This document summarizes several modern techniques for handwritten character recognition. It discusses common feature extraction methods like statistical, structural and global transformation features. It then summarizes several papers that have proposed different techniques for handwritten character recognition, including using associative memory nets, moment invariants with support vector machines, neural networks, hidden markov models, gradient features, and multi-scale neural networks. The document concludes that neural networks are commonly used for training, and that feature extraction methods continue to be improved, but handwritten character recognition remains an active area of research.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Survey on Tamil Handwritten Character Recognition using OCR Techniquescscpconf
In today’s fast growing technology, digital recognitions are playing wide role and providing
more scope to perform research in OCR techniques. Recognition of Tamil handwritten scripts is
complicated compared to other western language scripts. However, many researchers have
provided real-time solutions for offline Tamil character recognition also. Offline Tamil
handwritten documents recognition still offers many motivating challenges to researchers.
Current research offers many solutions on Tamil handwritten documents recognition even then
reasonable accuracy and performance has not been achieved. This paper analyses the various approaches and challenges concerning offline Tamil handwritten character recognition
AUTOMATIC TRAINING DATA SYNTHESIS FOR HANDWRITING RECOGNITION USING THE STRUC...ijaia
The paper presents a novel technique called “Structural Crossing-Over” to synthesize qualified data for training machine learning-based handwriting recognition. The proposed technique can provide a greater variety of patterns of training data than the existing approaches such as elastic distortion and tangentbased affine transformation. A couple of training characters are chosen, then they are analyzed by their similar and different structures, and finally are crossed over to generate the new characters. The experiments are set to compare the performances of tangent-based affine transformation and the proposed approach in terms of the variety of generated characters and percent of recognition errors. The standard
MNIST corpus including 60,000 training characters and 10,000 test characters is employed in the
experiments. The proposed technique uses 1,000 characters to synthesize 60,000 characters, and then uses
these data to train and test the benchmark handwriting recognition system that exploits Histogram of
Gradient: HOG as features and Support Vector Machine: SVM as recognizer. The experimental result
yields 8.06% of errors. It significantly outperforms the tangent-based affine transformation and the
original MNIST training data, which are 11.74% and 16.55%, respectively.
Comparative study of two methods for Handwritten Devanagari Numeral RecognitionIOSR Journals
Abstract : In this paper two different methods for Numeral Recognition are proposed and their results are
compared. The objective of this paper is to provide an efficient and reliable method for recognition of
handwritten numerals. First method employs Grid based feature extraction and recognition algorithm. In this
method the features of the image are extracted by using grid technique and this feature set is then compared
with the feature set of database image for classification. While second method contains Image Centroid Zone
and Zone Centroid Zone algorithms for feature extraction and the features are applied to Artificial Neural
Network for recognition of input image. Machine text recognition is important research area because of its
applications in many areas like Bank, Post office, Hospitals etc.
Keywords: Handwritten Numeral Recognition, Grid Technique, ANN, Feature Extraction, Classification.
Devnagari handwritten numeral recognition using geometric features and statis...Vikas Dongre
This paper presents a Devnagari Numerical recognition method based on statistical
discriminant functions. 17 geometric features based on pixel connectivity, lines, line directions, holes,
image area, perimeter, eccentricity, solidity, orientation etc. are used for representing the numerals. Five
discriminant functions viz. Linear, Quadratic, Diaglinear, Diagquadratic and Mahalanobis distance are
used for classification. 1500 handwritten numerals are used for training. Another 1500 handwritten
numerals are used for testing. Experimental results show that Linear, Quadratic and Mahalanobis
discriminant functions provide better results. Results of these three Discriminants are fed to a majority
voting type Combination classifier. It is found that Combination classifier offers better results over
individual classifiers.
DEVNAGARI DOCUMENT SEGMENTATION USING HISTOGRAM APPROACHijcseit
Document segmentation is one of the critical phases in machine recognition of any language. Correct
segmentation of individual symbols decides the accuracy of character recognition technique. It is used to
decompose image of a sequence of characters into sub images of individual symbols by segmenting lines and
words. Devnagari is the most popular script in India. It is used for writing Hindi, Marathi, Sanskrit and
Nepali languages. Moreover, Hindi is the third most popular language in the world. Devnagari documents
consist of vowels, consonants and various modifiers. Hence proper segmentation of Devnagari word is
challenging. A simple histogram based approach to segment Devnagari documents is proposed in this paper.
Various challenges in segmentation of Devnagari script are also discussed.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Survey on Tamil Handwritten Character Recognition using OCR Techniquescscpconf
In today’s fast growing technology, digital recognitions are playing wide role and providing
more scope to perform research in OCR techniques. Recognition of Tamil handwritten scripts is
complicated compared to other western language scripts. However, many researchers have
provided real-time solutions for offline Tamil character recognition also. Offline Tamil
handwritten documents recognition still offers many motivating challenges to researchers.
Current research offers many solutions on Tamil handwritten documents recognition even then
reasonable accuracy and performance has not been achieved. This paper analyses the various approaches and challenges concerning offline Tamil handwritten character recognition
AUTOMATIC TRAINING DATA SYNTHESIS FOR HANDWRITING RECOGNITION USING THE STRUC...ijaia
The paper presents a novel technique called “Structural Crossing-Over” to synthesize qualified data for training machine learning-based handwriting recognition. The proposed technique can provide a greater variety of patterns of training data than the existing approaches such as elastic distortion and tangentbased affine transformation. A couple of training characters are chosen, then they are analyzed by their similar and different structures, and finally are crossed over to generate the new characters. The experiments are set to compare the performances of tangent-based affine transformation and the proposed approach in terms of the variety of generated characters and percent of recognition errors. The standard
MNIST corpus including 60,000 training characters and 10,000 test characters is employed in the
experiments. The proposed technique uses 1,000 characters to synthesize 60,000 characters, and then uses
these data to train and test the benchmark handwriting recognition system that exploits Histogram of
Gradient: HOG as features and Support Vector Machine: SVM as recognizer. The experimental result
yields 8.06% of errors. It significantly outperforms the tangent-based affine transformation and the
original MNIST training data, which are 11.74% and 16.55%, respectively.
Comparative study of two methods for Handwritten Devanagari Numeral RecognitionIOSR Journals
Abstract : In this paper two different methods for Numeral Recognition are proposed and their results are
compared. The objective of this paper is to provide an efficient and reliable method for recognition of
handwritten numerals. First method employs Grid based feature extraction and recognition algorithm. In this
method the features of the image are extracted by using grid technique and this feature set is then compared
with the feature set of database image for classification. While second method contains Image Centroid Zone
and Zone Centroid Zone algorithms for feature extraction and the features are applied to Artificial Neural
Network for recognition of input image. Machine text recognition is important research area because of its
applications in many areas like Bank, Post office, Hospitals etc.
Keywords: Handwritten Numeral Recognition, Grid Technique, ANN, Feature Extraction, Classification.
Devnagari handwritten numeral recognition using geometric features and statis...Vikas Dongre
This paper presents a Devnagari Numerical recognition method based on statistical
discriminant functions. 17 geometric features based on pixel connectivity, lines, line directions, holes,
image area, perimeter, eccentricity, solidity, orientation etc. are used for representing the numerals. Five
discriminant functions viz. Linear, Quadratic, Diaglinear, Diagquadratic and Mahalanobis distance are
used for classification. 1500 handwritten numerals are used for training. Another 1500 handwritten
numerals are used for testing. Experimental results show that Linear, Quadratic and Mahalanobis
discriminant functions provide better results. Results of these three Discriminants are fed to a majority
voting type Combination classifier. It is found that Combination classifier offers better results over
individual classifiers.
DEVNAGARI DOCUMENT SEGMENTATION USING HISTOGRAM APPROACHijcseit
Document segmentation is one of the critical phases in machine recognition of any language. Correct
segmentation of individual symbols decides the accuracy of character recognition technique. It is used to
decompose image of a sequence of characters into sub images of individual symbols by segmenting lines and
words. Devnagari is the most popular script in India. It is used for writing Hindi, Marathi, Sanskrit and
Nepali languages. Moreover, Hindi is the third most popular language in the world. Devnagari documents
consist of vowels, consonants and various modifiers. Hence proper segmentation of Devnagari word is
challenging. A simple histogram based approach to segment Devnagari documents is proposed in this paper.
Various challenges in segmentation of Devnagari script are also discussed.
A Comprehensive Study On Handwritten Character Recognition Systemiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A CHINESE CHARACTER RECOGNITION METHOD BASED ON POPULATION MATRIX AND RELATIO...Teady Matius
A Chinese character has many different forms, information in its features will have many variations. Therefore, it needs a relational database to store many variations of their features. The use of the relational database to store the sets of features enables the use of distance measurements methods while measuring the sets of feature that owned by a Chinese character to recognize a Chinese character image inputted. The feature used in this thesis is the pixel population matrix. The sets of the features are stored and queried by using the relational database.
This paper discusses about how to recognize the Chinese character image and Chinese radical image by using relational database and pixel population matrix.
Dimensionality Reduction and Feature Selection Methods for Script Identificat...ITIIIndustries
The goal of this research is to explore effects of dimensionality reduction and feature selection on the problem of script identification from images of printed documents. The kadjacent segment is ideal for this use due to its ability to capture visual patterns. We have used principle component analysis to reduce the size of our feature matrix to a handier size that can be trained easily, and experimented by including varying combinations of dimensions of the super feature set. A modular
approach in neural network was used to classify 7 languages – Arabic, Chinese, English, Japanese, Tamil, Thai and Korean.
