SlideShare a Scribd company logo
1 of 5
Download to read offline
@ IJTSRD | Available Online @ www.ijtsrd.com
ISSN No: 2456
International
Research
Implementation and Performance Evaluation of Neural Network f
English Alphabet Recognition System
Lecturer,
Technological University, Republic of the Union of Myanmar
Thanlyin, Banbwegon, Myanmar (Burma)
ABSTRACT
One of the most classical applications of the
Neural Network is the character recognition system.
This system is the base for many different types of
applications in various fields, many of which are used
in daily lives. Cost effective and less time consuming,
businesses, post offices, banks, security systems, and
even the field of robotics employ this system as the
base of their operations. For character recognition,
there are many prosperous algorithms for training
neural networks. Back propagation (BP) is the most
popular algorithm for supervised training multilayer
neural networks. In this thesis, Back propagation (BP)
algorithm is implemented for the training of
multilayer neural networks employing in character
recognition system. The neural network architecture
used in this implementation is a fully connected three
layer network. The network can train over 16
characters since the 4-element output vector is used as
output units. This thesis also evaluates the
performance of Back propagation (BP) algorithm with
various learning rates and mean square errors.
MATLAB Programming language is used for
implementation.
Keywords: Artificial Neural Network, Back
propagation, Character Recognition
I. INTRODUCTION
Character Recognition is used widely today in the
post offices, banks, airports, airline offices, and
businesses. Address readers sort incoming and
outgoing mail, check readers in banks capture images
of checks for processing, airline ticket and passport
readers are used for various purposes from accounting
for passenger revenues to checking database records.
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018
ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume
International Journal of Trend in Scientific
Research and Development (IJTSRD)
International Open Access Journal
Implementation and Performance Evaluation of Neural Network f
English Alphabet Recognition System
Myat Thida Tun
, Department of Information Technology
Technological University, Republic of the Union of Myanmar
Thanlyin, Banbwegon, Myanmar (Burma)
One of the most classical applications of the Artificial
Neural Network is the character recognition system.
This system is the base for many different types of
applications in various fields, many of which are used
in daily lives. Cost effective and less time consuming,
s, security systems, and
even the field of robotics employ this system as the
base of their operations. For character recognition,
there are many prosperous algorithms for training
neural networks. Back propagation (BP) is the most
pervised training multilayer
neural networks. In this thesis, Back propagation (BP)
algorithm is implemented for the training of
multilayer neural networks employing in character
recognition system. The neural network architecture
on is a fully connected three
layer network. The network can train over 16
element output vector is used as
output units. This thesis also evaluates the
performance of Back propagation (BP) algorithm with
ean square errors.
MATLAB Programming language is used for
Artificial Neural Network, Back
Character Recognition is used widely today in the
post offices, banks, airports, airline offices, and
businesses. Address readers sort incoming and
outgoing mail, check readers in banks capture images
of checks for processing, airline ticket and passport
eaders are used for various purposes from accounting
for passenger revenues to checking database records.
Character Recognition software is also used in
scanners and faxes that allow the user to turn graphic
images of text into editable documents. Newer
applications have even expanded outside the
limitations of just characters. Eye, face, and
fingerprint scans used in high-
newer kind of recognition. More and more assembly
lines are becoming equipped with robots scanning the
gears that pass underneath for faults, and it has been
applied in the field of robotics to allow robots to
detect edges, shapes, and colors.
Character recognition is one of the most widely used
applications of Neural Networks. However, the
problems of slow training process, choosing suitable
values for the parameters and escaping from local
minima remain a major problem that face the
developers when using Neural Network. In recent
years, a pen-based computer has become popular as
an input device. Since characte
are the preferred input methods, there are many
character recognition methods that have been
introduced. In this thesis, Back propagation (BP) is
developed and trained to recognize characters. Back
propagation (BP) applies a non
error from each output unit before applying the back
propagation phase. The (BP) aims to speed up the
training process and escape from local minima.
II. PROPOSED IMPLEMENTATION
OFALPHABET RECOGNITION
The steps needed for the implementation of alphabet
recognition are described in the following articles.
Aug 2018 Page: 474
6470 | www.ijtsrd.com | Volume - 2 | Issue – 5
Scientific
(IJTSRD)
International Open Access Journal
Implementation and Performance Evaluation of Neural Network for
Character Recognition software is also used in
scanners and faxes that allow the user to turn graphic
images of text into editable documents. Newer
applications have even expanded outside the
limitations of just characters. Eye, face, and
-security areas employ a
newer kind of recognition. More and more assembly
lines are becoming equipped with robots scanning the
that pass underneath for faults, and it has been
applied in the field of robotics to allow robots to
detect edges, shapes, and colors.
Character recognition is one of the most widely used
applications of Neural Networks. However, the
ining process, choosing suitable
values for the parameters and escaping from local
minima remain a major problem that face the
developers when using Neural Network. In recent
based computer has become popular as
an input device. Since character recognition systems
are the preferred input methods, there are many
character recognition methods that have been
introduced. In this thesis, Back propagation (BP) is
developed and trained to recognize characters. Back
propagation (BP) applies a non-linear function on the
error from each output unit before applying the back
propagation phase. The (BP) aims to speed up the
training process and escape from local minima.
PROPOSED IMPLEMENTATION STEPS
OFALPHABET RECOGNITION
The steps needed for the implementation of alphabet
recognition are described in the following articles.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 475
A. Creating the Alphabet Recognition
The Character Recognition System must first be
created through a few simple steps in order to prepare
it for presentation into MATLAB. The matrixes of
each letter of the alphabet must be created along with
the network structure. In addition, one must
understand how to pull the Binary Input Code from
the matrix, and how to interpret the Binary Output
Code, which the computer ultimately produces.
