cloud robotics and automationA survey of research on cloud robotics and automation
A survey of research on cloud robotics and automationredpel dot com
 
An Efficient Hardware Implementation of Canny Edge Detection Algorithm
An Efficient Hardware Implementation of Canny Edge Detection AlgorithmAn Efficient Hardware Implementation of Canny Edge Detection Algorithm
An Efficient Hardware Implementation of Canny Edge Detection Algorithmijtsrd
 
Microsoft Dryad
Microsoft DryadMicrosoft Dryad
Microsoft DryadColin Clark
 
Software Technologies for ICT Architectures
Software Technologies for ICT ArchitecturesSoftware Technologies for ICT Architectures
Software Technologies for ICT ArchitecturesAntonio Marcos Alberti
 
Voice Enable Blind Assistance System -Real time Object Detection
Voice Enable Blind Assistance System -Real time Object DetectionVoice Enable Blind Assistance System -Real time Object Detection
Voice Enable Blind Assistance System -Real time Object DetectionIRJET Journal
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmIRJET Journal
 
A Review of Neural Networks Architectures, Designs, and Applications
A Review of Neural Networks Architectures, Designs, and ApplicationsA Review of Neural Networks Architectures, Designs, and Applications
A Review of Neural Networks Architectures, Designs, and ApplicationsIRJET Journal
 
Transfer Leaning Using Pytorch synopsis Minor project pptx
Transfer Leaning Using Pytorch  synopsis Minor project pptxTransfer Leaning Using Pytorch  synopsis Minor project pptx
Transfer Leaning Using Pytorch synopsis Minor project pptxAnkit Gupta
 
Application Of VLSI In Artificial Intelligence
Application Of VLSI In Artificial IntelligenceApplication Of VLSI In Artificial Intelligence
Application Of VLSI In Artificial IntelligenceDereck Downing
 
Application of VLSI In Artificial Intelligence
Application of VLSI In Artificial IntelligenceApplication of VLSI In Artificial Intelligence
Application of VLSI In Artificial IntelligenceIOSR Journals
 
Mastering AIOps with Deep Learning
Mastering AIOps with Deep LearningMastering AIOps with Deep Learning
Mastering AIOps with Deep LearningJorge Cardoso
 
Dynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT EnvironmentsDynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT EnvironmentsPayamBarnaghi
 

Similar to M tech published paper (20)

IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
 
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXINGPERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
 
Image transformation using grid(synopsis)
Image transformation using grid(synopsis)Image transformation using grid(synopsis)
Image transformation using grid(synopsis)
 
research Paper face recognition attendance system
research Paper face recognition attendance systemresearch Paper face recognition attendance system
research Paper face recognition attendance system
 
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
 
Deep Learning Demystified
Deep Learning DemystifiedDeep Learning Demystified
Deep Learning Demystified
 
A survey of research on cloud robotics and automation
A survey of research on cloud robotics and automationA survey of research on cloud robotics and automation
A survey of research on cloud robotics and automation
 
An Efficient Hardware Implementation of Canny Edge Detection Algorithm
An Efficient Hardware Implementation of Canny Edge Detection AlgorithmAn Efficient Hardware Implementation of Canny Edge Detection Algorithm
An Efficient Hardware Implementation of Canny Edge Detection Algorithm
 
Microsoft Dryad
Microsoft DryadMicrosoft Dryad
Microsoft Dryad
 
Software Technologies for ICT Architectures
Software Technologies for ICT ArchitecturesSoftware Technologies for ICT Architectures
Software Technologies for ICT Architectures
 
Voice Enable Blind Assistance System -Real time Object Detection
Voice Enable Blind Assistance System -Real time Object DetectionVoice Enable Blind Assistance System -Real time Object Detection
Voice Enable Blind Assistance System -Real time Object Detection
 
A Back Propagation Neural Network Intrusion Detection System Based on KVM
A Back Propagation Neural Network Intrusion Detection System Based on KVMA Back Propagation Neural Network Intrusion Detection System Based on KVM
A Back Propagation Neural Network Intrusion Detection System Based on KVM
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
 
A Review of Neural Networks Architectures, Designs, and Applications
A Review of Neural Networks Architectures, Designs, and ApplicationsA Review of Neural Networks Architectures, Designs, and Applications
A Review of Neural Networks Architectures, Designs, and Applications
 
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation UnitMIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
 
