SlideShare a Scribd company logo
1 of 7
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 580
SOLVING LINEAR EQUATIONS FROM AN IMAGE USING ANN
Mithun Roy1
, Anupam Mukherjee2
, Alok Basu3
, Pratik Kumer Halder4
1
Assistant Professor, Computer Science & Engineering, Siliguri Institute of Technology, West Bengal, India
2
Assistant Professor, Computer Science & Engineering, Siliguri Institute of Technology, West Bengal, India
3
Assistant Professor, Computer Science & Engineering, Siliguri Institute of Technology, West Bengal, India
4
Assistant Professor, Computer Science & Engineering, Gargi Memorial Institute of Technology, West Bengal, India
Abstract
Optical character recognition has a great impact in image processing application. This paper combines the concept of OCR and
feed-forward artificial neural network to solve mathematical linear equations. We implement blob analysis and feature extraction
to extract the individual characters to a captured image which having some mathematical equations. We are constructing 39
character set which having some numbers, alphabet and operators. Training of these character set is done by using supervised
learning rule. If that image satisfying linear equation condition then our proposed algorithm solve this equation and generate the
output. This paper tries to increase the recognition rate more than 87%. The result achieved from the training and testing on the
network of the letter recognition is satisfactory.
Keywords: Artificial Neural Network, Linear Equation, Recognized rate, Optical Character Recognition.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
The objective of this paper is to capture an input text image
which having an linear mathematical equations and take out
those equations from that image and also extract the
characters from that equations, characters are analyzed by
comparing its features to distinguished each character from
the input character sets.[2][4]
We are focusing on those text
images which are written in the following fonts, such as
Times New Roman, Arial Black, Cambria. We are dealing
with such characters which are normally used in linear
equations, like digits (0-9), arithmetic operators (+, -) and
assignment operator (=). Our input set contains 39 different
characters and each size of the character is 7X5. So, Input
matrix size will be 35 × 39. And target matrix size will be an
identity matrix of order 39 × 39.[7][11]
Each column identifies
the different characters of the input matrix. These proposed
methodologies also reduce the recognition problem and the
computational time.
The overall optical character reorganization (OCR) is done
in this paper by using Artificial Neural Network (ANN).[10]
In this case we are used feed-forward neural network with
multiple hidden layers. OCR is a very handful tools for
image processing application to translate the optically
scanned image to digital bitmap form.
1.1 Linear Equation
A linear equation is an algebraic equation in which each
term is either a constant or the product of a constant and (the
first power of) a single variable.[12]
Linear equations can have one or more variables. Linear
equations occur abundantly in most subareas of mathematics
and especially in applied mathematics.[12]
In mathematics, a system of linear equations (or linear
system) is a collection of linear equations involving the
same set of variables. For example,
A general system of m linear equations with n unknowns
can be written as
(1)
Here are the unknowns, are
the coefficients of the system, and are the
constant terms.[12]
Often the coefficients and unknowns are real or complex
numbers, but integers and rational numbers are also seen, as
are polynomials and elements of an abstract algebraic
structure. There are two general ways we are represents the
system of linear equations.[12]
1.1.1 Vector Equation
One extremely helpful view is that each unknown is a
weight for a column vector in a linear combination.[12]
(2)
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 581
1.1.2 Matrix Equation
The vector equation is equivalent to a matrix equation of the
form .
where A is an m × n matrix, X is a column vector with n
entries, and b is a column vector with m entries.[12]
(3)
2. PROPOSED METHODOLOGY
In this paper the process of character recognition system is
divided into four major categories.
1. Preprocessing and feature extraction.
2. Reorganization using feed-forward neural network.
3. Verification and validation of linear equations.
4. Solving equations and accuracy measurement.
2.1 Preprocessing and Feature Extraction:
In this phase we, prepare an input image which is captured
through digital input media like scanner or digital
camera/web camera. In this case we are trying to capture
those images which are having linear mathematical
equations.
2.2 Image Conversion:
It is the process that converts input RGB image to Gray
scale image (an intermediate image). We need to do this
conversion because we need binary image for further
operations. In next step gray scale image is converted into
binary image. Binary image is a digital image that has two
possible values, either 0 or 1. It may be represented in either
black or white colors. [1]
The flow diagram of our proposed model is given bellow:
Fig.1. Proposed Model
2.3 Image Enhancement
It is the process that reduces noise and blurring effect of that
input image. Median filter is used for noise reduction. After
image filtering procedure edge detection technique is
implemented. Edges in images are areas with strong
intensity contrasts – a jump in intensity from one pixel to the
next. Edge detecting an image significantly reduces the
amount of data and filters out useless information, while
preserving the important structural properties in an image.
[7][8][9]
2.4 Blobs Analysis
In Blobs analysis foreground and background objects are
separated by using thresholding method. It is used to
separate object and background, which is divided image into
two modes.[3]
The way to resolve both categories is by
assigning a thresholding value T.[1][5][6] Each point
which have value f is called foreground object,
START
READ INPUT IMAGE
CONTAINS LINEAR
EQUATIONS
IMAGE CONVERSION
RGB TO BINARY
IMAGE ENHANCEMENT
BLOBS ANALYSIS
FEATURE EXTRACTION
GENERATE INPUT
APPLY ARTIFICIAL NEURAL NETWORK
LINEAR EQUATION VERIFICATION
CHECK EQUATIONS
ARE VALID OR NOT
?
NO STOP
YES
SOLVE LINEAR EQUATION
PRODUCED DESIRE
OUTPUT
GENERATE
OUTPUT
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 582
and each point which have value f is called
background object. A threshold image g(x, y) is defined as,
(4)
2.5 Feature Extraction
In feature extraction we are considering some steps for
extracting a vector. We are focusing on content of the image
not the total part of the image. Our main intention is finding
a vector from the image. We have only two types of data on
the image. Those are 1 for the white space and 0 for the
black space. Now we have to pass the following steps for
creating input vector for a particular character or image.
Those are: 1. Pixel grabbing 2. Finding probability of
making square.[1][11]
2.6 Generate Input Matrix:
After blobs analysis, objects are detected. Then we extract
each object and resize it in a 7x5 dimensions. This
information stored in a column vector which having 35
rows.
2.7 Artificial Neural Network:
Neural networks are a promising new generation of
information processing system that demonstrate the ability
to learn, recall and generalize from training patterns or data.
ANNs are good at task such as pattern matching and
classification, function approximation, vector quantization
and data clustering. ANNs have a large number of highly
interconnected processing elements (called nodes) that
usually operate in parallel and are configured in regular
architecture. The collective behavior of ANN, like a human
brain, - demonstrate the ability to learn, recall and generalize
from training patterns or data.[2][4]
Fig.2. Mathematical model of ANN
The ith
processing element computes a weighted sum of its
input and output.
(firing condition) or 0 (non firing condition)
According to whether this weighted input sum is above or
below a certain threshold .
(5)
Where the activation function is a step function
As we know that general learning rules are classified into
three categories in ANN.
1. Supervised learning rules.
2. Unsupervised learning rules.
3. Reinforcement.
We focused in supervised learning rules. In supervised
learning rule for a particular input X a corresponding actual
output will be generated and that value is checked with
desire output, if it is matched then it is OK otherwise a error
signal will be generated.[2][4]
Fig.3.Supervised learning.
In this process we introduce the column vector as a input
