Numeral recognition is an important research direction in field of pattern recognition, and it has
broad application prospects. Aiming at four arithmetic operations of general printed formats, this article
adopts a multiple hybrid recognition method and is applied to automatically calculating. This method mainly
uses BP neural network and template matching method to distinguish the numerals and operators, in order
to increase the operation speed and recognition accuracy. Sample images of four arithmetic operations are
extracted from printed books, and they are used for testing the performance of proposed recognition
method. The experiments show that the method provides correct recognition rate of 96% and correct
calculation rate of 89%.
Text-Image Separation in Document Images using Boundary/Perimeter DetectionIDES Editor
Document analysis plays an important role in office
automation, especially in intelligent signal processing. The
proposed system consists of two modules: block segmentation
and block identification. In this approach, first a document is
segmented into several non-overlapping blocks by utilizing a
novel recursive segmentation technique, and then extracts
the features embedded in each segmented block are extracted.
Two kinds of features, connected components and image
boundary/perimeter features are extracted. Document with
text inside image pose limitations in earlier reported literature.
This is taken care of by applying additional pass of the Run
Length Smearing on the extracted image that contains text.
Proposed scheme is independent of type and language of the
document.
Texture based feature extraction and object trackingPriyanka Goswami
The project involved developing and implementing different texture analysis based extraction techniques like Local Binary Pattern (LBP), Local Derivative Pattern (LDP) and Local Ternary Pattern (LTP) in MATLAB and carrying out a comparative study by analyzing the effectiveness of each technique using a standard set of images (Yale data set). The most optimum technique is then applied to identify cloud patterns and track their motion (in pixel position changes) in time series images (acquired from weather satellites like GOES) using the Chi-Square Difference method.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Bangla Optical Digits Recognition using Edge Detection MethodIOSR Journals
Abstract:This paper is based on Bangla Optical Digit Recognition (ODR) by the Edge detection technique. In this method, Bangla digit image converted into gray-scale which distributed by an M by N array form. Here input data are considered off-line printed digit’s image which collected from computer generated image, scanned documents or printed text. After addressing the gray-scale image against a variable in the form of an M by N array, where the value of array pointers are shown 255 for total white space, 0 (zero) for total dark space and value between 255 and 0 for mix of white and dark space of the image. At the next process, four edgestouch points as well as each touch point’s ratio use as parameters to determine each Bangla digit uniquely. Keywords-Edge, image,gray-scale, Matrix,ODR.
Image to Text Converter PPT. PPT contains step by step algorithms/methods to which we can convert images in to text , specially contains algorithms for images which contains human handwritting, can convert writting in to text, img to text.
A Review of Optical Character Recognition System for Recognition of Printed Textiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Text-Image Separation in Document Images using Boundary/Perimeter DetectionIDES Editor
Document analysis plays an important role in office
automation, especially in intelligent signal processing. The
proposed system consists of two modules: block segmentation
and block identification. In this approach, first a document is
segmented into several non-overlapping blocks by utilizing a
novel recursive segmentation technique, and then extracts
the features embedded in each segmented block are extracted.
Two kinds of features, connected components and image
boundary/perimeter features are extracted. Document with
text inside image pose limitations in earlier reported literature.
This is taken care of by applying additional pass of the Run
Length Smearing on the extracted image that contains text.
Proposed scheme is independent of type and language of the
document.
Texture based feature extraction and object trackingPriyanka Goswami
The project involved developing and implementing different texture analysis based extraction techniques like Local Binary Pattern (LBP), Local Derivative Pattern (LDP) and Local Ternary Pattern (LTP) in MATLAB and carrying out a comparative study by analyzing the effectiveness of each technique using a standard set of images (Yale data set). The most optimum technique is then applied to identify cloud patterns and track their motion (in pixel position changes) in time series images (acquired from weather satellites like GOES) using the Chi-Square Difference method.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Bangla Optical Digits Recognition using Edge Detection MethodIOSR Journals
Abstract:This paper is based on Bangla Optical Digit Recognition (ODR) by the Edge detection technique. In this method, Bangla digit image converted into gray-scale which distributed by an M by N array form. Here input data are considered off-line printed digit’s image which collected from computer generated image, scanned documents or printed text. After addressing the gray-scale image against a variable in the form of an M by N array, where the value of array pointers are shown 255 for total white space, 0 (zero) for total dark space and value between 255 and 0 for mix of white and dark space of the image. At the next process, four edgestouch points as well as each touch point’s ratio use as parameters to determine each Bangla digit uniquely. Keywords-Edge, image,gray-scale, Matrix,ODR.
Image to Text Converter PPT. PPT contains step by step algorithms/methods to which we can convert images in to text , specially contains algorithms for images which contains human handwritting, can convert writting in to text, img to text.
A Review of Optical Character Recognition System for Recognition of Printed Textiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Detail description of feature extraction methods and classifier used for Texture Classification Approach. it also contain detail description of different Texture Database used for texture classification.
OCR for Gujarati Numeral using Neural Networkijsrd.com
This papers functions within to reduce individuality popularity (OCR) program for hand-written Gujarati research. One can find so much of work for Indian own native different languages like Hindi, Gujarati, Tamil, Bengali, Malayalam, Gurumukhi etc., but Gujarati is a vocabulary for which hardly any work is traceable especially for hand-written individuals. Here in this work a nerve program is provided for Gujarati hand-written research popularity. This paper deals with an optical character recognition (OCR) system for handwritten Gujarati numbers. A several break up food ahead nerve program is suggested for variation of research. The functions of Gujarati research are abstracted by four different details of research. Reduction and skew- changes are also done for preprocessing of hand-written research before their variation. This work has purchased approximately 81% of performance for Gujarati handwritten numerals.
A novel tool for stereo matching of imageseSAT Journals
Abstract Stereo matching techniques play an important role in many real world applications like robot stereo vision and image sequence analysis. From given pair of stereo pairs of images, it is possible to have matching techniques to obtain image descriptors or phenomena to compare the images. The goal of stereo matching can be achieved using either relational matching or feature or signal. However, the signal approach is most widely used. Recently Lemmens [10] provided a comprehensive review of many stereo matching techniques. In this paper we implement the techniques that can help in the real world. We build a prototype application that demonstrates the proof of concept. The empirical results revealed that the proposed application has good utility. Keywords – Stereo images, stereo matching,
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
A Review of Feature Extraction Techniques for CBIR based on SVMIJEEE
As with the advancement of multimedia technologies, users are not gratified with the conventional retrieval system techniques. So a application “Content Based Image Retrieval System” is introduced. CBIR is the application to retrieve the images or to search the digital images from the large database .The term “content” deals with the colour, shape, texture and all the information which is extracted from the image itself. This paper reviews the CBIR system which uses SVM classifier based algorithms for feature extraction phase.
A feature selection method for automatic image annotationinventionjournals
ABSTRACT: Automatic image annotation (AIA) is the bridge of high-level semantic information and the low-level feature. AIA is an effective method to resolve the problem of “Semantic Gap”. According to the intrinsic character of AIA, some common features are selected from the labeled images by multiple instance learning method. The feature selection method is applied into the task of automatic image annotation in this paper. Each keyword is analyzed hierarchically in low-granularity-level under the framework of feature selection. Through the common representative instances are mined, the semantic similarity of images can be effectively expressed and the better annotation results are able to be acquired, which testifies the effectiveness of the proposed annotation method. Gaussian mixture model is built by the selected feature method to characterize the labeled keyword. The experimental results illustrate the good perfromance of AIA.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Image type water meter character recognition based on embedded dspcsandit
In the paper, we combined DSP processor with image processing algorithm and studied the
method of water meter character recognition. We collected water meter image through camera
at a fixed angle, and the projection method is used to recognize those digital images. The
experiment results show that the method can recognize the meter characters accurately and
artificial meter reading is replaced by automatic digital recognition, which improves working
efficiency.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Fuzzy Region Merging Using Fuzzy Similarity Measurement on Image Segmentation IJECEIAES
Some image’s regions have unbalance information, such as blurred contour, shade, and uneven brightness. Those regions are called as ambiguous regions. Ambiguous region cause problem during region merging process in interactive image segmentation because that region has double information, both as object and background. We proposed a new region merging strategy using fuzzy similarity measurement for image segmentation. The proposed method has four steps; the first step is initial segmentation using mean-shift algorithm. The second step is giving markers manually to indicate the object and background region. The third step is determining the fuzzy region or ambiguous region in the images. The last step is fuzzy region merging using fuzzy similarity measurement. The experimental results demonstrated that the proposed method is able to segment natural images and dental panoramic images successfully with the average value of misclassification error (ME) 1.96% and 5.47%, respectively.
Automatic dominant region segmentation for natural imagescsandit
Image Segmentation segments an image into different homogenous regions. An efficient
semantic based image retrieval system divides the image into different regions separated by
color or texture sometimes even both. Features are extracted from the segmented regions and
are annotated automatically. Relevant images are retrieved from the database based on the
keywords of the segmented region In this paper, automatic image segmentation is proposed to
obtained dominant region of the input natural images. Dominant region are segmented and
results are obtained . Results are also recorded in comparison to JSEG algorithm
Segmentation and recognition of handwritten digit numeral string using a mult...ijfcstjournal
In this paper, the use of Multi-Layer Perceptron (MLP) Neural Network model is proposed for recognizing
unconstrained offline handwritten Numeral strings. The Numeral strings are segmented and isolated
numerals are obtained using a connected component labeling (CCL) algorithm approach. The structural
part of the models has been modeled using a Multilayer Perceptron Neural Network. This paper also
presents a new technique to remove slope and slant from handwritten numeral string and to normalize the
size of text images and classify with supervised learning methods. Experimental results on a database of
102 numeral string patterns written by 3 different people show that a recognition rate of 99.7% is obtained
on independent digits contained in the numeral string of digits includes both the skewed and slant data.
Detail description of feature extraction methods and classifier used for Texture Classification Approach. it also contain detail description of different Texture Database used for texture classification.
OCR for Gujarati Numeral using Neural Networkijsrd.com
This papers functions within to reduce individuality popularity (OCR) program for hand-written Gujarati research. One can find so much of work for Indian own native different languages like Hindi, Gujarati, Tamil, Bengali, Malayalam, Gurumukhi etc., but Gujarati is a vocabulary for which hardly any work is traceable especially for hand-written individuals. Here in this work a nerve program is provided for Gujarati hand-written research popularity. This paper deals with an optical character recognition (OCR) system for handwritten Gujarati numbers. A several break up food ahead nerve program is suggested for variation of research. The functions of Gujarati research are abstracted by four different details of research. Reduction and skew- changes are also done for preprocessing of hand-written research before their variation. This work has purchased approximately 81% of performance for Gujarati handwritten numerals.
A novel tool for stereo matching of imageseSAT Journals
Abstract Stereo matching techniques play an important role in many real world applications like robot stereo vision and image sequence analysis. From given pair of stereo pairs of images, it is possible to have matching techniques to obtain image descriptors or phenomena to compare the images. The goal of stereo matching can be achieved using either relational matching or feature or signal. However, the signal approach is most widely used. Recently Lemmens [10] provided a comprehensive review of many stereo matching techniques. In this paper we implement the techniques that can help in the real world. We build a prototype application that demonstrates the proof of concept. The empirical results revealed that the proposed application has good utility. Keywords – Stereo images, stereo matching,
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
A Review of Feature Extraction Techniques for CBIR based on SVMIJEEE
As with the advancement of multimedia technologies, users are not gratified with the conventional retrieval system techniques. So a application “Content Based Image Retrieval System” is introduced. CBIR is the application to retrieve the images or to search the digital images from the large database .The term “content” deals with the colour, shape, texture and all the information which is extracted from the image itself. This paper reviews the CBIR system which uses SVM classifier based algorithms for feature extraction phase.
A feature selection method for automatic image annotationinventionjournals
ABSTRACT: Automatic image annotation (AIA) is the bridge of high-level semantic information and the low-level feature. AIA is an effective method to resolve the problem of “Semantic Gap”. According to the intrinsic character of AIA, some common features are selected from the labeled images by multiple instance learning method. The feature selection method is applied into the task of automatic image annotation in this paper. Each keyword is analyzed hierarchically in low-granularity-level under the framework of feature selection. Through the common representative instances are mined, the semantic similarity of images can be effectively expressed and the better annotation results are able to be acquired, which testifies the effectiveness of the proposed annotation method. Gaussian mixture model is built by the selected feature method to characterize the labeled keyword. The experimental results illustrate the good perfromance of AIA.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Image type water meter character recognition based on embedded dspcsandit
In the paper, we combined DSP processor with image processing algorithm and studied the
method of water meter character recognition. We collected water meter image through camera
at a fixed angle, and the projection method is used to recognize those digital images. The
experiment results show that the method can recognize the meter characters accurately and
artificial meter reading is replaced by automatic digital recognition, which improves working
efficiency.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Fuzzy Region Merging Using Fuzzy Similarity Measurement on Image Segmentation IJECEIAES
Some image’s regions have unbalance information, such as blurred contour, shade, and uneven brightness. Those regions are called as ambiguous regions. Ambiguous region cause problem during region merging process in interactive image segmentation because that region has double information, both as object and background. We proposed a new region merging strategy using fuzzy similarity measurement for image segmentation. The proposed method has four steps; the first step is initial segmentation using mean-shift algorithm. The second step is giving markers manually to indicate the object and background region. The third step is determining the fuzzy region or ambiguous region in the images. The last step is fuzzy region merging using fuzzy similarity measurement. The experimental results demonstrated that the proposed method is able to segment natural images and dental panoramic images successfully with the average value of misclassification error (ME) 1.96% and 5.47%, respectively.
Automatic dominant region segmentation for natural imagescsandit
Image Segmentation segments an image into different homogenous regions. An efficient
semantic based image retrieval system divides the image into different regions separated by
color or texture sometimes even both. Features are extracted from the segmented regions and
are annotated automatically. Relevant images are retrieved from the database based on the
keywords of the segmented region In this paper, automatic image segmentation is proposed to
obtained dominant region of the input natural images. Dominant region are segmented and
results are obtained . Results are also recorded in comparison to JSEG algorithm
Segmentation and recognition of handwritten digit numeral string using a mult...ijfcstjournal
In this paper, the use of Multi-Layer Perceptron (MLP) Neural Network model is proposed for recognizing
unconstrained offline handwritten Numeral strings. The Numeral strings are segmented and isolated
numerals are obtained using a connected component labeling (CCL) algorithm approach. The structural
part of the models has been modeled using a Multilayer Perceptron Neural Network. This paper also
presents a new technique to remove slope and slant from handwritten numeral string and to normalize the
size of text images and classify with supervised learning methods. Experimental results on a database of
102 numeral string patterns written by 3 different people show that a recognition rate of 99.7% is obtained
on independent digits contained in the numeral string of digits includes both the skewed and slant data.
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...CSCJournals
Handwritten text and character recognition is a challenging task compared to recognition of handwritten numeral and computer printed text due to its large variety in nature. As practical pattern recognition problems uses bulk data and there is a one step self sufficient deterministic theory to resolve recognition problems by calculating inverse of Hessian Matrix and multiplication the inverse matrix it with first order local gradient vector. But in practical cases when neural network is large the inversing operation of the Hessian Matrix is not manageable and another condition must be satisfied the Hessian Matrix must be positive definite which may not be satishfied. In these cases some repetitive recursive models are taken. In several research work in past decade it was experienced that Neural Network based approach provides most reliable performance in handwritten character and text recognition but recognition performance depends upon some important factors like no of training samples, reliable features and no of features per character, training time, variety of handwriting etc. Important features from different types of handwriting are collected and are fed to the neural network for training. It is true that more no of features increases test efficiency but it takes longer time to converge the error curve. To reduce this training time effectively proper train algorithm should be chosen so that the system provides best train and test efficiency in least possible time that is to provide the system fastest intelligence. We have used several second order conjugate gradient algorithms for training of neural network. We have found that Scaled Conjugate Gradient Algorithm , a second order training algorithm as the fastest for training of neural network for our application. Training using SCG takes minimum time with excellent test efficiency. A scanned handwritten text is taken as input and character level segmentation is done. Some important and reliable features from each character are extracted and used as input to a neural network for training. When the error level reaches into a satisfactory level (10 -12 ) weights are accepted for testing a test script. Finally a lexicon matching algorithm solves the minor misclassification problems.
BLOB DETECTION TECHNIQUE USING IMAGE PROCESSING FOR IDENTIFICATION OF MACHINE...ijiert bestjournal
Optical character recognition systems have been effectively developed for the recognition of p rinted characters. Optical character recognition is an awesome computer vision technique with various applications ranging from saving real time scripts digitally and deriving context based intelligence using natural language processing from the texts. One such application is the recognition of machine printed characters. This paper illustrates the technique to identify machine printed characters using Blob detection method and Image processing. In many cases of such machine printed characters there is simi larity between character colour and background colour. There is mix up of reflected light and scattered light. Colour is not consistent across character area or background area. Paper explains how Blob detection technique is used for recognition of these m achines printed characters.
Tracking number plate from vehicle usingijfcstjournal
In Traffic surveillance, Tracking of the number plate from the vehicle is an important task, which demands
intelligent solution. In this document, extraction and Recognization of number plate from vehicles image
has been done using Matlab. It is assumed that images of the vehicle have been captured from Digital
Camera. Alphanumeric Characters on plate has been Extracted and recognized using template images of
alphanumeric characters.
This paper presents a new algorithm in MATLAB which has been used to extract the number plate from the
vehicle in various luminance conditions. Extracted image of the number plate can be seen in a text file for
verification purpose. Number plate identification is helpful in finding stolen cars, car parking management
system and identification of vehicle in traffic.
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...ijtsrd
The inclusion of time based queries in video indexing application is enables by the recognition of time and date stamps in CCTV video. In this paper, we propose the system for reconstructing the path of the object in surveillance cameras based on time and date optical character recognition system. Since there is no boundary in region for time and date, Discrete Cosine Transform DCT method is applied in order to locate the region area. After the region for time and date is located, it is segmented and then features for the symbols of the time and date are extracted. Back propagation neural network is used for recognition of the features and then stores the result in the database. By using the resulted database, the system reconstructs the path for the object based on time. The proposed system will be implemented in MATLAB. Pyae Phyo Thu | Mie Mie Tin | Ei Phyu Win | Cho Thet Mon "Reconstructing the Path of the Object based on Time and Date OCR in Surveillance System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27981.pdfPaper URL: https://www.ijtsrd.com/home-science/education/27981/reconstructing-the-path-of-the-object-based-on-time-and-date-ocr-in-surveillance-system/pyae-phyo-thu
IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of mechanical and civil engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in mechanical and civil engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Optical Character Recognition from Text ImageEditor IJCATR
Optical Character Recognition (OCR) is a system that provides a full alphanumeric recognition of printed or handwritten
characters by simply scanning the text image. OCR system interprets the printed or handwritten characters image and converts it into
corresponding editable text document. The text image is divided into regions by isolating each line, then individual characters with
spaces. After character extraction, the texture and topological features like corner points, features of different regions, ratio of
character area and convex area of all characters of text image are calculated. Previously features of each uppercase and lowercase
letter, digit, and symbols are stored as a template. Based on the texture and topological features, the system recognizes the exact
character using feature matching between the extracted character and the template of all characters as a measure of similarity.
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Editor IJCATR
A technique for enhancing decompressed fingerprint image using Wiener2 filter is proposed. First compression is done by sparse representation. Compression of fingerprint is necessary for reducing the memory consumption and efficient transfer of fingerprint images. This is very essential for the application which includes access control and forensics. So the fingerprint image is compressed using sparse representation. In this technique, first dictionary is constructed for patches of fingerprint images. Then a fingerprint is selected and the coefficients are obtained and encoded. Thus the compressed fingerprint is obtained. But when the fingerprint is reconstructed, it is affected by noise. So Wiener2 filter is used to filter the noise in the image. The ridge and bifurcation count is extracted from decompressed and enhanced fingerprints. The experiment result shows that the enhanced fingerprint image preserves more bifurcation than decompressed fingerprint image. The future analysis can be considered for preserving ridges.
Comparative study of two methods for Handwritten Devanagari Numeral RecognitionIOSR Journals
Abstract : In this paper two different methods for Numeral Recognition are proposed and their results are
compared. The objective of this paper is to provide an efficient and reliable method for recognition of
handwritten numerals. First method employs Grid based feature extraction and recognition algorithm. In this
method the features of the image are extracted by using grid technique and this feature set is then compared
with the feature set of database image for classification. While second method contains Image Centroid Zone
and Zone Centroid Zone algorithms for feature extraction and the features are applied to Artificial Neural
Network for recognition of input image. Machine text recognition is important research area because of its
applications in many areas like Bank, Post office, Hospitals etc.
Keywords: Handwritten Numeral Recognition, Grid Technique, ANN, Feature Extraction, Classification.
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
In this paper, snake optimization algorithm (SOA) is used to find the optimal gains of an enhanced controller for controlling congestion problem in computer networks. M-file and Simulink platform is adopted to evaluate the response of the active queue management (AQM) system, a comparison with two classical controllers is done, all tuned gains of controllers are obtained using SOA method and the fitness function chose to monitor the system performance is the integral time absolute error (ITAE). Transient analysis and robust analysis is used to show the proposed controller performance, two robustness tests are applied to the AQM system, one is done by varying the size of queue value in different period and the other test is done by changing the number of transmission control protocol (TCP) sessions with a value of ± 20% from its original value. The simulation results reflect a stable and robust behavior and best performance is appeared clearly to achieve the desired queue size without any noise or any transmission problems.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
2. TELKOMNIKA ISSN: 1693-6930
Recognition Technology for Four Arithmetic Operations (Wang Meng)
307
module and recognition module. Image preprocessing module conducts image by a series of
transformations, and then send the sample feature vector, finally extracted to digital
identification system, then identify them and give the results [8].
The main research of this paper is to explore a new method for automatic calculation
based on recognition technology. Because arithmetic operation is composed of Arabic numerals
and operator signs, numbers recognition algorithm must be extended in order to have the
recognition function of operation signs. Therefore, this paper proposed a recognition algorithm
that realizes recognizing four arithmetic operations, which can be used for intelligent calculating
based on recognition technology. Applying this recognition technology for four arithmetic
operations is to complete two parts of recognition task, those are: numeral recognition and
operator recognition. In our work, we have two phases for four arithmetic operations recognition.
Firstly, according to the structural characters, we extract and classify the operator signs from the
operation. Then we identify the rest numerals through numeral recognition algorism. The work
of numeral recognition is mainly implemented by using BP neural network and template
matching method. Training of BP neural network occurs before the trained system is
implemented in numerals recognition. When the recognition of network is failed, program will
enter into template matching procedures. By this, we both make use of neural network
recognition algorithm to reduce computing time, and take advantage of template matching
algorithm to improve the recognition rate.
The structure of this paper is as follows: section 2 presents some steps of image
preprocessing, which will be used in this paper. In Section 3, details of BP neural network
recognition and template matching method are presented. Their respective advantages are also
analyzed and compared. Section 4 presents the process of our proposed recognition system,
and provided the experiments. We discuss our results and comment on their comparisons.
Section 5 concludes this paper.
2. Image Preprocessing
Image preprocessing is the transform processing of image and the preparation of image
analysis. The purpose is to make the image more concise, more unique. The text, remain to be
recognized, is always from scanned printed or handwritten image files. Generally, the image will
be affected by the illumination, paper and so on. These factors will lead to distortion and stains.
So we need to exclude the interference, and extract useful information.
2.1. Filtering
Filtering process is used to clean up the image from any redundant feature points,
which mainly take the form of either a curve joining an end point with a branch or a cross point;
or a small loop joining two branch points [9]. This paper adopts the median filtering method for
image smoothly filtering. In this way, it not only eliminates the noise in the image, but also
preserves image edge. At the same time, the signal-to-noise ratio of image is improved.
Median filtering is used similar to an averaging filter, in that each output pixel is set to an
average of the pixel values in the neighborhood of the corresponding input pixel [10]. First of all,
gray value of i-th pixel within the template (window) is arranged from small to large like as:
inikii xxxx 21 (1)
Then the intermediate value can be calculated as:
},,,,{)( )1(21 inniii xxxxMedif . (2)
So, )(if is chosen as the mean value, and this value is regarded as the output of the
filter value. In the strong disturbing of pepper type (or pulse), median filtering can remove
interference, because the mean value forces the gray value of interfering points to become
close to gray value of the adjacent pixels points adjacent values.
In this paper, we used every pixel as the center to constitute the window of 3×3, and the
filtering process is as shown in Figure 1.
3. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 1, March 2017 : 306 – 313
308
(a)
(b)
(c)
Figure 1. Filtering process, (a) Original image, (b) Adding salt and pepper noise,
(c) Filtering and thresholding
2.2. Dividing
Character segmentation is an operation that seeks to decompose an image of a
sequence of characters into sub images of individual symbols [11]. Dividing is to make it
convenient for further processing of single characters separately. Papers [12-14] present
several dividing methods according to different situations.
Considering the characters are printed form with relatively fixed way of writing, there are
at least one row or column background pixels between neighboring characters. According to this
characteristic, we can adopt the dividing method based on projection.
2.3. Thinning
The stroke width of original scanned characters is generally several pixels. Thinning is
to retain important pixel of a character, remove irrelevant pixel, and get the stroke skeleton
character. The stroke skeleton is usually a single pixel width, which is enough to describe the
structure of the character. We call this image of a single pixel stroke with skeleton vividly, and
the process of obtaining skeleton is called thinning [15]. This paper uses the classic Hilditch
thinning algorithm.
Hilditch algorithm, different from the method of look-up table, under certain judgment,
directly operates in the program. According to the operation result, the algorithm will determine
whether delete this point or not. The thinning result is shown in Figure 2.
(a)
(b)
Figure 2. Thinning process
(a) Before thinning, (b) After thinning
Figure 3. Coarse Grid Character
2.4. Feature Extraction
Feature extraction plays a very important role in all pattern recognition systems. In the
past years, many feature extraction techniques have been proposed for handwritten number
recognition [16]. The recognition rate is decided by the reliability of the extracted features.
This paper extracts coarse grid characters as character’s feature. Through above
preprocessing steps, we normalize each character to a 21×15 lattice. The 21×15 lattices will be
separated into 35 parts, and each part contains 9 pixels as shown in Figure 3. For each
character, the algorithm will scan from left to right, from top to bottom line by line, and count the
statistics of each section’s highlights points.
Through grid division, we can extract 35 feature values which embody the
characteristics of preprocessed character. These values construct feature vector, and will be put
into recognition program.
3. Basic Theories of BP Neural Network Recognition and Template Matching Method
4. TELKOMNIKA ISSN: 1693-6930
Recognition Technology for Four Arithmetic Operations (Wang Meng)
309
Neural network recognition and template matching method are two kinds of recognition
methods. They are frequently used. They both have their own advantages. For neural network,
trained network used for recognition saves computing time, while for template matching method,
it always have higher accuracy.
3.1. BP Neural Network Recognition
BP Ann usually has learning and recognizing process. There are two phases of positive
transmitting processing and error reverse transmitting processing in the learn processing of BP
Ann. In the recognizing process, the signal only propagates forward, and recognition result is
given from the output layer.
For a practical neural network, if its structure is relatively simple, the ability of network
may be not enough to apply to the actual solution. If its structure is complex, corresponding
network computation quantity increases largely. At the same time, the generalization capability
of the network may not get corresponding improvement.
In this paper, neural network is realized by using a 3-layer neural network. The structure
is shown in Figure 4.
1x
2x
ijw jw
1
2
3
36
35x
1y
2y
3y
4y
Figure 4. Neural Network Structure
The input layer has 35 neurons, and they respectively correspond to the values from
feature vector ],,[ 3521 xxxp . The output layer has 4 neurons whose output values
construct a matrix vector ],,,[ 4321 yyyyt . 1y , 2y , 3y and 4y can form a four bit binary code,
which has 16 kinds of combinations. Here we use 14 kinds of them. These 14 combinations
respectively represent numerals (0-9) and operator signs (+, -, ×, and ÷).
Original images scanned from books printed by different fonts are collected. Each
character has 20 kinds of samples. In order to eliminate the samples of the same or similar
circumstances, we choose different fonts as training samples as far as possible. The image
preprocessing method mentioned in last chapter is adopted to get training samples. We extract
the feature vector to represent each character, and finally normalize the vector. Table 1 shows
the target vector of each character.
In the learning stage, input sample enters the network through the input layer, and then
will participate in calculating process from hidden units to output units. During this process,
neurons’ state of each layer only influences the neurons’ state of next layer. After the forward
process, current output and expected output are compared. If they are not equal, the process
will get into the back propagation procedure and correspondingly modify the connection weights
between the neurons. After several adjustments and iterative approach, error will approaches to
a minimum value.
In the recognizing stage, we extract the feature vector of character that remains to be
recognized, and input the data to trained network. According to the output of network, we can
judge which class the character belongs to.
5. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 1, March 2017 : 306 – 313
310
Table 1. Characters and Corresponding Target Vector
character Target vector character Target vector
1 [-0.95,-0.95,-0.95,0.95] 8 [0.95,-0.95,-0.95,-0.95]
2 [-0.95,-0.95,0.95,-0.95] 9 [0.95,-0.95,-0.95,0.95]
3 [-0.95,-0.95,0.95,0.95] 0 [0.95,-0.95,0.95,-0.95]
4 [-0.95,0.95,-0.95,-0.95] + [0.95,-0.95,0.95,0.95]
5 [-0.95,0.95,-0.95,0.95] - [0.95,0.95,-0.95,-0.95]
6 [-0.95,0.95,0.95,-0.95] × [0.95,0.95,-0.95,0.95]
7 [-0.95,0.95,0.95,0.95] ÷ [0.95,0.95,0.95,-0.95]
3.2. Template Matching Method
Among various pattern recognitions, template matching classification is one kind of
classical methods. Its mathematical model is easy to set up. This method treats all samples in
the training set as the standard samples. The test sample to be recognized will be compared
with the standard samples one by one. According to the classification discriminate function, the
category of most similar and closest standard sample is chosen as category of the test sample.
In the statistical approach, a pattern is represented by a set of N-dimensional feature
vector and the decision making process is determined by a similarity measure such as a
distance metric or a discriminate function [17]. In this paper, we will use shortest distance
between the feature vectors as the discriminate function.
For one test sample ],,[ 21 NxxxX and standard sample ],,[ 21 iNiii xxxX ,
where 141 i , the discriminate function can be express as:
2/1
1
2
))((
N
k
ikki xxD (3)
By comparison of all the distance values, the category corresponding to the minus value
is the final decision.
The template matching method is simple to realize and have higher accuracy than
neural network. However, it requires strong storage capacity and costs large amount of
computing time. This is because the stored templates may be a lot, so the storage amount is
quite large. Moreover, each test sample is required to calculate a distance value with every
standard template, so large amount of calculation should be done.
For BP neural network recognition, after finishing training the network, the recognition
result can be obtained according to the output layer directly. The information of training samples
has been recorded in the connection weights between neurons. This kind of network, used for
recognition, costs less computing time.
Considering the advantages and disadvantages of the two recognition methods
respectively, we combine the two methods to achieve better recognition performance and higher
efficiency. Firstly, BP neural network is used to recognize the test four arithmetic operations.
The recognition results of characters can directly made by the trained network, if the output of
network meets the following formula:
4
1
95.0
i
iy (4)
Where is a set small threshold. Otherwise, the characters are defined as unrecognized or
error identification character. Then the unrecognized characters will be reidentified by the
template matching recognition program.
4. Application to the Four Arithmetic Operations
Our work aims at applying the research to automatically calculating of four arithmetic
operations. To take into account the requirements of recognition reliability and the response
time, we employ a multiple hybrid recognition method.
6. TELKOMNIKA ISSN: 1693-6930
Recognition Technology for Four Arithmetic Operations (Wang Meng)
311
4.1. Recognition Process
After preprocessing, each character in arithmetic expression is normalized to a unified
form, which is convenient for the feature extraction and the following process. Then they will be
treated by a set of processes. The recognition process is shown in Figure 5.
The first step is to distinguish the operator signs from the arithmetic expression. The
structure characteristics of operator signs are obviously different from numerals, so we can
extract the operator signs first. Moreover, the characteristics of each operator sign vary so
greatly that we can use simple feature matching method to recognize them.
Figure
preprocessing
Network
recognition for
this numeral
Recognize the
operator based on
structure feature
Template
matching method
Rejection
End
yes
no
yes
yes
no
no
Is the character
operator sign
Is recognition
successful ?
Is matching
successful ?
Figure 5. Recognition Process of Proposed Method
The second step is to use trained BP neural network for the recognition of numerals.
Feature vector of a numeral is fed into network. The output vector of network is ],,,[ 4321 yyyy ,
where 95.0iy , 4,3,2,1i . Through experiments, we found that once iy is not
approximately equal to 0.95, network will often give wrong recognition result. Furthermore, the
lager the error signal 95.0iy is, the higher the incorrect rate is. In order to decrease the
incorrect rate, we consider the numeral whose output vector does not meet the inequality
4
1
95.0
i
iy as unrecognized character. At the same time, we think network recognition
algorithm is not successful.
In the third step, template matching recognition program will reidentify the unrecognized
character. Each standard template is compared with the sample to be recognized, and the most
similar is chosen as the result of recognition. This method needs large storage capacity, and
costs large amount of calculating time, so only when network recognition method is failed, it will
be used.
4.2. Experiment Results and Comparative Analysis
In order to evaluate the performance of the proposed method, we carry out four groups
of experiments. In the first group, we use conventional BP neural network recognition method
that was mentioned in papers [5-6]. Test character image is fed into recognition system. The
system makes the decision according to the output vector of network. The recognition result is
show in Table 2. Then we conduct the experiment using the method of combining template
matching [17] and neural network, which is one of steps in our proposed method. If the result of
7. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 1, March 2017 : 306 – 313
312
network is not reasonable, process will get into template matching program. The recognition
result is show in table 3. The third group is to use the proposed method. First step is to exact
the operator characters from arithmetic expression. Then we use the method of combining
neural network and template matching method to identify 10 numerals. The recognition result is
show in Table 4. These three groups of experiment are aiming at identifying a single character.
Each group had 100 tests.
Table 2. Result of traditional BP neural network method
Character Correct Error Rejection Character Correct Error Rejection
1 76 24 0 8 63 37 0
2 66 34 0 9 82 18 0
3 71 29 0 0 60 40 0
4 55 45 0 + 41 59 0
5 59 41 0 - 35 65 0
6 89 11 0 × 82 18 0
7 75 25 0 ÷ 70 30 0
According to Table 2, by using traditional neural network method, correct recognition
rate of characters is lower than 70% on average. Comparing tables 3-4 with Table 2, we can
find that using the method of multiple hybrid recognition obviously improve accuracy rate of
recognition. Comparing Table 4 with Table 3, we can see the method of separately identifying
operator characters and numerals improve the recognition rate for operation characters. The
proposed recognition method has the recognition rate of 96% on average for single character.
Considering the proposed recognition method has better performance, we conduct the
fourth group experiment that is applied to recognize four arithmetic operations and automatically
calculate it. We first take prepared identification program to identify the numerals and operators
from the photos, and then according to the rules of four arithmetic operations, the program
automatically calculates the result. We extract the test figures from book of different paper
conditions. In each figure, the number of characters is between 3 and 5 randomly. One hundred
tests are conducted for each condition. The result is shown in table 5. It shows that much of the
recognition accuracy has to do with the paper condition. But for common books, it has correct
rate of 89%.
Table 5. Test on different paper
Paper condition Correct Error Rejection
clean books 93 5 2
regular books 89 7 4
old books 83 10 7
Comparing to a single character’s correct recognition rate of 96%, the recognition
system applied to four arithmetic operations automatically calculating performs relatively poor.
That is because the prerequisite of correctly calculating is to correctly recognize all the
characters in four arithmetic operations. So the longer the operation expression is, the lower the
correct rate is.
5. Conclusion
In this paper, we develop a multiple hybrid recognition method, and apply it to four
arithmetic operations automatically calculating. We first introduce the image preprocessing
steps, and discuss two kinds of classical recognition method. Then we combine these two
methods in the system in order to improve recognition performance. In the proposed recognition
system, operator signs and numerals are identified by using different recognition methods. The
recognition result achieved by the proposed hybrid method is more reliable than that by
traditional neural network method alone. Experiments also demonstrate that the proposed
recognition method still keeps high accuracy, when it is applied to four arithmetic operations
calculating.
8. TELKOMNIKA ISSN: 1693-6930
Recognition Technology for Four Arithmetic Operations (Wang Meng)
313
It is obvious that different paper condition will affect the recognition accuracy. In our
future work, we will adopt some more effective image preprocessing approaches in order to
adapt to different conditions. We will try to employ the experience of other advanced recognition
algorithm to optimize our proposed recognition method.
References
[1] L Yang, HL Sun, W Liang, HJ Yuan, JX Li. Numeral Recognition Based on Projective Invariants. The
6th International Forum on Strategic Technology. 2011: 1078-1081.
[2] ZJ Zhang, GH Chen, JW Li, YL Ma, N Ju. The Research on Digit Recognition Algorithm for Automatic
Meter Reading System. Proceedings of the 8th World Congress on Intelligent Control and
Automation. 2010: 5399-5403.
[3] Y Wen, Y Lu, PF Shi. