SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
DOI:10.5121/ijfcst.2016.6104 49
SEGMENTATION AND RECOGNITION OF
HANDWRITTEN DIGIT NUMERAL STRING USING A
MULTI LAYER PERCEPTRON NEURAL NETWORKS
N. Venkateswara Rao1
and Dr. B. Raveendra Babu2
1
Dept. of Computer Science & Engineering, R.V.R. & J.C. College of Engineering,
Guntur, INDIA
2
Professor, Dept. of Computer Science & Engineering VNR Vignana Jyothi Institute of
Engineering and Technology, Hyderabad, INDIA
ABSTRACT
In this paper, the use of Multi-Layer Perceptron (MLP) Neural Network model is proposed for recognizing
unconstrained offline handwritten Numeral strings. The Numeral strings are segmented and isolated
numerals are obtained using a connected component labeling (CCL) algorithm approach. The structural
part of the models has been modeled using a Multilayer Perceptron Neural Network. This paper also
presents a new technique to remove slope and slant from handwritten numeral string and to normalize the
size of text images and classify with supervised learning methods. Experimental results on a database of
102 numeral string patterns written by 3 different people show that a recognition rate of 99.7% is obtained
on independent digits contained in the numeral string of digits includes both the skewed and slant data.
KEYWORDS
Connected Components Labeling, Multi-Layer Perceptron Neural Networks, Segmentation, Feature
Extraction, Handwritten recognition.
1. INTRODUCTION
Recognizing writer-independent handwritten numeral string of digits is still a difficult problem
for a computer although it has been a research topic for over so many decades. The key problem
is due to an unlimited number of styles, sizes and variations of digit patterns used by different
people. As a critical preprocessing stage in handwritten numerical string recognition, the
numerical string digits segmentation exports results which will affect the performance of the
overall recognition system. There still exist several challenges in the numerical string
segmentation for hand written document. Unlike machine printed document, the free-style
handwritten numerical string of digits is often curved, have various skew angles, no uniform
direction, connect or overlap with each other. A study of the present literature exposes that an
excessive amount of research work has been made to resolve the problem. Different sets of
features in topological and spatial domain, as well as in frequency domain, have been proposed
for the recognition of handwritten characters [1]. Moreover, a variety of classification methods,
such as template matching, structural, syntactic and neural network approaches are adopted for
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
50
classification and/or recognition [2, 11]. However, most of these algorithms could not yield
satisfactory recognition performance in the cases of rotated and noisy patterns. Multi-module
(multi-expert) neural networks have been studied for the last few years in order to reduce the
learning complexity and to improve the system performance [3]. The neural network classifiers
are generally classified into two categories. In one category, each module of the neural network is
used to look after a sub-region of the feature space or a subgroup of classes in the hope that each
of these local expert can take better care of its own domain so that the overall performance can be
improved [4, 5]. In the other category, each module of the neural network is used to deal with the
input from one of the multiple sensors that are used to collect all possible data. Handwritten
character recognition task is very complex. Normally recognition of isolated characters is a
simple task than a string of characters [6-10].These systems are used in many areas like automatic
processing of bank checks, tax forms, postal identification numbers, optical response sheets etc.,.
In this work, a connected component labeling algorithm [12] is used to segment the individual
numerals of the image. For any character recognition problems to segment the characters, it is
required to do some preprocessing methods for getting better features.
2. SEGMENTATION AND RECOGNITION OF HAND WRITTEN NUMERAL
STRING
The procedure done before processing by correcting images from different errors is called
preprocessing. The preprocessing is to be done before image enhancement. It includes conversion
to a binary image, applying Median filtering to remove noise, and Thinning etc.
2.1 Binarization:
Scanned input image is given as input. It is checked whether the image is color or grayscale or
binary. If the image is not binary image it is converted to binary image.
1. Calculating the size of the image.
2. Finding the sum of the pixels.
3. Calculating the average threshold value using the sum of the pixels and the size of the
image.
4. Comparing the generated threshold value with the pixel value of the image. If the pixel is
value is greater than the threshold value, then assign the pixel a value of ‘1’ otherwise
‘0’.
2.2 Noise Removal:
Median filters are commonly used methods to remove the noise. Median filter is one of the most