Transfer Leaning Using Pytorch synopsis Minor project pptx
Transfer Leaning Using Pytorch  synopsis Minor project pptxTransfer Leaning Using Pytorch  synopsis Minor project pptx
Transfer Leaning Using Pytorch synopsis Minor project pptx
 
Application Of VLSI In Artificial Intelligence
Application Of VLSI In Artificial IntelligenceApplication Of VLSI In Artificial Intelligence
Application Of VLSI In Artificial Intelligence
 
Application of VLSI In Artificial Intelligence
Application of VLSI In Artificial IntelligenceApplication of VLSI In Artificial Intelligence
Application of VLSI In Artificial Intelligence
 
Mastering AIOps with Deep Learning
Mastering AIOps with Deep LearningMastering AIOps with Deep Learning
Mastering AIOps with Deep Learning
 
Dynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT EnvironmentsDynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT Environments
 

Recently uploaded

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Christopher Logan Kennedy
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

M tech published paper

  • 1. International Journal of Advanced Research in Computer Science & Technology (IJARCST 2015) 25 Vol. 3, Issue 4 (Oct. - Dec. 2015) ISSN : 2347 - 8446 (Online) ISSN : 2347 - 9817 (Print) www.ijarcst.com Š All Rights Reserved, IJARCST 2013 Noisy Character Recognition Using Artificial Neural Network I Anand Kumar Sharma, II Bhaskar Gupta I,II Research Scholar (M.Tech. Student), SET, NIU, Gr. Noida Associate Professor, SET, NIU, Greater Noida I. Introduction One of the classical applications of Artificial Neural Network is Noisy Character Recognition. Character Recognition finds its applications in a number if area, such as in banking, security products, hospitals, evaluations of examination papers, answer sheets and even in robotics. Inthisprojectweaimtodesignandimplementaneuralnetworkfor performing character recognition. Because of the great flexibility in MATLAB’s Neural Network Toolbox, we will be using it for the whole implementation. II. Neural Networks NeuralNetworkisformedbyinterconnectinganumberofelements called neurons in different layers together. These neurons work in a same manner as they do in biological terms. Consider a system in which a neural network is formed using three layers –Input , Hidden and Output as Shown in figure where Input layer is used to fed all the input data. which is followed by a hidden layers of neurons for further processing of data and finally the output layer of neurons for calculating the desired response of the Neural network Created. Fig. Diagram of a neural network The above figure shows the three layers of a neural network-input, hidden and output layer.The output of individual neuron can be given by: Fig. Output of individual Neuron OUTPUT=f(X1W1+X2W2+X3W3) as shown in the above figure , where X1,X2and X3 are the inputs whereas W1,W2 and W3 are weight in that layer. Some functions used in Neural Network are as follows:- In Multilayer neural networks , Log-sigmoid transfer functioncalled Logsig are frequently used. Fig. Log-Sigmoid Transfer Function The above figure shows that the logsig function gives the outputs between 0 and 1 whenever the neuron’s net input goes from negative to positive infinity as shown in the above figure.Tan –sigmoid transfer function Tansig can also be used in Multilayer networks. Fig. Tan-Sigmoid Transfer Function III. Some of the features of MATLAB include: Ability to zip and unzip files and folders in the Current Folder• browser to simplify sharing of files New visual cues in the Current Folder browser to show• directories on the MATLAB path EnhancedtabcompletionintheMATLABEditorwithsupport• for local variables, subfunctions, and nested functions . Expanded access in the plot selector to plots from the• Curve Fitting, Filter Design, Image Processing, and Signal Processing Toolboxes. IV. Basically we are roughly dividing the whole project in three parts: The first part consists of creating a simple neural network• using MATLAB, thus getting acquainted with the functions and tools that MATLAB has to offer. The second part will focus on character recognition, in which• Abstract In This research aims at designing and developing a Neural Network based Character recognition system, capable of recognizing a