Devnagari document segmentation using histogram approachVikas Dongre
Document segmentation is one of the critical phases in machine recognition of any language. Correct
segmentation of individual symbols decides the accuracy of character recognition technique. It is used to
decompose image of a sequence of characters into sub images of individual symbols by segmenting lines and
words. Devnagari is the most popular script in India. It is used for writing Hindi, Marathi, Sanskrit and
Nepali languages. Moreover, Hindi is the third most popular language in the world. Devnagari documents
consist of vowels, consonants and various modifiers. Hence proper segmentation of Devnagari word is
challenging. A simple histogram based approach to segment Devnagari documents is proposed in this paper.
Various challenges in segmentation of Devnagari script are also discussed.
SEGMENTATION OF CHARACTERS WITHOUT MODIFIERS FROM A PRINTED BANGLA TEXTcscpconf
Optical Character Recognition (OCR) is one of the fundamental research areas of image processing and pattern recognition field. The performance accuracy of an OCR system depends on the proper segmentation of the characters. This paper is concerned with the segmentation of printed bangla characters without modifiers for optical character recognition (OCR) system. The basic steps needed for developing an OCR system also have been discussed.
DEVELOPMENT OF AN ALPHABETIC CHARACTER RECOGNITION SYSTEM USING MATLAB FOR BA...Mohammad Liton Hossain
Character recognition technique, associates a symbolic identity with the image of the character, is an important area in pattern recognition and image processing. The principal idea here is to convert raw images (scanned from document, typed, pictured etcetera) into editable text like html, doc, txt or other formats. There is a very limited number of Bangla Character recognition system, if available they can’t recognize the whole alphabet set. Motivated by this, this paper demonstrates a MATLAB based Character Recognition system from printed Bangla writings. It can also compare the characters of one image file to another one. Processing steps here involved binarization, noise removal and segmentation in various levels, features extraction and recognition.
An effective approach to offline arabic handwriting recognitionijaia
Segmentation is the most challenging part of the Arabic handwriting recognition, due to the unique
characteristics of Arabic writing that allows the same shape to denote different characters. In this paper,
an off-line Arabic handwriting recognition system is proposed. The processing details are presented in
three main stages. Firstly, the image is skeletonized to one pixel thin. Secondly, transfer each diagonally
connected foreground pixel to the closest horizontal or vertical line. Finally, these orthogonal lines are
coded as vectors of unique integer numbers; each vector represents one letter of the word. In order to
evaluate the proposed techniques, the system has been tested on the IFN/ENIT database, and the
experimental results show that our method is superior to those methods currently available.
AN APPORACH FOR SCRIPT IDENTIFICATION IN PRINTED TRILINGUAL DOCUMENTS USING T...ijaia
In this work, we review the outcome of texture features for script classification. Rectangular White Space
analysis algorithm is used to analyze and identify heterogeneous layouts of document images. The texture
features, namely the color texture moments, Local binary pattern (LBP) and responses of Gabor, LM-filter,
S-filter, R-filter are extracted, and combinations of these are considered in the classification. In this work,
a probabilistic neural network and Nearest Neighbor are used for classification. To corrabate the
adequacy of the proposed strategy, an experiment was operated on our own data set. To study the effect of
classification accuracy, we vary the database sizes and the results show that the combination of multiple
features vastly improves the performance.
Nowadays character recognition has gained lot of attention in the field of pattern recognition due to its application in various fields. It is one of the most successful applications of automatic pattern recognition. Research in OCR is popular for its application potential in banks, post offices, office automation etc. HCR is useful in cheque processing in banks; almost all kind of form processing systems, handwritten postal address resolution and many more. This paper presents a simple and efficient approach for the implementation of OCR and translation of scanned images of printed text into machine-encoded text. It makes use of different image analysis phases followed by image detection via pre-processing and post-processing. This paper also describes scanning the entire document (same as the segmentation in our case) and recognizing individual characters from image irrespective of their position, size and various font styles and it deals with recognition of the symbols from English language, which is internationally accepted.
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...IJERD Editor
Advancements of Computer technology has made every organization to implement the automatic processing systems for its activities. One of the examples is the recognition of handwritten characters, which has always been a challenging task in image processing and pattern recognition. In this paper we propose Zone based features for recognition of the handwritten characters. In this zoning approach a digit image is divided into 8x8 zones and centre pixel is computed for each zone. This procedure is sequentially repeated for entire zone. Finally features are extracted for classification and recognition.
Cursive Handwriting Segmentation Using Ideal Distance Approach IJECEIAES
Offline cursive handwriting becomes a major challenge due to the huge amount of handwriting varieties such as slant handwriting, space between words, the size and direction of the letter, the style of writing the letter and handwriting with contour similarity on some letters. There are some steps for recursive handwriting recognition. The steps are preprocessing, morphology, segmentation, features of letter extraction and recognition. Segmentation is a crucial process in handwriting recognition since the success of segmentation step will determine the success level of recognition. This paper proposes a segmentation algorithm that segment recursive handwriting into letters. These letters will form words using a method that determine the intersection cutting point of image recursive handwriting with an ideal image distance. The ideal distance of recursive handwriting image is an ideal distance segmentation point in order to avoid the cutting of other letter’s section. The width and height of images are used to determine the accurate segmentation point. There were 999 recursive handwriting input images taken from 25 researchers used for this study. The images used are the images obtained from preprocessing step. Those are the images with slope correction. This study used Support Vector Machine (SVM) to recognize recursive handwriting. The experiments show the proposed segmentation algorithm able to segment the image precisely and have 97% success recognizing the recursive handwriting.
Data Mining Based Skin Pixel Detection Applied On Human Images: A Study PaperIJERA Editor
Skin segmentation is the process of the identifying the skin pixels in a image in a particular color model and dividing the images into skin and non-skin pixels. It is the process of find the particular skin of the image or video in a color model. Finding the regions of the images in human images to say these pixel regions are part of the image or videos is typically a preprocessing step in skin detection in computer vision, face detection or multi-view face detection. Skin pixel detection model converts the images into appropriate format in a color space and then classification process is being used for labeling of the skin and non-skin pixels. A skin classifier identifies the boundary of the skin image in a skin color model based on the training dataset. Here in this paper, we present the survey of the skin pixel segmentation using the learning algorithms.
Approximation of Gaussian derivatives for UWB communicationijsrd.com
UWB is a new interesting technology for wireless communications. It can replace traditionally carrier-based radio transmission by pulse-based transmission using ultrawide band frequency but at a very low energy. An important aspect of research in this domain is to find a pulse with an optimal shape, whose power spectral density respects and best fits emission limitation mask imposed by FCC. In this paper we review common used Gaussian pulses and its derivatives and the influence of shape factor, finding an optimal specific value for each derivative. Next, we search to obtain possible better pulse shapes as linear combinations of Gaussian derivatives. Older studies refer in one case to the same shape factor for all derivatives and in other case to higher factor for first derivative and smaller shape factors for subsequent derivatives. Our new idea is to use Gaussian derivatives, each with its specific optimal shape factor and to use a "trial and error" algorithm to obtain a linear combination pulse with better performance.
Experimental Investigation on Use of Honge(Pongamia) Biodiesel on Multi-cylin...ijsrd.com
Biodiesel is a fatty acid alkyl ester which is renewable, biodegradable and non toxic fuel which can be derived from any vegetable oil by transesterifiaction process. Biodiesel has become a key source as a substitution fuel and is making its place as a key future renewable energy source. Biodiesel derived from vegetable oils are quite promising alternative fuels for diesel engines. Use of vegetable oils in diesel engines leads to slightly inferior performance and higher smoke emissions due to their high viscosity. The performance of vegetable oils can be improved by modifying them through the Transesterification process. In the present work, the performance of single cylinder direct injection diesel engine using honge as fuel was evaluated for its performance, emission and combustion characteristics. The properties of honge thus obtained are comparable with ASTM biodiesel standards. The produced honge biodiesel was tested for their use as a substitute fuel for diesel engine. Tests have been conducted at different varying load of biodiesel, at 60% throttle. The performance parameters elucidated includes brake thermal efficiency, specific fuel consumption, torque, also emission characteristics against varying Brake Power (BP) and combustion characteristics against crank angle.
A Comprehensive Study On Handwritten Character Recognition Systemiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A CHINESE CHARACTER RECOGNITION METHOD BASED ON POPULATION MATRIX AND RELATIO...Teady Matius
A Chinese character has many different forms, information in its features will have many variations. Therefore, it needs a relational database to store many variations of their features. The use of the relational database to store the sets of features enables the use of distance measurements methods while measuring the sets of feature that owned by a Chinese character to recognize a Chinese character image inputted. The feature used in this thesis is the pixel population matrix. The sets of the features are stored and queried by using the relational database.
This paper discusses about how to recognize the Chinese character image and Chinese radical image by using relational database and pixel population matrix.
Dimensionality Reduction and Feature Selection Methods for Script Identificat...ITIIIndustries
The goal of this research is to explore effects of dimensionality reduction and feature selection on the problem of script identification from images of printed documents. The kadjacent segment is ideal for this use due to its ability to capture visual patterns. We have used principle component analysis to reduce the size of our feature matrix to a handier size that can be trained easily, and experimented by including varying combinations of dimensions of the super feature set. A modular
approach in neural network was used to classify 7 languages – Arabic, Chinese, English, Japanese, Tamil, Thai and Korean.
Devnagari document segmentation using histogram approachVikas Dongre
Document segmentation is one of the critical phases in machine recognition of any language. Correct
segmentation of individual symbols decides the accuracy of character recognition technique. It is used to
decompose image of a sequence of characters into sub images of individual symbols by segmenting lines and
words. Devnagari is the most popular script in India. It is used for writing Hindi, Marathi, Sanskrit and
Nepali languages. Moreover, Hindi is the third most popular language in the world. Devnagari documents
consist of vowels, consonants and various modifiers. Hence proper segmentation of Devnagari word is
challenging. A simple histogram based approach to segment Devnagari documents is proposed in this paper.
Various challenges in segmentation of Devnagari script are also discussed.
SEGMENTATION OF CHARACTERS WITHOUT MODIFIERS FROM A PRINTED BANGLA TEXTcscpconf
Optical Character Recognition (OCR) is one of the fundamental research areas of image processing and pattern recognition field. The performance accuracy of an OCR system depends on the proper segmentation of the characters. This paper is concerned with the segmentation of printed bangla characters without modifiers for optical character recognition (OCR) system. The basic steps needed for developing an OCR system also have been discussed.
DEVELOPMENT OF AN ALPHABETIC CHARACTER RECOGNITION SYSTEM USING MATLAB FOR BA...Mohammad Liton Hossain
Character recognition technique, associates a symbolic identity with the image of the character, is an important area in pattern recognition and image processing. The principal idea here is to convert raw images (scanned from document, typed, pictured etcetera) into editable text like html, doc, txt or other formats. There is a very limited number of Bangla Character recognition system, if available they can’t recognize the whole alphabet set. Motivated by this, this paper demonstrates a MATLAB based Character Recognition system from printed Bangla writings. It can also compare the characters of one image file to another one. Processing steps here involved binarization, noise removal and segmentation in various levels, features extraction and recognition.
An effective approach to offline arabic handwriting recognitionijaia
Segmentation is the most challenging part of the Arabic handwriting recognition, due to the unique
characteristics of Arabic writing that allows the same shape to denote different characters. In this paper,
an off-line Arabic handwriting recognition system is proposed. The processing details are presented in
three main stages. Firstly, the image is skeletonized to one pixel thin. Secondly, transfer each diagonally
connected foreground pixel to the closest horizontal or vertical line. Finally, these orthogonal lines are
coded as vectors of unique integer numbers; each vector represents one letter of the word. In order to
evaluate the proposed techniques, the system has been tested on the IFN/ENIT database, and the
experimental results show that our method is superior to those methods currently available.
AN APPORACH FOR SCRIPT IDENTIFICATION IN PRINTED TRILINGUAL DOCUMENTS USING T...ijaia
In this work, we review the outcome of texture features for script classification. Rectangular White Space
analysis algorithm is used to analyze and identify heterogeneous layouts of document images. The texture
features, namely the color texture moments, Local binary pattern (LBP) and responses of Gabor, LM-filter,
S-filter, R-filter are extracted, and combinations of these are considered in the classification. In this work,
a probabilistic neural network and Nearest Neighbor are used for classification. To corrabate the
adequacy of the proposed strategy, an experiment was operated on our own data set. To study the effect of
classification accuracy, we vary the database sizes and the results show that the combination of multiple
features vastly improves the performance.
Nowadays character recognition has gained lot of attention in the field of pattern recognition due to its application in various fields. It is one of the most successful applications of automatic pattern recognition. Research in OCR is popular for its application potential in banks, post offices, office automation etc. HCR is useful in cheque processing in banks; almost all kind of form processing systems, handwritten postal address resolution and many more. This paper presents a simple and efficient approach for the implementation of OCR and translation of scanned images of printed text into machine-encoded text. It makes use of different image analysis phases followed by image detection via pre-processing and post-processing. This paper also describes scanning the entire document (same as the segmentation in our case) and recognizing individual characters from image irrespective of their position, size and various font styles and it deals with recognition of the symbols from English language, which is internationally accepted.
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...IJERD Editor
Advancements of Computer technology has made every organization to implement the automatic processing systems for its activities. One of the examples is the recognition of handwritten characters, which has always been a challenging task in image processing and pattern recognition. In this paper we propose Zone based features for recognition of the handwritten characters. In this zoning approach a digit image is divided into 8x8 zones and centre pixel is computed for each zone. This procedure is sequentially repeated for entire zone. Finally features are extracted for classification and recognition.
Cursive Handwriting Segmentation Using Ideal Distance Approach IJECEIAES
Offline cursive handwriting becomes a major challenge due to the huge amount of handwriting varieties such as slant handwriting, space between words, the size and direction of the letter, the style of writing the letter and handwriting with contour similarity on some letters. There are some steps for recursive handwriting recognition. The steps are preprocessing, morphology, segmentation, features of letter extraction and recognition. Segmentation is a crucial process in handwriting recognition since the success of segmentation step will determine the success level of recognition. This paper proposes a segmentation algorithm that segment recursive handwriting into letters. These letters will form words using a method that determine the intersection cutting point of image recursive handwriting with an ideal image distance. The ideal distance of recursive handwriting image is an ideal distance segmentation point in order to avoid the cutting of other letter’s section. The width and height of images are used to determine the accurate segmentation point. There were 999 recursive handwriting input images taken from 25 researchers used for this study. The images used are the images obtained from preprocessing step. Those are the images with slope correction. This study used Support Vector Machine (SVM) to recognize recursive handwriting. The experiments show the proposed segmentation algorithm able to segment the image precisely and have 97% success recognizing the recursive handwriting.
Data Mining Based Skin Pixel Detection Applied On Human Images: A Study PaperIJERA Editor
Skin segmentation is the process of the identifying the skin pixels in a image in a particular color model and dividing the images into skin and non-skin pixels. It is the process of find the particular skin of the image or video in a color model. Finding the regions of the images in human images to say these pixel regions are part of the image or videos is typically a preprocessing step in skin detection in computer vision, face detection or multi-view face detection. Skin pixel detection model converts the images into appropriate format in a color space and then classification process is being used for labeling of the skin and non-skin pixels. A skin classifier identifies the boundary of the skin image in a skin color model based on the training dataset. Here in this paper, we present the survey of the skin pixel segmentation using the learning algorithms.
Approximation of Gaussian derivatives for UWB communicationijsrd.com
UWB is a new interesting technology for wireless communications. It can replace traditionally carrier-based radio transmission by pulse-based transmission using ultrawide band frequency but at a very low energy. An important aspect of research in this domain is to find a pulse with an optimal shape, whose power spectral density respects and best fits emission limitation mask imposed by FCC. In this paper we review common used Gaussian pulses and its derivatives and the influence of shape factor, finding an optimal specific value for each derivative. Next, we search to obtain possible better pulse shapes as linear combinations of Gaussian derivatives. Older studies refer in one case to the same shape factor for all derivatives and in other case to higher factor for first derivative and smaller shape factors for subsequent derivatives. Our new idea is to use Gaussian derivatives, each with its specific optimal shape factor and to use a "trial and error" algorithm to obtain a linear combination pulse with better performance.
Experimental Investigation on Use of Honge(Pongamia) Biodiesel on Multi-cylin...ijsrd.com
Biodiesel is a fatty acid alkyl ester which is renewable, biodegradable and non toxic fuel which can be derived from any vegetable oil by transesterifiaction process. Biodiesel has become a key source as a substitution fuel and is making its place as a key future renewable energy source. Biodiesel derived from vegetable oils are quite promising alternative fuels for diesel engines. Use of vegetable oils in diesel engines leads to slightly inferior performance and higher smoke emissions due to their high viscosity. The performance of vegetable oils can be improved by modifying them through the Transesterification process. In the present work, the performance of single cylinder direct injection diesel engine using honge as fuel was evaluated for its performance, emission and combustion characteristics. The properties of honge thus obtained are comparable with ASTM biodiesel standards. The produced honge biodiesel was tested for their use as a substitute fuel for diesel engine. Tests have been conducted at different varying load of biodiesel, at 60% throttle. The performance parameters elucidated includes brake thermal efficiency, specific fuel consumption, torque, also emission characteristics against varying Brake Power (BP) and combustion characteristics against crank angle.
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICijsrd.com
Communication in any language between two or more persons is like a plaintext or simple text. That means any person knowing that language can easily understand this plain text until this plaintext is codified in some manner. So, it is important to implement the coding techniques to ensure that information is hidden from everyone for whom it is not intended. So, that only authenticated person will be allowed to access the information. Cryptography is the art and science of achieving security by the encoding of messages in an unreadable form. Cryptography derives from the Greek word; the word "crypto" comes from kruptos, which means "hidden" and graphy means "writing". Thus, Cryptography is the practice and study of the hiding messages. Today, the cryptography is considered as branch for both the Computer Science and mathematics, which will related to the information theory.
Ijsrdv1 i2070Experimental Investigations of Chemical and Geotechnical Propert...ijsrd.com
Fly Ash generation and utilization both are expected to increase but the gap between them will also increase. Researchers are finding out new area for utilization of Fly Ash to minimize its environmental impact. One such area is Geotechnical Engineering. Black Cotton Soil is a problematic soil with respect to Soil-Structure interaction. In this paper, various properties of Black Cotton Soil like pH, plasticity index, volume change behavior and dry density are studied after mixing Fly Ash in different proportion and are presented. It can be concluded that 30% Fly Ash by weight mixed with Black Cotton soil gives optimum result for most of the properties.