B. Alphabet Matrixes
A character matrix is an array of black and white
pixels; the vector of 1 represented by black, and 0 by
white. They can be created by the use of MATLAB,
in size or font imaginable; in addition, multiple fonts
of the same alphabet may even be used under separate
training sessions. In this thesis, 24 x 21 size of
character matrix is used and Tahoma font type is used
for testing.
C. Neural Network
The network receives the 504 Boolean values as a
504-element input vector. It is then required to
identify the letter by responding with a 4-element
output vector. In this thesis, since 16 English
characters (A-P) are trained and tested, the system
yields 16 4-element output vectors. Each output
vector represents a letter. To operate correctly, the
network should respond with a value closing to the
corresponding targeted output vector of the letter
being presented to the network.
D. Architecture
The neural network needs 504 inputs and 4 neurons in
its output layer to identify the letters. The sigmoid
transfer function was picked because its output range
(0 to 1) is perfect for learning to output Boolean
values. The hidden layer has 84 neurons.
E. Setting the Weight
There are two sets of weights; input-hidden layer
weights and hidden-output layer weights. These
weights represent the memory of the neural network,
where final training weights can be used when
running the network. Initial weights are generated
randomly there, after; weights are updated using the
error (difference) between the actual output of the
network and the desired (target) output. Weight
updating occurs each iteration, and the network learns
while iterating repeatedly until a net minimum error
value is achieved.
F. Training
The network is first trained on ideal vectors until it
has a low mean squared error. Then, the network is
trained on all sets of vectors. The network is trained
on noise-free alphabet to maintain the network's
ability to classify ideal input vectors. All training is
done using back propagation with adaptive learning
rate.
III.IMPLEMENTING THE BACK
PROPAGATION LEARNING ALGORITHM
FOR A FULLY CONNECTED THREE
LAYER NETWORK
Neural networks are developed and trained to
recognize characters. Back propagation (BP), which
applies a non-linear function on the error from each
output unit before applying the back propagation
phase. The BP aims to speed up the training process
and escape from local minima.
 Apply the input vector to the input units.
 Calculate the net-input values to the hidden layer
units.
 Calculate the outputs from the hidden layer.
 Calculate the net-input values to the each units.
 Calculate the outputs from the output units.
 Calculate the error term for the output units.
 Calculate the error term for the hidden units
 Update weights on the output layer.
 Update weights on the hidden layer.
IV. EXPERIMENTAL PARAMETERS
Two three-layered neural networks are implemented,
each with different learning parameters. Figure shows
the training set for each neural network. Although
there exist numerous variants of the classical back
propagation training algorithm.
Fig.1 Training Set for Each Neural Network
The experiments were made on recognizing characters
from A to P. Characters are represented as N-vector
which is given to the input layer of each neural
network. As shown in Fig.1 the number of pixels
(number of units in input layer) of the first neural
network is 504 (24x21 matrix). Black pixels are
represented by 1’s and white pixel by 0’s (i.e. Binary
input values were used).
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 476
Image Database Table
Desired output for each character
Binary Code Character
0 0 0 0 A
0 0 0 1 B
0 0 1 0 C
0 0 1 1 D
... …
… …
1 1 1 P
V. EXPERIMENTAL RESULT
Neural Network Programming Steps:
There are many steps in Neural Network program. If
the user wants to run this program, the following
command has to type in command window of
MATLAB.
>> Main-Program At this time, cover window appears
as shown in Figure 2.
Fig. 2 Cover window
After main program has opened, the cover window
appears as shown in Figure.2. In this screen, there are
two submenus under Main menu. If the user wants to
train the data set, the submenu “Train” can be chosen.
Otherwise, the submenu “Test” can be chosen if the
user want to test. If the user chooses the “Train”
menu, the command window appears as in Fig. 5.4,
requesting the user to give desired learning rate and
mean square error. Then the training program perform
its task (training data set) and outputs the results of
total iteration number, total time taken (in seconds),
mean squared error and actual output vector as shown
in figure.
Fig.3 The Output Results of Training Program for
MSE = 0.00001
Table.1The results of training process for
MSE = 0.00001
Learning Rate Iterations Time Taken(s)
0.1 899 196.3616
0.2 437 95.9667
0.3 291 74.8111
0.4 215 49.2186
0.5 156 35.8624
Table shows the results of training process with MSE
= 0.00001 for five different learning rates. From this
table, it is found that the more learning rate, the less
iteration number and the faster the trained network
reaches to desired goal (mean square error).
Table.2 The results of training process for Learning
Rate = 0.3
MSE Iterations Time Taken (s)
0.0001 40 2.8467
0.00001 288 64.0111
0.000001 2390 528.8830
0.0000001 21888 4.6590e+003
Table 2 shows the results of training process with
learning rate = 0.3 for five various mean square error
parameters. Firstly, the user uses the learning rate
parameter = 0.3 for mean squared error = 0.0001.
Then, the result output can be seen as the total
iteration numbers are 40 and the time taken is 2.8467
seconds.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
Table.3The results of training process for Learning
Rate = 0.5
MSE Iterations Time Taken (s)
0.0001 26 8.89394
0.00001 157 38.9225
0.000001 1470 315.5358
0.0000001 13388 2.8660e
Table3 shows the results of training process with
learning rate = 0.5 for five various mean square error
parameters. Firstly, the user uses the learning rate
parameter = 0.5 for mean square error = 0.00001.
Then, the result output can be seen as the total
iteration numbers are 157 and the time taken is
38.9225 seconds. If the user wants to test the data set,
the submenu “Test” can be chosen. The user can enter
the test character file from A to P for both purposes of
training and testing processes. Fig. 3 shows the results
of testing characters which have been trained. Firstly,
'Enter Test File:' request the user to give the desired
file to test (Eg. Atest.jpg). Then, the result of
character recognition, the output vector (0 0 0 0 or 0 0
0 0 1, etc.) and the recognized character (“It is A” or
"It is B", etc.), will appear as shown in Fig. 5.6.
user can test 16 characters (A to P) by entering
desired test file. For the question, “Do you want to
test the next character (y/n)?”, the user can write “y or
n”. If the user writes “y”, continue to test the next
character otherwise “n” to exit the command window.
Fig4. Command Window to Test for Training or
Testing Character
This paper explains the processing steps of Character
Recognition System. The user can be easily seen the
processing and running steps of Neural Network
programs. This thesis aims to apply the classical BP