character correctly from noise. Neural Networks which bears highly parallel architecture, are becoming more and more fault tolerant; thus making it very suitable for problems like pattern matching, character recognition etc. We assume that we have acquired images of different English Alphabets, and during this acquisition the images get distorted due to various reasons. We used Neural Network Toolbox in MATLAB. MATLAB has very powerful environment for supporting Neural Network Algorithms. MATLAB provides various tools for designing & training Neural Network. The following screenshot shows the GUI (Graphical User Interface) of the application developed. Keywords Character Recognition, Neural Network, Character Extraction algorithm, Edge Detection algorithm, Image acquisition.
  • 2. International Journal of Advanced Research in Computer Science & Technology (IJARCST 2015) 26 Vol. 3, Issue 4 (Oct. - Dec. 2015) ISSN : 2347 - 8446 (Online) ISSN : 2347 - 9817 (Print) www.ijarcst.comŠ 2013, IJARCST All Rights Reserved the difference between training a network with data that is noisy or not noisy will be highlighted, (and optionally the interpretation and response to English letters under five different noise levels). The last part will deal with designing and creating a neural• network in which we will focus on how parameter changes and data manipulation can influence our design. V. Figures of praposed model And Steps: a. Design steps : Fig. Proposed Design Model b: Figures of varrious activities during the perfomances of project research are attached as the process of reviews. Fig: Screenshot of Input stage ANN system. C. Table Captions Table: Specific parameter of the system VI. Results and Applications- Fig. Screenshot of noisy character Fig. Noisy input X Fig. Noise level of X
  • 3. International Journal of Advanced Research in Computer Science & Technology (IJARCST 2015) 27 Vol. 3, Issue 4 (Oct. - Dec. 2015) ISSN : 2347 - 8446 (Online) ISSN : 2347 - 9817 (Print) www.ijarcst.com Š All Rights Reserved, IJARCST 2013 Fig. Recovered Output X Fig. Noisy input T Fig. Noise level of T Fig. Recovered Output T One of the classical applications of Artificial Neural Network is Noisy Character Recognition. Character Recognition finds its applications in a number if area, such as in banking, security products, hospitals, evaluations of examination papers, answer sheets and even in robotics. VII. Conclusions Our preliminary research in noisy character recognition clearly indicates that Neural Network can be a most important tool for the implementation of the Character Recognition System. Further the latest CAD tools such as MATLAB, can provide us with greater flexibility and enhance the efficiency and productivity of the developers by reducing the complexity of coding.finaly in future the entire algorithm will be implemented on embedded system (AVR MICROCONTROLLER BOARD WITH USB PROGRAMMER). References : Simon Haykin, Neural Networks: A comprehensive[1]. foundation, 2nd Edition, Prentice Hall, 1998 Shashank Araokar, ‘Visual Character Recognitionusing[2]. Artificial Neural Networks’ Srinivasa Kumar Devireddy, Settipalli Appa Rao, ‘HAND[3]. WRITTEN CHARACTER RECOGNITION USING BACK PROPAGATION NETWORK’ WOJCIECH KACALAK, Department of Mechanical[4]. Engineering Raclawicka 15-17, 75-620 Koszalin, Poland ‘NEW METHODS FOR HANDWRITING RECOGNITION USING ARTIFICIAL NEURAL NETWORKS’. Hentrich, Michael (2015). “Methodology and Coronary[5]. Artery Disease Cure” (https://www.researchgate.net/ publication/281017979_Methodology_and_Coronary_ Artery_Disease_Cure). McCulloch, WarrenÍž Walter Pitts (1943). “A Logical[6]. Calculus of Ideas Immanent in Nervous Activity”.Bulletin of Mathematical Biophysics 5(4):115133.doi:10.1007/ BF02478259 https://dx.doi.org/10.1007%2FBF02478259 Hebb, Donald (1949). The Organization of Behavior. New[7]. York:Wiley. Farley, B.G.Íž W.A. Clark (1954). “Simulation of[8]. Self­ Organizing Systems by Digital Computer”.IRE TransactionsonInformationTheory4(4):7684.doi:10.1109/ TIT.1954.1057468 (https://dx.doi.org/10.1109%2FTIT.195 4.1057468). Rochester, N.Íž J.H. HollandÍž L.H. HabitÍž W.L. Duda (1956).