Machining of Sic - Metal Matrix Composite (MMC) by Polycrystalline Diamond (P...ijsrd.com
In this paper, wear of polycrystalline diamond (PCD) cutting tools and the surface integrity during machining of SiC – Metal Matrix Composite (MMC) is discussed. An attempt is made to establish relation between the hardness of the tool and the flank wear. A newly developed PCD tool, which is superior in hardness with lower flank wear than the conventional tools is introduced. During machining with PCD tools, the severity of transfer material on the tools increased significantly with cutting distance and cutting speed. The superior surface finish obtained with the PCD tools cannot be merely explained by their low wear. The low degree of adhesion that these tools had with the work material appeared to be the main reason for the superior surface obtained at both low and high cutting speeds. At low cutting speed, when the use of coolant resulted in a marked reduction in the amount of work material on the machined work pieces, high Ra and P-V values can be obtained.
MESSAGING GATEWAY large business edition is an easy to use email virus protection that delivers effective and accurate antispam protection with no user peer user fees and available as a VMware-based virtual appliance Messaging gateway large business edition can be implemented on your existing hardware making it one of the most affordable gateway appliance solutions available.
An Impact of Land use and Transportation - A case study of Sanand Areaijsrd.com
Land use and Transportation Systems play definitive roles in shaping the city or town. This paper explores the impact of land use and transportation system on the city population and the land price. Theory discussed is located within the Indian context, and utilizes the example of the Sanand area in Gujarat State to elucidate how landuse and transportation system impact on the characteristics of the area.
Design and Simulation Low power SRAM Circuitsijsrd.com
SRAMs), focusing on optimizing delay and power. As the scaling trends in the speed and power of SRAMs with size and technology and find that the SRAM delay scales as the logarithm of its size as long as the interconnect delay is negligible. Non-scaling of threshold mismatches with process scaling, causes the signal swings in the bitlines and data lines also not to scale, leading to an increase in the relative delay of an SRAM, across technology generations. Appropriate methods for reduction of power consumption were studied such as capacitance reduction, very low operating voltages, DC and AC current reduction and suppression of leakage currents to name a few.. Many of reviewed techniques are applicable to other applications such as ASICs, DSPs, etc. Battery and solar-cell operation requires an operating voltage environment in low voltage area. These conditions demand new design approaches and more sophisticated concepts to retain high device reliability. The proposed techniques (USRS and LPRS) are topology based and hence easier to implement.
Use of Seven Quality Tools to Improve Quality and Productivity in Industryijsrd.com
The main aim of this paper is to provide the use of 7-Quality Tools (QC) to improve the quality of products in any industry. It included different methods and tools by which some organization can keep check on quality. Some simple techniques like basic Quality Control(QC) provide simple and effective way to improve the quality.The work shows continuous use of these tools upgrades the personnel characteristics of the people involved. It enhances their ability to think generate ideas, solve problem and do proper planning. The development of people improves the internal environment of the organization, Which plays a major role in the total Quality Culture.
A Novel Technique to Solve Mathematical Model of Pressure Swing Adsorption Sy...ijsrd.com
The mathematical modeling of a Pressure Swing Adsorption (PSA) system is discussed in detail for the Skarstrom cycle of two-bed process. The system is used to get pure oxygen product from the air with the use of zeolite 13X as an adsorbent. There are complex partial differential equations (pdes) which may not solve by analytical methods. There is no provision for solving it in any other software other than Matlab. All the equations are rearranged and written into dimensionless quantities, to make it easier. It is a novel technique of solving these complex PDEs. After that we have converted these PDEs into ODEs (Ordinary Differential Equations) by using OCFE (Orthogonal Collocation on Finite Elements) method. Now, these ODEs can be solved using different solvers like ode23, ode45, ode113, ode15s, ode23s, ode23t, ode23tb. The results obtained by this model will be compared to real industrial data.
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A Surveyijsrd.com
A Mobile Ad Hoc Network (MANET) is a self organizing, infrastructure less, multi-hop network. The wireless and distributed nature of MANETs poses a great challenge to system security designers. Ad hoc networks are by nature very open to anyone. Anyone with the proper hardware and knowledge of the network topology and protocols can connect to the network. This allows potential attackers to infiltrate the network and carry out attacks on its participants with the purpose of stealing or altering information. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. It does not require any cryptographic primitives. This attack targets specifically routing control packets, the nodes that are close to the attackers are shielded from any alternative routes with more than one or two hops to the remote location. All routes are thus directed to the wormhole established by the attackers. The entire routing system in MANET can even be brought down using the wormhole attack.
A New Transmission Scheme for MIMO – OFDMijsrd.com
This contribution introduces a new transmission scheme for multiple-input multiple-output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) systems. The new scheme is efficient and suitable especially for symmetric channels such as the link between two base stations or between two antennas on radio beam transmission. This survey Paper presents the performance analysis of V-BLAST based multiple inputs multiple output orthogonal frequency division multiplexing (MIMO-OFDM) system with respect to bit error rate per signal to noise ratio (BER/SNR) for various detection techniques. A 2X2 MIMO-OFDM system is used for the performance evaluation. The simulation results shows that the performance of V-BLAST based detection techniques is much better than the conventional methods. Alamouti Space Time Block Code (STBC) scheme is used with orthogonal designs over multiple antennas which showed simulated results are identical to expected theoretical results. With this technique both Bit Error Rate (BER) and maximum diversity gain are achieved by increasing number of antennas on either side. This scheme is efficient in all the applications where system capacity is limited by multipath fading.
Simulation of 3 bit Flash ADC in 0.18μmTechnology using NG SPICE Tool for Hig...ijsrd.com
This paper provides the basic simulation result for the 3 bit flash type ADC in 0.18μm technology using the NG Spice device simulator tool. It includes two stages, first stage includes 7 comparators and second stage has a thermometer encoder. The simulation is done in NG spice tool developed by university of California at Berkeley (USA).The response time of the comparator and ADC are 3.7ns and 4.9ns respectively with 50.01μw power dissipation which makes the ADC more suitable for high speed application with lower power devices.
Optimization of Process Parameters of Tungsten Inert Gas Welding by Taguchi M...ijsrd.com
Tungsten Inert Gas welding (TIG) is one of the most important joining technologies in welding-related fabrication. High quality weld joints without spattering and slags qualify this welding technology for the major part of metals. As the filler-metal supply is separated from the arc, the molten pool can be controlled in the best way possible an advantage which ensures the quality of the execution of the weld but entails a relatively low deposition rate and welding speed. When manufacturing consumer products where appearance is of importance; then the choice has to be TIG welding. Jobs that call for code requirements such as nuclear work, piping, and high profile consumer goods often require at least the first weld in the pipe joint to be TIG welding for an effective bond. In some cases all the passes on a multi-pass pipe weld may have to be TIG welding, if demand has high quality and code requirements.
Handwriting character recognition (HCR) is the ability of a computer to receive and interpret handwritten input. Handwritten Character Recognition is one of the active and challenging research areas in the field of Pattern Recognition. Pattern recognition is a process that taking in raw data and making an action based on the category of the pattern. HCR is one of the well-known applications of pattern recognition. Handwriting recognition especially for Indian languages is still in infant stage because not much work has been done it. This paper discuss about an idea to recognize Kannada vowels using chain code features. Kannada is a South Indian language. For any recognition system, an important part is feature extraction. A proper feature extraction method can increase the recognition ratio. In this paper, a chain code based feature extraction method is investigated for developing HCR system. Chain code is working based on 4-neighborhood or 8–neighborhood methods. Chain code is a sequence of code directions of a character and connection to a starting point which is often used in image processing. In this paper, 8–neighborhood method has been implemented which allows generation of eight different codes for each character. These codes have been used as features of the character image, which have been later on used for training and testing for K-Nearest Neighbor (KNN) classifiers. The level of accuracy reached to 100%.
A Review on Geometrical Analysis in Character Recognitioniosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Recognition of Persian handwritten characters has been considered as a significant field of research for
the last few years under pattern analysing technique. In this paper, a new approach for robust handwritten
Persian numerals recognition using strong feature set and a classifier fusion method is scrutinized to
increase the recognition percentage. For implementing the classifier fusion technique, we have considered
k nearest neighbour (KNN), linear classifier (LC) and support vector machine (SVM) classifiers. The
innovation of this tactic is to attain better precision with few features using classifier fusion method. For
evaluation of the proposed method we considered a Persian numerals database with 20,000 handwritten
samples. Spending 15,000 samples for training stage, we verified our technique on other 5,000 samples,
and the correct recognition ratio achievedapproximately 99.90%. Additional, we got 99.97% exactness
using four-fold cross validation procedure on 20,000 databases.
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...csandit
Optical Character recognition is the method of digitalization of hand and type written or
printed text into machine-encoded form and is superfluity of the various applications of envision
of human’s life. In present human life OCR has been successfully using in finance, legal,
banking, health care and home need appliances. India is a multi cultural, literature and
traditional scripted country. Telugu is the southern Indian language, it is a syllabic language,
symbol script represents a complete syllable and formed with the conjunct mixed consonants in
their representation. Recognition of mixed conjunct consonants is critical than the normal
consonants, because of their variation in written strokes, conjunct maxing with pre and post
level of consonants. This paper proposes the layered approach methodology to recognize the
characters, conjunct consonants, mixed- conjunct consonants and expressed the efficient
classification of the hand written and printed conjunct consonants. This paper implements the
Advanced Fuzzy Logic system controller to take the text in the form of written or printed,
collected the text images from the scanned file, digital camera, Processing the Image with
Examine the high intensity of images based on the quality ration, Extract the image characters
depends on the quality then check the character orientation and alignment then to check the
character thickness, base and print ration. The input image characters can classify into the two
ways, first way represents the normal consonants and the second way represents conjunct
consonants. Digitalized image text divided into three layers, the middle layer represents normal
consonants and the top and bottom layer represents mixed conjunct consonants. Here
recognition process starts from middle layer, and then it continues to check the top and bottom
layers. The recognition process treat as conjunct consonants when it can detect any symbolic
characters in top and bottom layers of present base character otherwise treats as normal
consonants. The post processing technique applied to all three layered characters. Post
processing of the image: concentrated on the image text readability and compatibility, if the
readability is not process then repeat the process again. In this recognition process includes
slant correction, thinning, normalization, segmentation, feature extraction and classification. In
the process of development of the algorithm the pre-processing, segmentation, character
recognition and post-processing modules were discussed. The main objectives to the
development of this paper are: To develop the classification, identification of deference
prototyping for written and printed consonants, conjunct consonants and symbols based on 3
layered approaches with different measurable area by using fuzzy logic and to determine
suitable features for handwritten character recognition.
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...cscpconf
Optical Character recognition is the method of digitalization of hand and type written or printed text into machine-encoded form and is superfluity of the various applications of envision of human’s life. In present human life OCR has been successfully using in finance, legal, banking, health care and home need appliances. India is a multi cultural, literature and traditional scripted country. Telugu is the southern Indian language, it is a syllabic language, symbol script represents a complete syllable and formed with the conjunct mixed consonants in their representation. Recognition of mixed conjunct consonants is critical than the normal
consonants, because of their variation in written strokes, conjunct maxing with pre and post level of consonants. This paper proposes the layered approach methodology to recognize the characters, conjunct consonants, mixed- conjunct consonants and expressed the efficient classification of the hand written and printed conjunct consonants. This paper implements the Advanced Fuzzy Logic system controller to take the text in the form of written or printed, collected the text images from the scanned file, digital camera, Processing the Image with Examine the high intensity of images based on the quality ration, Extract the image characters depends on the quality then check the character orientation and alignment then to check the character thickness, base and print ration. The input image characters can classify into the two ways, first way represents the normal consonants and the second way represents conjunct consonants. Digitalized image text divided into three layers, the middle layer represents normal consonants and the top and bottom layer represents mixed conjunct consonants. Here
recognition process starts from middle layer, and then it continues to check the top and bottom layers. The recognition process treat as conjunct consonants when it can detect any symbolic characters in top and bottom layers of present base character otherwise treats as normal consonants. The post processing technique applied to all three layered characters. Post processing of the image: concentrated on the image text readability and compatibility, if the
readability is not process then repeat the process again. In this recognition process includes slant correction, thinning, normalization, segmentation, feature extraction and classification. In the process of development of the algorithm the pre-processing, segmentation, character recognition and post processing modules were discussed. The main objectives to the development of this paper are: To develop the classification, identification of deference prototyping for written and printed consonants, conjunct consonants and symbols based on 3 layered approaches with different measurable area by using fuzzy logic and to determine suitable features for handwritten character recognition.
Text detection and recognition in scene images or natural images has applications in computer
vision systems like registration number plate detection, automatic traffic sign detection, image retrieval
and help for visually impaired people. Scene text, however, has complicated background, blur image,
partly occluded text, variations in font-styles, image noise and ranging illumination. Hence scene text
recognition could be a difficult computer vision problem. In this paper connected component method
is used to extract the text from background. In this work, horizontal and vertical projection profiles,
geometric properties of text, image binirization and gap filling method are used to extract the text from
scene images. Then histogram based threshold is applied to separate text background of the images.
Finally text is extracted from images.
Character recognition of kannada text in scene images using neuralIAEME Publication
Character recognition in scene images is one of the most fascinating and challenging
areas of pattern recognition with various practical application potentials. It can contribute
immensely to the advancement of an automation process and can improve the interface
between man and machine in many applications. Some practical application potentials of
character recognition system are: reading aid for the blind, traffic guidance systems, tour
guide systems, location aware systems and many more. In this work, a novel method for
recognizing basic Kannada characters in natural scene images is proposed. The proposed
method uses zone wise horizontal and vertical profile based features of character images. The
method works in two phases. During training, zone wise vertical and horizontal profile based
features are extracted from training samples and neural network is trained. During testing, the
test image is processed to obtain features and recognized using neural network classifier. The
method has been evaluated on 490 Kannada character images captured from 2 Mega Pixels
cameras on mobile phones at various sizes 240x320, 600x800 and 900x1200, which contains
samples of different sizes, styles and with different degradations, and achieves an average
recognition accuracy of 92%. The system is efficient and insensitive to the variations in size
and font, noise, blur and other degradations.
International Journal of Research in Engineering and Science is an open access peer-reviewed international forum for scientists involved in research to publish quality and refereed papers. Papers reporting original research or experimentally proved review work are welcome. Papers for publication are selected through peer review to ensure originality, relevance, and readability.
Topographic Feature Extraction for Bengali and Hindi Character Imagessipij
Feature selection and extraction plays an important role in different classification based problems such as face recognition, signature verification, optical character recognition (OCR) etc. The performance of OCR highly depends on the proper selection and extraction of feature set. In this paper, we present novel features based on the topography of a character as visible from different viewing directions on a 2D plane. By topography of a character we mean the structural features of the strokes and their spatial relations. In this work we develop topographic features of strokes visible with respect to views from different directions (e.g. North, South, East, and West). We consider three types of topographic features: closed region, convexity of strokes, and straight line strokes. These features are represented as a shapebased graph which acts as an invariant feature set for discriminating very similar type characters efficiently. We have tested the proposed method on printed and handwritten Bengali and Hindi character images. Initial results demonstrate the efficacy of our approach.
Topographic Feature Extraction for Bengali and Hindi Character Imagessipij
Feature selection and extraction plays an important role in different classification based problems such as face recognition, signature verification, optical character recognition (OCR) etc. The performance of OCR highly depends on the proper selection and extraction of feature set. In this paper, we present novel features based on the topography of a character as visible from different viewing directions on a 2D plane. By topography of a character we mean the structural features of the strokes and their spatial relations. In this work we develop topographic features of strokes visible with respect to views from different directions (e.g. North, South, East, and West). We consider three types of topographic features: closed region, convexity of strokes, and straight line strokes. These features are represented as a shapebased graph which acts as an invariant feature set for discriminating very similar type characters efficiently. We have tested the proposed method on printed and handwritten Bengali and Hindi character images. Initial results demonstrate the efficacy of our approach.
Due to availability of internet and evolution of embedded devices, Internet of things can be useful to contribute in energy domain. The Internet of Things (IoT) will deliver a smarter grid to enable more information and connectivity throughout the infrastructure and to homes. Through the IoT, consumers, manufacturers and utility providers will come across new ways to manage devices and ultimately conserve resources and save money by using smart meters, home gateways, smart plugs and connected appliances. The future smart home, various devices will be able to measure and share their energy consumption, and actively participate in house-wide or building wide energy management systems. This paper discusses the different approaches being taken worldwide to connect the smart grid. Full system solutions can be developed by combining hardware and software to address some of the challenges in building a smarter and more connected smart grid.
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
In the era of computing technology, Internet of Things (IoT) devices are now popular in each and every domains like e-governance, e-Health, e-Home, e-Commerce, and e-Trafficking etc. Iot is spreading from small to large applications in all fields like Smart Cities, Smart Grids, Smart Transportation. As on one side IoT provide facilities and services for the society. On the other hand, IoT security is also a crucial issues.IoT security is an area which totally concerned for giving security to connected devices and networks in the IoT .As, IoT is vast area with usability, performance, security, and reliability as a major challenges in it. The growth of the IoT is exponentially increases as driven by market pressures, which proportionally increases the security threats involved in IoT The relationship between the security and billions of devices connecting to the Internet cannot be described with existing mathematical methods. In this paper, we explore the opportunities possible in the IoT with security threats and challenges associated with it.
In today’s emerging world of Internet, each and every thing is supposed to be in connected mode with the help of billions of smart devices. By connecting all the devises used in our day to day life, make our life trouble less and easy. We are incorporated in a world where we are used to have smart phones, smart cars, smart gadgets, smart homes and smart cities. Different institutes and researchers are working for creating a smart world for us but real question which we need to emphasis on is how to make dumb devises talk with uncommon hardware and communication technology. For the same what kind of mechanism to use with various protocols and less human interaction. The purpose is to provide the key area for application of IoT and a platform on which various devices having different mechanism and protocols can communicate with an integrated architecture.
Study on Issues in Managing and Protecting Data of IOTijsrd.com
This paper discusses variety of issues for preserving and managing data produced by IoT. Every second large amount of data are added or updated in the IoT databases across the heterogeneous environment. While managing the data each phase of data processing for IoT data is exigent like storing data, querying, indexing, transaction management and failure handling. We also refer to the problem of data integration and protection as data requires to be fit in single layout and travel securely as they arrive in the pool from diversified sources in different structure. Finally, we confer a standardized pathway to manage and to defend data in consistent manner.