algorithm on one of the Back propagation neural
network applications, which is character recognition.
In this thesis, to obtain fair and independent results,
network architecture was trained with various MSE
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018
training process for Learning
Time Taken (s)
8.89394
38.9225
315.5358
2.8660e+003
Table3 shows the results of training process with
mean square error
parameters. Firstly, the user uses the learning rate
parameter = 0.5 for mean square error = 0.00001.
Then, the result output can be seen as the total
iteration numbers are 157 and the time taken is
est the data set,
the submenu “Test” can be chosen. The user can enter
the test character file from A to P for both purposes of
training and testing processes. Fig. 3 shows the results
of testing characters which have been trained. Firstly,
e:' request the user to give the desired
file to test (Eg. Atest.jpg). Then, the result of
character recognition, the output vector (0 0 0 0 or 0 0
0 0 1, etc.) and the recognized character (“It is A” or
"It is B", etc.), will appear as shown in Fig. 5.6. The
user can test 16 characters (A to P) by entering
desired test file. For the question, “Do you want to
test the next character (y/n)?”, the user can write “y or
n”. If the user writes “y”, continue to test the next
mmand window.
4. Command Window to Test for Training or
This paper explains the processing steps of Character
Recognition System. The user can be easily seen the
processing and running steps of Neural Network
ims to apply the classical BP
algorithm on one of the Back propagation neural
network applications, which is character recognition.
In this thesis, to obtain fair and independent results,
network architecture was trained with various MSE
values for the different learning rate at each time. The
experimental results show that using the BP can speed
up convergence of the training process and recognize
trained characters (A to P) from the Image Database
Table.
VI.CONCLUSIONS
This paper aims to apply the BP algorithm on one of
the Back propagation neural network application,
which is character recognition. The architecture of
504×84×4 was used with various values for the
learning rate. The experimental results show that
using the BP can speed up convergence of the training
process. Although small values for the learning rate
were used, the BP was able to train the neural
network. The performance of recognition can be
increased when the input training data files are
increased. The size of database set is presented as an
important role of the training section. The Back
propagation Neural Network is discussed in the
Chapter four of this thesis. It can also be used for
almost any image recognition applications. The
network is a 3 layer configuration, with the required
input and output layers, as well as a single hidden
layer that choosing the number of hidden layers is a
difficult task with no hard rules or guidelines.
However, the size of a hidden layer is related to the
features or distinguishing characteristics that are to be
discerned from the data. Here, the network applies
one hidden layer, which has 84 neurons. The output
layer is where the output vector can be retrieved. Each
neuron in this layer outputs a value between 0 and 1
by applying logical sigmoid function (sig = 1/ (1+exp
(-1*s)). In addition, to obtain the accurate output
values (0 or 1); the threshold value of 0.5 is used
when calculating each neuron’s output.
REFERENCES
1. Ravina Mithe, Supriya Indalkar, Nilam
“Optical Character Recognition” International
Journal of Recent Technology and Engineering
(IJRTE) ISSN: 2277-3878, Volume
March 2013
2. Parappa S.N. and Singh M.P., “Performance
Analysis of Conjugate Descent Learning Rule of
Feed Forward Neural Networks for Pattern
Classification”, International Journal of
Multidisciplinary and Current Research, pg. 723
725, Vol. 3, 2015
3. Kumar Prodhan, Md.Farukuzzaman
“Implementation of Bac
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Aug 2018 Page: 477
ferent learning rate at each time. The
experimental results show that using the BP can speed
up convergence of the training process and recognize
trained characters (A to P) from the Image Database
This paper aims to apply the BP algorithm on one of
the Back propagation neural network application,
which is character recognition. The architecture of
504×84×4 was used with various values for the
learning rate. The experimental results show that
he BP can speed up convergence of the training
process. Although small values for the learning rate
were used, the BP was able to train the neural
network. The performance of recognition can be
increased when the input training data files are
e size of database set is presented as an
important role of the training section. The Back
propagation Neural Network is discussed in the
Chapter four of this thesis. It can also be used for
almost any image recognition applications. The
er configuration, with the required
input and output layers, as well as a single hidden
layer that choosing the number of hidden layers is a
difficult task with no hard rules or guidelines.
However, the size of a hidden layer is related to the
distinguishing characteristics that are to be
discerned from the data. Here, the network applies
one hidden layer, which has 84 neurons. The output
layer is where the output vector can be retrieved. Each
neuron in this layer outputs a value between 0 and 1
by applying logical sigmoid function (sig = 1/ (1+exp
1*s)). In addition, to obtain the accurate output
values (0 or 1); the threshold value of 0.5 is used
when calculating each neuron’s output.
Ravina Mithe, Supriya Indalkar, Nilam Divekar
“Optical Character Recognition” International
Journal of Recent Technology and Engineering
3878, Volume-2, Issue-1,
Parappa S.N. and Singh M.P., “Performance
Analysis of Conjugate Descent Learning Rule of
Feed Forward Neural Networks for Pattern
Classification”, International Journal of
Multidisciplinary and Current Research, pg. 723-
Kumar Prodhan, Md.Farukuzzaman Khan
“Implementation of Back-Propagation Neural
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 478
Network for Isolated Bangla Speech Recognition”
International Journal of Information Sciences and
Techniques (IJIST) Vol.3, No.4, July 2013
4. Farjana Yeasmin Omee, Shiam Shabbir Himel “A
Complete Workflow for Development of Bangla
OCR” International Journal of Computer
Applications (0975 – 8887) Volume 21– No.9,
May 2011
5. Md. Abul hasnat “Research Report on Bangla
OCR training and testing method”Conference on
Artificial Intelligence and Soft Computing,
Marlbella Spain, ACTA press 2004.
6. GOLABI, S.—SAADAT, S.—HELFROUSH, M.
S.—TASHK, A.: A novel thinning algorithm with
fingerprint minutiae extraction capability,
International Journal of Computer Theory and
Engineering 4 (2012), no. 4, 514–517.
7. E..Robust feature extraction in fingerprint images
using ridge model tracking, Center for Embedded
Systems for Critical Applications, Bradley
Department of Electrical and Computer
Engineering (2014).
8. SUANDI, S.A.: Finger Code for identity
verification using fingerprint and smart card in:
10th Asian Control Conference (2015),
6p.em_Classification_UsingTransformation_Base
d_Feature_Extraction_Methods [accessed Jul 07
2018]

More Related Content

What's hot

Neural Networks in the Wild: Handwriting Recognition
Neural Networks in the Wild: Handwriting RecognitionNeural Networks in the Wild: Handwriting Recognition
Neural Networks in the Wild: Handwriting RecognitionJohn Liu
 
Performance Efficient DNA Sequence Detectionalgo
Performance Efficient DNA Sequence DetectionalgoPerformance Efficient DNA Sequence Detectionalgo
Performance Efficient DNA Sequence DetectionalgoRahul Shirude
 
"An Introduction to Machine Learning and How to Teach Machines to See," a Pre...
"An Introduction to Machine Learning and How to Teach Machines to See," a Pre..."An Introduction to Machine Learning and How to Teach Machines to See," a Pre...
"An Introduction to Machine Learning and How to Teach Machines to See," a Pre...Edge AI and Vision Alliance
 
Text extraction From Digital image
Text extraction From Digital imageText extraction From Digital image
Text extraction From Digital imageKaushik Godhani
 
Traffic Sign Detection and Recognition for Automated Driverless Cars Based on...
Traffic Sign Detection and Recognition for Automated Driverless Cars Based on...Traffic Sign Detection and Recognition for Automated Driverless Cars Based on...
Traffic Sign Detection and Recognition for Automated Driverless Cars Based on...ijtsrd
 
Adaptive network based fuzzy
Adaptive network based fuzzyAdaptive network based fuzzy
Adaptive network based fuzzyijaia
 
An Artificial Intelligence Approach to Ultra High Frequency Path Loss Modelli...
An Artificial Intelligence Approach to Ultra High Frequency Path Loss Modelli...An Artificial Intelligence Approach to Ultra High Frequency Path Loss Modelli...
An Artificial Intelligence Approach to Ultra High Frequency Path Loss Modelli...ijtsrd
 
Open CV Implementation of Object Recognition Using Artificial Neural Networks
Open CV Implementation of Object Recognition Using Artificial Neural NetworksOpen CV Implementation of Object Recognition Using Artificial Neural Networks
Open CV Implementation of Object Recognition Using Artificial Neural Networksijceronline
 
Handwritten Digit Recognition
Handwritten Digit RecognitionHandwritten Digit Recognition
Handwritten Digit Recognitionijtsrd
 
Transfer Leaning Using Pytorch synopsis Minor project pptx
Transfer Leaning Using Pytorch  synopsis Minor project pptxTransfer Leaning Using Pytorch  synopsis Minor project pptx
Transfer Leaning Using Pytorch synopsis Minor project pptxAnkit Gupta
 
Speech encryption by multiple chaotic maps with fast fourier transform
Speech encryption by multiple chaotic maps with fast fourier transform Speech encryption by multiple chaotic maps with fast fourier transform
Speech encryption by multiple chaotic maps with fast fourier transform IJECEIAES
 
Patent Protection of Machine Learning and Artificial Intelligence Inventions ...
Patent Protection of Machine Learning and Artificial Intelligence Inventions ...Patent Protection of Machine Learning and Artificial Intelligence Inventions ...
Patent Protection of Machine Learning and Artificial Intelligence Inventions ...Knobbe Martens - Intellectual Property Law
 
Opticalcharacter recognition
Opticalcharacter recognition Opticalcharacter recognition
Opticalcharacter recognition Shobhit Saxena
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Fingerprint compression-based-on-...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Fingerprint compression-based-on-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...IEEEBEBTECHSTUDENTPROJECTS
 
Deep Learning personalised, closed-loop Brain-Computer Interfaces for mu...
Deep  Learning  personalised, closed-loop  Brain-Computer  Interfaces  for mu...Deep  Learning  personalised, closed-loop  Brain-Computer  Interfaces  for mu...
Deep Learning personalised, closed-loop Brain-Computer Interfaces for mu...Willy Marroquin (WillyDevNET)
 
Communication systems-theory-for-undergraduate-students-using-matlab
Communication systems-theory-for-undergraduate-students-using-matlabCommunication systems-theory-for-undergraduate-students-using-matlab
Communication systems-theory-for-undergraduate-students-using-matlabSaifAbdulNabi1
 
Downloadfile
DownloadfileDownloadfile
Downloadfilegaur07av
 

What's hot (20)

Neural Networks in the Wild: Handwriting Recognition
Neural Networks in the Wild: Handwriting RecognitionNeural Networks in the Wild: Handwriting Recognition
Neural Networks in the Wild: Handwriting Recognition
 
Performance Efficient DNA Sequence Detectionalgo
Performance Efficient DNA Sequence DetectionalgoPerformance Efficient DNA Sequence Detectionalgo
Performance Efficient DNA Sequence Detectionalgo
 
"An Introduction to Machine Learning and How to Teach Machines to See," a Pre...
"An Introduction to Machine Learning and How to Teach Machines to See," a Pre..."An Introduction to Machine Learning and How to Teach Machines to See," a Pre...
"An Introduction to Machine Learning and How to Teach Machines to See," a Pre...
 
Text extraction From Digital image
Text extraction From Digital imageText extraction From Digital image
Text extraction From Digital image
 
Traffic Sign Detection and Recognition for Automated Driverless Cars Based on...
Traffic Sign Detection and Recognition for Automated Driverless Cars Based on...Traffic Sign Detection and Recognition for Automated Driverless Cars Based on...
Traffic Sign Detection and Recognition for Automated Driverless Cars Based on...
 
Adaptive network based fuzzy
Adaptive network based fuzzyAdaptive network based fuzzy
Adaptive network based fuzzy
 
Machine learning
Machine learningMachine learning
Machine learning
 
Das09112008
Das09112008Das09112008
Das09112008
 
An Artificial Intelligence Approach to Ultra High Frequency Path Loss Modelli...
An Artificial Intelligence Approach to Ultra High Frequency Path Loss Modelli...An Artificial Intelligence Approach to Ultra High Frequency Path Loss Modelli...
An Artificial Intelligence Approach to Ultra High Frequency Path Loss Modelli...
 
Open CV Implementation of Object Recognition Using Artificial Neural Networks
Open CV Implementation of Object Recognition Using Artificial Neural NetworksOpen CV Implementation of Object Recognition Using Artificial Neural Networks
Open CV Implementation of Object Recognition Using Artificial Neural Networks
 
Handwritten Digit Recognition
Handwritten Digit RecognitionHandwritten Digit Recognition
Handwritten Digit Recognition
 
Transfer Leaning Using Pytorch synopsis Minor project pptx
Transfer Leaning Using Pytorch  synopsis Minor project pptxTransfer Leaning Using Pytorch  synopsis Minor project pptx
Transfer Leaning Using Pytorch synopsis Minor project pptx
 
Speech encryption by multiple chaotic maps with fast fourier transform
Speech encryption by multiple chaotic maps with fast fourier transform Speech encryption by multiple chaotic maps with fast fourier transform
Speech encryption by multiple chaotic maps with fast fourier transform
 
Patent Protection of Machine Learning and Artificial Intelligence Inventions ...
Patent Protection of Machine Learning and Artificial Intelligence Inventions ...Patent Protection of Machine Learning and Artificial Intelligence Inventions ...
Patent Protection of Machine Learning and Artificial Intelligence Inventions ...
 
Opticalcharacter recognition
Opticalcharacter recognition Opticalcharacter recognition
Opticalcharacter recognition
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Fingerprint compression-based-on-...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Fingerprint compression-based-on-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...
 
Deep Learning personalised, closed-loop Brain-Computer Interfaces for mu...
Deep  Learning  personalised, closed-loop  Brain-Computer  Interfaces  for mu...Deep  Learning  personalised, closed-loop  Brain-Computer  Interfaces  for mu...
Deep Learning personalised, closed-loop Brain-Computer Interfaces for mu...
 
Communication systems-theory-for-undergraduate-students-using-matlab
Communication systems-theory-for-undergraduate-students-using-matlabCommunication systems-theory-for-undergraduate-students-using-matlab
Communication systems-theory-for-undergraduate-students-using-matlab
 
Downloadfile
DownloadfileDownloadfile
Downloadfile
 
One shot learning
One shot learningOne shot learning
One shot learning
 

Similar to Implementation and Performance Evaluation of Neural Network for English Alphabet Recognition System

IRJET- Intelligent Character Recognition of Handwritten Characters using ...
IRJET-  	  Intelligent Character Recognition of Handwritten Characters using ...IRJET-  	  Intelligent Character Recognition of Handwritten Characters using ...
IRJET- Intelligent Character Recognition of Handwritten Characters using ...IRJET Journal
 
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...AM Publications
 
IRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten CharactersIRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten CharactersIRJET Journal
 
BLOB DETECTION TECHNIQUE USING IMAGE PROCESSING FOR IDENTIFICATION OF MACHINE...
BLOB DETECTION TECHNIQUE USING IMAGE PROCESSING FOR IDENTIFICATION OF MACHINE...BLOB DETECTION TECHNIQUE USING IMAGE PROCESSING FOR IDENTIFICATION OF MACHINE...
BLOB DETECTION TECHNIQUE USING IMAGE PROCESSING FOR IDENTIFICATION OF MACHINE...ijiert bestjournal
 
Sign Language Detector Using Cloud
Sign Language Detector Using CloudSign Language Detector Using Cloud
Sign Language Detector Using Cloudijtsrd
 
IRJET- Optical Character Recognition using Image Processing
IRJET-  	  Optical Character Recognition using Image ProcessingIRJET-  	  Optical Character Recognition using Image Processing
IRJET- Optical Character Recognition using Image ProcessingIRJET Journal
 
Handwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNNHandwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNNIRJET Journal
 
Text Recognition using Convolutional Neural Network: A Review
Text Recognition using Convolutional Neural Network: A ReviewText Recognition using Convolutional Neural Network: A Review
Text Recognition using Convolutional Neural Network: A ReviewIRJET Journal
 
IRJET- Hand Sign Recognition using Convolutional Neural Network
IRJET- Hand Sign Recognition using Convolutional Neural NetworkIRJET- Hand Sign Recognition using Convolutional Neural Network
IRJET- Hand Sign Recognition using Convolutional Neural NetworkIRJET Journal
 
Packet Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String KernelsPacket Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String KernelsIJERA Editor
 
Character recognition for bi lingual mixed-type characters using artificial n...
Character recognition for bi lingual mixed-type characters using artificial n...Character recognition for bi lingual mixed-type characters using artificial n...
Character recognition for bi lingual mixed-type characters using artificial n...eSAT Publishing House
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Chiranjeevi Adi
 
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...IRJET Journal
 
FACE EXPRESSION RECOGNITION USING CONVOLUTION NEURAL NETWORK (CNN) MODELS
FACE EXPRESSION RECOGNITION USING CONVOLUTION NEURAL NETWORK (CNN) MODELS FACE EXPRESSION RECOGNITION USING CONVOLUTION NEURAL NETWORK (CNN) MODELS
FACE EXPRESSION RECOGNITION USING CONVOLUTION NEURAL NETWORK (CNN) MODELS ijgca
 
Devanagari Digit and Character Recognition Using Convolutional Neural Network
Devanagari Digit and Character Recognition Using Convolutional Neural NetworkDevanagari Digit and Character Recognition Using Convolutional Neural Network
Devanagari Digit and Character Recognition Using Convolutional Neural NetworkIRJET Journal
 
Currency Detection using TensorFlow
Currency Detection using TensorFlowCurrency Detection using TensorFlow
Currency Detection using TensorFlowIRJET Journal
 
IRJET- Image to Text Conversion using Tesseract
IRJET-  	  Image to Text Conversion using TesseractIRJET-  	  Image to Text Conversion using Tesseract
IRJET- Image to Text Conversion using TesseractIRJET Journal
 
IRJET- Wearable AI Device for Blind
IRJET- Wearable AI Device for BlindIRJET- Wearable AI Device for Blind
IRJET- Wearable AI Device for BlindIRJET Journal
 

Similar to Implementation and Performance Evaluation of Neural Network for English Alphabet Recognition System (20)

IRJET- Intelligent Character Recognition of Handwritten Characters using ...
IRJET-  	  Intelligent Character Recognition of Handwritten Characters using ...IRJET-  	  Intelligent Character Recognition of Handwritten Characters using ...
IRJET- Intelligent Character Recognition of Handwritten Characters using ...
 
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...
 
IRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten CharactersIRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten Characters
 
BLOB DETECTION TECHNIQUE USING IMAGE PROCESSING FOR IDENTIFICATION OF MACHINE...
BLOB DETECTION TECHNIQUE USING IMAGE PROCESSING FOR IDENTIFICATION OF MACHINE...BLOB DETECTION TECHNIQUE USING IMAGE PROCESSING FOR IDENTIFICATION OF MACHINE...
BLOB DETECTION TECHNIQUE USING IMAGE PROCESSING FOR IDENTIFICATION OF MACHINE...
 