popular non-linear filters to remove the salt & pepper noise. The noise is removed by substituting
the mask center value by the median value of midpoint neighborhood.
2.3 Skew Correction
In mathematical terms skew means, lines that are neither parallel nor intersecting. The skew
correction is performed on such lines. The image is rotated with an angle to remove the skew.
Skew correction is used to align the image base line with the x-axis.In this system, a lower
baseline is drawn where the maximum pixels are located. An example is shown in Figure 1.
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
51
1) The lowest black pixel is determined in every column of the image to populate the set S.
S = {si = (xi; yi)/lowest black pixel in column xi}
2) To fit as the baseline of the current line, the data set S is used to calculate a least-squares
linear regression to find a base line of the form y = mx+c
3) Computing the arctangent of the line slope that produces the rotation angle, theta= arctan(m)
4) Rotate the image by negative theta value computed in step 3 to remove the skew.
Figure 1 Sample Skew Correction Image
2.4 Slant Removal
It is used to normalize writing where the text is at an angle with the goal of making the text
upright. Here based on a line, image is rotated with the angle so that the slant present in the image
is removed.
The slant correction algorithm is as follows:
1) Calculate the new transformations from -45 degrees to 45 degrees angle to shear and
transform the line
2) Generate a vertical projection histogram for each shear angle calculated in the above step.
3) Calculate Time Frequency distribution of each vertical histogram computed in the above step.
4) Remove the slant of the image by choosing angle representing the largest distribution
intensity from the histogram computed in the above step.
Figure 2 Sample Slant Correction Image
2.5 Segmentation
Segmentation is the process of dividing the string of numeral digits into individual digit images.
Normally there are three approaches for dividing the string of numerals into individual digits.
They are 1) External segmentation, where digit boundaries are found prior to segmentation, 2)
Internal segmentation, in which letter boundaries are determined as part of recognition, and 3) No
segmentation, where recognition occurs at string level. In this paper an internal segmentation is
done by using a connected components labeling (CCL) approach method.
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
52
The algorithm for finding the connected components of an image is
1) Scan the image by moving along a row until it comes to a point p (where p denotes the
pixel to be labeled at any stage in the scanning process) for which V= {1}.
2) When this is true, examine the four neighbors of p which have already been encountered
in the scan
a. To the left of p.
b. Above it.
c. The two upper diagonal terms.
3) The labeling of p occurs as follows:
a. If all four neighbors are 0, assign a new label top, else
b. if only one neighbor has V={1}, assign its label to p, else
c. If more than one of the neighbors have V={1}, assign one of the labels to p and
make a note of the equivalences.
2.6 Feature Extraction
For achieving high recognition rate, the selection of appropriate feature extraction method is very
important. After pre-processing i.e., skew correction, slant correction, and segmentation is done
the image is normalized to a 15x15 without changing the aspect ratio. A total of 225 features are
taken from the image to classify the image. The features of the characters that are important for
classifying them at recognition stage are extracted. This is an important stage as its effective
functioning increases the recognition rate and decreases the misclassification. The features are
extracted for all images after segmenting the string of numerals into individual digits where one
sample of the image is shown in Figure 1 which is a skew corrected image and Figure 2 is after
slant correction.
2.7 Classification
As the features are extracted, an appropriate classifier must be selected. A number of classifiers
are used and each classifier suitable to classify a specific kind of feature vector depending upon
its characteristics is found. The Neural Network classifier is used commonly for classification. A
multi-layer perceptron neural network classifier is used here for recognition. The most common
classifier model is multi-layer perceptron neural networks. In order to learn this neural network, it
requires a desired output because it is a supervised network. The goal of this network is to create
a model which correctly maps from input to the output with historical data. A sample
representation of a multi-layer perceptron is shown in Figure 3.
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
53
Figure 3 Architecture of Multi Layer Perceptron (MLP) Neural Network
3. RESULTS AND DISCUSSIONS
Experiments are conducted on different numerical string of characters written by three different
writers. In this work, 40 samples from writer1 and 38 samples from writer2 and 24 samples from
writer3 are collected. A total of 102 numerical strings of characters from these three different