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
Today with advancement in Information Communication Technology (ICT) the way the education is being delivered is seeing a paradigm shift from boring classroom lectures to interactive applications such as 2-D and 3-D learning content, animations, live videos, response systems, interactive panels, education games, virtual laboratories and collaborative research (data gathering and analysis) etc. Engineering is emerging with more innovative solutions in the field of education and bringing out their innovative products to improve education delivery. The academic institutes which were once hesitant to use such technology are now looking forward to such innovations. They are adopting the new ways as they are realizing the vast benefits of using such methods and technology. The benefits are better comprehensibility, improved learning efficiency of students, and access to vast knowledge resources, geographical reach, quick feedback, accountability and quality research. This paper focuses on how engineering can leverage the latest technology and build a collaborative learning environment which can then be integrated with the national e-learning grid.
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
In the world more than 15% people are living with disability that also include children below age of 10 years. Due to lack of independent support services specially abled (handicap) people overly rely on other people for their basic needs, that excludes them from being financially and socially active. The Internet of Things (IoT) can give support system and a better quality of life as well as participation in routine and day to day life. For this purpose, the future solutions for current problems has been introduced in this paper. Daunting challenges have been considered as future research and glimpse of the IoT for specially abled person is given in the paper.
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
Internet of things (IoT) is the most powerful invention and if used in the positive direction, internet can prove to be very productive. But, now a days, due to the social networking sites such as Face book, WhatsApp, twitter, hike etc. internet is producing adverse effects on the student life, especially those students studying at college Level. As it is rightly said, something which has some positive effects also has some of the negative effects on the other hand. In this article, we are discussing some adverse effects of IoT on student’s life.
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
The use of information and communications technology (ICT) in education is a relatively new phenomenon and it has been the educational researchers' focus of attention for more than two decades. Educators and researchers examine the challenges of using ICT and think of new ways to integrate ICT into the curriculum. However, there are some barriers for the teachers that prevent them to use ICT in the classroom and develop supporting materials through ICT. The purpose of this study is to examine the high school English teachers’ perceptions of the factors discouraging teachers to use ICT in the classroom.
In recent years usage of private vehicles create urban traffic more and more crowded. As result traffic becomes one of the important problems in big cities in all over the world. Some of the traffic concerns are traffic jam and accidents which have caused a huge waste of time, more fuel consumption and more pollution. Time is very important parameter in routine life. The main problem faced by the people is real time routing. Our solution Virtual Eye will provide the current updates as in the real time scenario of the specific route. This research paper presents smart traffic navigation system, based on Internet of Things, which is featured by low cost, high compatibility, easy to upgrade, to replace traditional traffic management system and the proposed system can improve road traffic tremendously.
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
In this work there is illustrated an ontological model of educational programs in computer science for bachelor and master degrees in Computer science and for master educational program “Computer science as second competence†by Tempus project PROMIS.
Understanding IoT Management for Smart Refrigeratorijsrd.com
Lately the concept of Internet of Things (IoT) is being more elaborated and devices and databases are proposed thereby to meet the need of an Internet of Things scenario. IoT is being considered to be an integral part of smart house where devices will be connected to each other and also react upon certain environmental input. This will eventually include the home refrigerator, air conditioner, lights, heater and such other home appliances. Therefore, we focus our research on the database part for such an IoT’ fridge which we called as smart Fridge. We describe the potentials achievable through a database for an IoT refrigerator to manage the refrigerator food and also aid the creation of a monthly budget of the house for a family. The paper aims at the data management issue based on a proposed design for an intelligent refrigerator leveraging the sensor technology and the wireless communication technology. The refrigerator which identifies products by reading the barcodes or RFID tags is proposed to order the required products by connecting to the Internet. Thus the goal of this paper is to minimize human interaction to maintain the daily life events.
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
Double wishbone designs allow the engineer to carefully control the motion of the wheel throughout suspension travel. 3-D model of the Lower Wishbone Arm is prepared by using CAD software for modal and stress analysis. The forces and moments are used as the boundary conditions for finite element model of the wishbone arm. By using these boundary conditions static analysis is carried out. Then making the load as a function of time; quasi-static analysis of the wishbone arm is carried out. A finite element based optimization is used to optimize the design of lower wishbone arm. Topology optimization and material optimization techniques are used to optimize lower wishbone arm design.
A Review: Microwave Energy for materials processingijsrd.com
Microwave energy is a latest largest growing technique for material processing. This paper presents a review of microwave technologies used for material processing and its use for industrial applications. Advantages in using microwave energy for processing material include rapid heating, high heating efficiency, heating uniformity and clean energy. The microwave heating has various characteristics and due to which it has been become popular for heating low temperature applications to high temperature applications. In recent years this novel technique has been successfully utilized for the processing of metallic materials. Many researchers have reported microwave energy for sintering, joining and cladding of metallic materials. The aim of this paper is to show the use of microwave energy not only for non-metallic materials but also the metallic materials. The ability to process metals with microwave could assist in the manufacturing of high performance metal parts desired in many industries, for example in automotive and aeronautical industries.
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
With an expontial growth of World Wide Web, there are so many information overloaded and it became hard to find out data according to need. Web usage mining is a part of web mining, which deal with automatic discovery of user navigation pattern from web log. This paper presents an overview of web mining and also provide navigation pattern from classification and clustering algorithm for web usage mining. Web usage mining contain three important task namely data preprocessing, pattern discovery and pattern analysis based on discovered pattern. And also contain the comparative study of web mining techniques.
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
Application of FACTS controller called Static Synchronous Compensator STATCOM to improve the performance of power grid with Wind Farms is investigated .The essential feature of the STATCOM is that it has the ability to absorb or inject fastly the reactive power with power grid . Therefore the voltage regulation of the power grid with STATCOM FACTS device is achieved. Moreover restoring the stability of the power system having wind farm after occurring severe disturbance such as faults or wind farm mechanical power variation is obtained with STATCOM controller . The dynamic model of the power system having wind farm controlled by proposed STATCOM is developed . To validate the powerful of the STATCOM FACTS controller, the studied power system is simulated and subjected to different severe disturbances. The results prove the effectiveness of the proposed STATCOM controller in terms of fast damping the power system oscillations and restoring the power system stability.
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
Now a days solar harvesting is more popular. As the popularity become higher the material quality and solar tracking methods are more improved. There are several factors affecting the solar system. Major influence on solar cell, intensity of source radiation and storage techniques The materials used in solar cell manufacturing limit the efficiency of solar cell. This makes it particularly difficult to make considerable improvements in the performance of the cell, and hence restricts the efficiency of the overall collection process. Therefore, the most attainable maximum power point tracking method of improving the performance of solar power collection is to increase the mean intensity of radiation received from the source used. The purposed of tracking system controls elevation and orientation angles of solar panels such that the panels always maintain perpendicular to the sunlight. The measured variables of our automatic system were compared with those of a fixed angle PV system. As a result of the experiment, the voltage generated by the proposed tracking system has an overall of about 28.11% more than the fixed angle PV system. There are three major approaches for maximizing power extraction in medium and large scale systems. They are sun tracking, maximum power point (MPP) tracking or both.
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
In day today's relevance, it is mandatory to device the usage of diesel in an economic way. In present scenario, the very low combustion efficiency of CI engine leads to poor performance of engine and produces emission due to incomplete combustion. Study of research papers is focused on the improvement in efficiency of the engine and reduction in emissions by adding ethanol in a diesel with different blends like 5%, 10%, 15%, 20%, 25% and 30% by volume. The performance and emission characteristics of the engine are tested observed using blended fuels and comparative assessment is done with the performance and emission characteristics of engine using pure diesel.
Study and Review on Various Current Comparatorsijsrd.com
This paper presents study and review on various current comparators. It also describes low voltage current comparator using flipped voltage follower (FVF) to obtain the single supply voltage. This circuit has short propagation delay and occupies a small chip area as compare to other current comparators. The results of this circuit has obtained using PSpice simulator for 0.18 μm CMOS technology and a comparison has been performed with its non FVF counterpart to contrast its effectiveness, simplicity, compactness and low power consumption.
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
Power dissipation is a challenging problem for today's system-on-chip design and test. This paper presents a novel architecture which generates the test patterns with reduced switching activities; it has the advantage of low test power and low hardware overhead. The proposed LP-TPG (test pattern generator) structure consists of modified low power linear feedback shift register (LP-LFSR), m-bit counter, gray counter, NOR-gate structure and XOR-array. The seed generated from LP-LFSR is EXCLUSIVE-OR ed with the data generated from gray code generator. The XOR result of the sequence is single input changing (SIC) sequence, in turn reduces the switching activity and so power dissipation will be very less. The proposed architecture is simulated using Modelsim and synthesized using Xilinx ISE9.2.The Xilinx chip scope tool will be used to test the logic running on FPGA.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
In the last decade, the greatest threat to the wireless sensor network has been Reactive Jamming Attack because it is difficult to be disclosed and defend as well as due to its mass destruction to legitimate sensor communications. As discussed above about the Reactive Jammers Nodes, a new scheme to deactivate them efficiently is by identifying all trigger nodes, where transmissions invoke the jammer nodes, which has been proposed and developed. Due to this identification mechanism, many existing reactive jamming defending schemes can be benefited. This Trigger Identification can also work as an application layer .In this paper, on one side we provide the several optimization problems to provide complete trigger identification service framework for unreliable wireless sensor networks and on the other side we also provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios.
