SlideShare a Scribd company logo
1 of 5
Download to read offline
@ IJTSRD | Available Online @ www.ijtsrd.com
ISSN No: 2456
International
Research
Alphabet Recognition System Based o
Lecturer,
Technological University,
Thanlyin,
ABSTRACT
One of the most classical applications of the Artificial
Neural Network is the character recognition system.
This system is the base for many different types of
applications in various fields, many of which are used
in daily lives. Cost effective and less time consuming,
businesses, post offices, banks, security systems, and
even the field of robotics employ this
base of their operations. For character recognition,
there are many prosperous algorithms for training
neural networks. Back propagation (BP) is the most
popular algorithm for supervised training multilayer
neural networks. In this thesis, Back propagation (BP)
algorithm is implemented for the training of
multilayer neural networks employing in character
recognition system. The neural network architecture
used in this implementation is a fully connected three
layer network. The network can tr
characters since the 4-element output vector is used as
output units. This thesis also evaluates the
performance of Back propagation (BP) algorithm with
various learning rates and mean square errors.
MATLAB Programming language is used for
implementation.
Keywords: Artificial Neural Network, Back
propagation, Character Recognition
I. INTRODUCTION
Character Recognition is used widely today in the
post offices, banks, airports, airline offices, and
businesses. Address readers sort incoming and
outgoing mail, check readers in banks capture images
of checks for processing, airline ticket and passport
readers are used for various purposes from accounting
for passenger revenues to checking database records.
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018
ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume
International Journal of Trend in Scientific
Research and Development (IJTSRD)
International Open Access Journal
habet Recognition System Based on Artifical Neural Network
Myat Thida Tun
, Department of Information Technology
nological University, Republic of the Union of Myanmar
Thanlyin, Banbwegon, Myanmar (Burma)
One of the most classical applications of the Artificial
Neural Network is the character recognition system.
This system is the base for many different types of
applications in various fields, many of which are used
in daily lives. Cost effective and less time consuming,
businesses, post offices, banks, security systems, and
system as the
base of their operations. For character recognition,
there are many prosperous algorithms for training
neural networks. Back propagation (BP) is the most
popular algorithm for supervised training multilayer
ack propagation (BP)
algorithm is implemented for the training of
multilayer neural networks employing in character
recognition system. The neural network architecture
used in this implementation is a fully connected three
layer network. The network can train over 16
element output vector is used as
output units. This thesis also evaluates the
performance of Back propagation (BP) algorithm with
various learning rates and mean square errors.
MATLAB Programming language is used for
Artificial Neural Network, Back
Character Recognition is used widely today in the
post offices, banks, airports, airline offices, and
businesses. Address readers sort incoming and
outgoing mail, check readers in banks capture images
of checks for processing, airline ticket and passport
readers are used for various purposes from accounting
for passenger revenues to checking database records.
Character Recognition software is als
scanners and faxes that allow the user to turn
images of text into editable documents. Newer
applications have even expanded outside the
limitations of just characters. Eye, face, and
fingerprint scans used in high-
newer kind of recognition. More and more assembly
lines are becoming equipped with robots scanning the
gears that pass underneath for faults, and it has been
applied in the field of robotics to allow robots to
detect edges, shapes, and colors.
Character recognition is one of the most widely used
applications of Neural Networks. However, the
problems of slow training process, choosing suitable
values for the parameters and escaping from local
minima remain a major problem that face the
developers when using Neural Network. In recent
years, a pen-based computer has become popular as
an input device. Since character recognition systems
are the preferred input methods, there are many
character recognition methods that have been
introduced. In this thesis, Bac
developed and trained to recognize characters. Back
propagation (BP) applies a non
error from each output unit before applying the back
propagation phase. The (BP) aims to speed up the
training process and escape from local minima.
II. PROPOSED IMPLEMENTATION STEPS
OFALPHABET RECOGNITION
The steps needed for the implementation of alphabet
recognition are described in the following articles.
Aug 2018 Page: 469
6470 | www.ijtsrd.com | Volume - 2 | Issue – 5
Scientific
(IJTSRD)
International Open Access Journal
n Artifical Neural Network
Character Recognition software is also used in
scanners and faxes that allow the user to turn graphic
images of text into editable documents. Newer
applications have even expanded outside the
limitations of just characters. Eye, face, and
-security areas employ a
newer kind of recognition. More and more assembly
lines are becoming equipped with robots scanning the
gears that pass underneath for faults, and it has been