writers are collected. These samples contain a total number of 617 individual digits covering all
the digits approximately equal which is shown in table 1. Each sample of numerical string is
segmented into individual digits. Each digit is normalized to a size of 15X15 pixels. From the
normalized image the features are extracted and training is performed with the multi layer
perceptron back propagation neural network. From the confusion matrix, shown in Figure 4, it is
observed that a recognition rate of 99.7% and an error rate of 0.3% is obtained. Some of the
sample images written by different writers are shown in Figure 5.
Table 1 Sample Images database
Writer1 Writer2 Writer3 Total
No: of samples 40 38 24 102
Number of 0’s 22 21 14 57
Number of 1’s 29 22 15 66
Number of 2’s 28 22 15 65
Number of 3’s 19 23 17 57
Number of 4’s 25 22 15 62
Number of 5’s 25 24 12 63
Number of 6’s 27 24 14 65
Number of 7’s 26 22 14 62
Number of 8’s 27 22 15 63
Number of 9’s 23 21 13 59
Total Digits 251 223 144 617
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
54
Figure 4 Confusion Matrix
Figure 5 Sample Images
4. CONCLUSION
Previous work of the authors of this paper is limited to an isolated digit character. In this paper, a
new method for handwritten digits recognition from a string of numerals using a multi-layer
perceptron neural network is presented. The effectiveness of this proposed method was evaluated
by computing the recognition rate and error rate. It is observed that a recognition rate of 99.7%
and an error rate of 0.3% on handwritten string of numerals is obtained.
REFERENCES
[l] C. Y. Suen. Distinctive features in automatic recognition of hand printed characters. Signal
Processing, 4(2 & 3):193 - 207, 1982.
[2] S. Mori, C. Y. Suen, and K. Yamamoto. Historical review of OCR research and development.
Proceedings of the IEEE, 80(7):1029 - 1058, 1992.
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
55
[3] Michael I. Jordan and Robert A. Jacobs. Hierarchies of adaptive experts. In Advance in Neural
Information Processing Systems 4,
[4] Tatsuo Matsuoka, Hiroshi Hamada, and Ryohei Nakatsu. Syllable recognition using integrated neural
networks. In IEEE INNS International Joint Conference on Neural Networks, volume 1, 1989.
[5] Z. Chi and M. Jabri. A Multi-Module Neural Network Approach for ICEG Classification. In
Proceedings of the Third Australian Conference on Neural Networks, Canberra, Australia, 1992.
[6] Thien M. Ha, Matthias Zimmermann, Horst Bunke, Off-line handwritten numeral string recognition
by combining segmentation-based and segmentation-free methods, Journal of Pattern Recognition,
Volume 31, Issue 3, Pages 257–272, March 1998.
[7] Zhixin Shi, Venu Govindaraju, Segmentation and recognition of connected handwritten numeral
strings, Journal of Pattern Recognition, Volume 30, Issue 9, Pages 1501-1504, 1997.
[8] Ashraf Elnagara, Reda Alhajj, Segmentation of connected handwritten numeral strings, Journal of
Pattern Recognition, Volume 36, Issue 3, Pages 625–634, March 2003.
[9] Yi-Kai Chen, Jhing-Fa Wang, Segmentation of single- or multiple-touching handwritten numeral
string using background and foreground analysis, IEEE Transactions on Pattern Analysis and Machine
Intelligence, Volume 22, Issue 11, Pages 1304 – 1317, Nov 2000.
[10] Javad Sadria, Ching Y. Suena, Tien D. Bui, A genetic framework using contextual knowledge for
segmentation and recognition of handwritten numeral strings, Journal of Pattern Recognition, Volume
40, Issue 3, Pages 898–919, March 2007.
[11] N. Venkateswara Rao, Dr. B. Raveendra Babu, G. Rama Mohan Babu, A Radial Basis Function
Neural Network to Recognize Handwritten Numerals with normalized moment features from
skeletons, IEEE International Conference on Recent Trends in Information Technology (ICRTIT),
Pages 68 – 72, 2013.
[12] Di Stefano, L.Bulgarelli, Andrea , A simple and efficient connected components labeling algorithm,
International Conference on Image Analysis and Processing, Pages 322 – 327, 1999.
AUTHORS
N. VenkateswaraRao, received his M.Sc degree in Computer Science Department
from Acharya Nagarjuna University, India. He did his M.Tech in Computer Science
& Technology from Andhra University, India. He is currently working as Associate
Professor, in the Department of Computer Science & Engineering at RVR & JC
College of Engineering, Guntur, India. He has 15 years of teaching experience. His
research areas of interest include Artificial Neural Networks, Image Processing, and
Pattern Recognition. He is life member of ISTE.
Dr. B. Raveendra Babu, obtained his Masters in Computer Science and Engineering
from Anna University, Chennai. He received his Ph.D. in Applied Mathematics at S.
V. University, Tirupati. He is currently working as professor and HOD in department
of Computer Science & Engineering at VNR Vignana Jyothi Institute of Engineering
and Technology, Hyderabad. He has 30 years of teaching experience. He has more
than 40 international & national publications to his credit. His research areas of
interest include VLDB, Image Processing, Pattern analysis and Wavelets. He is life
member in professional bodies like ACM, ISTE and CSI.