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxnikitacareer3
Looking for the best engineering colleges in Jaipur for 2024?
Check out our list of the top 10 B.Tech colleges to help you make the right choice for your future career!
1) MNIT
2) MANIPAL UNIV
3) LNMIIT
4) NIMS UNIV
5) JECRC
6) VIVEKANANDA GLOBAL UNIV
7) BIT JAIPUR
8) APEX UNIV
9) AMITY UNIV.
10) JNU
TO KNOW MORE ABOUT COLLEGES, FEES AND PLACEMENT, WATCH THE FULL VIDEO GIVEN BELOW ON "TOP 10 B TECH COLLEGES IN JAIPUR"
https://www.youtube.com/watch?v=vSNje0MBh7g
VISIT CAREER MANTRA PORTAL TO KNOW MORE ABOUT COLLEGES/UNIVERSITITES in Jaipur:
https://careermantra.net/colleges/3378/Jaipur/b-tech
Get all the information you need to plan your next steps in your medical career with Career Mantra!
https://careermantra.net/
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
bank management system in java and mysql report1.pdf
A Survey of Modern Character Recognition Techniques
1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 2, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 217
A Survey of Modern Character Recognition Techniques
Jitendra shrivastav1
Ravindra Gupta2
1
M.Tech Student of Computer Science S.S.S.I.S.T. College, Sehore, MP, India
2
Department of Computer Science & Engineering, S.S.S.I.S.T Sehore, MP, India
Abstract— In this paper, we present an overview of existing
handwritten character recognition techniques. All these
algorithms are described more or less on their own.
handwritten character recognition is a very popular and
computationally expensive task. We also explain the
fundamentals of handwritten character recognition. We
describe today’s approaches for handwritten character
recognition. From the broad variety of efficient techniques
that have been developed we will compare the most
important ones. We will systematize the techniques and
analyze their performance based on both their run time
performance and theoretical considerations. Their strengths
and weaknesses are also investigated. It turns out that the
behavior of the algorithms is much more similar as to be
expected.
KEYWORDS: OCR, HCR, Features, Training, classification
I. INTRODUCTION
Character recognition is an art of detecting segmenting and
identifying characters from image. More precisely Character
recognition is process of detecting and recognizing
characters from input image and converts it into ASCII or
other equivalent machine editable form[1], [2], [3]. It
contributes immensely to the advancement of automation
process and improving the interface between man and
machine in many applications [4]. Character recognition is
one of the most interesting and fascinating areas of pattern
recognition and artificial intelligence [5], [6].Character
recognition is getting more and more attention since last
decade due to its wide range of application. Conversion of
handwritten characters is important for making several
important documents related to our history, such as
manuscripts, into machine editable form so that it can be
easily accessed and pres independent work is going on in
Optical Character Recognition that is processing of
printed/computer generated document and handwritten and
manually created document processing i.e. handwritten
character recognition. Character recognitio character
recognition (Fig. 1(a)) and online character recognition (Fig.
1(b)).
In offline character recognition system, document is first
generated, digitized, stored in computer and then it is
processed. While in case of online character recognition
system, character is processed while it was under creation.
External factors like pressure speed of writi have any
influence in case of offline system but they have great
impact on online system. Again, offline or online system can
be applied on optical character (Fig 2.(a)) or handwritten
characters (Fig 2.(b)).Based on that system can be classified
as OCR or HCR respectively. The online methods have been
superior to their counterpart i.e. offline methods due to
temporal information present in character generation [4].
Accuracy of HCR is still limited to 90 percent due to
presence of large variation in shape, scale, style, orientation
etc. [8]. Character processing systems are domain and
application specific, like there it is not possible to design
generic system which can process all kind of scripts and
language. Lots of work has been done on European
languages and Arabic (Urdu) language. Whereas domestic
languages like Hindi, Punjabi, Bangla, Tamil, Gujarati etc.
are very less explored due to limited usage. In this paper,
our focus is to carry out in depth literature survey on
handwritten character recognition methods.
II. LITERATURE REVIEW
Image processing and pattern recognition plays significant
role in handwritten character recognition. In [10], Rajbala
et al have discussed various types of classification of feature
extraction methods like statistical feature based methods,
structural feature based methods and global transformation
techniques. Statistical methods are based on planning of
how data are selected. It uses the information of statistical
distribution of pixels in image. It can be mainly classified in
three categories: 1). Partitioning in regions, 2). Profile
generation and projections 3). Distances and crossing.
Structural features are extracted from structure and
2. A Survey of Modern Character Recognition Techniques
(IJSRD/Vol. 1/Issue 2/2013/0041)
All rights reserved by www.ijsrd.com
218
geometry of character like number of horizontal and vertical
lines, aspect ratio, number of cross points, number of loops,
number of branch points, number of strokes, number of
curves etc. Global transformation features are calculated by
converting image in frequency domain like Discrete Fourier
Transformation (DFT), Discrete Cosine Transformation
(DCT), Discrete Wavelet Transformation (DWT), Gabor
filtering, Walsh-Hadamard transformation etc.
Feature extracted can be either low level or high level.
Low level features include width, height, curliness, aspect
ratio etc of the character. These alone cannot be used to
distinguish one character from another in the character set of
the language [11]. So, there are a number of other high level
features which include number and position of loops,
straight lines, headlines, curves etc.
Tirthraj Dash et al have discussed HCR using associative
memory net (AMN) in their paper [12]. They have directly
worked at pixel level. Dataset was designed in MS Paint 6.1
with normal Arial font of size 28. Dimension of image was
kept 31 X 39. Once characters are extracted, their binary
pixel values are directly used to train AMN.
I.K.Pathan et al have proposed offline approach for
handwritten isolated Urdu characters in their wok mentioned
in [13]. Urdu character may contain one, two, three or four
segment. In which one component is known as primary
(generally represents large continuous stroke) and rest of all
are known as secondary components (generally represents
small stroke or dots). Authors have used moment invariants
(MI) feature to recognize the characters. MI features are
well known to be invariant under rotation, translation,
scaling and reflection. MI features are measure of the pixel
distribution around the center of gravity of character and it
captures the global character shape information. If character
image is single component than it is normalized in 60 X 60
pixels and horizontally divided in equal 3 parts. 7 MI are
extracted from each zone and 7 MI are calculated from
overall image, so total of 28 features are used to train SVM.
And if image is having multi component than 28 MI are
extracted from primary component (60 X 60) and 21 MI are
extracted from secondary component (22 X 22). Separate
SVM are trained for both and decision is taken based on
rules satisfying some criteria. Proposed system claim to get
highest 93.59 % accuracy.
In [4], Pradeep et al have proposed neural network based
classification of handwritten character recognition system.
Each individual character is resized to 30 X 20 pixels for
processing. They are using binary features to train neural
network. However such features are not robust. In post
processing stage, recognized characters are converted to
ASCII format. Input layer has 600 neurons equal to number
of pixels. Output layer has 26 neurons as English has 26
alphabets. Proposed ANN uses back propagation algorithm
with momentum and adaptive learning rate.
Rajib et al have proposed Hidden Markov Model based
system for English HCR in their literature [8]. They have
employed global as well as local feature extraction methods.
Global feature involves four gradient features, six projection
features and four curvature features. And to extract local
features, image is divided in to nine equal blocks and 4
gradient features are calculated from each block, so total of
36 features are extracted. So overall feature vector contains
50 features per character. O = [G(4) P(6) C(4) L(36)], where
G, P, C and L represents global gradient, projection,
curvature and local gradient features respectively. Number
in parenthesis represents number of respective features.
HMM is trained using these feature and experiment is
carried out. Post processing is also applied after recognition
phase of HMM to highly confused group of characters like
N and M, O and Q, C and O etc. For each group new feature
is calculated to discriminate characters within the group.
Gradient features based method is discussed in [14] by
Ashutosh et al. Experiment is carried out on Hindi, third
most popular language in the world. The first research work
on handwritten Devnagari characters was published in 1977.
300 Million People use the Devnagari script for
documentation in central and north region of India [8].In
proposed method, Gradient Vector is calculated at each
pixel and image is divided in 9 X 9 blocks. Then strength of
gradient is accumulated in eight standard directions in
eachsub block. 9 X 9 blocks is further down sampled to 5 X
5 block using Gaussian filter.Preprocessing steps for
proposed methods are as follows: Intensity values of image
were adjusted and then images were converted to binary
with threshold value 0.8. Connected component with pixel
density less than 30 were removed from further processing.
Median filter was applied to remove pepper and salt noise
present in binary images. And finally, individual characters
were extracted by row and column histogram processing and
normalized to 90 X 90 pixel block. Gradient feature were
extracted using sobel operator.
Velappa et al have proposed multiscale neural network
based approach in [15]. Neural networks like Feed forward
back propagation neural network requires long training time
to memorize and generalize all input feature vectors [10].
And still there are good chances of misclassification.
Generalization problem can be overcome by using multi
scale neural network [11].Proposed system first convert
camera captured RGB image to binary image. Width to
Height Ratio (WH), Relative Height (RH) ratio, Relative
Width ratio (RW) is calculated to remove unnecessary
connected components from image. For multi scale neural
network, detected character is resized to 20 X 28 pixels, 10
X 14 pixels and 5 X 7 pixels. Binary features of these
different resolution images are given to three layer feed
forward back propagation algorithm.
In literature [16], T.Som et al have discussed fuzzy
membership function based approach for HCR.Character
images are normalized to 20 X 10 pixels. Average image
(fused image) is formed from 10 images of each character.
Bonding box around character is determined by using
vertical and horizontal projection of character. After
cropping image to bounding box, it is resized to 10 X 10
pixels size. After that, thing is performed and thinned image
is placed in one by one raw of 100 X 100 canvas. Similarity
score of test image is matched with fusion image and
characters are classified.
3. A Survey of Modern Character Recognition Techniques
(IJSRD/Vol. 1/Issue 2/2013/0041)
All rights reserved by www.ijsrd.com
219
PaperOffline
Model /Features Dataset Size
Accuracy
Claimed
[8] √
HMM
Gradient (4),
Projection (6),
Curvature (6),
Local Grad (4)
100 Writers X 5
sample of each
= 13000 Samples
(26 Alphabet)
Training Set : 2600
98.26 %
Char
Testing Set:
10,400
[11]
FFBPNN
Freeman Code
[14]
Gradient
SVM
20 Writer X 10
Samples = 7200
Samples (36
Alphabets)
Normalized Size:
90 X 90
94.00 %
[15]
Multi scale
Neural Network
10 sample X 26
Alphabets = 260
10 X 10 numeric =
100
85.00 %
[16]
Fuzzy
Membership
based function
10 sample X 26
char = 260
[17]
Single Layer
NN.
Binary features
26 Characters only 80.00 %
[18]
Modified
Cascaded ANN
5 features from
each block of
character
Total 100
Characters from 10
persons 67.00 %
[20]
Zone based
hybrid feature
extraction model
In literature [17], Rakesh kumar et al has proposed single
layer neural network based approach for HCR to reduce
training time. Characters are written on A4 size paper in
uniform box. Segmented characters are scaled to 80 X 80
pixels. Each 0 is replaced by -1 for better training.
Diagonal based feature extraction work is mentioned in [19],
which is improved by Sharma et al, discussed in [20]. They
have proposed zone based hybrid feature extraction method.
Euler number concept is used to improve speed and
accuracy. Thresholding, filtering and thinning operations are
performed as a part of preprocessing. Segmentation can be
classified into three broad categories: Top down, Bottom up
and Hybrid techniques. In proposed method segmented
character is resized to 90 X 60. After calculating Euler
number from this image, character is divided in to 10 X 10
pixel 54 zones. Each zone value is replaced by average
intensity value and is used as feature value. 9 and 6 features
are extracted by averaging values row wise and column
wise, so it forms total 69 features. A FFBPNN with
configuration 69-100-100-26 is used for classification.
III. CONCLUSIONS
Comparison between all discussed literatures is shown in
table I with all possible dimensions. Literature review shows
than neural network is the prime choice among researchers
for training purpose. However various kind of changes have
been proposed in feature extraction methods. Work can be
extended from single character or set of characters to
document processing. Many applications are awaiting the
enhancement in character recognition to be adopted it fully.
Hybrid model can be proposed which counts on more than
one feature extraction methods to discriminate characters
properly. Post processing is also crucial to discriminate
similar structured characters like Q and O, M and N like
pairs in English language. It is not possible to design fully
automated system which can handle all kind of variability.
HCR system must be domain specific as well as bounded to
limited versatility in writing style for robustness.
Handwritten character recognition is still a burning research
area of pattern recognition. Each and every step contributes
directly to the accuracy of system, like preprocessing,
segmentation, feature extraction, training methods etc all. So
all these area are open for independent research. A lot can
be improved in each of step.
REFERENCES
[1] Kai Ding, Zhibin Liu, Lianwen Jin, Xinghua Zhu, A
Comparative study of GABOR feature and gradient
feature for handwritten 17hinese character recognition,
International Conference on Wavelet Analysis and
Pattern Recognition, pp. 1182-1186, Beijing, China, 2-4
Nov. 2007
[2] Pranob K Charles, V.Harish, M.Swathi, CH. Deepthi,
"A Review on the Various Techniques used for Optical
Character Recognition", International Journal of
Engineering Research and Applications, Vol. 2, Issue 1,
pp. 659-662, Jan-Feb 2012
[3] Om Prakash Sharma, M. K. Ghose, Krishna Bikram
Shah, "An Improved Zone Based Hybrid Feature
4. A Survey of Modern Character Recognition Techniques
(IJSRD/Vol. 1/Issue 2/2013/0041)
All rights reserved by www.ijsrd.com
220
Extraction Model for Handwritten Alphabets
Recognition Using Euler Number", International
Journal of Soft Computing and Engineering, Vol.2,
Issue 2, pp. 504-58, May 2012
[4] J. Pradeepa, E. Srinivasana, S. Himavathib, "Neural
Network Based Recognition System Integrating Feature
Extraction and Classification for English Handwritten",
International journal of Engineering,Vol.25, No. 2, pp.
99-106, May 2012
[5] Liu Cheng-Lin, Nakashima, Kazuki, H, Sako,
H.Fujisawa, Handwritten digit recognition:
investigation of normalization and feature extraction
techniques, Pattern Recognition, Vol. 37, No. 2, pp.
265-279, 2004.
[6] Supriya Deshmukh, Leena Ragha, "Analysis of
Directional Features - Stroke and Contour
for Handwritten Character Recognition", IEEE International
Advance Computing Conference, pp.1114-1118, 6-7
March, 2009, India
[7] Amritha Sampath, Tripti C, Govindaru V, Freeman code
based online handwritten character recognition for
Malayalam using Back propagation neural networks,
Advance computing: An international journal, Vol. 3,
No. 4, pp. 51-58, July 2012
[8] Rajib Lochan Das, Binod Kumar Prasad, Goutam
Sanyal, "HMM based Offline Handwritten Writer
Independent English Character Recognition using
Global and Local Feature Extraction", International
Journal of Computer Applications (0975 8887),
Volume 46 No.10, pp. 45-50, May 2012
[9] Bhatia, N. and Vandana, Survey of Nearest Neighbor
Techniques, International Journal of Computer Science
and Information Security, Vol. 8, No. 2, (2001), 302-
305.
[10] Rajbala Tokas,Aruna Bhadu, "A comparative analysis
of feature extraction techniques for handwritten
character recognition", International Journal of
Advanced Technology & Engineering Research,
Volume 2, Issue 4, pp. 215-219, July 2012
[11] Amritha Sampath, Tripti C, Govindaru V, "Freeman
code based online handwritten character recognition for
Malayalam using backpropagation neural networks",
International journal on Advanced computing, Vol. 3,
No. 4, pp. 51 - 58, July 2012
[12] Tirtharaj Dash, Time efficient approach to offline hand
written character recognition using associative memory
net., International Journal of Computing and Business
Research, Volume 3 Issue 3 September 2012
[13] Imaran Khan Pathan,Abdulbari Ahmed Bari Ahmed
Ali, Ramteke R.J., "Recognition of offline handwritten
isolated Urdu character ", International Journal on
Advances in Computational Research, Vol. 4, Issue 1,
pp. 117-121, 2012
[14] Ashutosh Aggarwal, Rajneesh Rani, RenuDhir,
"Handwritten Devanagari Character Recognition Using
Gradient Features", International Journal of Advanced
Research in Computer Science and Software
Engineering (ISSN: 2277-128X), Vol. 2, Issue 5, pp.
8590, May 2012
[15] Velappa Ganapathy, Kok Leong Liew, "Handwritten
Character Recognition Using Multi scale Neural
Network Training Technique", World Academy of
Science, Engineering and Technology, pp. 32-37, 2008
[16] T.Som, Sumit Saha, "Handwritten Character
Recognition Using Fuzzy Membership Function",
International Journal of Emerging Technologies in
Sciences and Engineering,Vol.5, No.2, pp. 11-15, Dec
2011
[17] Rakesh Kumar Mandal, N R Manna, "Hand Written
English Character Recognition using Row- wise
Segmentation Technique", International Symposium on
Devices MEMS, Intelligent Systems &
Communication, pp. 5-9, 2011.
[18] Farah Hanna Zawaideh, "Arabic Hand Written
Character Recognition Using Modified Multi-Neural
Network", Journal of Emerging Trends in Computing
and Information Sciences (ISSN 2079-8407), Vol. 3,
No. 7, pp. 1021-1026, July 2012
[19] J Pradeep, E Shrinivasan and S.Himavathi, "Diagonal
Based Feature Extraction for Handwritten Alphabets
Recognition System Using Neural Network",
International Journal of Computer Science &
Information Technology (IJCSIT), vol. 3, No 1, Feb
2011.
[20] Om Prakash Sharma, M. K. Ghose, Krishna Bikram
Shah, "An Improved Zone Based Hybrid Feature
Extraction Model for Handwritten Alphabets
Recognition Using Euler Number", International
Journal of Soft Computing and Engineering (ISSN:
2231 - 2307), Vol. 2, Issue 2, pp. 504-508, May 2012
[21] Moncef Charfi, Monji Kherallah, Abdelkarim El Baati,
Adel M. Alimi, "A New Approach for Arabic
Handwritten Postal Addresses Recognition",
International Journal of Advanced Computer Science
and Applications, Vol. 3, No. 3, pp. 1-7, 2012