SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 5, No. 5, September 2014 
AUTOMATIC TRAINING DATA SYNTHESIS 
FOR HANDWRITING RECOGNITION USING 
THE STRUCTURAL CROSSING-OVER 
TECHNIQUE 
Sirisak Visessenee1,*, Sanparith Marukatat2, and Rachada Kongkachandra3 
1,3 Department of Computer Science, Faculty of Science and Technology, Thammasat 
University, Klongluang, Patumthani, 12120, THAILAND. 
2 Image Technology Lab., National Electronics and Computer Technology Center, 
Klongluang, Patumthani, 12120, THAILAND. 
ABSTRACT 
The paper presents a novel technique called “Structural Crossing-Over” to synthesize qualified data for 
training machine learning-based handwriting recognition. The proposed technique can provide a greater 
variety of patterns of training data than the existing approaches such as elastic distortion and tangent-based 
affine transformation. A couple of training characters are chosen, then they are analyzed by their 
similar and different structures, and finally are crossed over to generate the new characters. The 
experiments are set to compare the performances of tangent-based affine transformation and the proposed 
approach in terms of the variety of generated characters and percent of recognition errors. The standard 
MNIST corpus including 60,000 training characters and 10,000 test characters is employed in the 
experiments. The proposed technique uses 1,000 characters to synthesize 60,000 characters, and then uses 
these data to train and test the benchmark handwriting recognition system that exploits Histogram of 
Gradient: HOG as features and Support Vector Machine: SVM as recognizer. The experimental result 
yields 8.06% of errors. It significantly outperforms the tangent-based affine transformation and the 
original MNIST training data, which are 11.74% and 16.55%, respectively. 
KEYWORDS 
Distortion, Handwriting Recognition, Structural Crossing-Over Technique, Support Vector Machine, 
Training Data Synthesis 
1. INTRODUCTION 
Handwriting recognition is a research field that is strongly associated with natural language 
processing. Its goal is to convert the character images into text that the computer can process. 
Although various input devices have been developed to provide facilities for users such as 
keyboard, mouse, digital pen, stylus, and touch screen, however, most people still prefer to write 
notes on paper with handwriting. To bring them into the computer, users have to waste their time 
typing them again. Therefore, the development of a handwriting recognition system allows users 
to easily record and can help bridge the gap between the skilled computer users and those who are 
not. 
In the past, there were a lot of successful researches on handwriting recognition with a high 
recognition accuracy 90% approximately. Various approaches have been applied in many 
languages such as English [1-3], Chinese [4,5], Japanese [6], Arabic [7] and Thai [8-10]. The big 
DOI : 10.5121/ijaia.2014.5507 85
International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 5, No. 5, September 2014 
problem with handwriting recognition research has come from the different handwriting patterns, 
which are characterized by a specific individual. Also, the handwriting of an individual can vary 
according to the different emotions and situations. The recognition method used in most research 
is divided into two main ways. 
86 
1. Recognition by the rules (Rule-based Recognition). 
2. Recognition by machine learning (Machine Learning-based Recognition). 
For the first method, the rules are derived from the experts that are limited, which could not cover 
all the variety of characters. The second method is more popular because of the following 
benefits. 
• Sophisticated pattern recognition 
• Intelligent decisions 
• Self-modifying 
• Multiple iterations [11] 
However, the major problem of the machine learning approach is that the amount of quality 
training data is insufficient. Garrett Wu [12] said that if we have a lot of data, combined with a 
simple algorithm, it will be able to overcome a complex algorithm. The good recognizer comes 
from a good learner. The more experience the learner has, the better the learner is. In this paper, 
we present a novel technique to automatically synthesize training data for handwriting 
recognition systems. The paper is structured as follows: Section 2 mentions some existing 
approaches used to cure the limited training data problem. Section 3 proposes an idea, called the 
structural crossing-over. Section 4 mentions the experiment settings and their results. The 
discussion and conclusion are in the last section. 
2. EXISTING APPROACHES SOLVING INSUFFICIENT 
TRAINING DATA 
There are many researchers attempting to improve the accuracy of handwriting recognition 
systems by concentrating on training data synthesis. In 2000, M. Mori, et al. [13] proposed a 
point correspondence technique to generate new samples. They assigned one character as 
template and then randomly chose a character from the training data set. The point 
correspondences between the two characters are projected. The generated characters are produced 
by varying parameters in the defined distortion function, as shown in Fig.1 (a). In 2005, Kambar, 
Sapargali [14] applied morphing transformation to generate synthetic data for handwritten 
numeral recognition. He randomly selected two characters from training data set, then three 
features, i.e. gradient, structural, and concavity, of each character are extracted. Finally, he 
applied morphing transformation to produce various characters forms, as illustrated in Fig. 1 (b). 
In 2007, Buyoung Yun, et al. [15] used different tangent vectors to represent different variations. 
They proposed eight tangent vectors for i.e. scaling, rotation, X-translation, Y-translation, parallel 
hyperbolic, diagonal hyperbolic, thickness and modified thickness. Figure 1 (c) illustrates the 
example of applying tangent vectors to the number “2”. Although the previous research 
succeeded in increasing the quantity of training data, they are limited in increasing the variety of 
patterns for training data.
International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 5, No. 5, September 2014 
87 
(a) 
(b) 
(c) 
Figure 1. The generated numeric characters by previous researches 
3. STRUCTURAL CROSSING-OVER TECHNIQUE 
Since the generated characters in the previous works are mostly derived from the source 
characters by considering the character structure of individual characters. Whether a character is 
distorted with different angles, its total structure is not much different from the original. In this 
paper, a couple of characters are selected, some common structures are extracted, the variations 
between two characters are considered, and finally some new hybrid characters are produced.
International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 5, No. 5, September 2014 
The steps in our proposed technique are demonstrated in Fig.2. There are four main steps i.e. 
preprocessing, crossing-over point finding, structure grouping, and character reproduction. 
88 
Figure 2. Steps in Structural Crossing-Over Technique 
3.1 Preprocessing 
To generate the new training data, at least two characters are required. They are preprocessed by 
binarization and thinning, as shown in Fig.3. 
Figure 3. Preprocessing character by “Thinning” Figure 4. Crossing-Over Point Finding 
3.2 Crossing-Over Point Finding 
This step is to find the common points between two characters. These points are called crossing-over 
points. Consider in Fig. 4, two original characters, L and R, are overlapped. The coordinate 
of L is set to (0,0) and the coordinate of R could be varied both in X and Y axis. The number of 
generated training data depends on the times and the gap size when two characters are 
overlapped. Each overlapping frame provides one or more intersection points. We then call it 
“crossing-over point”. In Fig.4, there are two points. These points are used as the separator 
therefore three fragments of each character are obtained. 
3.3 Structure Grouping 
From step 3.2, the different fragments of each character are found. We believe that these various 
parts can yield various patterns of characters. However, if we make a combination by using these 
small fragments, some strange characters might occur. To make sure that the synthetic characters 
are the same as the original character, the structure of the character should be gained. Therefore, 
these fragments are then overlapped again to find the significant structure of each character. From
International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 5, No. 5, September 2014 
Fig. 5, six fragments i.e. L1,L2,L3,R1,R2,and R3 are overlapped and then output two main 
structures. Dilation process is then used to make the structures clear. 
89 
Figure 5. Structure Grouping Process 
3.4 Characters Reproduction 
After the structure fragments of original characters are obtained, the character reproduction step is 
activated. The new characters are synthesized by using three parts i.e. one fragment from L, 
crossing-over points, and one fragment of R. The fragment L and R should have different 
structures. Figure 6 illustrated how new “3” are generated. The left “3” character is synthesized 
by combining the first structure in L, cross-over points, and the second structure in R while the 
right “3” uses the second structure in L, cross-over points, and the first structure in R. Finally, the 
dilation process is employed to enlarge the new characters. 
Figure 6. Character Reproduction Process 
4. EXPERIMENTS AND RESULTS 
We hypothesize the proposed “Structural Crossing-over” technique can generate the new 
characters with a greater variety of patterns than the previous research works. We select the
International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 5, No. 5, September 2014 
tangent vectors with affine transformation [15] as benchmark. The comparison in terms of 
character patterns varieties and recognition accuracy are experimented. The standard corpus as 
MNIST [16] are employed. It includes 60,000 characters for training and 10,000 characters for 
testing. 
Figure 7 shows the appearances of new generated characters after using technique in [15] and our 
proposed technique. In Fig. 7 (a), ten characters in the right column are generated from the left 
character. Figure 7 (b) results the new generated characters derived from the proposed technique. 
The character patterns are more varied. 
90 
(a) 
(b) 
Figure 7. Comparative Synthetic Characters between the proposed technique and [15] 
With the assumption that if a handwriting recognition is trained by a huge variety of patterns as 
training data, the recognition accuracy would be increased. We set the experiments by building a 
benchmark handwriting recognition system that uses the Histogram of Gradient (HOG) as the 
character features and the Support Vector Machine (SVM) with linear Kernel function and one-against- 
all approach as multiclass classifier. The benchmark system is trained by 60,000 numeric 
characters and then is tested with the 10,000 characters from MNIST [15]. The % of recognition 
error is 16.55. 
Instead of using the total 60,000 characters for training, we synthesize the training data from 
1,000 numeric characters from MNIST [15]. With the small set of training data, when we applied 
two synthesis approaches i.e. tangent and structural crossing-over, the % of recognition errors are 
significantly decreased. The experimental results in the 2nd through the 7th column are the % of 
recognition errors, which are trained by the synthesized training data vary from 10,000 through 
60,000 characters. The proposed technique illustrated the outperformed results.
International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 5, No. 5, September 2014 
91 
Table 1 Comparative Percent of Handwriting Recognition Errors proposed technique 
5. CONCLUSION 
The paper presents a novel technique called “Structural Crossing-Over” to synthesize qualified 
data for training machine learning-based handwriting recognition. The proposed technique can 
provide a greater variety of patterns of training data than the existing approaches. The tangent 
vectors with affine transformation [15] are used as a competitive approach. The comparison in 
terms of character patterns varieties and recognition accuracy are experimented with the MNIST 
corpus [16]. The Support Vector Machine (SVM) with Histogram of Gradient (HOG) features, 
linear Kernel function and one-against-all approach for multiclass classification is implemented 
as a recognition system. The proposed technique can yield the outperformed results both in 
varieties and accuracy. 
REFERENCES 
[1] A. Graves and J. Schmidhuber (2009) “Offline handwriting recognition with multidimensional 
recurrent neural networks”, In D. Koller, D. Schuurmans, Y. Bengio, and L. Bottou, editors, 
Advances in Neural Information Processing Systems 21, MIT Press, pp. 545-552. 
[2] R. Kala, H. Vazirani, A. Shukla and R. Tiwari (2010) “Offline Handwriting Recognition using 
Genetic Algorithm”, IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 2, No 1, 
pp. 16-25. 
[3] D. K. Patel, T. Som, S. K. Yadav and M. K. Singh (2012) “Handwritten Character Recognition Using 
Multi-resolution Technique and Euclidean Distance Metric”, JSIP Journal of Signal and Information 
Processing, pp. 208-214. 
[4] Y. Mizukami (1998) “A Handwritten Chinese Character Recognition System Using Hierarchical 
Displacement Extraction Based on Directional Features”, Pattern Recognition Letters, Vol. 19, No. 7, 
pp. 595-604. 
[5] A. B. Wang and K. C. Fan (2001) “Optical Recognition of Handwritten Chineses Character by 
Hierarchical Radical Matching Method”, Pattern Recognition, Vol. 34, No. 1, pp. 15-35. 
[6] H Kasuga, K. Sumida, K. Ohkawa and Y. Wada (2003) "A Deformed Character Generation By A 
Computational Handwriting Model And A Genetic Algorithm”, Information Processing Society Of 
Japan (IPSJ) Journal, Vol. 44, No. 9, pp. 2363-2373, 2003. 
[7] A. Cheung, M. Bennamoun and N. W. Bergmann (2001) “An Arabic OCR System Using 
Recognition-Based Segmentation”, Pattern Recognition, Vol. 34, No. 2, 2001, pp. 215- 233. 
[8] I. Methasate and S. Sae-tang (2004) "The Clustering Technique for Thai Handwriting Recognition", 
Proceedings of the 9th International Workshop on Frontiers in Handwriting Recognition, Tokyo, 
Japan, October 26-29. 
[9] A. Chatchinarat (2009) "Thai Handwriting Segmentation Using Proportional Invariant Recognition 
Technique", Proceedings of the International Conference on Future Computer and Communication, 
Kuala Lumpar, Malaysia, April 3-5, pp. 283 - 287. 
[10] R. Nopsuwanchai, A. Biem and W. F. Clocksin (2006) "Maximization of mutual information for 
offline Thai handwriting recognition", IEEE Transactions on Pattern Analysis and Machine 
Intelligence, Vol. 28, No. 8, pp. 1347-1351. 
[11] Yottamine Analytics, LLC, Analytics: The Machine Learning Advantage, 
http://yottamine.com/machine-learning-svm, 2011–2013 
[12] G. Wu (2013) “Why More Data and Simple Algorithms Beat Complex Analytics Models.” Wellesley 
Information Services. Retrieved October 17, 2013 from http://data-informed.com/why-more-data-and-simple- 
algorithms-beat-complex-analytics-models.
International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 5, No. 5, September 2014 
[13] M. Mori, A. Suzuki, A. Siho and S. Ohtsuka (2000) “Generating new samples from handwriting 
numerals based on point correspondence”, Proceedings of the 7th International Workshop on 
Frontiers of Handwriting Recognition, pp. 281-290. 
[14] S. Kambar (2005) “Generating synthetic data by morphing transformation for handwriting numeral 
92 
recognition (with v-SVM)”, Masters thesis, Concordia University. 
[15] Y. Buyoung, C. Kim, and S. Yang (2007) “Recognition of handwritten digit with transformed 
invariance distance”, Project Final Report, EECS 545 Machine Learning, 
http://web.eecs.umich.edu/~cscott/past_courses/eecs545f07/projects/KimYangYun.pdf. 
[16] Y. LeCun, C. Cortes, C. J. C. Burges (2013) "THE MNIST DATABASE of handwriting digits", 
Retrieved October 17, 2013 from http://yann.lecun.com/exdb/mnist/. 
Authors 
Sirisak Visessenee received a B.Sc degree from Thammasat University, Thailand. 
Currently, He is Master student in Computer Science in Thammasat University and works 
as teacher assistant in Computer Science department, Faculty of Science and Technology, 
Thammasat University. His research interests include Artificial Intelligent, Handwritten 
Recognition, and Machine Learning. 
Sanparith Marukatat received the PhD degree in computer science from the Paris 6 
University (Universite´ Pierre et Marie Curie), France, in 2004. His work concerned 
handwriting recognition and statistical models for sequence data. He is now with NECTEC, 
Thailand, where he works on machine learning methods for offline handwriting recognition 
and for speech recognition. 
Rachada Kongakchandra received the Ph.D. degree in electrical and computer engineering 
from King Mongkut’s University of Technology Thonburi, Thailand. Currently, she works 
as Assistant Professor at the Computer Science department, Faculty of Science and 
Technology, Thammasat University. Her research interests include Artificial Intelligent, 
Natural Language Processing, Semantic Processing, and Machine Learning.