More Related Content

What's hot

Handwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHandwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHarshana Madusanka Jayamaha
 
Off-line English Character Recognition: A Comparative Survey
Off-line English Character Recognition: A Comparative SurveyOff-line English Character Recognition: A Comparative Survey
Off-line English Character Recognition: A Comparative Surveyidescitation
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...iosrjce
 
Neural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlabNeural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlabijcses
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkeSAT Journals
 
Character Recognition using Machine Learning
Character Recognition using Machine LearningCharacter Recognition using Machine Learning
Character Recognition using Machine LearningRitwikSaurabh1
 
Optical character recognition performance analysis of sif and ldf based ocr
Optical character recognition performance analysis of sif and ldf based ocrOptical character recognition performance analysis of sif and ldf based ocr
Optical character recognition performance analysis of sif and ldf based ocrcsandit
 
Handwritten character recognition in
Handwritten character recognition inHandwritten character recognition in
Handwritten character recognition inijaia
 
Character recognition project
Character recognition projectCharacter recognition project
Character recognition projectMonsif sakienah
 
Project report - Bengali digit recongnition using SVM
Project report - Bengali digit recongnition using SVMProject report - Bengali digit recongnition using SVM
Project report - Bengali digit recongnition using SVMMohammad Saiful Islam
 
A Comprehensive Study On Handwritten Character Recognition System
A Comprehensive Study On Handwritten Character Recognition SystemA Comprehensive Study On Handwritten Character Recognition System
A Comprehensive Study On Handwritten Character Recognition Systemiosrjce
 
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...CSCJournals
 
Handwritten Digit Recognition(Convolutional Neural Network) PPT
Handwritten Digit Recognition(Convolutional Neural Network) PPTHandwritten Digit Recognition(Convolutional Neural Network) PPT
Handwritten Digit Recognition(Convolutional Neural Network) PPTRishabhTyagi48
 
Inpainting scheme for text in video a survey
Inpainting scheme for text in video   a surveyInpainting scheme for text in video   a survey
Inpainting scheme for text in video a surveyeSAT Journals
 
Devanagari Character Recognition
Devanagari Character RecognitionDevanagari Character Recognition
Devanagari Character RecognitionPulkit Goyal
 
offline character recognition for handwritten gujarati text
offline character recognition for handwritten gujarati textoffline character recognition for handwritten gujarati text
offline character recognition for handwritten gujarati textBhumika Patel
 

What's hot (20)

Offline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural NetworkOffline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural Network
 
Handwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHandwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural network
 
Text Detection and Recognition
Text Detection and RecognitionText Detection and Recognition
Text Detection and Recognition
 
Off-line English Character Recognition: A Comparative Survey
Off-line English Character Recognition: A Comparative SurveyOff-line English Character Recognition: A Comparative Survey
Off-line English Character Recognition: A Comparative Survey
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
 
Neural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlabNeural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlab
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural network
 
Character Recognition using Machine Learning
Character Recognition using Machine LearningCharacter Recognition using Machine Learning
Character Recognition using Machine Learning
 
Optical character recognition performance analysis of sif and ldf based ocr
Optical character recognition performance analysis of sif and ldf based ocrOptical character recognition performance analysis of sif and ldf based ocr
Optical character recognition performance analysis of sif and ldf based ocr
 
Handwritten character recognition in
Handwritten character recognition inHandwritten character recognition in
Handwritten character recognition in
 
Seminar5
Seminar5Seminar5
Seminar5
 
Character recognition project
Character recognition projectCharacter recognition project
Character recognition project
 
Project report - Bengali digit recongnition using SVM
Project report - Bengali digit recongnition using SVMProject report - Bengali digit recongnition using SVM
Project report - Bengali digit recongnition using SVM
 
A Comprehensive Study On Handwritten Character Recognition System
A Comprehensive Study On Handwritten Character Recognition SystemA Comprehensive Study On Handwritten Character Recognition System
A Comprehensive Study On Handwritten Character Recognition System
 
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
 
Handwritten Digit Recognition(Convolutional Neural Network) PPT
Handwritten Digit Recognition(Convolutional Neural Network) PPTHandwritten Digit Recognition(Convolutional Neural Network) PPT
Handwritten Digit Recognition(Convolutional Neural Network) PPT
 
Inpainting scheme for text in video a survey
Inpainting scheme for text in video   a surveyInpainting scheme for text in video   a survey
Inpainting scheme for text in video a survey
 
Devanagari Character Recognition
Devanagari Character RecognitionDevanagari Character Recognition
Devanagari Character Recognition
 
offline character recognition for handwritten gujarati text
offline character recognition for handwritten gujarati textoffline character recognition for handwritten gujarati text
offline character recognition for handwritten gujarati text
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 

Similar to Segmentation and recognition of handwritten digit numeral string using a multi layer perceptron neural networks

Feature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual AnalysisFeature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual Analysisvivatechijri
 
Recognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic OperationsRecognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic OperationsTELKOMNIKA JOURNAL
 