parameter to the processing element in artificial neural
network (ANN). We are introducing multiple hidden layers
in this case. Resultant value of this feed-forward ANN is
checked with target matrix and the final output is extracted.
Fig.4. Feed-forward ANN
2.8 Liner Equation Extraction and Verification:
In this section after extracting each character from the
processed image, we checked whether each character is
recognized by this system correctly? If yes, then we use
finite automata and check those extracted valid characters
make linier equation or not. We check the Linier Equations
are correct or not using the following Finite Automata.
Learning
System
Σ
Input
Error signal
training data
Actual output
Output
desired
-
+
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 583
Fig.5. Linear Equation recognizer
Acceptability of a string by Finite Automata:
A string W is accepted by a finite automata M = {Q, Σ, ,
q0, F} if (q0, W) = P for some P in F. This concludes that
the string is accepted by the final state.
From the above finite automata M contains Q = { A, B, C,
D, E, F,G}, Σ = { +, -, =, 0, 1, … , 9, a, b, … , z}, F= {G}
and q0 = {A} as the initial state.
e.g. let us say be a input
string the above finite automata checks the input sting is the
valid linear equation or not.
(Accepted)
3. EXPERIMENTAL RESULT
Step I: Read input image from input devices (like scanner or
digital camera). Then convert that input RGB image to gray
scale image and remove noise using median filter, finally
convert that gray scale image to binary image.
(a)
(b)
Fig.6. a. Input image (after scaning) b. Binary Image
Step II: After detecting binary image we are using sobel
operator to generate edge detected image which is followed
by image filling and blobs analysis.
(c)
(d)
Fig.7. c. Edge detected image d. Image Filling and Blobs
analysis
B C
D EA =
a|b|c..|z
0|1|2…|9
0|1|2…|9
F
0|1|2…|9
0|1|2…|9
+|-
a|b|c..|z
+|-
GF
+/-
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 584
Step III: Recognization of characters is done using feed-
forward ANNs.
Fig.8. After Character Extractions & Verification
Step IV: After character extraction and verification of the
extracted valid equations using regular expression we
generate the resultant output which is shown below.
Fig.9. Resultant values of the following three linear
equations
4. RESULT ANALYSIS
The result achieved from the training and testing on the
network of the letter recognition is at around 87%.
Previously it is around 80-82%. We increase the recognition
rate at around 5% more. In this part we had shown the
details of the result analysis and network performance. We
choose 39 input characters and each and individual character
is checked and validate through our reorganization system.
Those characters which are not recognized by the system are
treated as an error which is marked by the “yellow” color.
After actual verification and validation of characters we
have got 87% success rate. [11]
IC: INPUT CHARACTER
RC:
RECOGNIZED
CHARACTER
RR: RECOGNIZED RATE
IC RC RR IC RC RR IC RC RR
1 1 > 87 % a a > 87 % n n > 87 %
2 2 > 87 % b b > 87 % o 0 0%
3 f 0% c c > 87 % p p > 87 %
4 4 > 87 % d d > 87 % q a 0%
5 5 > 87 % e e > 87 % r r > 87 %
6 6 > 87 % f f > 87 % s s > 87 %
7 7 > 87 % g g > 87 % t t > 87 %
8 8 > 87 % h h > 87 % u u > 87 %
9 9 > 87 % i i > 87 % v v > 87 %
0 0 > 87 % j l 0% w w > 87 %
+ + > 87 % k k > 87 % x x > 87 %
- - > 87 % l l > 87 % y v 0%
= = > 87 % m m > 87 % z z > 87 %
Recognized rate: (34/39) x 100% = 87%
Network Performance Analysis
The data set is checked by typical feed-forward neural network. We can check the network performance and determine if any
changes need to be made to the training process, the network architecture, or the data sets. The network mean squared error
performance was rated at 0.0013149 during epoch 10.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 585
Fig.10. Plot-performance
Plot performs plot the training validation and test performances on the training record.
Fig.11. Plot-regression
Plot the linear equation of targets relative to outputs.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 586
5. CONCLUSION
Most important part of this paper is its real life
implementation. Any person can capture an image using
image capturing devices from any books having system of
linear equations, and then our proposed model is good
enough to detect and generate the resultant output. In this
paper we proposed a feed forward ANN based model which
is used to recognize the character set which are involve in
system of linear equations. We are not only deal with optical
character recognition (OCR) but also proposed a model
which can extract the features of the input character set.
Verification and validation part is also equally important;
acceptance of the string is verified by using finite automata.
Solving system of linear equations is done using Gauss
Elimination method. The result achieved from the training
and testing on the network of the character recognition is at
around 87%. Previously it is around 80-82%.[11]
We increase
the recognition rate at around 5% more.
ACKNOWLEDGEMENTS
We tender our heartily gratitude to our parents, family
members and friends.
REFERENCES
[1]. Gonzalez, Rafael C., Richard E. Woods. :” Digital
Image Processing.” Ed III, Pearson Education Asia.
[2]. Ruck, D.W. Rogers, S.K. and Kabrisky, M. “Feature
Selection Using a MultiLayer Perceptron”. In J. Neural
Network Comput. 2 (2):40-48, 1990.
[3]. S.Arya andD.M.Mount. “Approximate nearest neighbor
searching” .Proceeding 4th Annual ACM-SIAM
Symposium on Discrete Algorithms, pages 271-280,1993.
[4]. Rossi, F.”Attribute Suppression with Multi-Layer
Perceptron”. In Proceedings of IEEE-IMACS'96, Lille,
France. 1996.
[5]. D.Comaniciu and P.Meer. “Robust analysis of feature
spaces: color image segmentation”. Proceedings of IEEE
Conference on Computer Vision and Pattern Recognition,
pages 750-755, 1997.
[6]. J.Shi and J.Malik. “Normalized cuts and image
segmentation”. Proceedings of the IEEE Conference on
Computer Vision and Pattern Recognition, pages 731-737,
1997.
[7]. Viola, P. and Jones, M. Robust Real Time Object
Detection, In International Journal of Computer Vision,
1(2), 2002.
[8]. Jinshan Tang Eli Peli, and Scott Acton “Image
Enhancement Using a Contrast Measure in the Compressed
Domain”, IEEE Signal processing Letters , Vol. 10, NO.
10, October 2003.
[9]. S. S. Agaian, S. Blair and K. A. Panetta, “Transform
coefficient histogram-based image enhancement algorithms
using contrast entropy”, IEEE Transaction on Image
Processing. vol. 16, no. 3, pages. 741-758, 2007.
[10]. A. A. Wadud, M. Kabir, M. H. Dewan and M. C.
Oksam, “A dynamic histogram equalization for image
contrast enhancement”, IEEE Trans. Consumer Electronic ,
vol. 53, no. 2, pages 593-600, 2007.
[11]. Md. Alamgir Badsha, Md. Akkas Ali, Dr. Kaushik
Deb, Md. Nuruzzaman Bhuiyan, “Handwritten Bangla
Character Recognition Using Neural Network”,
International Journal of Advanced Research in Computer
Science and Software Engineering”. Vol 2, Issue 11, pages.
307 – 312, November 2012.
[12]. Hamming, R.W., "Introduction to Applied Numerical
Analysis", McGraw-Hill Book Co., Inc., New York, San
Francisco, Toronto, London. 1971
BIOGRAPHIES
Mithun Roy has obtained M.Tech. in
Computer Science from West Bengal
University of Technology. Presently he is
working as an Assistant Professor in the
department of CSE in Siliguri Institute of
Technology. His research interest is in
Digital Image Processing, Social Networking and Pattern
recognition.
Anupam Mukherjee has obtained B.Tech.
and M.Tech. in Computer Science from
West Bengal Univer sity of Technology.
Presently he is working as an Assistant
Professor in the dept. of CSE in Siliguri
Institute of Technology. His research interest
is in Digital Image Processing, Computer
Networking, Cryptography and Network Security.
Alok Basu has started his career as a
Mechanical Engineer, at Alloy Steels Plant,
SAIL in 1983. He worked there in different
sections of his field in various capacities.
Later he got a scope to be trained in COBOL
and to work with the in-house software
development and maintenance team for more than seven
years. He was mainly involved in the development of
Production Information & Order Servicing System in
COBOL on MV 15000 (AOS/VS-II) platform. He joined in
Siliguri Institute of Technology after completion of M. Tech
in Information Technology. He is serving this institute for
more than 10 years and presently holding the chair of HOD.
Pratik Kumer Halder has obtained B.Tech.
and M.Tech. in Computer Science from
West Bengal University of Technology.
Presently he is working as an Assistant
Professor in the dept. of CSE in Gargi
Memorial Institute of Technology. His
research interest is in Digital Image Processing, visual
cryptography.

More Related Content

What's hot

IRJET-Handwritten Digit Classification using Machine Learning Models
IRJET-Handwritten Digit Classification using Machine Learning ModelsIRJET-Handwritten Digit Classification using Machine Learning Models
IRJET-Handwritten Digit Classification using Machine Learning ModelsIRJET Journal
 
Comparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition TechniquesComparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition TechniquesIJERA Editor
 
ALU Using Area Optimized Vedic Multiplier
ALU Using Area Optimized Vedic MultiplierALU Using Area Optimized Vedic Multiplier
ALU Using Area Optimized Vedic MultiplierIJERA Editor
 
PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...
PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...
PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...ijesajournal
 
A BI-OBJECTIVE MODEL FOR SVM WITH AN INTERACTIVE PROCEDURE TO IDENTIFY THE BE...
A BI-OBJECTIVE MODEL FOR SVM WITH AN INTERACTIVE PROCEDURE TO IDENTIFY THE BE...A BI-OBJECTIVE MODEL FOR SVM WITH AN INTERACTIVE PROCEDURE TO IDENTIFY THE BE...
A BI-OBJECTIVE MODEL FOR SVM WITH AN INTERACTIVE PROCEDURE TO IDENTIFY THE BE...ijaia
 
Image similarity using fourier transform
Image similarity using fourier transformImage similarity using fourier transform
Image similarity using fourier transformIAEME Publication
 
84cc04ff77007e457df6aa2b814d2346bf1b
84cc04ff77007e457df6aa2b814d2346bf1b84cc04ff77007e457df6aa2b814d2346bf1b
84cc04ff77007e457df6aa2b814d2346bf1bPRAWEEN KUMAR
 
IRJET- Performance Analysis of Optimization Techniques by using Clustering
IRJET- Performance Analysis of Optimization Techniques by using ClusteringIRJET- Performance Analysis of Optimization Techniques by using Clustering
IRJET- Performance Analysis of Optimization Techniques by using ClusteringIRJET Journal
 
Dimensionality Reduction
Dimensionality ReductionDimensionality Reduction
Dimensionality Reductionmrizwan969
 
Paper id 21201488
Paper id 21201488Paper id 21201488
Paper id 21201488IJRAT
 
Quality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint CompressionQuality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint CompressionIJTET Journal
 
High speed multiplier using vedic mathematics
High speed multiplier using vedic mathematicsHigh speed multiplier using vedic mathematics
High speed multiplier using vedic mathematicseSAT Publishing House
 
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITY
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITYDCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITY
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITYIAEME Publication
 
The Application Of Bayes Ying-Yang Harmony Based Gmms In On-Line Signature Ve...
The Application Of Bayes Ying-Yang Harmony Based Gmms In On-Line Signature Ve...The Application Of Bayes Ying-Yang Harmony Based Gmms In On-Line Signature Ve...
The Application Of Bayes Ying-Yang Harmony Based Gmms In On-Line Signature Ve...ijaia
 

What's hot (18)

IRJET-Handwritten Digit Classification using Machine Learning Models
IRJET-Handwritten Digit Classification using Machine Learning ModelsIRJET-Handwritten Digit Classification using Machine Learning Models
IRJET-Handwritten Digit Classification using Machine Learning Models
 
Comparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition TechniquesComparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition Techniques
 
ALU Using Area Optimized Vedic Multiplier
ALU Using Area Optimized Vedic MultiplierALU Using Area Optimized Vedic Multiplier
ALU Using Area Optimized Vedic Multiplier
 
D010332630
D010332630D010332630
D010332630
 
PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...
PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...
PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...
 