applied in the field of robotics to allow robots to
tect edges, shapes, and colors.
recognition is one of the most widely used
applications of Neural Networks. However, the
problems of slow training process, choosing suitable
values for the parameters and escaping from local
minima remain a major problem that face the
ng Neural Network. In recent
based computer has become popular as
an input device. Since character recognition systems
are the preferred input methods, there are many
character recognition methods that have been
introduced. In this thesis, Back propagation (BP) is
developed and trained to recognize characters. Back
propagation (BP) applies a non-linear function on the
error from each output unit before applying the back
propagation phase. The (BP) aims to speed up the
e from local minima.
PROPOSED IMPLEMENTATION STEPS
OFALPHABET RECOGNITION
The steps needed for the implementation of alphabet
recognition are described in the following articles.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 470
A. Creating the Alphabet Recognition
The Character Recognition System must first be
created through a few simple steps in order to prepare
it for presentation into MATLAB. The matrixes of
each letter of the alphabet must be created along with
the network structure. In addition, one must
understand how to pull the Binary Input Code from
the matrix, and how to interpret the Binary Output
Code, which the computer ultimately produces.
B. Alphabet Matrixes
A character matrix is an array of black and white
pixels; the vector of 1 represented by black, and 0 by
white. They can be created by the use of MATLAB,
in size or font imaginable; in addition, multiple fonts
of the same alphabet may even be used under separate
training sessions. In this thesis, 24 x 21 size of
character matrix is used and Tahoma font type is used
for testing.
C. Neural Network
The network receives the 504 Boolean values as a
504-element input vector. It is then required to
identify the letter by responding with a 4-element
output vector. In this thesis, since 16 English
characters (A-P) are trained and tested, the system
yields 16 4-element output vectors. Each output
vector represents a letter. To operate correctly, the
network should respond with a value closing to the
corresponding targeted output vector of the letter
being presented to the network.
D. Architecture
The neural network needs 504 inputs and 4 neurons in
its output layer to identify the letters. The sigmoid
transfer function was picked because its output range
(0 to 1) is perfect for learning to output Boolean
values. The hidden layer has 84 neurons.
E. Setting the Weight
There are two sets of weights; input-hidden layer
weights and hidden-output layer weights. These
weights represent the memory of the neural network,
where final training weights can be used when
running the network. Initial weights are generated
randomly there, after; weights are updated using the
error (difference) between the actual output of the
network and the desired (target) output. Weight
updating occurs each iteration, and the network learns
while iterating repeatedly until a net minimum error
value is achieved.
F. Training
The network is first trained on ideal vectors until it
has a low mean squared error. Then, the network is
trained on all sets of vectors. The network is trained
on noise-free alphabet to maintain the network's
ability to classify ideal input vectors. All training is
done using back propagation with adaptive learning
rate.
III.IMPLEMENTING THE BACK
PROPAGATION LEARNING ALGORITHM
FOR A FULLY CONNECTED THREE
LAYER NETWORK
Neural networks are developed and trained to
recognize characters. Back propagation (BP), which
applies a non-linear function on the error from each
output unit before applying the back propagation
phase. The BP aims to speed up the training process
and escape from local minima.
 Apply the input vector to the input units.
 Calculate the net-input values to the hidden layer
units.
 Calculate the outputs from the hidden layer.
 Calculate the net-input values to the each units.
 Calculate the outputs from the output units.
 Calculate the error term for the output units.
 Calculate the error term for the hidden units
 Update weights on the output layer.
 Update weights on the hidden layer.
IV.EXPERIMENTAL PARAMETERS
Two three-layered neural networks are implemented,
each with different learning parameters. Figure shows
the training set for each neural network. Although
there exist numerous variants of the classical back
propagation training algorithm.
Fig.1 Training Set for Each Neural Network
The experiments were made on recognizing characters
from A to P. Characters are represented as N-vector
which is given to the input layer of each neural
network. As shown in Fig.1 the number of pixels
(number of units in input layer) of the first neural
network is 504 (24x21 matrix). Black pixels are
represented by 1’s and white pixel by 0’s (i.e. Binary
input values were used).
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 471
Image Database Table
Desired output for each character
Binary Code Character
0 0 0 0 A
0 0 0 1 B
0 0 1 0 C
0 0 1 1 D
... …
… …
1 1 1 P
V. EXPERIMENTAL RESULT
Neural Network Programming Steps:
There are many steps in Neural Network program. If
the user wants to run this program, the following
command has to type in command window of
MATLAB.
>> Main-Program At this time, cover window appears
as shown in Figure 2.
Fig. 2 Cover window
After main program has opened, the cover window
appears as shown in Figure.2. In this screen, there are
two submenus under Main menu. If the user wants to
train the data set, the submenu “Train” can be chosen.
Otherwise, the submenu “Test” can be chosen if the
user want to test. If the user chooses the “Train”
menu, the command window appears as in Fig. 5.4,
requesting the user to give desired learning rate and
mean square error. Then the training program perform
its task (training data set) and outputs the results of
total iteration number, total time taken (in seconds),
mean squared error and actual output vector as shown
in figure.
Fig.3 The Output Results of Training Program for
MSE = 0.00001
Table.1The results of training process for
MSE = 0.00001
Learning Rate Iterations Time Taken(s)
0.1 899 196.3616
0.2 437 95.9667
0.3 291 74.8111
0.4 215 49.2186
0.5 156 35.8624
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 472
Table shows the results of training process with MSE
= 0.00001 for five different learning rates. From this
table, it is found that the more learning rate, the less
iteration number and the faster the trained network
reaches to desired goal (mean square error).
Table.2 The results of training process for Learning
Rate = 0.3
MSE Iterations Time Taken (s)
0.0001 40 2.8467
0.00001 288 64.0111
0.000001 2390 528.8830
0.0000001 21888 4.6590e+003
Table 2 shows the results of training process with
learning rate = 0.3 for five various mean square error
parameters. Firstly, the user uses the learning rate
parameter = 0.3 for mean squared error = 0.0001.
Then, the result output can be seen as the total
iteration numbers are 40 and the time taken is 2.8467
seconds.
Table.3The results of training process for Learning
Rate = 0.5
MSE Iterations Time Taken (s)
0.0001 40 2.8467
0.00001 288 64.0111
0.000001 2390 528.8830
0.0000001 21888 4.6590e+003
Table3 shows the results of training process with
learning rate = 0.5 for five various mean square error
parameters. Firstly, the user uses the learning rate
parameter = 0.5 for mean square error = 0.00001.
Then, the result output can be seen as the total
iteration numbers are 157 and the time taken is
38.9225 seconds. If the user wants to test the data set,
the submenu “Test” can be chosen. The user can enter
the test character file from A to P for both purposes of
training and testing processes. Fig. 3 shows the results
of testing characters which have been trained. Firstly,
'Enter Test File:' request the user to give the desired
file to test (Eg. Atest.jpg). Then, the result of
character recognition, the output vector (0 0 0 0 or 0 0
0 0 1, etc.) and the recognized character (“It is A” or
"It is B", etc.), will appear as shown in Fig. 5.6. The
user can test 16 characters (A to P) by entering
desired test file. For the question, “Do you want to
test the next character (y/n)?”, the user can write “y or
n”. If the user writes “y”, continue to test the next
character otherwise “n” to exit the command window.
Fig4. Command Window to Test for Training or
Testing Character
This paper explains the processing steps of Character
Recognition System. The user can be easily seen the
processing and running steps of Neural Network
programs. This thesis aims to apply the classical BP
algorithm on one of the Back propagation neural
network applications, which is character recognition.
In this thesis, to obtain fair and independent results,
network architecture was trained with various MSE
values for the different learning rate at each time. The
experimental results show that using the BP can speed
up convergence of the training process and recognize
trained characters (A to P) from the Image Database
Table.
VI.CONCLUSIONS
This paper aims to apply the BP algorithm on one of
the Back propagation neural network application,
which is character recognition. The architecture of
504×84×4 was used with various values for the
learning rate. The experimental results show that
using the BP can speed up convergence of the training
process. Although small values for the learning rate
were used, the BP was able to train the neural
network. The performance of recognition can be
increased when the input training data files are
increased. The size of database set is presented as an
important role of the training section. The Back
propagation Neural Network is discussed in the
Chapter four of this thesis. It can also be used for
almost any image recognition applications. The
network is a 3 layer configuration, with the required
input and output layers, as well as a single hidden
layer that choosing the number of hidden layers is a
difficult task with no hard rules or guidelines.
However, the size of a hidden layer is related to the
features or distinguishing characteristics that are to be
discerned from the data. Here, the network applies
one hidden layer, which has 84 neurons. The output
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 473
layer is where the output vector can be retrieved. Each
neuron in this layer outputs a value between 0 and 1
by applying logical sigmoid function (sig = 1/ (1+exp
(-1*s)). In addition, to obtain the accurate output
values (0 or 1); the threshold value of 0.5 is used
when calculating each neuron’s output.
REFERENCES
1. Faaborg A., 2002, “Using Neural Networks to
Create an Adaptive Character Recognition
System”,
2. Alek saner I., 1995, “An Introduction to Neural
Computing", Second Edition hapman & Hall.
3. Morgan L. and Bourlard H., 1995, “Continuous
Speech Recognition an introduction to the hybrid
Signal Processing Mag.
4. You D. and Kim G., 2003, “An approach for
locating segmentation points of handwritten digit
strings using a neural network”, Proceedings of
the Seventh International Conference on
Document Analysis.
5. Verma B., 2003, “A Contour Code Feature Based
Segmentation for Handwriting Recognition”,

More Related Content

What's hot

Traffic Sign Detection and Recognition for Automated Driverless Cars Based on...
Traffic Sign Detection and Recognition for Automated Driverless Cars Based on...Traffic Sign Detection and Recognition for Automated Driverless Cars Based on...
Traffic Sign Detection and Recognition for Automated Driverless Cars Based on...
ijtsrd
 
Understanding rf circuits with multisim 10
Understanding rf circuits with multisim 10Understanding rf circuits with multisim 10
Understanding rf circuits with multisim 10
Dikshya Rath
 

What's hot (20)

Open CV Implementation of Object Recognition Using Artificial Neural Networks
Open CV Implementation of Object Recognition Using Artificial Neural NetworksOpen CV Implementation of Object Recognition Using Artificial Neural Networks
Open CV Implementation of Object Recognition Using Artificial Neural Networks
 
One shot learning
One shot learningOne shot learning
One shot learning
 
Downloadfile
DownloadfileDownloadfile
Downloadfile
 
Adaptive network based fuzzy
Adaptive network based fuzzyAdaptive network based fuzzy
Adaptive network based fuzzy
 
Deep Learning personalised, closed-loop Brain-Computer Interfaces for mu...
Deep  Learning  personalised, closed-loop  Brain-Computer  Interfaces  for mu...Deep  Learning  personalised, closed-loop  Brain-Computer  Interfaces  for mu...
Deep Learning personalised, closed-loop Brain-Computer Interfaces for mu...
 
Handwritten Digit Recognition
Handwritten Digit RecognitionHandwritten Digit Recognition
Handwritten Digit Recognition
 
Transfer Leaning Using Pytorch synopsis Minor project pptx
Transfer Leaning Using Pytorch  synopsis Minor project pptxTransfer Leaning Using Pytorch  synopsis Minor project pptx
Transfer Leaning Using Pytorch synopsis Minor project pptx
 
J017446568
J017446568J017446568
J017446568
 
BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...
BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...
BIDIRECTIONAL LONG SHORT-TERM MEMORY (BILSTM)WITH CONDITIONAL RANDOM FIELDS (...
 
Traffic Sign Detection and Recognition for Automated Driverless Cars Based on...
Traffic Sign Detection and Recognition for Automated Driverless Cars Based on...Traffic Sign Detection and Recognition for Automated Driverless Cars Based on...
Traffic Sign Detection and Recognition for Automated Driverless Cars Based on...
 
The Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless CommunicationsThe Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless Communications
 
Communication systems-theory-for-undergraduate-students-using-matlab
Communication systems-theory-for-undergraduate-students-using-matlabCommunication systems-theory-for-undergraduate-students-using-matlab
Communication systems-theory-for-undergraduate-students-using-matlab
 
Extractive Summarization with Very Deep Pretrained Language Model
Extractive Summarization with Very Deep Pretrained Language ModelExtractive Summarization with Very Deep Pretrained Language Model
Extractive Summarization with Very Deep Pretrained Language Model
 
Machine Learning Techniques in Python Dissertation - Phdassistance
Machine Learning Techniques in Python Dissertation - PhdassistanceMachine Learning Techniques in Python Dissertation - Phdassistance
Machine Learning Techniques in Python Dissertation - Phdassistance
 
Aisi2017 keynote speaker
Aisi2017 keynote speakerAisi2017 keynote speaker
Aisi2017 keynote speaker
 
IDENTIFICATION OF IMAGE SPAM BY USING LOW LEVEL & METADATA FEATURES
IDENTIFICATION OF IMAGE SPAM BY USING LOW LEVEL & METADATA FEATURES IDENTIFICATION OF IMAGE SPAM BY USING LOW LEVEL & METADATA FEATURES
IDENTIFICATION OF IMAGE SPAM BY USING LOW LEVEL & METADATA FEATURES
 
Understanding rf circuits with multisim 10
Understanding rf circuits with multisim 10Understanding rf circuits with multisim 10
Understanding rf circuits with multisim 10
 
Patent Protection of Machine Learning and Artificial Intelligence Inventions ...
Patent Protection of Machine Learning and Artificial Intelligence Inventions ...Patent Protection of Machine Learning and Artificial Intelligence Inventions ...
Patent Protection of Machine Learning and Artificial Intelligence Inventions ...
 
Text independent speaker identification system using average pitch and forman...
Text independent speaker identification system using average pitch and forman...Text independent speaker identification system using average pitch and forman...
Text independent speaker identification system using average pitch and forman...
 
Arabic named entity recognition using deep learning approach
Arabic named entity recognition using deep learning approachArabic named entity recognition using deep learning approach
Arabic named entity recognition using deep learning approach
 

Similar to Alphabet Recognition System Based on Artifical Neural Network

Similar to Alphabet Recognition System Based on Artifical Neural Network (20)

IRJET- Intelligent Character Recognition of Handwritten Characters using ...
IRJET-  	  Intelligent Character Recognition of Handwritten Characters using ...IRJET-  	  Intelligent Character Recognition of Handwritten Characters using ...
IRJET- Intelligent Character Recognition of Handwritten Characters using ...
 
Som paper1.doc
Som paper1.docSom paper1.doc
Som paper1.doc
 
IRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten CharactersIRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten Characters
 
Text Recognition using Convolutional Neural Network: A Review
Text Recognition using Convolutional Neural Network: A ReviewText Recognition using Convolutional Neural Network: A Review
Text Recognition using Convolutional Neural Network: A Review
 
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...
 
Facial expression recognition projc 2 (3) (1)
Facial expression recognition projc 2 (3) (1)Facial expression recognition projc 2 (3) (1)
Facial expression recognition projc 2 (3) (1)
 
BLOB DETECTION TECHNIQUE USING IMAGE PROCESSING FOR IDENTIFICATION OF MACHINE...
BLOB DETECTION TECHNIQUE USING IMAGE PROCESSING FOR IDENTIFICATION OF MACHINE...BLOB DETECTION TECHNIQUE USING IMAGE PROCESSING FOR IDENTIFICATION OF MACHINE...
BLOB DETECTION TECHNIQUE USING IMAGE PROCESSING FOR IDENTIFICATION OF MACHINE...
 
Packet Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String KernelsPacket Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String Kernels
 
Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...
 
Sign Language Detector Using Cloud
Sign Language Detector Using CloudSign Language Detector Using Cloud
Sign Language Detector Using Cloud
 
2. NEURAL NETWORKS USING GENETIC ALGORITHMS.pptx
2. NEURAL NETWORKS USING GENETIC ALGORITHMS.pptx2. NEURAL NETWORKS USING GENETIC ALGORITHMS.pptx
2. NEURAL NETWORKS USING GENETIC ALGORITHMS.pptx
 
IRJET- Optical Character Recognition using Image Processing
IRJET-  	  Optical Character Recognition using Image ProcessingIRJET-  	  Optical Character Recognition using Image Processing
IRJET- Optical Character Recognition using Image Processing
 
IRJET- Hand Sign Recognition using Convolutional Neural Network
IRJET- Hand Sign Recognition using Convolutional Neural NetworkIRJET- Hand Sign Recognition using Convolutional Neural Network
IRJET- Hand Sign Recognition using Convolutional Neural Network
 
Devanagari Digit and Character Recognition Using Convolutional Neural Network
Devanagari Digit and Character Recognition Using Convolutional Neural NetworkDevanagari Digit and Character Recognition Using Convolutional Neural Network
Devanagari Digit and Character Recognition Using Convolutional Neural Network
 
FACE EXPRESSION RECOGNITION USING CONVOLUTION NEURAL NETWORK (CNN) MODELS
FACE EXPRESSION RECOGNITION USING CONVOLUTION NEURAL NETWORK (CNN) MODELS FACE EXPRESSION RECOGNITION USING CONVOLUTION NEURAL NETWORK (CNN) MODELS
FACE EXPRESSION RECOGNITION USING CONVOLUTION NEURAL NETWORK (CNN) MODELS
 
Deep learning Techniques JNTU R20 UNIT 2
Deep learning Techniques JNTU R20 UNIT 2Deep learning Techniques JNTU R20 UNIT 2
Deep learning Techniques JNTU R20 UNIT 2
 
Human age and gender Detection
Human age and gender DetectionHuman age and gender Detection
Human age and gender Detection
 
Deep learning seminar report
Deep learning seminar reportDeep learning seminar report
Deep learning seminar report
 
Handwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNNHandwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNN
 
Neural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlabNeural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlab
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Alphabet Recognition System Based on Artifical Neural Network

  • 1. @ IJTSRD | Available Online @ www.ijtsrd.com ISSN No: 2456 International Research Alphabet Recognition System Based o Lecturer, Technological University, Thanlyin, ABSTRACT One of the most classical applications of the Artificial Neural Network is the character recognition system. This system is the base for many different types of applications in various fields, many of which are used in daily lives. Cost effective and less time consuming, businesses, post offices, banks, security systems, and even the field of robotics employ this base of their operations. For character recognition, there are many prosperous algorithms for training neural networks. Back propagation (BP) is the most popular algorithm for supervised training multilayer neural networks. In this thesis, Back propagation (BP) algorithm is implemented for the training of multilayer neural networks employing in character recognition system. The neural network architecture used in this implementation is a fully connected three layer network. The network can tr characters since the 4-element output vector is used as output units. This thesis also evaluates the performance of Back propagation (BP) algorithm with various learning rates and mean square errors. MATLAB Programming language is used for implementation. Keywords: Artificial Neural Network, Back propagation, Character Recognition I. INTRODUCTION Character Recognition is used widely today in the post offices, banks, airports, airline offices, and businesses. Address readers sort incoming and outgoing mail, check readers in banks capture images of checks for processing, airline ticket and passport readers are used for various purposes from accounting for passenger revenues to checking database records. @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume International Journal of Trend in Scientific Research and Development (IJTSRD) International Open Access Journal habet Recognition System Based on Artifical Neural Network Myat Thida Tun , Department of Information Technology nological University, Republic of the Union of Myanmar Thanlyin, Banbwegon, Myanmar (Burma) One of the most classical applications of the Artificial Neural Network is the character recognition system. This system is the base for many different types of applications in various fields, many of which are used in daily lives. Cost effective and less time consuming, businesses, post offices, banks, security systems, and system as the base of their operations. For character recognition, there are many prosperous algorithms for training neural networks. Back propagation (BP) is the most popular algorithm for supervised training multilayer ack propagation (BP) algorithm is implemented for the training of multilayer neural networks employing in character recognition system. The neural network architecture used in this implementation is a fully connected three layer network. The network can train over 16 element output vector is used as output units. This thesis also evaluates the performance of Back propagation (BP) algorithm with various learning rates and mean square errors. MATLAB Programming language is used for Artificial Neural Network, Back Character Recognition is used widely today in the post offices, banks, airports, airline offices, and businesses. Address readers sort incoming and outgoing mail, check readers in banks capture images of checks for processing, airline ticket and passport readers are used for various purposes from accounting for passenger revenues to checking database records. Character Recognition software is als scanners and faxes that allow the user to turn images of text into editable documents. Newer applications have even expanded outside the limitations of just characters. Eye, face, and fingerprint scans used in high- newer kind of recognition. More and more assembly lines are becoming equipped with robots scanning the gears that pass underneath for faults, and it has been applied in the field of robotics to allow robots to detect edges, shapes, and colors. Character recognition is one of the most widely used applications of Neural Networks. However, the problems of slow training process, choosing suitable values for the parameters and escaping from local minima remain a major problem that face the developers when using Neural Network. In recent years, a pen-based computer has become popular as an input device. Since character recognition systems are the preferred input methods, there are many character recognition methods that have been introduced. In this thesis, Bac developed and trained to recognize characters. Back propagation (BP) applies a non error from each output unit before applying the back propagation phase. The (BP) aims to speed up the training process and escape from local minima. II. PROPOSED IMPLEMENTATION STEPS OFALPHABET RECOGNITION The steps needed for the implementation of alphabet recognition are described in the following articles. Aug 2018 Page: 469 6470 | www.ijtsrd.com | Volume - 2 | Issue – 5 Scientific (IJTSRD) International Open Access Journal n Artifical Neural Network Character Recognition software is also used in scanners and faxes that allow the user to turn graphic images of text into editable documents. Newer applications have even expanded outside the limitations