More Related Content

What's hot

Dynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationDynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationeSAT Publishing House
 
Dynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationDynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationeSAT Journals
 
Scene text recognition in mobile applications by character descriptor and str...
Scene text recognition in mobile applications by character descriptor and str...Scene text recognition in mobile applications by character descriptor and str...
Scene text recognition in mobile applications by character descriptor and str...eSAT Journals
 
Recognition of Words in Tamil Script Using Neural Network
Recognition of Words in Tamil Script Using Neural NetworkRecognition of Words in Tamil Script Using Neural Network
Recognition of Words in Tamil Script Using Neural NetworkIJERA Editor
 
Character Recognition (Devanagari Script)
Character Recognition (Devanagari Script)Character Recognition (Devanagari Script)
Character Recognition (Devanagari Script)IJERA Editor
 
An Efficient Segmentation Technique for Machine Printed Devanagiri Script: Bo...
An Efficient Segmentation Technique for Machine Printed Devanagiri Script: Bo...An Efficient Segmentation Technique for Machine Printed Devanagiri Script: Bo...
An Efficient Segmentation Technique for Machine Printed Devanagiri Script: Bo...iosrjce
 
RECOGNITION OF HANDWRITTEN MEITEI MAYEK SCRIPT BASED ON TEXTURE FEATURE
RECOGNITION OF HANDWRITTEN MEITEI MAYEK SCRIPT BASED ON TEXTURE FEATURE RECOGNITION OF HANDWRITTEN MEITEI MAYEK SCRIPT BASED ON TEXTURE FEATURE
RECOGNITION OF HANDWRITTEN MEITEI MAYEK SCRIPT BASED ON TEXTURE FEATURE kevig
 
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...IJERD Editor
 
PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...
PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...
PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...ijesajournal
 
REDUCING THE COMPLEXITIES IN THE COGNITION OF ONTOLOGY KNOWLEDGE REPRESENTATION
REDUCING THE COMPLEXITIES IN THE COGNITION OF ONTOLOGY KNOWLEDGE REPRESENTATION REDUCING THE COMPLEXITIES IN THE COGNITION OF ONTOLOGY KNOWLEDGE REPRESENTATION
REDUCING THE COMPLEXITIES IN THE COGNITION OF ONTOLOGY KNOWLEDGE REPRESENTATION ijistjournal
 
PCA and DCT Based Approach for Face Recognition
PCA and DCT Based Approach for Face RecognitionPCA and DCT Based Approach for Face Recognition
PCA and DCT Based Approach for Face Recognitionijtsrd
 
A Hybrid method of face detection based on Feature Extraction using PIFR and ...
A Hybrid method of face detection based on Feature Extraction using PIFR and ...A Hybrid method of face detection based on Feature Extraction using PIFR and ...
A Hybrid method of face detection based on Feature Extraction using PIFR and ...IJERA Editor
 
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...Editor IJMTER
 
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...csandit
 
Ijartes v1-i2-001
Ijartes v1-i2-001Ijartes v1-i2-001
Ijartes v1-i2-001IJARTES
 
OCR-THE 3 LAYERED APPROACH FOR DECISION MAKING STATE AND IDENTIFICATION OF TE...
OCR-THE 3 LAYERED APPROACH FOR DECISION MAKING STATE AND IDENTIFICATION OF TE...OCR-THE 3 LAYERED APPROACH FOR DECISION MAKING STATE AND IDENTIFICATION OF TE...
OCR-THE 3 LAYERED APPROACH FOR DECISION MAKING STATE AND IDENTIFICATION OF TE...ijaia
 

What's hot (18)

Dynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationDynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentation
 
Dynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationDynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentation
 
Scene text recognition in mobile applications by character descriptor and str...
Scene text recognition in mobile applications by character descriptor and str...Scene text recognition in mobile applications by character descriptor and str...
Scene text recognition in mobile applications by character descriptor and str...
 