A BI-OBJECTIVE MODEL FOR SVM WITH AN INTERACTIVE PROCEDURE TO IDENTIFY THE BE...
A BI-OBJECTIVE MODEL FOR SVM WITH AN INTERACTIVE PROCEDURE TO IDENTIFY THE BE...A BI-OBJECTIVE MODEL FOR SVM WITH AN INTERACTIVE PROCEDURE TO IDENTIFY THE BE...
A BI-OBJECTIVE MODEL FOR SVM WITH AN INTERACTIVE PROCEDURE TO IDENTIFY THE BE...
 
Image similarity using fourier transform
Image similarity using fourier transformImage similarity using fourier transform
Image similarity using fourier transform
 
84cc04ff77007e457df6aa2b814d2346bf1b
84cc04ff77007e457df6aa2b814d2346bf1b84cc04ff77007e457df6aa2b814d2346bf1b
84cc04ff77007e457df6aa2b814d2346bf1b
 
IRJET- Performance Analysis of Optimization Techniques by using Clustering
IRJET- Performance Analysis of Optimization Techniques by using ClusteringIRJET- Performance Analysis of Optimization Techniques by using Clustering
IRJET- Performance Analysis of Optimization Techniques by using Clustering
 
Dimensionality Reduction
Dimensionality ReductionDimensionality Reduction
Dimensionality Reduction
 
A280108
A280108A280108
A280108
 
Paper id 21201488
Paper id 21201488Paper id 21201488
Paper id 21201488
 
Quality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint CompressionQuality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint Compression
 
High speed multiplier using vedic mathematics
High speed multiplier using vedic mathematicsHigh speed multiplier using vedic mathematics
High speed multiplier using vedic mathematics
 
Distance Sort
Distance SortDistance Sort
Distance Sort
 
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITY
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITYDCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITY
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITY
 
The Application Of Bayes Ying-Yang Harmony Based Gmms In On-Line Signature Ve...
The Application Of Bayes Ying-Yang Harmony Based Gmms In On-Line Signature Ve...The Application Of Bayes Ying-Yang Harmony Based Gmms In On-Line Signature Ve...
The Application Of Bayes Ying-Yang Harmony Based Gmms In On-Line Signature Ve...
 
B018110915
B018110915B018110915
B018110915
 

Viewers also liked

Capp system process sequence optimization based on genetic algorithms
Capp system process sequence optimization based on genetic algorithmsCapp system process sequence optimization based on genetic algorithms
Capp system process sequence optimization based on genetic algorithmseSAT Journals
 
Mining of images using retrieval techniques
Mining of images using retrieval techniquesMining of images using retrieval techniques
Mining of images using retrieval techniqueseSAT Journals
 
Uncertainty of correlated color temperature due to variation in electrical op...
Uncertainty of correlated color temperature due to variation in electrical op...Uncertainty of correlated color temperature due to variation in electrical op...
Uncertainty of correlated color temperature due to variation in electrical op...eSAT Journals
 
An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...eSAT Journals
 
Variable radiation pattern from co axial probe fed rectangular patch antenna ...
Variable radiation pattern from co axial probe fed rectangular patch antenna ...Variable radiation pattern from co axial probe fed rectangular patch antenna ...
Variable radiation pattern from co axial probe fed rectangular patch antenna ...eSAT Journals
 
Parametric optimization of centrifugal magnetic force assisted abrasive flow ...
Parametric optimization of centrifugal magnetic force assisted abrasive flow ...Parametric optimization of centrifugal magnetic force assisted abrasive flow ...
Parametric optimization of centrifugal magnetic force assisted abrasive flow ...eSAT Journals
 
Wear characteristics of pure aluminium, al alloy & al-alumina metal mtrix...
Wear characteristics of pure aluminium, al alloy & al-alumina metal mtrix...Wear characteristics of pure aluminium, al alloy & al-alumina metal mtrix...
Wear characteristics of pure aluminium, al alloy & al-alumina metal mtrix...eSAT Journals
 
A cost effective solar charge controller
A cost effective solar charge controllerA cost effective solar charge controller
A cost effective solar charge controllereSAT Journals
 
Thermal analysis and dc conductivity of polypyrrole
Thermal analysis and dc conductivity of polypyrroleThermal analysis and dc conductivity of polypyrrole
Thermal analysis and dc conductivity of polypyrroleeSAT Journals
 
Ontology development for software tracking information system
Ontology development for software tracking information systemOntology development for software tracking information system
Ontology development for software tracking information systemeSAT Journals
 
Development and evaluation of a weighable lysimeter to determine crop evapotr...
Development and evaluation of a weighable lysimeter to determine crop evapotr...Development and evaluation of a weighable lysimeter to determine crop evapotr...
Development and evaluation of a weighable lysimeter to determine crop evapotr...eSAT Journals
 
The influence of tree induce suction on soil suction profiles
The influence of tree induce suction on soil suction profilesThe influence of tree induce suction on soil suction profiles
The influence of tree induce suction on soil suction profileseSAT Journals
 
Perfomance evaluation on light transmitting concrete (translucent concrete)
Perfomance evaluation on light transmitting concrete (translucent concrete)Perfomance evaluation on light transmitting concrete (translucent concrete)
Perfomance evaluation on light transmitting concrete (translucent concrete)eSAT Journals
 
Optimizing the manufacturing of the nose cone of a race car
Optimizing the manufacturing of the nose cone of a race carOptimizing the manufacturing of the nose cone of a race car
Optimizing the manufacturing of the nose cone of a race careSAT Journals
 
Review of behavioral study of structural elements through different destructi...
Review of behavioral study of structural elements through different destructi...Review of behavioral study of structural elements through different destructi...
Review of behavioral study of structural elements through different destructi...eSAT Journals
 
Phyto remediation of waste water through aquatic plants for the change detect...
Phyto remediation of waste water through aquatic plants for the change detect...Phyto remediation of waste water through aquatic plants for the change detect...
Phyto remediation of waste water through aquatic plants for the change detect...eSAT Journals
 
Design of a 50 kilogram capacity cast iron crucible furnace using locally ava...
Design of a 50 kilogram capacity cast iron crucible furnace using locally ava...Design of a 50 kilogram capacity cast iron crucible furnace using locally ava...
Design of a 50 kilogram capacity cast iron crucible furnace using locally ava...eSAT Journals
 

Viewers also liked (17)

Capp system process sequence optimization based on genetic algorithms
Capp system process sequence optimization based on genetic algorithmsCapp system process sequence optimization based on genetic algorithms
Capp system process sequence optimization based on genetic algorithms
 
Mining of images using retrieval techniques
Mining of images using retrieval techniquesMining of images using retrieval techniques
Mining of images using retrieval techniques
 
Uncertainty of correlated color temperature due to variation in electrical op...
Uncertainty of correlated color temperature due to variation in electrical op...Uncertainty of correlated color temperature due to variation in electrical op...
Uncertainty of correlated color temperature due to variation in electrical op...
 
An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...
 
Variable radiation pattern from co axial probe fed rectangular patch antenna ...
Variable radiation pattern from co axial probe fed rectangular patch antenna ...Variable radiation pattern from co axial probe fed rectangular patch antenna ...
Variable radiation pattern from co axial probe fed rectangular patch antenna ...
 
Parametric optimization of centrifugal magnetic force assisted abrasive flow ...
Parametric optimization of centrifugal magnetic force assisted abrasive flow ...Parametric optimization of centrifugal magnetic force assisted abrasive flow ...
Parametric optimization of centrifugal magnetic force assisted abrasive flow ...
 
Wear characteristics of pure aluminium, al alloy & al-alumina metal mtrix...
Wear characteristics of pure aluminium, al alloy & al-alumina metal mtrix...Wear characteristics of pure aluminium, al alloy & al-alumina metal mtrix...
Wear characteristics of pure aluminium, al alloy & al-alumina metal mtrix...
 
A cost effective solar charge controller
A cost effective solar charge controllerA cost effective solar charge controller
A cost effective solar charge controller
 
Thermal analysis and dc conductivity of polypyrrole
Thermal analysis and dc conductivity of polypyrroleThermal analysis and dc conductivity of polypyrrole
Thermal analysis and dc conductivity of polypyrrole
 
Ontology development for software tracking information system
Ontology development for software tracking information systemOntology development for software tracking information system
Ontology development for software tracking information system
 
Development and evaluation of a weighable lysimeter to determine crop evapotr...
Development and evaluation of a weighable lysimeter to determine crop evapotr...Development and evaluation of a weighable lysimeter to determine crop evapotr...
Development and evaluation of a weighable lysimeter to determine crop evapotr...
 
The influence of tree induce suction on soil suction profiles
The influence of tree induce suction on soil suction profilesThe influence of tree induce suction on soil suction profiles
The influence of tree induce suction on soil suction profiles
 
Perfomance evaluation on light transmitting concrete (translucent concrete)
Perfomance evaluation on light transmitting concrete (translucent concrete)Perfomance evaluation on light transmitting concrete (translucent concrete)
Perfomance evaluation on light transmitting concrete (translucent concrete)
 
Optimizing the manufacturing of the nose cone of a race car
Optimizing the manufacturing of the nose cone of a race carOptimizing the manufacturing of the nose cone of a race car
Optimizing the manufacturing of the nose cone of a race car
 
Review of behavioral study of structural elements through different destructi...
Review of behavioral study of structural elements through different destructi...Review of behavioral study of structural elements through different destructi...
Review of behavioral study of structural elements through different destructi...
 
Phyto remediation of waste water through aquatic plants for the change detect...
Phyto remediation of waste water through aquatic plants for the change detect...Phyto remediation of waste water through aquatic plants for the change detect...
Phyto remediation of waste water through aquatic plants for the change detect...
 
Design of a 50 kilogram capacity cast iron crucible furnace using locally ava...
Design of a 50 kilogram capacity cast iron crucible furnace using locally ava...Design of a 50 kilogram capacity cast iron crucible furnace using locally ava...
Design of a 50 kilogram capacity cast iron crucible furnace using locally ava...
 

Similar to Solving linear equations from an image using ann

IRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine LearningIRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine LearningIRJET Journal
 
New Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionNew Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionIJERA Editor
 
Application of normalized cross correlation to image registration
Application of normalized cross correlation to image registrationApplication of normalized cross correlation to image registration
Application of normalized cross correlation to image registrationeSAT Publishing House
 
Gesture recognition system
Gesture recognition systemGesture recognition system
Gesture recognition systemeSAT Journals
 
Image detective efficient image retrieval system
Image detective    efficient image retrieval systemImage detective    efficient image retrieval system
Image detective efficient image retrieval systemeSAT Journals
 
IRJET-Analysis of Face Recognition System for Different Classifier
IRJET-Analysis of Face Recognition System for Different ClassifierIRJET-Analysis of Face Recognition System for Different Classifier
IRJET-Analysis of Face Recognition System for Different ClassifierIRJET Journal
 
Image enhancement techniques a review
Image enhancement techniques   a reviewImage enhancement techniques   a review
Image enhancement techniques a revieweSAT Journals
 
Face recognition using gaussian mixture model & artificial neural network
Face recognition using gaussian mixture model & artificial neural networkFace recognition using gaussian mixture model & artificial neural network
Face recognition using gaussian mixture model & artificial neural networkeSAT Journals
 
AMAZON STOCK PRICE PREDICTION BY USING SMLT
AMAZON STOCK PRICE PREDICTION BY USING SMLTAMAZON STOCK PRICE PREDICTION BY USING SMLT
AMAZON STOCK PRICE PREDICTION BY USING SMLTIRJET Journal
 
Survey on Artificial Neural Network Learning Technique Algorithms
Survey on Artificial Neural Network Learning Technique AlgorithmsSurvey on Artificial Neural Network Learning Technique Algorithms
Survey on Artificial Neural Network Learning Technique AlgorithmsIRJET Journal
 
An fpga based efficient fruit recognition system using minimum
An fpga based efficient fruit recognition system using minimumAn fpga based efficient fruit recognition system using minimum
An fpga based efficient fruit recognition system using minimumAlexander Decker
 
Water Quality Index Calculation of River Ganga using Decision Tree Algorithm
Water Quality Index Calculation of River Ganga using Decision Tree AlgorithmWater Quality Index Calculation of River Ganga using Decision Tree Algorithm
Water Quality Index Calculation of River Ganga using Decision Tree AlgorithmIRJET Journal
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...ijfcstjournal
 
Image Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic AlgorithmImage Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic AlgorithmAM Publications
 