of just characters. Eye, face, and -security areas employ a newer kind of recognition. More and more assembly lines are becoming equipped with robots scanning the gears that pass underneath for faults, and it has been applied in the field of robotics to allow robots to tect edges, shapes, and colors. recognition is one of the most widely used applications of Neural Networks. However, the problems of slow training process, choosing suitable values for the parameters and escaping from local minima remain a major problem that face the ng Neural Network. In recent based computer has become popular as an input device. Since character recognition systems are the preferred input methods, there are many character recognition methods that have been introduced. In this thesis, Back propagation (BP) is developed and trained to recognize characters. Back propagation (BP) applies a non-linear function on the error from each output unit before applying the back propagation phase. The (BP) aims to speed up the e from local minima. PROPOSED IMPLEMENTATION STEPS OFALPHABET RECOGNITION The steps needed for the implementation of alphabet recognition are described in the following articles.
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 470 A. Creating the Alphabet Recognition The Character Recognition System must first be created through a few simple steps in order to prepare it for presentation into MATLAB. The matrixes of each letter of the alphabet must be created along with the network structure. In addition, one must understand how to pull the Binary Input Code from the matrix, and how to interpret the Binary Output Code, which the computer ultimately produces. B. Alphabet Matrixes A character matrix is an array of black and white pixels; the vector of 1 represented by black, and 0 by white. They can be created by the use of MATLAB, in size or font imaginable; in addition, multiple fonts of the same alphabet may even be used under separate training sessions. In this thesis, 24 x 21 size of character matrix is used and Tahoma font type is used for testing. C. Neural Network The network receives the 504 Boolean values as a 504-element input vector. It is then required to identify the letter by responding with a 4-element output vector. In this thesis, since 16 English characters (A-P) are trained and tested, the system yields 16 4-element output vectors. Each output vector represents a letter. To operate correctly, the network should respond with a value closing to the corresponding targeted output vector of the letter being presented to the network. D. Architecture The neural network needs 504 inputs and 4 neurons in its output layer to identify the letters. The sigmoid transfer function was picked because its output range (0 to 1) is perfect for learning to output Boolean values. The hidden layer has 84 neurons. E. Setting the Weight There are two sets of weights; input-hidden layer weights and hidden-output layer weights. These weights represent the memory of the neural network, where final training weights can be used when running the network. Initial weights are generated randomly there, after; weights are updated using the error (difference) between the actual output of the network and the desired (target) output. Weight updating occurs each iteration, and the network learns while iterating repeatedly until a net minimum error value is achieved. F. Training The network is first trained on ideal vectors until it has a low mean squared error. Then, the network is trained on all sets of vectors. The network is trained on noise-free alphabet to maintain the network's ability to classify ideal input vectors. All training is done using back propagation with adaptive learning rate. III.IMPLEMENTING THE BACK PROPAGATION LEARNING ALGORITHM FOR A FULLY CONNECTED THREE LAYER NETWORK Neural networks are developed and trained to recognize characters. Back propagation (BP), which applies a non-linear function on the error from each output unit before applying the back propagation phase. The BP aims to speed up the training process and escape from local minima.  Apply the input vector to the input units.  Calculate the net-input values to the hidden layer units.  Calculate the outputs from the hidden layer.  Calculate the net-input values to the each units.  Calculate the outputs from the output units.  Calculate the error term for the output units.  Calculate the error term for the hidden units  Update weights on the output layer.  Update weights on the hidden layer. IV.EXPERIMENTAL PARAMETERS Two three-layered neural networks are implemented, each with different learning parameters. Figure shows the training set for each neural network. Although there exist numerous variants of the classical back propagation training algorithm. Fig.1 Training Set for Each Neural Network The experiments were made on recognizing characters from A to P. Characters are represented as N-vector which is given to the input layer of each neural network. As shown in Fig.1 the number of pixels (number of units in input layer) of the first neural network is 504 (24x21 matrix). Black pixels are represented by 1’s and white pixel by 0’s (i.e. Binary input values were used).