[9]. “Testsonacellassemblytheoryoftheactionofthebrain,using a large digital computer”.IRE Transactionson Information Theory 2(3):8093.doi:10.1109/TIT.1956.1056810 (https:// dx.doi.org/10.1109%2FTIT.1956.1056810). Rosenblatt, F. (1958). “The Perceptron: A Probabilistic[10]. Model For Information Storage And Organization In The Brain”.PsychologicalReview65(6):386–408.doi:10.1037/ h0042519 (https://dx.doi.org/10.1037%2Fh0042519). PMID 13602029 (https://www.ncbi.nlm.nih.gov/ pubmed/13602029). Werbos, P.J. (1975). Beyond Regression: New Tools for[11]. Prediction and Analysis in the Behavioral Sciences. Minsky, M.Íž S. Papert (1969). An Introduction to[12]. Computational Geometry. MIT Press.ISBN0­262­63022­2. Rumelhart, D.EÍž James McClelland (1986). Parallel[13]. DistributedProcessing:ExplorationsintheMicrostructureof Cognition. Cambridge: MIT Press. Russell,Ingrid.“NeuralNetworksModule”(http://uhaweb.[14]. hartford.edu/compsci/neural­networksdefinition.html). Retrieved 2012. Yang, J. J.Íž Pickett, M. D.Íž Li, X. M.Íž Ohlberg, D. A. A.Íž[15]. Stewart, D. R. Íž Williams, R.S. Nat.Nanotechnol. 2008, 3,
  • 4. International Journal of Advanced Research in Computer Science & Technology (IJARCST 2015) 28 Vol. 3, Issue 4 (Oct. - Dec. 2015) ISSN : 2347 - 8446 (Online) ISSN : 2347 - 9817 (Print) www.ijarcst.comŠ 2013, IJARCST All Rights Reserved 429–433. Strukov, D. B.Íž Snider, G. S.Íž Stewart, D. R.Íž Williams, R.[16]. S. Nature 2008, 453, 80–83. 2012 Kurzweil AI Interview (http://www.kurzweilai.net/[17]. how­bio­inspired­deep­learning­keeps­winningcompetitions) with JĂźrgen Schmidhuber on the eight competitions won by his Deep Learning team 2009–2012. http://www.kurzweilai.net/how­bio­inspired­deep­[18]. learning­keeps­winning­competitions 2012 Kurzweil AI InterviewwithJĂźrgenSchmidhuberontheeightcompetitions won by his Deep Learning team 2009–2012 Graves, AlexÍž and Schmidhuber, JĂźrgenÍž Offline[19]. Handwriting Recognition with Multidimensional Recurrent Neural Networks (http://www.idsia.ch/~juergen/nips2009. pdf), in Bengio, YoshuaÍž Schuurmans, DaleÍž Lafferty, JohnÍž Williams, Chris K. I.Íž and Culotta, Aron (eds.), Advances in Neural Information Processing Systems 22(NIPS’22), 7–10 December 2009, Vancouver, BC, Neural Information Processing Systems (NIPS) Foundation,2009, pp. 545–552. A.Graves,M.Liwicki,S.Fernandez,R.Bertolami,H.Bunke,[20]. J.Schmidhuber.ANovelConnectionistSystemforImproved Unconstrained Handwriting Recognition (http://www. idsia.ch/~juergen/tpami_2008.pdf). IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 31, no. 5, 2009. Graves, AlexÍž and Schmidhuber, JĂźrgenÍž Offline[21]. Handwriting Recognition with Multidimensiona Recurrent Neural Networks, in Bengio, YoshuaÍž Schuurmans, DaleÍž Lafferty,JohnÍž Williams,ChrisK.I.ÍžandCulotta,Aron(eds.), Advances in Neural Information Processing Systems 22 (NIPS’22), December 7th–10th,2009,Vancouver, BC, NeuralInformationProcessingSystems(NIPS)Foundation, 2009,pp.545–552. A. Graves, M. Liwicki, S. Fernandez, R. Bertolami, H.[22]. Bunke, J. Schmidhuber. A Novel Connectionist System for Improved Unconstrained Handwriting Recognition. IEEE TransactionsonPatternAnalysisandMachineIntelligence, vol. 31, no.5,2009. D. C. Ciresan, U. Meier, J. Masci, J. Schmidhuber. Multi­[23]. ColumnDeepNeuralNetworkforTrafficSignClassification. Neural Networks,2012. D.Ciresan,A.Giusti,L.Gambardella,J.Schmidhuber.Deep[24]. NeuralNetworksSegmentNeuronalMembranesinElectron Microscopy Images. In Advances in Neural Information Processing Systems (NIPS 2012), Lake Tahoe,2012. Author's Profilels: Andnd Kumar Sharma is currently pursuing M.Tech. from Noida International University, Greater Noida (India), in the area fo Digital Communication Department of Electronics and Communication Engineering. Mr. Bhaskar Gupta is currently working as an Associate Professor in Electronics & Communication Engineering department (School of Technology). He is looking after M.Tech. Programmes too. He is having more than 15 years of experience in teaching and research area. He has more than 40 publications in International and National Journals. He has reviewed many papers from outside India like China, Korea etc. His areas of interest are image processing, face recognition and artificialintelligence.Hewasactivelyinvolvedinroboticsprojects of KAIS, South Korea for too long time. He has guided more than 10 M.Tech. in UPTU, Jamia Hamdard and various other reputed Universities.