IRJET - Skin Disease Predictor using Deep Learning
IRJET - Skin Disease Predictor using Deep LearningIRJET - Skin Disease Predictor using Deep Learning
IRJET - Skin Disease Predictor using Deep LearningIRJET Journal
 
Amalgamation of contour, texture, color, edge, and
Amalgamation of contour, texture, color, edge, andAmalgamation of contour, texture, color, edge, and
Amalgamation of contour, texture, color, edge, andeSAT Publishing House
 
Human Activity Recognition Using AccelerometerData
Human Activity Recognition Using AccelerometerDataHuman Activity Recognition Using AccelerometerData
Human Activity Recognition Using AccelerometerDataIRJET Journal
 
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...IRJET Journal
 
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...IRJET Journal
 
Document Layout analysis using Inverse Support Vector Machine (I-SVM) for Hin...
Document Layout analysis using Inverse Support Vector Machine (I-SVM) for Hin...Document Layout analysis using Inverse Support Vector Machine (I-SVM) for Hin...
Document Layout analysis using Inverse Support Vector Machine (I-SVM) for Hin...IRJET Journal
 

Similar to Solving linear equations from an image using ann (20)

IRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine LearningIRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine Learning
 
New Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionNew Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral Recognition
 
Application of normalized cross correlation to image registration
Application of normalized cross correlation to image registrationApplication of normalized cross correlation to image registration
Application of normalized cross correlation to image registration
 
Gesture recognition system
Gesture recognition systemGesture recognition system
Gesture recognition system
 
Image detective efficient image retrieval system
Image detective    efficient image retrieval systemImage detective    efficient image retrieval system
Image detective efficient image retrieval system
 
IRJET-Analysis of Face Recognition System for Different Classifier
IRJET-Analysis of Face Recognition System for Different ClassifierIRJET-Analysis of Face Recognition System for Different Classifier
IRJET-Analysis of Face Recognition System for Different Classifier
 
Image enhancement techniques a review
Image enhancement techniques   a reviewImage enhancement techniques   a review
Image enhancement techniques a review
 
Face recognition using gaussian mixture model & artificial neural network
Face recognition using gaussian mixture model & artificial neural networkFace recognition using gaussian mixture model & artificial neural network
Face recognition using gaussian mixture model & artificial neural network
 
AMAZON STOCK PRICE PREDICTION BY USING SMLT
AMAZON STOCK PRICE PREDICTION BY USING SMLTAMAZON STOCK PRICE PREDICTION BY USING SMLT
AMAZON STOCK PRICE PREDICTION BY USING SMLT
 
Survey on Artificial Neural Network Learning Technique Algorithms
Survey on Artificial Neural Network Learning Technique AlgorithmsSurvey on Artificial Neural Network Learning Technique Algorithms
Survey on Artificial Neural Network Learning Technique Algorithms
 
An fpga based efficient fruit recognition system using minimum
An fpga based efficient fruit recognition system using minimumAn fpga based efficient fruit recognition system using minimum
An fpga based efficient fruit recognition system using minimum
 
Water Quality Index Calculation of River Ganga using Decision Tree Algorithm
Water Quality Index Calculation of River Ganga using Decision Tree AlgorithmWater Quality Index Calculation of River Ganga using Decision Tree Algorithm
Water Quality Index Calculation of River Ganga using Decision Tree Algorithm
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
Image Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic AlgorithmImage Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic Algorithm
 
IRJET - Skin Disease Predictor using Deep Learning
IRJET - Skin Disease Predictor using Deep LearningIRJET - Skin Disease Predictor using Deep Learning
IRJET - Skin Disease Predictor using Deep Learning
 
Amalgamation of contour, texture, color, edge, and
Amalgamation of contour, texture, color, edge, andAmalgamation of contour, texture, color, edge, and
Amalgamation of contour, texture, color, edge, and
 
Human Activity Recognition Using AccelerometerData
Human Activity Recognition Using AccelerometerDataHuman Activity Recognition Using AccelerometerData
Human Activity Recognition Using AccelerometerData
 
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
 
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
 
Document Layout analysis using Inverse Support Vector Machine (I-SVM) for Hin...
Document Layout analysis using Inverse Support Vector Machine (I-SVM) for Hin...Document Layout analysis using Inverse Support Vector Machine (I-SVM) for Hin...
Document Layout analysis using Inverse Support Vector Machine (I-SVM) for Hin...
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksMagic Marks
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...jabtakhaidam7
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 

Recently uploaded (20)

Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 

Solving linear equations from an image using ann

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 580 SOLVING LINEAR EQUATIONS FROM AN IMAGE USING ANN Mithun Roy1 , Anupam Mukherjee2 , Alok Basu3 , Pratik Kumer Halder4 1 Assistant Professor, Computer Science & Engineering, Siliguri Institute of Technology, West Bengal, India 2 Assistant Professor, Computer Science & Engineering, Siliguri Institute of Technology, West Bengal, India 3 Assistant Professor, Computer Science & Engineering, Siliguri Institute of Technology, West Bengal, India 4 Assistant Professor, Computer Science & Engineering, Gargi Memorial Institute of Technology, West Bengal, India Abstract Optical character recognition has a great impact in image processing application. This paper combines the concept of OCR and feed-forward artificial neural network to solve mathematical linear equations. We implement blob analysis and feature extraction to extract the individual characters to a captured image which having some mathematical equations. We are constructing 39 character set which having some numbers, alphabet and operators. Training of these character set is done by using supervised learning rule. If that image satisfying linear equation condition then our proposed algorithm solve this equation and generate the output. This paper tries to increase the recognition rate more than 87%. The result achieved from the training and testing on the network of the letter recognition is satisfactory. Keywords: Artificial Neural Network, Linear Equation, Recognized rate, Optical Character Recognition. --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION The objective of this paper is to capture an input text image which having an linear mathematical equations and take out those equations from that image and also extract the characters from that equations, characters are analyzed by comparing its features to distinguished each character from the input character sets.[2][4] We are focusing on those text images which are written in the following fonts, such as Times New Roman, Arial Black, Cambria. We are dealing with such characters which are normally used in linear equations, like digits (0-9), arithmetic operators (+, -) and assignment operator (=). Our input set contains 39 different characters and each size of the character is 7X5. So, Input matrix size will be 35 × 39. And target matrix size will be an identity matrix of order 39 × 39.[7][11] Each column identifies the different characters of the input matrix. These proposed methodologies also reduce the recognition problem and the computational time. The overall optical character reorganization (OCR) is done in this paper by using Artificial Neural Network (ANN).[10] In this case we are used feed-forward neural network with multiple hidden layers. OCR is a very handful tools for image processing application to translate the optically scanned image to digital bitmap form. 1.1 Linear Equation A linear equation is an algebraic equation in which each term is either a constant or the product of a constant and (the first power of) a single variable.[12] Linear equations can have one or more variables. Linear equations occur abundantly in most subareas of mathematics and especially in applied mathematics.[12] In mathematics, a system of linear equations (or linear system) is a collection of linear equations involving the same set of variables. For example, A general system of m linear equations with n unknowns can be written as (1) Here are the unknowns, are the coefficients of the system, and are the constant terms.[12] Often the coefficients and unknowns are real or complex numbers, but integers and rational numbers are also seen, as are polynomials and elements of an abstract algebraic structure. There are two general ways we are represents the system of linear equations.[12] 1.1.1 Vector Equation One extremely helpful view is that each unknown is a weight for a column vector in a linear combination.[12] (2)
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 581 1.1.2 Matrix Equation The vector equation is equivalent to a matrix equation of the form . where A is an m × n matrix, X is a column vector with n entries, and b is a column vector with m entries.[12] (3) 2. PROPOSED METHODOLOGY In this paper the process of character recognition system is divided into four major categories. 1. Preprocessing and feature extraction. 2. Reorganization using feed-forward neural network. 3. Verification and validation of linear equations. 4. Solving equations and accuracy measurement. 2.1 Preprocessing and Feature Extraction: In this phase we, prepare an input image which is captured through digital input media like scanner or digital camera/web camera. In this case we are trying to capture those images which are having linear mathematical equations. 2.2 Image Conversion: It is the process that converts input RGB image to Gray scale image (an intermediate image). We need to do this conversion because we need binary image for further operations. In next step gray scale image is converted into binary image. Binary image is a digital image that has two possible values, either 0 or 1. It may be represented in either black or white colors. [1] The flow diagram of our proposed model is given bellow: Fig.1. Proposed Model 2.3 Image Enhancement It is the process that reduces noise and blurring effect of that input image. Median filter is used for noise reduction. After image filtering procedure edge detection technique is implemented. Edges in images are areas with strong intensity contrasts – a jump in intensity from one pixel to the next. Edge detecting an image significantly reduces the amount of data and filters out useless information, while preserving the important structural properties in an image. [7][8][9] 2.4 Blobs Analysis In Blobs analysis foreground and background objects are separated by using thresholding method. It is used to separate object and background, which is divided image into two modes.[3] The way to resolve both categories is by assigning a thresholding value T.[1][5][6] Each point which have value f is called foreground object, START READ INPUT IMAGE CONTAINS LINEAR EQUATIONS IMAGE CONVERSION RGB TO BINARY IMAGE ENHANCEMENT BLOBS ANALYSIS FEATURE EXTRACTION GENERATE INPUT APPLY ARTIFICIAL NEURAL NETWORK LINEAR EQUATION VERIFICATION CHECK EQUATIONS ARE VALID OR NOT ? NO STOP YES SOLVE LINEAR EQUATION PRODUCED DESIRE OUTPUT GENERATE OUTPUT
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 582 and each point which have value f is called background object. A threshold image g(x, y) is defined as, (4) 2.5 Feature Extraction In feature extraction we are considering some steps for extracting a vector. We are focusing on content of the image not the total part of the image. Our main intention is finding a vector from the image. We have only two types of data on the image. Those are 1 for the white space and 0 for the black space. Now we have to pass the following steps for creating input vector for a particular character or image. Those are: 1. Pixel grabbing 2. Finding probability of making square.[1][11] 2.6 Generate Input Matrix: After blobs analysis, objects are detected. Then we extract each object and resize it in a 7x5 dimensions. This information stored in a column vector which having 35 rows. 2.7 Artificial Neural Network: Neural networks are a promising new generation of information processing system that demonstrate the ability to learn, recall and generalize from training patterns or data. ANNs are good at task such as pattern matching and classification, function approximation, vector quantization and data clustering. ANNs have a large number of highly interconnected processing elements (called nodes) that usually operate in parallel and are configured in regular architecture. The collective behavior of ANN, like a human brain, - demonstrate the ability to learn, recall and generalize from training patterns or data.[2][4] Fig.2. Mathematical model of ANN The ith processing element computes a weighted sum of its input and output. (firing condition) or 0 (non firing condition) According to whether this weighted input sum is above or below a certain threshold . (5) Where the activation function is a step function As we know that general learning rules are classified into three categories in ANN. 1. Supervised learning rules. 2. Unsupervised learning rules. 3. Reinforcement. We focused in supervised learning rules. In supervised learning rule for a particular input X a corresponding actual output will be generated and that value is checked with desire output, if it is matched then it is OK otherwise a error signal will be generated.[2][4] Fig.3.Supervised learning. In this process we introduce the column vector as a input parameter to the processing element in artificial neural network (ANN). We are introducing multiple hidden layers in this case. Resultant value of this feed-forward ANN is checked with target matrix and the final output is extracted. Fig.4. Feed-forward ANN 2.8 Liner Equation Extraction and Verification: In this section after extracting each character from the processed image, we checked whether each character is recognized by this system correctly? If yes, then we use finite automata and check those extracted valid characters make linier equation or not. We check the Linier Equations are correct or not using the following Finite Automata. Learning System Σ Input Error signal training data Actual output Output desired - +