Sign Language Detector Using Cloud
Sign Language Detector Using CloudSign Language Detector Using Cloud
Sign Language Detector Using Cloud
 
IRJET- Optical Character Recognition using Image Processing
IRJET-  	  Optical Character Recognition using Image ProcessingIRJET-  	  Optical Character Recognition using Image Processing
IRJET- Optical Character Recognition using Image Processing
 
Handwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNNHandwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNN
 
Som paper1.doc
Som paper1.docSom paper1.doc
Som paper1.doc
 
Text Recognition using Convolutional Neural Network: A Review
Text Recognition using Convolutional Neural Network: A ReviewText Recognition using Convolutional Neural Network: A Review
Text Recognition using Convolutional Neural Network: A Review
 
IRJET- Hand Sign Recognition using Convolutional Neural Network
IRJET- Hand Sign Recognition using Convolutional Neural NetworkIRJET- Hand Sign Recognition using Convolutional Neural Network
IRJET- Hand Sign Recognition using Convolutional Neural Network
 
Packet Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String KernelsPacket Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String Kernels
 
Character recognition for bi lingual mixed-type characters using artificial n...
Character recognition for bi lingual mixed-type characters using artificial n...Character recognition for bi lingual mixed-type characters using artificial n...
Character recognition for bi lingual mixed-type characters using artificial n...
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks
 
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
 
Ocr 1
Ocr 1Ocr 1
Ocr 1
 
FACE EXPRESSION RECOGNITION USING CONVOLUTION NEURAL NETWORK (CNN) MODELS
FACE EXPRESSION RECOGNITION USING CONVOLUTION NEURAL NETWORK (CNN) MODELS FACE EXPRESSION RECOGNITION USING CONVOLUTION NEURAL NETWORK (CNN) MODELS
FACE EXPRESSION RECOGNITION USING CONVOLUTION NEURAL NETWORK (CNN) MODELS
 
Devanagari Digit and Character Recognition Using Convolutional Neural Network
Devanagari Digit and Character Recognition Using Convolutional Neural NetworkDevanagari Digit and Character Recognition Using Convolutional Neural Network
Devanagari Digit and Character Recognition Using Convolutional Neural Network
 
Currency Detection using TensorFlow
Currency Detection using TensorFlowCurrency Detection using TensorFlow
Currency Detection using TensorFlow
 
IRJET- Image to Text Conversion using Tesseract
IRJET-  	  Image to Text Conversion using TesseractIRJET-  	  Image to Text Conversion using Tesseract
IRJET- Image to Text Conversion using Tesseract
 
IRJET- Wearable AI Device for Blind
IRJET- Wearable AI Device for BlindIRJET- Wearable AI Device for Blind
IRJET- Wearable AI Device for Blind
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

Implementation and Performance Evaluation of Neural Network for English Alphabet Recognition System

  • 1. @ IJTSRD | Available Online @ www.ijtsrd.com ISSN No: 2456 International Research Implementation and Performance Evaluation of Neural Network f English Alphabet Recognition System Lecturer, Technological University, Republic of the Union of Myanmar Thanlyin, Banbwegon, Myanmar (Burma) ABSTRACT One of the most classical applications of the Neural Network is the character recognition system. This system is the base for many different types of applications in various fields, many of which are used in daily lives. Cost effective and less time consuming, businesses, post offices, banks, security systems, and even the field of robotics employ this system as the base of their operations. For character recognition, there are many prosperous algorithms for training neural networks. Back propagation (BP) is the most popular algorithm for supervised training multilayer neural networks. In this thesis, Back propagation (BP) algorithm is implemented for the training of multilayer neural networks employing in character recognition system. The neural network architecture used in this implementation is a fully connected three layer network. The network can train over 16 characters since the 4-element output vector is used as output units. This thesis also evaluates the performance of Back propagation (BP) algorithm with various learning rates and mean square errors. MATLAB Programming language is used for implementation. Keywords: Artificial Neural Network, Back propagation, Character Recognition I. INTRODUCTION Character Recognition is used widely today in the post offices, banks, airports, airline offices, and businesses. Address readers sort incoming and outgoing mail, check readers in banks capture images of checks for processing, airline ticket and passport readers are used for various purposes from accounting for passenger revenues to checking database records. @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume International Journal of Trend in Scientific Research and Development (IJTSRD) International Open Access Journal Implementation and Performance Evaluation of Neural Network f English Alphabet Recognition System Myat Thida Tun , Department of Information Technology Technological University, Republic of the Union of Myanmar Thanlyin, Banbwegon, Myanmar (Burma) One of the most classical applications of the Artificial Neural Network is the character recognition system. This system is the base for many different types of applications in various fields, many of which are used in daily lives. Cost effective and less time consuming, s, security systems, and even the field of robotics employ this system as the base of their operations. For character recognition, there are many prosperous algorithms for training neural networks. Back propagation (BP) is the most pervised training multilayer neural networks. In this thesis, Back propagation (BP) algorithm is implemented for the training of multilayer neural networks employing in character recognition system. The neural network architecture on is a fully connected three layer network. The network can train over 16 element output vector is used as output units. This thesis also evaluates the performance of Back propagation (BP) algorithm with ean square errors. MATLAB Programming language is used for Artificial Neural Network, Back Character Recognition is used widely today in the post offices, banks, airports, airline offices, and businesses. Address readers sort incoming and outgoing mail, check readers in banks capture images of checks for processing, airline ticket and passport eaders are used for various purposes from accounting for passenger revenues to checking database records. Character Recognition software is also used in scanners and faxes that allow the user to turn graphic images of text into editable documents. Newer applications have even expanded outside the limitations of just characters. Eye, face, and fingerprint scans used in high- newer kind of recognition. More and more assembly lines are becoming equipped with robots scanning the gears that pass underneath for faults, and it has been applied in the field of robotics to allow robots to detect edges, shapes, and colors. Character recognition is one of the most widely used applications of Neural Networks. However, the problems of slow training process, choosing suitable values for the parameters and escaping from local minima remain a major problem that face the developers when using Neural Network. In recent years, a pen-based computer has become popular as an input device. Since characte are the preferred input methods, there are many character recognition methods that have been introduced. In this thesis, Back propagation (BP) is developed and trained to recognize characters. Back propagation (BP) applies a non error from each output unit before applying the back propagation phase. The (BP) aims to speed up the training process and escape from local minima. II. PROPOSED IMPLEMENTATION OFALPHABET RECOGNITION The steps needed for the implementation of alphabet recognition are described in the following articles. Aug 2018 Page: 474 6470 | www.ijtsrd.com | Volume - 2 | Issue – 5 Scientific (IJTSRD) International Open Access Journal Implementation and Performance Evaluation of Neural Network for Character Recognition software is also used in scanners and faxes that allow the user to turn graphic images of text into editable documents. Newer applications have even expanded outside the limitations of just characters. Eye, face, and -security areas employ a newer kind of recognition. More and more assembly lines are becoming equipped with robots scanning the that pass underneath for faults, and it has been applied in the field of robotics to allow robots to detect edges, shapes, and colors. Character recognition is one of the most widely used applications of Neural Networks. However, the ining process, choosing suitable values for the parameters and escaping from local minima remain a major problem that face the developers when using Neural Network. In recent based computer has become popular as an input device. Since character recognition systems are the preferred input methods, there are many character recognition methods that have been introduced. In this thesis, Back propagation (BP) is developed and trained to recognize characters. Back propagation (BP) applies a non-linear function on the error from each output unit before applying the back propagation phase. The (BP) aims to speed up the training process and escape from local minima. PROPOSED IMPLEMENTATION STEPS OFALPHABET RECOGNITION The steps needed for the implementation of alphabet recognition are described in the following articles.
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 475 A. Creating the Alphabet Recognition The Character Recognition System must first be created through a few simple steps in order to prepare it for presentation into MATLAB. The matrixes of each letter of the alphabet must be created along with the network structure. In addition, one must understand how to pull the Binary Input Code from the matrix, and how to interpret the Binary Output Code, which the computer ultimately produces. B. Alphabet Matrixes A character matrix is an array of black and white pixels; the vector of 1 represented by black, and 0 by white. They can be created by the use of MATLAB, in size or font imaginable; in addition, multiple fonts of the same alphabet may even be used under separate training sessions. In this thesis, 24 x 21 size of character matrix is used and Tahoma font type is used for testing. C. Neural Network The network receives the 504 Boolean values as a 504-element input vector. It is then required to identify the letter by responding with a 4-element output vector. In this thesis, since 16 English characters (A-P) are trained and tested, the system yields 16 4-element output vectors. Each output vector represents a letter. To operate correctly, the network should respond with a value closing to the corresponding targeted output vector of the letter being presented to the network. D. Architecture The neural network needs 504 inputs and 4 neurons in its output layer to identify the letters. The sigmoid transfer function was picked because its output range (0 to 1) is perfect for learning to output Boolean values. The hidden layer has 84 neurons. E. Setting the Weight There are two sets of weights; input-hidden layer weights and hidden-output layer weights. These weights represent the memory of the neural network, where final training weights can be used when running the network. Initial weights are generated randomly there, after; weights are updated using the error (difference) between the actual output of the network and the desired (target) output. Weight updating occurs each iteration, and the network learns while iterating repeatedly until a net minimum error value is achieved. F. Training The network is first trained on ideal vectors until it has a low mean squared error. Then, the network is trained on all sets of vectors. The network is trained on noise-free alphabet to maintain the network's ability to classify ideal input vectors. All training is done using back propagation with adaptive learning rate. III.IMPLEMENTING THE BACK PROPAGATION LEARNING ALGORITHM FOR A FULLY CONNECTED THREE LAYER NETWORK Neural networks are developed and trained to recognize characters. Back propagation (BP), which applies a non-linear function on the error from each output unit before applying the back propagation phase. The BP aims to speed up the training process and escape from local minima.  Apply the input vector to the input units.  Calculate the net-input values to the hidden layer units.  Calculate the outputs from the hidden layer.  Calculate the net-input values to the each units.  Calculate the outputs from the output units.  Calculate the error term for the output units.  Calculate the error term for the hidden units  Update weights on the output layer.  Update weights on the hidden layer. IV. EXPERIMENTAL PARAMETERS Two three-layered neural networks are implemented, each with different learning parameters. Figure shows the training set for each neural network. Although there exist numerous variants of the classical back propagation training algorithm. Fig.1 Training Set for Each Neural Network The experiments were made on recognizing characters from A to P. Characters are represented as N-vector which is given to the input layer of each neural network. As shown in Fig.1 the number of pixels (number of units in input layer) of the first neural network is 504 (24x21 matrix). Black pixels are represented by 1’s and white pixel by 0’s (i.e. Binary input values were used).