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 471 Image Database Table Desired output for each character Binary Code Character 0 0 0 0 A 0 0 0 1 B 0 0 1 0 C 0 0 1 1 D ... … … … 1 1 1 P V. EXPERIMENTAL RESULT Neural Network Programming Steps: There are many steps in Neural Network program. If the user wants to run this program, the following command has to type in command window of MATLAB. >> Main-Program At this time, cover window appears as shown in Figure 2. Fig. 2 Cover window After main program has opened, the cover window appears as shown in Figure.2. In this screen, there are two submenus under Main menu. If the user wants to train the data set, the submenu “Train” can be chosen. Otherwise, the submenu “Test” can be chosen if the user want to test. If the user chooses the “Train” menu, the command window appears as in Fig. 5.4, requesting the user to give desired learning rate and mean square error. Then the training program perform its task (training data set) and outputs the results of total iteration number, total time taken (in seconds), mean squared error and actual output vector as shown in figure. Fig.3 The Output Results of Training Program for MSE = 0.00001 Table.1The results of training process for MSE = 0.00001 Learning Rate Iterations Time Taken(s) 0.1 899 196.3616 0.2 437 95.9667 0.3 291 74.8111 0.4 215 49.2186 0.5 156 35.8624
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 472 Table shows the results of training process with MSE = 0.00001 for five different learning rates. From this table, it is found that the more learning rate, the less iteration number and the faster the trained network reaches to desired goal (mean square error). Table.2 The results of training process for Learning Rate = 0.3 MSE Iterations Time Taken (s) 0.0001 40 2.8467 0.00001 288 64.0111 0.000001 2390 528.8830 0.0000001 21888 4.6590e+003 Table 2 shows the results of training process with learning rate = 0.3 for five various mean square error parameters. Firstly, the user uses the learning rate parameter = 0.3 for mean squared error = 0.0001. Then, the result output can be seen as the total iteration numbers are 40 and the time taken is 2.8467 seconds. Table.3The results of training process for Learning Rate = 0.5 MSE Iterations Time Taken (s) 0.0001 40 2.8467 0.00001 288 64.0111 0.000001 2390 528.8830 0.0000001 21888 4.6590e+003 Table3 shows the results of training process with learning rate = 0.5 for five various mean square error parameters. Firstly, the user uses the learning rate parameter = 0.5 for mean square error = 0.00001. Then, the result output can be seen as the total iteration numbers are 157 and the time taken is 38.9225 seconds. If the user wants to test the data set, the submenu “Test” can be chosen. The user can enter the test character file from A to P for both purposes of training and testing processes. Fig. 3 shows the results of testing characters which have been trained. Firstly, 'Enter Test File:' request the user to give the desired file to test (Eg. Atest.jpg). Then, the result of character recognition, the output vector (0 0 0 0 or 0 0 0 0 1, etc.) and the recognized character (“It is A” or "It is B", etc.), will appear as shown in Fig. 5.6. The user can test 16 characters (A to P) by entering desired test file. For the question, “Do you want to test the next character (y/n)?”, the user can write “y or n”. If the user writes “y”, continue to test the next character otherwise “n” to exit the command window. Fig4. Command Window to Test for Training or Testing Character This paper explains the processing steps of Character Recognition System. The user can be easily seen the processing and running steps of Neural Network programs. This thesis aims to apply the classical BP algorithm on one of the Back propagation neural network applications, which is character recognition. In this thesis, to obtain fair and independent results, network architecture was trained with various MSE values for the different learning rate at each time. The experimental results show that using the BP can speed up convergence of the training process and recognize trained characters (A to P) from the Image Database Table. VI.CONCLUSIONS This paper aims to apply the BP algorithm on one of the Back propagation neural network application, which is character recognition. The architecture of 504×84×4 was used with various values for the learning rate. The experimental results show that using the BP can speed up convergence of the training process. Although small values for the learning rate were used, the BP was able to train the neural network. The performance of recognition can be increased when the input training data files are increased. The size of database set is presented as an important role of the training section. The Back propagation Neural Network is discussed in the Chapter four of this thesis. It can also be used for almost any image recognition applications. The network is a 3 layer configuration, with the required input and output layers, as well as a single hidden layer that choosing the number of hidden layers is a difficult task with no hard rules or guidelines. However, the size of a hidden layer is related to the features or distinguishing characteristics that are to be discerned from the data. Here, the network applies one hidden layer, which has 84 neurons. The output
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 473 layer is where the output vector can be retrieved. Each neuron in this layer outputs a value between 0 and 1 by applying logical sigmoid function (sig = 1/ (1+exp (-1*s)). In addition, to obtain the accurate output values (0 or 1); the threshold value of 0.5 is used when calculating each neuron’s output. REFERENCES 1. Faaborg A., 2002, “Using Neural Networks to Create an Adaptive Character Recognition System”, 2. Alek saner I., 1995, “An Introduction to Neural Computing", Second Edition hapman & Hall. 3. Morgan L. and Bourlard H., 1995, “Continuous Speech Recognition an introduction to the hybrid Signal Processing Mag. 4. You D. and Kim G., 2003, “An approach for locating segmentation points of handwritten digit strings using a neural network”, Proceedings of the Seventh International Conference on Document Analysis. 5. Verma B., 2003, “A Contour Code Feature Based Segmentation for Handwriting Recognition”,