Comparative study of two methods for Handwritten Devanagari Numeral Recognition
Comparative study of two methods for Handwritten Devanagari Numeral RecognitionComparative study of two methods for Handwritten Devanagari Numeral Recognition
Comparative study of two methods for Handwritten Devanagari Numeral RecognitionIOSR Journals
 
AN EFFICIENT FEATURE EXTRACTION AND CLASSIFICATION OF HANDWRITTEN DIGITS USIN...
AN EFFICIENT FEATURE EXTRACTION AND CLASSIFICATION OF HANDWRITTEN DIGITS USIN...AN EFFICIENT FEATURE EXTRACTION AND CLASSIFICATION OF HANDWRITTEN DIGITS USIN...
AN EFFICIENT FEATURE EXTRACTION AND CLASSIFICATION OF HANDWRITTEN DIGITS USIN...IJCSEA Journal
 
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...IRJET Journal
 
Text Extraction and Recognition Using Median Filter
Text Extraction and Recognition Using Median FilterText Extraction and Recognition Using Median Filter
Text Extraction and Recognition Using Median FilterIRJET Journal
 
Tracking number plate from vehicle using
Tracking number plate from vehicle usingTracking number plate from vehicle using
Tracking number plate from vehicle usingijfcstjournal
 
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...ijtsrd
 
journal paper publication
journal paper publicationjournal paper publication
journal paper publicationrikaseorika
 
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...
IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...IRJET Journal
 
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdfHandwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdfSachin414679
 
FINGERPRINT CLASSIFICATION BASED ON ORIENTATION FIELD
FINGERPRINT CLASSIFICATION BASED ON ORIENTATION FIELDFINGERPRINT CLASSIFICATION BASED ON ORIENTATION FIELD
FINGERPRINT CLASSIFICATION BASED ON ORIENTATION FIELDijesajournal
 
Improvement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random ForestImprovement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random ForestIJERA Editor
 
Improvement oh the recognition rate by random forest
Improvement oh the recognition rate by random forestImprovement oh the recognition rate by random forest
Improvement oh the recognition rate by random forestYoussef Rachidi
 
Paper id 252014130
Paper id 252014130Paper id 252014130
Paper id 252014130IJRAT
 
IRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine LearningIRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine LearningIRJET Journal
 
"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”Er. Arpit Sharma
 
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...IRJET Journal
 

Similar to Segmentation and recognition of handwritten digit numeral string using a multi layer perceptron neural networks (20)

Feature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual AnalysisFeature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual Analysis
 
Recognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic OperationsRecognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic Operations
 
Comparative study of two methods for Handwritten Devanagari Numeral Recognition
Comparative study of two methods for Handwritten Devanagari Numeral RecognitionComparative study of two methods for Handwritten Devanagari Numeral Recognition
Comparative study of two methods for Handwritten Devanagari Numeral Recognition
 
AN EFFICIENT FEATURE EXTRACTION AND CLASSIFICATION OF HANDWRITTEN DIGITS USIN...
AN EFFICIENT FEATURE EXTRACTION AND CLASSIFICATION OF HANDWRITTEN DIGITS USIN...AN EFFICIENT FEATURE EXTRACTION AND CLASSIFICATION OF HANDWRITTEN DIGITS USIN...
AN EFFICIENT FEATURE EXTRACTION AND CLASSIFICATION OF HANDWRITTEN DIGITS USIN...
 
Assignment-1-NF.docx
Assignment-1-NF.docxAssignment-1-NF.docx
Assignment-1-NF.docx
 
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
 
Text Extraction and Recognition Using Median Filter
Text Extraction and Recognition Using Median FilterText Extraction and Recognition Using Median Filter
Text Extraction and Recognition Using Median Filter
 
Tracking number plate from vehicle using
Tracking number plate from vehicle usingTracking number plate from vehicle using
Tracking number plate from vehicle using
 
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
 
journal paper publication
journal paper publicationjournal paper publication
journal paper publication
 
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...
IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...
 
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdfHandwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
 
FINGERPRINT CLASSIFICATION BASED ON ORIENTATION FIELD
FINGERPRINT CLASSIFICATION BASED ON ORIENTATION FIELDFINGERPRINT CLASSIFICATION BASED ON ORIENTATION FIELD
FINGERPRINT CLASSIFICATION BASED ON ORIENTATION FIELD
 
Improvement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random ForestImprovement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random Forest
 
Improvement oh the recognition rate by random forest
Improvement oh the recognition rate by random forestImprovement oh the recognition rate by random forest
Improvement oh the recognition rate by random forest
 
Paper id 252014130
Paper id 252014130Paper id 252014130
Paper id 252014130
 
IRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine LearningIRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine Learning
 
"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”
 