Isolated Kannada Character Recognition using Chain Code Features
Isolated Kannada Character Recognition using Chain Code FeaturesIsolated Kannada Character Recognition using Chain Code Features
Isolated Kannada Character Recognition using Chain Code Features
 
Recognition of Words in Tamil Script Using Neural Network
Recognition of Words in Tamil Script Using Neural NetworkRecognition of Words in Tamil Script Using Neural Network
Recognition of Words in Tamil Script Using Neural Network
 
Character Recognition (Devanagari Script)
Character Recognition (Devanagari Script)Character Recognition (Devanagari Script)
Character Recognition (Devanagari Script)
 
An Efficient Segmentation Technique for Machine Printed Devanagiri Script: Bo...
An Efficient Segmentation Technique for Machine Printed Devanagiri Script: Bo...An Efficient Segmentation Technique for Machine Printed Devanagiri Script: Bo...
An Efficient Segmentation Technique for Machine Printed Devanagiri Script: Bo...
 
RECOGNITION OF HANDWRITTEN MEITEI MAYEK SCRIPT BASED ON TEXTURE FEATURE
RECOGNITION OF HANDWRITTEN MEITEI MAYEK SCRIPT BASED ON TEXTURE FEATURE RECOGNITION OF HANDWRITTEN MEITEI MAYEK SCRIPT BASED ON TEXTURE FEATURE
RECOGNITION OF HANDWRITTEN MEITEI MAYEK SCRIPT BASED ON TEXTURE FEATURE
 
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
 
PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...
PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...
PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...
 
REDUCING THE COMPLEXITIES IN THE COGNITION OF ONTOLOGY KNOWLEDGE REPRESENTATION
REDUCING THE COMPLEXITIES IN THE COGNITION OF ONTOLOGY KNOWLEDGE REPRESENTATION REDUCING THE COMPLEXITIES IN THE COGNITION OF ONTOLOGY KNOWLEDGE REPRESENTATION
REDUCING THE COMPLEXITIES IN THE COGNITION OF ONTOLOGY KNOWLEDGE REPRESENTATION
 
PCA and DCT Based Approach for Face Recognition
PCA and DCT Based Approach for Face RecognitionPCA and DCT Based Approach for Face Recognition
PCA and DCT Based Approach for Face Recognition
 
C7 agramakirshnan2
C7 agramakirshnan2C7 agramakirshnan2
C7 agramakirshnan2
 
A Hybrid method of face detection based on Feature Extraction using PIFR and ...
A Hybrid method of face detection based on Feature Extraction using PIFR and ...A Hybrid method of face detection based on Feature Extraction using PIFR and ...
A Hybrid method of face detection based on Feature Extraction using PIFR and ...
 
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
 
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...
 
Ijartes v1-i2-001
Ijartes v1-i2-001Ijartes v1-i2-001
Ijartes v1-i2-001
 
OCR-THE 3 LAYERED APPROACH FOR DECISION MAKING STATE AND IDENTIFICATION OF TE...
OCR-THE 3 LAYERED APPROACH FOR DECISION MAKING STATE AND IDENTIFICATION OF TE...OCR-THE 3 LAYERED APPROACH FOR DECISION MAKING STATE AND IDENTIFICATION OF TE...
OCR-THE 3 LAYERED APPROACH FOR DECISION MAKING STATE AND IDENTIFICATION OF TE...
 

Viewers also liked

Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Chiranjeevi Adi
 
A Comprehensive Study On Handwritten Character Recognition System
A Comprehensive Study On Handwritten Character Recognition SystemA Comprehensive Study On Handwritten Character Recognition System
A Comprehensive Study On Handwritten Character Recognition Systemiosrjce
 
Language identification
Language identificationLanguage identification
Language identificationatulnitrkl
 
Script Identification Using MATLAB
Script Identification Using MATLABScript Identification Using MATLAB
Script Identification Using MATLABAnimesh Mishra
 
Automatic Language Identification
Automatic Language IdentificationAutomatic Language Identification
Automatic Language Identificationbigshum
 
Artificial Neural Network / Hand written character Recognition
Artificial Neural Network / Hand written character RecognitionArtificial Neural Network / Hand written character Recognition
Artificial Neural Network / Hand written character RecognitionDr. Uday Saikia
 

Viewers also liked (6)

Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks
 
A Comprehensive Study On Handwritten Character Recognition System
A Comprehensive Study On Handwritten Character Recognition SystemA Comprehensive Study On Handwritten Character Recognition System
A Comprehensive Study On Handwritten Character Recognition System
 
Language identification
Language identificationLanguage identification
Language identification
 
Script Identification Using MATLAB
Script Identification Using MATLABScript Identification Using MATLAB
Script Identification Using MATLAB
 
Automatic Language Identification
Automatic Language IdentificationAutomatic Language Identification
Automatic Language Identification
 
Artificial Neural Network / Hand written character Recognition
Artificial Neural Network / Hand written character RecognitionArtificial Neural Network / Hand written character Recognition
Artificial Neural Network / Hand written character Recognition
 

Similar to Handwriting Recognition Data Synthesis Using Structural Crossing-Over

Offline Character Recognition Using Monte Carlo Method and Neural Network
Offline Character Recognition Using Monte Carlo Method and Neural NetworkOffline Character Recognition Using Monte Carlo Method and Neural Network
Offline Character Recognition Using Monte Carlo Method and Neural Networkijaia
 
856200902 a06
856200902 a06856200902 a06
856200902 a06amosalade
 
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...CSCJournals
 
Dimensionality Reduction and Feature Selection Methods for Script Identificat...
Dimensionality Reduction and Feature Selection Methods for Script Identificat...Dimensionality Reduction and Feature Selection Methods for Script Identificat...
Dimensionality Reduction and Feature Selection Methods for Script Identificat...ITIIIndustries
 
Comparative Analysis of PSO and GA in Geom-Statistical Character Features Sel...
Comparative Analysis of PSO and GA in Geom-Statistical Character Features Sel...Comparative Analysis of PSO and GA in Geom-Statistical Character Features Sel...
Comparative Analysis of PSO and GA in Geom-Statistical Character Features Sel...IJERA Editor
 
FEATURES MATCHING USING NATURAL LANGUAGE PROCESSING
FEATURES MATCHING USING NATURAL LANGUAGE PROCESSINGFEATURES MATCHING USING NATURAL LANGUAGE PROCESSING
FEATURES MATCHING USING NATURAL LANGUAGE PROCESSINGIJCI JOURNAL
 
SENTIMENT ANALYSIS IN MYANMAR LANGUAGE USING CONVOLUTIONAL LSTM NEURAL NETWORK
SENTIMENT ANALYSIS IN MYANMAR LANGUAGE USING CONVOLUTIONAL LSTM NEURAL NETWORKSENTIMENT ANALYSIS IN MYANMAR LANGUAGE USING CONVOLUTIONAL LSTM NEURAL NETWORK
SENTIMENT ANALYSIS IN MYANMAR LANGUAGE USING CONVOLUTIONAL LSTM NEURAL NETWORKijnlc
 
Sentiment Analysis In Myanmar Language Using Convolutional Lstm Neural Network
Sentiment Analysis In Myanmar Language Using Convolutional Lstm Neural NetworkSentiment Analysis In Myanmar Language Using Convolutional Lstm Neural Network
Sentiment Analysis In Myanmar Language Using Convolutional Lstm Neural Networkkevig
 
Character Recognition using Data Mining Technique (Artificial Neural Network)
Character Recognition using Data Mining Technique (Artificial Neural Network)Character Recognition using Data Mining Technique (Artificial Neural Network)
Character Recognition using Data Mining Technique (Artificial Neural Network)Sudipto Krishna Dutta
 
A Survey of Modern Character Recognition Techniques
A Survey of Modern Character Recognition TechniquesA Survey of Modern Character Recognition Techniques
A Survey of Modern Character Recognition Techniquesijsrd.com
 
Recognition Of Handwritten Meitei Mayek Script Based On Texture Feature
Recognition Of Handwritten Meitei Mayek Script Based On Texture FeatureRecognition Of Handwritten Meitei Mayek Script Based On Texture Feature
Recognition Of Handwritten Meitei Mayek Script Based On Texture Featureijnlc
 
LEARNING SPLINE MODELS WITH THE EM ALGORITHM FOR SHAPE RECOGNITION
LEARNING SPLINE MODELS WITH THE EM ALGORITHM FOR SHAPE RECOGNITIONLEARNING SPLINE MODELS WITH THE EM ALGORITHM FOR SHAPE RECOGNITION
LEARNING SPLINE MODELS WITH THE EM ALGORITHM FOR SHAPE RECOGNITIONgerogepatton
 
Fractal analysis of good programming style
Fractal analysis of good programming styleFractal analysis of good programming style
Fractal analysis of good programming stylecsandit
 
FRACTAL ANALYSIS OF GOOD PROGRAMMING STYLE
FRACTAL ANALYSIS OF GOOD PROGRAMMING STYLEFRACTAL ANALYSIS OF GOOD PROGRAMMING STYLE
FRACTAL ANALYSIS OF GOOD PROGRAMMING STYLEcscpconf
 
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...IRJET Journal
 
FREEMAN CODE BASED ONLINE HANDWRITTEN CHARACTER RECOGNITION FOR MALAYALAM USI...
FREEMAN CODE BASED ONLINE HANDWRITTEN CHARACTER RECOGNITION FOR MALAYALAM USI...FREEMAN CODE BASED ONLINE HANDWRITTEN CHARACTER RECOGNITION FOR MALAYALAM USI...
FREEMAN CODE BASED ONLINE HANDWRITTEN CHARACTER RECOGNITION FOR MALAYALAM USI...acijjournal
 
Optical character recognition performance analysis of sif and ldf based ocr
Optical character recognition performance analysis of sif and ldf based ocrOptical character recognition performance analysis of sif and ldf based ocr
Optical character recognition performance analysis of sif and ldf based ocrcsandit
 
RECOGNITION OF CHEISING IYEK/EEYEK-MANIPURI DIGITS USING SUPPORT VECTOR MACHINES
RECOGNITION OF CHEISING IYEK/EEYEK-MANIPURI DIGITS USING SUPPORT VECTOR MACHINESRECOGNITION OF CHEISING IYEK/EEYEK-MANIPURI DIGITS USING SUPPORT VECTOR MACHINES
RECOGNITION OF CHEISING IYEK/EEYEK-MANIPURI DIGITS USING SUPPORT VECTOR MACHINESIJCSIT Journal
 
Analysis of machine learning algorithms for character recognition: a case stu...
Analysis of machine learning algorithms for character recognition: a case stu...Analysis of machine learning algorithms for character recognition: a case stu...
Analysis of machine learning algorithms for character recognition: a case stu...nooriasukmaningtyas
 

Similar to Handwriting Recognition Data Synthesis Using Structural Crossing-Over (20)

Offline Character Recognition Using Monte Carlo Method and Neural Network
Offline Character Recognition Using Monte Carlo Method and Neural NetworkOffline Character Recognition Using Monte Carlo Method and Neural Network
Offline Character Recognition Using Monte Carlo Method and Neural Network
 
856200902 a06
856200902 a06856200902 a06
856200902 a06
 
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
 
Dimensionality Reduction and Feature Selection Methods for Script Identificat...
Dimensionality Reduction and Feature Selection Methods for Script Identificat...Dimensionality Reduction and Feature Selection Methods for Script Identificat...
Dimensionality Reduction and Feature Selection Methods for Script Identificat...
 
Comparative Analysis of PSO and GA in Geom-Statistical Character Features Sel...
Comparative Analysis of PSO and GA in Geom-Statistical Character Features Sel...Comparative Analysis of PSO and GA in Geom-Statistical Character Features Sel...
Comparative Analysis of PSO and GA in Geom-Statistical Character Features Sel...
 
FEATURES MATCHING USING NATURAL LANGUAGE PROCESSING
FEATURES MATCHING USING NATURAL LANGUAGE PROCESSINGFEATURES MATCHING USING NATURAL LANGUAGE PROCESSING
FEATURES MATCHING USING NATURAL LANGUAGE PROCESSING
 
SENTIMENT ANALYSIS IN MYANMAR LANGUAGE USING CONVOLUTIONAL LSTM NEURAL NETWORK
SENTIMENT ANALYSIS IN MYANMAR LANGUAGE USING CONVOLUTIONAL LSTM NEURAL NETWORKSENTIMENT ANALYSIS IN MYANMAR LANGUAGE USING CONVOLUTIONAL LSTM NEURAL NETWORK
SENTIMENT ANALYSIS IN MYANMAR LANGUAGE USING CONVOLUTIONAL LSTM NEURAL NETWORK
 
Sentiment Analysis In Myanmar Language Using Convolutional Lstm Neural Network
Sentiment Analysis In Myanmar Language Using Convolutional Lstm Neural NetworkSentiment Analysis In Myanmar Language Using Convolutional Lstm Neural Network
Sentiment Analysis In Myanmar Language Using Convolutional Lstm Neural Network
 
Character Recognition using Data Mining Technique (Artificial Neural Network)
Character Recognition using Data Mining Technique (Artificial Neural Network)Character Recognition using Data Mining Technique (Artificial Neural Network)
Character Recognition using Data Mining Technique (Artificial Neural Network)
 
A Survey of Modern Character Recognition Techniques
A Survey of Modern Character Recognition TechniquesA Survey of Modern Character Recognition Techniques
A Survey of Modern Character Recognition Techniques
 
Recognition Of Handwritten Meitei Mayek Script Based On Texture Feature
Recognition Of Handwritten Meitei Mayek Script Based On Texture FeatureRecognition Of Handwritten Meitei Mayek Script Based On Texture Feature
Recognition Of Handwritten Meitei Mayek Script Based On Texture Feature
 
LEARNING SPLINE MODELS WITH THE EM ALGORITHM FOR SHAPE RECOGNITION
LEARNING SPLINE MODELS WITH THE EM ALGORITHM FOR SHAPE RECOGNITIONLEARNING SPLINE MODELS WITH THE EM ALGORITHM FOR SHAPE RECOGNITION
LEARNING SPLINE MODELS WITH THE EM ALGORITHM FOR SHAPE RECOGNITION
 
Fractal analysis of good programming style
Fractal analysis of good programming styleFractal analysis of good programming style
Fractal analysis of good programming style
 
FRACTAL ANALYSIS OF GOOD PROGRAMMING STYLE
FRACTAL ANALYSIS OF GOOD PROGRAMMING STYLEFRACTAL ANALYSIS OF GOOD PROGRAMMING STYLE
FRACTAL ANALYSIS OF GOOD PROGRAMMING STYLE
 
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
 
Telugu letters dataset and parallel deep convolutional neural network with a...
Telugu letters dataset and parallel deep convolutional neural  network with a...Telugu letters dataset and parallel deep convolutional neural  network with a...
Telugu letters dataset and parallel deep convolutional neural network with a...
 
FREEMAN CODE BASED ONLINE HANDWRITTEN CHARACTER RECOGNITION FOR MALAYALAM USI...
FREEMAN CODE BASED ONLINE HANDWRITTEN CHARACTER RECOGNITION FOR MALAYALAM USI...FREEMAN CODE BASED ONLINE HANDWRITTEN CHARACTER RECOGNITION FOR MALAYALAM USI...
FREEMAN CODE BASED ONLINE HANDWRITTEN CHARACTER RECOGNITION FOR MALAYALAM USI...
 
Optical character recognition performance analysis of sif and ldf based ocr
Optical character recognition performance analysis of sif and ldf based ocrOptical character recognition performance analysis of sif and ldf based ocr
Optical character recognition performance analysis of sif and ldf based ocr
 
RECOGNITION OF CHEISING IYEK/EEYEK-MANIPURI DIGITS USING SUPPORT VECTOR MACHINES
RECOGNITION OF CHEISING IYEK/EEYEK-MANIPURI DIGITS USING SUPPORT VECTOR MACHINESRECOGNITION OF CHEISING IYEK/EEYEK-MANIPURI DIGITS USING SUPPORT VECTOR MACHINES
RECOGNITION OF CHEISING IYEK/EEYEK-MANIPURI DIGITS USING SUPPORT VECTOR MACHINES
 
Analysis of machine learning algorithms for character recognition: a case stu...
Analysis of machine learning algorithms for character recognition: a case stu...Analysis of machine learning algorithms for character recognition: a case stu...
Analysis of machine learning algorithms for character recognition: a case stu...
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

Handwriting Recognition Data Synthesis Using Structural Crossing-Over

  • 1. International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 5, No. 5, September 2014 AUTOMATIC TRAINING DATA SYNTHESIS FOR HANDWRITING RECOGNITION USING THE STRUCTURAL CROSSING-OVER TECHNIQUE Sirisak Visessenee1,*, Sanparith Marukatat2, and Rachada Kongkachandra3 1,3 Department of Computer Science, Faculty of Science and Technology, Thammasat University, Klongluang, Patumthani, 12120, THAILAND. 2 Image Technology Lab., National Electronics and Computer Technology Center, Klongluang, Patumthani, 12120, THAILAND. ABSTRACT The paper presents a novel technique called “Structural Crossing-Over” to synthesize qualified data for training machine learning-based handwriting recognition. The proposed technique can provide a greater variety of patterns of training data than the existing approaches such as elastic distortion and tangent-based affine transformation. A couple of training characters are chosen, then they are analyzed by their similar and different structures, and finally are crossed over to generate the new characters. The experiments are set to compare the performances of tangent-based affine transformation and the proposed approach in terms of the variety of generated characters and percent of recognition errors. The standard MNIST corpus including 60,000 training characters and 10,000 test characters is employed in the experiments. The proposed technique uses 1,000 characters to synthesize 60,000 characters, and then uses these data to train and test the benchmark handwriting recognition system that exploits Histogram of Gradient: HOG as features and Support Vector Machine: SVM as recognizer. The experimental result yields 8.06% of errors. It significantly outperforms the tangent-based affine transformation and the original MNIST training data, which are 11.74% and 16.55%, respectively. KEYWORDS Distortion, Handwriting Recognition, Structural Crossing-Over Technique, Support Vector Machine, Training Data Synthesis 1. INTRODUCTION Handwriting recognition is a research field that is strongly associated with natural language processing. Its goal is to convert the character images into text that the computer can process. Although various input devices have been developed to provide facilities for users such as keyboard, mouse, digital pen, stylus, and touch screen, however, most people still prefer to write notes on paper with handwriting. To bring them into the computer, users have to waste their time typing them again. Therefore, the development of a handwriting recognition system allows users to easily record and can help bridge the gap between the skilled computer users and those who are not. In the past, there were a lot of successful researches on handwriting recognition with a high recognition accuracy 90% approximately. Various approaches have been applied in many languages such as English [1-3], Chinese [4,5], Japanese [6], Arabic [7] and Thai [8-10]. The big DOI : 10.5121/ijaia.2014.5507 85
  • 2. International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 5, No. 5, September 2014 problem with handwriting recognition research has come from the different handwriting patterns, which are characterized by a specific individual. Also, the handwriting of an individual can vary according to the different emotions and situations. The recognition method used in most research is divided into two main ways. 86 1. Recognition by the rules (Rule-based Recognition). 2. Recognition by machine learning (Machine Learning-based Recognition). For the first method, the rules are derived from the experts that are limited, which could not cover all the variety of characters. The second method is more popular because of the following benefits. • Sophisticated pattern recognition • Intelligent decisions • Self-modifying • Multiple iterations [11] However, the major problem of the machine learning approach is that the amount of quality training data is insufficient. Garrett Wu [12] said that if we have a lot of data, combined with a simple algorithm, it will be able to overcome a complex algorithm. The good recognizer comes from a good learner. The more experience the learner has, the better the learner is. In this paper, we present a novel technique to automatically synthesize training data for handwriting recognition systems. The paper is structured as follows: Section 2 mentions some existing approaches used to cure the limited training data problem. Section 3 proposes an idea, called the structural crossing-over. Section 4 mentions the experiment settings and their results. The discussion and conclusion are in the last section. 2. EXISTING APPROACHES SOLVING INSUFFICIENT TRAINING DATA There are many researchers attempting to improve the accuracy of handwriting recognition systems by concentrating on training data synthesis. In 2000, M. Mori, et al. [13] proposed a point correspondence technique to generate new samples. They assigned one character as template and then randomly chose a character from the training data set. The point correspondences between the two characters are projected. The generated characters are produced by varying parameters in the defined distortion function, as shown in Fig.1 (a). In 2005, Kambar, Sapargali [14] applied morphing transformation to generate synthetic data for handwritten numeral recognition. He randomly selected two characters from training data set, then three features, i.e. gradient, structural, and concavity, of each character are extracted. Finally, he applied morphing transformation to produce various characters forms, as illustrated in Fig. 1 (b). In 2007, Buyoung Yun, et al. [15] used different tangent vectors to represent different variations. They proposed eight tangent vectors for i.e. scaling, rotation, X-translation, Y-translation, parallel hyperbolic, diagonal hyperbolic, thickness and modified thickness. Figure 1 (c) illustrates the example of applying tangent vectors to the number “2”. Although the previous research succeeded in increasing the quantity of training data, they are limited in increasing the variety of patterns for training data.
  • 3. International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 5, No. 5, September 2014 87 (a) (b) (c) Figure 1. The generated numeric characters by previous researches 3. STRUCTURAL CROSSING-OVER TECHNIQUE Since the generated characters in the previous works are mostly derived from the source characters by considering the character structure of individual characters. Whether a character is distorted with different angles, its total structure is not much different from the original. In this paper, a couple of characters are selected, some common structures are extracted, the variations between two characters are considered, and finally some new hybrid characters are produced.
  • 4. International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 5, No. 5, September 2014 The steps in our proposed technique are demonstrated in Fig.2. There are four main steps i.e. preprocessing, crossing-over point finding, structure grouping, and character reproduction. 88 Figure 2. Steps in Structural Crossing-Over Technique 3.1 Preprocessing To generate the new training data, at least two characters are required. They are preprocessed by binarization and thinning, as shown in Fig.3. Figure 3. Preprocessing character by “Thinning” Figure 4. Crossing-Over Point Finding 3.2 Crossing-Over Point Finding This step is to find the common points between two characters. These points are called crossing-over points. Consider in Fig. 4, two original characters, L and R, are overlapped. The coordinate of L is set to (0,0) and the coordinate of R could be varied both in X and Y axis. The number of generated training data depends on the times and the gap size when two characters are overlapped. Each overlapping frame provides one or more intersection points. We then call it “crossing-over point”. In Fig.4, there are two points. These points are used as the separator therefore three fragments of each character are obtained. 3.3 Structure Grouping From step 3.2, the different fragments of each character are found. We believe that these various parts can yield various patterns of characters. However, if we make a combination by using these small fragments, some strange characters might occur. To make sure that the synthetic characters are the same as the original character, the structure of the character should be gained. Therefore, these fragments are then overlapped again to find the significant structure of each character. From
  • 5. International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 5, No. 5, September 2014 Fig. 5, six fragments i.e. L1,L2,L3,R1,R2,and R3 are overlapped and then output two main structures. Dilation process is then used to make the structures clear. 89 Figure 5. Structure Grouping Process 3.4 Characters Reproduction After the structure fragments of original characters are obtained, the character reproduction step is activated. The new characters are synthesized by using three parts i.e. one fragment from L, crossing-over points, and one fragment of R. The fragment L and R should have different structures. Figure 6 illustrated how new “3” are generated. The left “3” character is synthesized by combining the first structure in L, cross-over points, and the second structure in R while the right “3” uses the second structure in L, cross-over points, and the first structure in R. Finally, the dilation process is employed to enlarge the new characters. Figure 6. Character Reproduction Process 4. EXPERIMENTS AND RESULTS We hypothesize the proposed “Structural Crossing-over” technique can generate the new characters with a greater variety of patterns than the previous research works. We select the
  • 6. International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 5, No. 5, September 2014 tangent vectors with affine transformation [15] as benchmark. The comparison in terms of character patterns varieties and recognition accuracy are experimented. The standard corpus as MNIST [16] are employed. It includes 60,000 characters for training and 10,000 characters for testing. Figure 7 shows the appearances of new generated characters after using technique in [15] and our proposed technique. In Fig. 7 (a), ten characters in the right column are generated from the left character. Figure 7 (b) results the new generated characters derived from the proposed technique. The character patterns are more varied. 90 (a) (b) Figure 7. Comparative Synthetic Characters between the proposed technique and [15] With the assumption that if a handwriting recognition is trained by a huge variety of patterns as training data, the recognition accuracy would be increased. We set the experiments by building a benchmark handwriting recognition system that uses the Histogram of Gradient (HOG) as the character features and the Support Vector Machine (SVM) with linear Kernel function and one-against- all approach as multiclass classifier. The benchmark system is trained by 60,000 numeric characters and then is tested with the 10,000 characters from MNIST [15]. The % of recognition error is 16.55. Instead of using the total 60,000 characters for training, we synthesize the training data from 1,000 numeric characters from MNIST [15]. With the small set of training data, when we applied two synthesis approaches i.e. tangent and structural crossing-over, the % of recognition errors are significantly decreased. The experimental results in the 2nd through the 7th column are the % of recognition errors, which are trained by the synthesized training data vary from 10,000 through 60,000 characters. The proposed technique illustrated the outperformed results.
  • 7. International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 5, No. 5, September 2014 91 Table 1 Comparative Percent of Handwriting Recognition Errors proposed technique 5. CONCLUSION The paper presents a novel technique called “Structural Crossing-Over” to synthesize qualified data for training machine learning-based handwriting recognition. The proposed technique can provide a greater variety of patterns of training data than the existing approaches. The tangent vectors with affine transformation [15] are used as a competitive approach. The comparison in terms of character patterns varieties and recognition accuracy are experimented with the MNIST corpus [16]. The Support Vector Machine (SVM) with Histogram of Gradient (HOG) features, linear Kernel function and one-against-all approach for multiclass classification is implemented as a recognition system. The proposed technique can yield the outperformed results both in varieties and accuracy. REFERENCES [1] A. Graves and J. Schmidhuber (2009) “Offline handwriting recognition with multidimensional recurrent neural networks”, In D. Koller, D. Schuurmans, Y. Bengio, and L. Bottou, editors, Advances in Neural Information Processing Systems 21, MIT Press, pp. 545-552. [2] R. Kala, H. Vazirani, A. Shukla and R. Tiwari (2010) “Offline Handwriting Recognition using Genetic Algorithm”, IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 2, No 1, pp. 16-25. [3] D. K. Patel, T. Som, S. K. Yadav and M. K. Singh (2012) “Handwritten Character Recognition Using Multi-resolution Technique and Euclidean Distance Metric”, JSIP Journal of Signal and Information Processing, pp. 208-214. [4] Y. Mizukami (1998) “A Handwritten Chinese Character Recognition System Using Hierarchical Displacement Extraction Based on Directional Features”, Pattern Recognition Letters, Vol. 19, No. 7, pp. 595-604. [5] A. B. Wang and K. C. Fan (2001) “Optical Recognition of Handwritten Chineses Character by Hierarchical Radical Matching Method”, Pattern Recognition, Vol. 34, No. 1, pp. 15-35. [6] H Kasuga, K. Sumida, K. Ohkawa and Y. Wada (2003) "A Deformed Character Generation By A Computational Handwriting Model And A Genetic Algorithm”, Information Processing Society Of Japan (IPSJ) Journal, Vol. 44, No. 9, pp. 2363-2373, 2003. [7] A. Cheung, M. Bennamoun and N. W. Bergmann (2001) “An Arabic OCR System Using Recognition-Based Segmentation”, Pattern Recognition, Vol. 34, No. 2, 2001, pp. 215- 233. [8] I. Methasate and S. Sae-tang (2004) "The Clustering Technique for Thai Handwriting Recognition", Proceedings of the 9th International Workshop on Frontiers in Handwriting Recognition, Tokyo, Japan, October 26-29. [9] A. Chatchinarat (2009) "Thai Handwriting Segmentation Using Proportional Invariant Recognition Technique", Proceedings of the International Conference on Future Computer and Communication, Kuala Lumpar, Malaysia, April 3-5, pp. 283 - 287. [10] R. Nopsuwanchai, A. Biem and W. F. Clocksin (2006) "Maximization of mutual information for offline Thai handwriting recognition", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 28, No. 8, pp. 1347-1351. [11] Yottamine Analytics, LLC, Analytics: The Machine Learning Advantage, http://yottamine.com/machine-learning-svm, 2011–2013 [12] G. Wu (2013) “Why More Data and Simple Algorithms Beat Complex Analytics Models.” Wellesley Information Services. Retrieved October 17, 2013 from http://data-informed.com/why-more-data-and-simple- algorithms-beat-complex-analytics-models.
  • 8. International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 5, No. 5, September 2014 [13] M. Mori, A. Suzuki, A. Siho and S. Ohtsuka (2000) “Generating new samples from handwriting numerals based on point correspondence”, Proceedings of the 7th International Workshop on Frontiers of Handwriting Recognition, pp. 281-290. [14] S. Kambar (2005) “Generating synthetic data by morphing transformation for handwriting numeral 92 recognition (with v-SVM)”, Masters thesis, Concordia University. [15] Y. Buyoung, C. Kim, and S. Yang (2007) “Recognition of handwritten digit with transformed invariance distance”, Project Final Report, EECS 545 Machine Learning, http://web.eecs.umich.edu/~cscott/past_courses/eecs545f07/projects/KimYangYun.pdf. [16] Y. LeCun, C. Cortes, C. J. C. Burges (2013) "THE MNIST DATABASE of handwriting digits", Retrieved October 17, 2013 from http://yann.lecun.com/exdb/mnist/. Authors Sirisak Visessenee received a B.Sc degree from Thammasat University, Thailand. Currently, He is Master student in Computer Science in Thammasat University and works as teacher assistant in Computer Science department, Faculty of Science and Technology, Thammasat University. His research interests include Artificial Intelligent, Handwritten Recognition, and Machine Learning. Sanparith Marukatat received the PhD degree in computer science from the Paris 6 University (Universite´ Pierre et Marie Curie), France, in 2004. His work concerned handwriting recognition and statistical models for sequence data. He is now with NECTEC, Thailand, where he works on machine learning methods for offline handwriting recognition and for speech recognition. Rachada Kongakchandra received the Ph.D. degree in electrical and computer engineering from King Mongkut’s University of Technology Thonburi, Thailand. Currently, she works as Assistant Professor at the Computer Science department, Faculty of Science and Technology, Thammasat University. Her research interests include Artificial Intelligent, Natural Language Processing, Semantic Processing, and Machine Learning.