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 583 Fig.5. Linear Equation recognizer Acceptability of a string by Finite Automata: A string W is accepted by a finite automata M = {Q, Σ, , q0, F} if (q0, W) = P for some P in F. This concludes that the string is accepted by the final state. From the above finite automata M contains Q = { A, B, C, D, E, F,G}, Σ = { +, -, =, 0, 1, … , 9, a, b, … , z}, F= {G} and q0 = {A} as the initial state. e.g. let us say be a input string the above finite automata checks the input sting is the valid linear equation or not. (Accepted) 3. EXPERIMENTAL RESULT Step I: Read input image from input devices (like scanner or digital camera). Then convert that input RGB image to gray scale image and remove noise using median filter, finally convert that gray scale image to binary image. (a) (b) Fig.6. a. Input image (after scaning) b. Binary Image Step II: After detecting binary image we are using sobel operator to generate edge detected image which is followed by image filling and blobs analysis. (c) (d) Fig.7. c. Edge detected image d. Image Filling and Blobs analysis B C D EA = a|b|c..|z 0|1|2…|9 0|1|2…|9 F 0|1|2…|9 0|1|2…|9 +|- a|b|c..|z +|- GF +/-
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 584 Step III: Recognization of characters is done using feed- forward ANNs. Fig.8. After Character Extractions & Verification Step IV: After character extraction and verification of the extracted valid equations using regular expression we generate the resultant output which is shown below. Fig.9. Resultant values of the following three linear equations 4. RESULT ANALYSIS The result achieved from the training and testing on the network of the letter recognition is at around 87%. Previously it is around 80-82%. We increase the recognition rate at around 5% more. In this part we had shown the details of the result analysis and network performance. We choose 39 input characters and each and individual character is checked and validate through our reorganization system. Those characters which are not recognized by the system are treated as an error which is marked by the “yellow” color. After actual verification and validation of characters we have got 87% success rate. [11] IC: INPUT CHARACTER RC: RECOGNIZED CHARACTER RR: RECOGNIZED RATE IC RC RR IC RC RR IC RC RR 1 1 > 87 % a a > 87 % n n > 87 % 2 2 > 87 % b b > 87 % o 0 0% 3 f 0% c c > 87 % p p > 87 % 4 4 > 87 % d d > 87 % q a 0% 5 5 > 87 % e e > 87 % r r > 87 % 6 6 > 87 % f f > 87 % s s > 87 % 7 7 > 87 % g g > 87 % t t > 87 % 8 8 > 87 % h h > 87 % u u > 87 % 9 9 > 87 % i i > 87 % v v > 87 % 0 0 > 87 % j l 0% w w > 87 % + + > 87 % k k > 87 % x x > 87 % - - > 87 % l l > 87 % y v 0% = = > 87 % m m > 87 % z z > 87 % Recognized rate: (34/39) x 100% = 87% Network Performance Analysis The data set is checked by typical feed-forward neural network. We can check the network performance and determine if any changes need to be made to the training process, the network architecture, or the data sets. The network mean squared error performance was rated at 0.0013149 during epoch 10.
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 585 Fig.10. Plot-performance Plot performs plot the training validation and test performances on the training record. Fig.11. Plot-regression Plot the linear equation of targets relative to outputs.
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 586 5. CONCLUSION Most important part of this paper is its real life implementation. Any person can capture an image using image capturing devices from any books having system of linear equations, and then our proposed model is good enough to detect and generate the resultant output. In this paper we proposed a feed forward ANN based model which is used to recognize the character set which are involve in system of linear equations. We are not only deal with optical character recognition (OCR) but also proposed a model which can extract the features of the input character set. Verification and validation part is also equally important; acceptance of the string is verified by using finite automata. Solving system of linear equations is done using Gauss Elimination method. The result achieved from the training and testing on the network of the character recognition is at around 87%. Previously it is around 80-82%.[11] We increase the recognition rate at around 5% more. ACKNOWLEDGEMENTS We tender our heartily gratitude to our parents, family members and friends. REFERENCES [1]. Gonzalez, Rafael C., Richard E. Woods. :” Digital Image Processing.” Ed III, Pearson Education Asia. [2]. Ruck, D.W. Rogers, S.K. and Kabrisky, M. “Feature Selection Using a MultiLayer Perceptron”. In J. Neural Network Comput. 2 (2):40-48, 1990. [3]. S.Arya andD.M.Mount. “Approximate nearest neighbor searching” .Proceeding 4th Annual ACM-SIAM Symposium on Discrete Algorithms, pages 271-280,1993. [4]. Rossi, F.”Attribute Suppression with Multi-Layer Perceptron”. In Proceedings of IEEE-IMACS'96, Lille, France. 1996. [5]. D.Comaniciu and P.Meer. “Robust analysis of feature spaces: color image segmentation”. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pages 750-755, 1997. [6]. J.Shi and J.Malik. “Normalized cuts and image segmentation”. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 731-737, 1997. [7]. Viola, P. and Jones, M. Robust Real Time Object Detection, In International Journal of Computer Vision, 1(2), 2002. [8]. Jinshan Tang Eli Peli, and Scott Acton “Image Enhancement Using a Contrast Measure in the Compressed Domain”, IEEE Signal processing Letters , Vol. 10, NO. 10, October 2003. [9]. S. S. Agaian, S. Blair and K. A. Panetta, “Transform coefficient histogram-based image enhancement algorithms using contrast entropy”, IEEE Transaction on Image Processing. vol. 16, no. 3, pages. 741-758, 2007. [10]. A. A. Wadud, M. Kabir, M. H. Dewan and M. C. Oksam, “A dynamic histogram equalization for image contrast enhancement”, IEEE Trans. Consumer Electronic , vol. 53, no. 2, pages 593-600, 2007. [11]. Md. Alamgir Badsha, Md. Akkas Ali, Dr. Kaushik Deb, Md. Nuruzzaman Bhuiyan, “Handwritten Bangla Character Recognition Using Neural Network”, International Journal of Advanced Research in Computer Science and Software Engineering”. Vol 2, Issue 11, pages. 307 – 312, November 2012. [12]. Hamming, R.W., "Introduction to Applied Numerical Analysis", McGraw-Hill Book Co., Inc., New York, San Francisco, Toronto, London. 1971 BIOGRAPHIES Mithun Roy has obtained M.Tech. in Computer Science from West Bengal University of Technology. Presently he is working as an Assistant Professor in the department of CSE in Siliguri Institute of Technology. His research interest is in Digital Image Processing, Social Networking and Pattern recognition. Anupam Mukherjee has obtained B.Tech. and M.Tech. in Computer Science from West Bengal Univer sity of Technology. Presently he is working as an Assistant Professor in the dept. of CSE in Siliguri Institute of Technology. His research interest is in Digital Image Processing, Computer Networking, Cryptography and Network Security. Alok Basu has started his career as a Mechanical Engineer, at Alloy Steels Plant, SAIL in 1983. He worked there in different sections of his field in various capacities. Later he got a scope to be trained in COBOL and to work with the in-house software development and maintenance team for more than seven years. He was mainly involved in the development of Production Information & Order Servicing System in COBOL on MV 15000 (AOS/VS-II) platform. He joined in Siliguri Institute of Technology after completion of M. Tech in Information Technology. He is serving this institute for more than 10 years and presently holding the chair of HOD. Pratik Kumer Halder has obtained B.Tech. and M.Tech. in Computer Science from West Bengal University of Technology. Presently he is working as an Assistant Professor in the dept. of CSE in Gargi Memorial Institute of Technology. His research interest is in Digital Image Processing, visual cryptography.