Dp34707712
Dp34707712Dp34707712
Dp34707712
 
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
 

More from ijfcstjournal

A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESijfcstjournal
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...ijfcstjournal
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...ijfcstjournal
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...ijfcstjournal
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...ijfcstjournal
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGijfcstjournal
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYijfcstjournal
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSijfcstjournal
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMijfcstjournal
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSijfcstjournal
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...ijfcstjournal
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGijfcstjournal
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...ijfcstjournal
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHijfcstjournal
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSijfcstjournal
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)ijfcstjournal
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...ijfcstjournal
 
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMSA STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMSijfcstjournal
 
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERINGA LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERINGijfcstjournal
 

More from ijfcstjournal (20)

A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITY
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
 
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMSA STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
 
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERINGA LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

Segmentation and recognition of handwritten digit numeral string using a multi layer perceptron neural networks

  • 1. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016 DOI:10.5121/ijfcst.2016.6104 49 SEGMENTATION AND RECOGNITION OF HANDWRITTEN DIGIT NUMERAL STRING USING A MULTI LAYER PERCEPTRON NEURAL NETWORKS N. Venkateswara Rao1 and Dr. B. Raveendra Babu2 1 Dept. of Computer Science & Engineering, R.V.R. & J.C. College of Engineering, Guntur, INDIA 2 Professor, Dept. of Computer Science & Engineering VNR Vignana Jyothi Institute of Engineering and Technology, Hyderabad, INDIA ABSTRACT In this paper, the use of Multi-Layer Perceptron (MLP) Neural Network model is proposed for recognizing unconstrained offline handwritten Numeral strings. The Numeral strings are segmented and isolated numerals are obtained using a connected component labeling (CCL) algorithm approach. The structural part of the models has been modeled using a Multilayer Perceptron Neural Network. This paper also presents a new technique to remove slope and slant from handwritten numeral string and to normalize the size of text images and classify with supervised learning methods. Experimental results on a database of 102 numeral string patterns written by 3 different people show that a recognition rate of 99.7% is obtained on independent digits contained in the numeral string of digits includes both the skewed and slant data. KEYWORDS Connected Components Labeling, Multi-Layer Perceptron Neural Networks, Segmentation, Feature Extraction, Handwritten recognition. 1. INTRODUCTION Recognizing writer-independent handwritten numeral string of digits is still a difficult problem for a computer although it has been a research topic for over so many decades. The key problem is due to an unlimited number of styles, sizes and variations of digit patterns used by different people. As a critical preprocessing stage in handwritten numerical string recognition, the numerical string digits segmentation exports results which will affect the performance of the overall recognition system. There still exist several challenges in the numerical string segmentation for hand written document. Unlike machine printed document, the free-style handwritten numerical string of digits is often curved, have various skew angles, no uniform direction, connect or overlap with each other. A study of the present literature exposes that an excessive amount of research work has been made to resolve the problem. Different sets of features in topological and spatial domain, as well as in frequency domain, have been proposed for the recognition of handwritten characters [1]. Moreover, a variety of classification methods, such as template matching, structural, syntactic and neural network approaches are adopted for
  • 2. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016 50 classification and/or recognition [2, 11]. However, most of these algorithms could not yield satisfactory recognition performance in the cases of rotated and noisy patterns. Multi-module (multi-expert) neural networks have been studied for the last few years in order to reduce the learning complexity and to improve the system performance [3]. The neural network classifiers are generally classified into two categories. In one category, each module of the neural network is used to look after a sub-region of the feature space or a subgroup of classes in the hope that each of these local expert can take better care of its own domain so that the overall performance can be improved [4, 5]. In the other category, each module of the neural network is used to deal with the input from one of the multiple sensors that are used to collect all possible data. Handwritten character recognition task is very complex. Normally recognition of isolated characters is a simple task than a string of characters [6-10].These systems are used in many areas like automatic processing of bank checks, tax forms, postal identification numbers, optical response sheets etc.,. In this work, a connected component labeling algorithm [12] is used to segment the individual numerals of the image. For any character recognition problems to segment the characters, it is required to do some preprocessing methods for getting better features. 