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 476 Image Database Table Desired output for each character Binary Code Character 0 0 0 0 A 0 0 0 1 B 0 0 1 0 C 0 0 1 1 D ... … … … 1 1 1 P V. EXPERIMENTAL RESULT Neural Network Programming Steps: There are many steps in Neural Network program. If the user wants to run this program, the following command has to type in command window of MATLAB. >> Main-Program At this time, cover window appears as shown in Figure 2. Fig. 2 Cover window After main program has opened, the cover window appears as shown in Figure.2. In this screen, there are two submenus under Main menu. If the user wants to train the data set, the submenu “Train” can be chosen. Otherwise, the submenu “Test” can be chosen if the user want to test. If the user chooses the “Train” menu, the command window appears as in Fig. 5.4, requesting the user to give desired learning rate and mean square error. Then the training program perform its task (training data set) and outputs the results of total iteration number, total time taken (in seconds), mean squared error and actual output vector as shown in figure. Fig.3 The Output Results of Training Program for MSE = 0.00001 Table.1The results of training process for MSE = 0.00001 Learning Rate Iterations Time Taken(s) 0.1 899 196.3616 0.2 437 95.9667 0.3 291 74.8111 0.4 215 49.2186 0.5 156 35.8624 Table shows the results of training process with MSE = 0.00001 for five different learning rates. From this table, it is found that the more learning rate, the less iteration number and the faster the trained network reaches to desired goal (mean square error). Table.2 The results of training process for Learning Rate = 0.3 MSE Iterations Time Taken (s) 0.0001 40 2.8467 0.00001 288 64.0111 0.000001 2390 528.8830 0.0000001 21888 4.6590e+003 Table 2 shows the results of training process with learning rate = 0.3 for five various mean square error parameters. Firstly, the user uses the learning rate parameter = 0.3 for mean squared error = 0.0001. Then, the result output can be seen as the total iteration numbers are 40 and the time taken is 2.8467 seconds.
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com Table.3The results of training process for Learning Rate = 0.5 MSE Iterations Time Taken (s) 0.0001 26 8.89394 0.00001 157 38.9225 0.000001 1470 315.5358 0.0000001 13388 2.8660e Table3 shows the results of training process with learning rate = 0.5 for five various mean square error parameters. Firstly, the user uses the learning rate parameter = 0.5 for mean square error = 0.00001. Then, the result output can be seen as the total iteration numbers are 157 and the time taken is 38.9225 seconds. If the user wants to test the data set, the submenu “Test” can be chosen. The user can enter the test character file from A to P for both purposes of training and testing processes. Fig. 3 shows the results of testing characters which have been trained. Firstly, 'Enter Test File:' request the user to give the desired file to test (Eg. Atest.jpg). Then, the result of character recognition, the output vector (0 0 0 0 or 0 0 0 0 1, etc.) and the recognized character (“It is A” or "It is B", etc.), will appear as shown in Fig. 5.6. user can test 16 characters (A to P) by entering desired test file. For the question, “Do you want to test the next character (y/n)?”, the user can write “y or n”. If the user writes “y”, continue to test the next character otherwise “n” to exit the command window. Fig4. Command Window to Test for Training or Testing Character This paper explains the processing steps of Character Recognition System. The user can be easily seen the processing and running steps of Neural Network programs. This thesis aims to apply the classical BP algorithm on one of the Back propagation neural network applications, which is character recognition. In this thesis, to obtain fair and independent results, network architecture was trained with various MSE International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 training process for Learning Time Taken (s) 8.89394 38.9225 315.5358 2.8660e+003 Table3 shows the results of training process with mean square error parameters. Firstly, the user uses the learning rate parameter = 0.5 for mean square error = 0.00001. Then, the result output can be seen as the total iteration numbers are 157 and the time taken is est the data set, the submenu “Test” can be chosen. The user can enter the test character file from A to P for both purposes of training and testing processes. Fig. 3 shows the results of testing characters which have been trained. Firstly, e:' request the user to give the desired file to test (Eg. Atest.jpg). Then, the result of character recognition, the output vector (0 0 0 0 or 0 0 0 0 1, etc.) and the recognized character (“It is A” or "It is B", etc.), will appear as shown in Fig. 5.6. The user can test 16 characters (A to P) by entering desired test file. For the question, “Do you want to test the next character (y/n)?”, the user can write “y or n”. If the user writes “y”, continue to test the next mmand window. 4. Command Window to Test for Training or This paper explains the processing steps of Character Recognition System. The user can be easily seen the processing and running steps of Neural Network ims to apply the classical BP algorithm on one of the Back propagation neural network applications, which is character recognition. In this thesis, to obtain fair and independent results, network architecture was trained with various MSE values for the different learning rate at each time. The experimental results show that using the BP can speed up convergence of the training process and recognize trained characters (A to P) from the Image Database Table. VI.CONCLUSIONS This paper aims to apply the BP algorithm on one of the Back propagation neural network application, which is character recognition. The architecture of 504×84×4 was used with various values for the learning rate. The experimental results show that using the BP can speed up convergence of the training process. Although small values for the learning rate were used, the BP was able to train the neural network. The performance of recognition can be increased when the input training data files are increased. The size of database set is presented as an important role of the training section. The Back propagation Neural Network is discussed in the Chapter four of this thesis. It can also be used for almost any image recognition applications. The network is a 3 layer configuration, with the required input and output layers, as well as a single hidden layer that choosing the number of hidden layers is a difficult task with no hard rules or guidelines. However, the size of a hidden layer is related to the features or distinguishing characteristics that are to be discerned from the data. Here, the network applies one hidden layer, which has 84 neurons. The output layer is where the output vector can be retrieved. Each neuron in this layer outputs a value between 0 and 1 by applying logical sigmoid function (sig = 1/ (1+exp (-1*s)). In addition, to obtain the accurate output values (0 or 1); the threshold value of 0.5 is used when calculating each neuron’s output. REFERENCES 1. Ravina Mithe, Supriya Indalkar, Nilam “Optical Character Recognition” International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume March 2013 2. Parappa S.N. and Singh M.P., “Performance Analysis of Conjugate Descent Learning Rule of Feed Forward Neural Networks for Pattern Classification”, International Journal of Multidisciplinary and Current Research, pg. 723 725, Vol. 3, 2015 3. Kumar Prodhan, Md.Farukuzzaman “Implementation of Bac International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Aug 2018 Page: 477 ferent learning rate at each time. The experimental results show that using the BP can speed up convergence of the training process and recognize trained characters (A to P) from the Image Database This paper aims to apply the BP algorithm on one of the Back propagation neural network application, which is character recognition. The architecture of 504×84×4 was used with various values for the learning rate. The experimental results show that he BP can speed up convergence of the training process. Although small values for the learning rate were used, the BP was able to train the neural network. The performance of recognition can be increased when the input training data files are e size of database set is presented as an important role of the training section. The Back propagation Neural Network is discussed in the Chapter four of this thesis. It can also be used for almost any image recognition applications. The er configuration, with the required input and output layers, as well as a single hidden layer that choosing the number of hidden layers is a difficult task with no hard rules or guidelines. However, the size of a hidden layer is related to the distinguishing characteristics that are to be discerned from the data. Here, the network applies one hidden layer, which has 84 neurons. The output layer is where the output vector can be retrieved. Each neuron in this layer outputs a value between 0 and 1 by applying logical sigmoid function (sig = 1/ (1+exp 1*s)). In addition, to obtain the accurate output values (0 or 1); the threshold value of 0.5 is used when calculating each neuron’s output. Ravina Mithe, Supriya Indalkar, Nilam Divekar “Optical Character Recognition” International Journal of Recent Technology and Engineering 3878, Volume-2, Issue-1, Parappa S.N. and Singh M.P., “Performance Analysis of Conjugate Descent Learning Rule of Feed Forward Neural Networks for Pattern Classification”, International Journal of Multidisciplinary and Current Research, pg. 723- Kumar Prodhan, Md.Farukuzzaman Khan “Implementation of Back-Propagation Neural
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 478 Network for Isolated Bangla Speech Recognition” International Journal of Information Sciences and Techniques (IJIST) Vol.3, No.4, July 2013 4. Farjana Yeasmin Omee, Shiam Shabbir Himel “A Complete Workflow for Development of Bangla OCR” International Journal of Computer Applications (0975 – 8887) Volume 21– No.9, May 2011 5. Md. Abul hasnat “Research Report on Bangla OCR training and testing method”Conference on Artificial Intelligence and Soft Computing, Marlbella Spain, ACTA press 2004. 6. GOLABI, S.—SAADAT, S.—HELFROUSH, M. S.—TASHK, A.: A novel thinning algorithm with fingerprint minutiae extraction capability, International Journal of Computer Theory and Engineering 4 (2012), no. 4, 514–517. 7. E..Robust feature extraction in fingerprint images using ridge model tracking, Center for Embedded Systems for Critical Applications, Bradley Department of Electrical and Computer Engineering (2014). 8. SUANDI, S.A.: Finger Code for identity verification using fingerprint and smart card in: 10th Asian Control Conference (2015), 6p.em_Classification_UsingTransformation_Base d_Feature_Extraction_Methods [accessed Jul 07 2018]