2. SEGMENTATION AND RECOGNITION OF HAND WRITTEN NUMERAL STRING The procedure done before processing by correcting images from different errors is called preprocessing. The preprocessing is to be done before image enhancement. It includes conversion to a binary image, applying Median filtering to remove noise, and Thinning etc. 2.1 Binarization: Scanned input image is given as input. It is checked whether the image is color or grayscale or binary. If the image is not binary image it is converted to binary image. 1. Calculating the size of the image. 2. Finding the sum of the pixels. 3. Calculating the average threshold value using the sum of the pixels and the size of the image. 4. Comparing the generated threshold value with the pixel value of the image. If the pixel is value is greater than the threshold value, then assign the pixel a value of ‘1’ otherwise ‘0’. 2.2 Noise Removal: Median filters are commonly used methods to remove the noise. Median filter is one of the most popular non-linear filters to remove the salt & pepper noise. The noise is removed by substituting the mask center value by the median value of midpoint neighborhood. 2.3 Skew Correction In mathematical terms skew means, lines that are neither parallel nor intersecting. The skew correction is performed on such lines. The image is rotated with an angle to remove the skew. Skew correction is used to align the image base line with the x-axis.In this system, a lower baseline is drawn where the maximum pixels are located. An example is shown in Figure 1.
  • 3. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016 51 1) The lowest black pixel is determined in every column of the image to populate the set S. S = {si = (xi; yi)/lowest black pixel in column xi} 2) To fit as the baseline of the current line, the data set S is used to calculate a least-squares linear regression to find a base line of the form y = mx+c 3) Computing the arctangent of the line slope that produces the rotation angle, theta= arctan(m) 4) Rotate the image by negative theta value computed in step 3 to remove the skew. Figure 1 Sample Skew Correction Image 2.4 Slant Removal It is used to normalize writing where the text is at an angle with the goal of making the text upright. Here based on a line, image is rotated with the angle so that the slant present in the image is removed. The slant correction algorithm is as follows: 1) Calculate the new transformations from -45 degrees to 45 degrees angle to shear and transform the line 2) Generate a vertical projection histogram for each shear angle calculated in the above step. 3) Calculate Time Frequency distribution of each vertical histogram computed in the above step. 4) Remove the slant of the image by choosing angle representing the largest distribution intensity from the histogram computed in the above step. Figure 2 Sample Slant Correction Image 2.5 Segmentation Segmentation is the process of dividing the string of numeral digits into individual digit images. Normally there are three approaches for dividing the string of numerals into individual digits. They are 1) External segmentation, where digit boundaries are found prior to segmentation, 2) Internal segmentation, in which letter boundaries are determined as part of recognition, and 3) No segmentation, where recognition occurs at string level. In this paper an internal segmentation is done by using a connected components labeling (CCL) approach method.
  • 4. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016 52 The algorithm for finding the connected components of an image is 1) Scan the image by moving along a row until it comes to a point p (where p denotes the pixel to be labeled at any stage in the scanning process) for which V= {1}. 2) When this is true, examine the four neighbors of p which have already been encountered in the scan a. To the left of p. b. Above it. c. The two upper diagonal terms. 3) The labeling of p occurs as follows: a. If all four neighbors are 0, assign a new label top, else b. if only one neighbor has V={1}, assign its label to p, else c. If more than one of the neighbors have V={1}, assign one of the labels to p and make a note of the equivalences. 2.6 Feature Extraction For achieving high recognition rate, the selection of appropriate feature extraction method is very important. After pre-processing i.e., skew correction, slant correction, and segmentation is done the image is normalized to a 15x15 without changing the aspect ratio. A total of 225 features are taken from the image to classify the image. The features of the characters that are important for classifying them at recognition stage are extracted. This is an important stage as its effective functioning increases the recognition rate and decreases the misclassification. The features are extracted for all images after segmenting the string of numerals into individual digits where one sample of the image is shown in Figure 1 which is a skew corrected image and Figure 2 is after slant correction. 2.7 Classification As the features are extracted, an appropriate classifier must be selected. A number of classifiers are used and each classifier suitable to classify a specific kind of feature vector depending upon its characteristics is found. The Neural Network classifier is used commonly for classification. A multi-layer perceptron neural network classifier is used here for recognition. The most common classifier model is multi-layer perceptron neural networks. In order to learn this neural network, it requires a desired output because it is a supervised network. The goal of this network is to create a model which correctly maps from input to the output with historical data. A sample representation of a multi-layer perceptron is shown in Figure 3.
  • 5. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016 53 Figure 3 Architecture of Multi Layer Perceptron (MLP) Neural Network 3. RESULTS AND DISCUSSIONS Experiments are conducted on different numerical string of characters written by three different writers. In this work, 40 samples from writer1 and 38 samples from writer2 and 24 samples from writer3 are collected. A total of 102 numerical strings of characters from these three different writers are collected. These samples contain a total number of 617 individual digits covering all the digits approximately equal which is shown in table 1. Each sample of numerical string is segmented into individual digits. Each digit is normalized to a size of 15X15 pixels. From the normalized image the features are extracted and training is performed with the multi layer perceptron back propagation neural network. From the confusion matrix, shown in Figure 4, it is observed that a recognition rate of 99.7% and an error rate of 0.3% is obtained. Some of the sample images written by different writers are shown in Figure 5. Table 1 Sample Images database Writer1 Writer2 Writer3 Total No: of samples 40 38 24 102 Number of 0’s 22 21 14 57 Number of 1’s 29 22 15 66 Number of 2’s 28 22 15 65 Number of 3’s 19 23 17 57 Number of 4’s 25 22 15 62 Number of 5’s 25 24 12 63 Number of 6’s 27 24 14 65 Number of 7’s 26 22 14 62 Number of 8’s 27 22 15 63 Number of 9’s 23 21 13 59 Total Digits 251 223 144 617
  • 6. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016 54 Figure 4 Confusion Matrix Figure 5 Sample Images 4. CONCLUSION Previous work of the authors of this paper is limited to an isolated digit character. In this paper, a new method for handwritten digits recognition from a string of numerals using a multi-layer perceptron neural network is presented. The effectiveness of this proposed method was evaluated by computing the recognition rate and error rate. It is observed that a recognition rate of 99.7% and an error rate of 0.3% on handwritten string of numerals is obtained. REFERENCES [l] C. Y. Suen. Distinctive features in automatic recognition of hand printed characters. Signal Processing, 4(2 & 3):193 - 207, 1982. [2] S. Mori, C. Y. Suen, and K. Yamamoto. Historical review of OCR research and development. Proceedings of the IEEE, 80(7):1029 - 1058, 1992.
  • 7. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016 55 [3] Michael I. Jordan and Robert A. Jacobs. Hierarchies of adaptive experts. In Advance in Neural Information Processing Systems 4, [4] Tatsuo Matsuoka, Hiroshi Hamada, and Ryohei Nakatsu. Syllable recognition using integrated neural networks. In IEEE INNS International Joint Conference on Neural Networks, volume 1, 1989. [5] Z. Chi and M. Jabri. A Multi-Module Neural Network Approach for ICEG Classification. In Proceedings of the Third Australian Conference on Neural Networks, Canberra, Australia, 1992. [6] Thien M. Ha, Matthias Zimmermann, Horst Bunke, Off-line handwritten numeral string recognition by combining segmentation-based and segmentation-free methods, Journal of Pattern Recognition, Volume 31, Issue 3, Pages 257–272, March 1998. [7] Zhixin Shi, Venu Govindaraju, Segmentation and recognition of connected handwritten numeral strings, Journal of Pattern Recognition, Volume 30, Issue 9, Pages 1501-1504, 1997. [8] Ashraf Elnagara, Reda Alhajj, Segmentation of connected handwritten numeral strings, Journal of Pattern Recognition, Volume 36, Issue 3, Pages 625–634, March 2003. [9] Yi-Kai Chen, Jhing-Fa Wang, Segmentation of single- or multiple-touching handwritten numeral string using background and foreground analysis, IEEE Transactions on Pattern Analysis and Machine Intelligence, Volume 22, Issue 11, Pages 1304 – 1317, Nov 2000. [10] Javad Sadria, Ching Y. Suena, Tien D. Bui, A genetic framework using contextual knowledge for segmentation and recognition of handwritten numeral strings, Journal of Pattern Recognition, Volume 40, Issue 3, Pages 898–919, March 2007. [11] N. Venkateswara Rao, Dr. B. Raveendra Babu, G. Rama Mohan Babu, A Radial Basis Function Neural Network to Recognize Handwritten Numerals with normalized moment features from skeletons, IEEE International Conference on Recent Trends in Information Technology (ICRTIT), Pages 68 – 72, 2013. [12] Di Stefano, L.Bulgarelli, Andrea , A simple and efficient connected components labeling algorithm, International Conference on Image Analysis and Processing, Pages 322 – 327, 1999. AUTHORS N. VenkateswaraRao, received his M.Sc degree in Computer Science Department from Acharya Nagarjuna University, India. He did his M.Tech in Computer Science & Technology from Andhra University, India. He is currently working as Associate Professor, in the Department of Computer Science & Engineering at RVR & JC College of Engineering, Guntur, India. He has 15 years of teaching experience. His research areas of interest include Artificial Neural Networks, Image Processing, and Pattern Recognition. He is life member of ISTE. Dr. B. Raveendra Babu, obtained his Masters in Computer Science and Engineering from Anna University, Chennai. He received his Ph.D. in Applied Mathematics at S. V. University, Tirupati. He is currently working as professor and HOD in department of Computer Science & Engineering at VNR Vignana Jyothi Institute of Engineering and Technology, Hyderabad. He has 30 years of teaching experience. He has more than 40 international & national publications to his credit. His research areas of interest include VLDB, Image Processing, Pattern analysis and Wavelets. He is life member in professional bodies like ACM, ISTE and CSI.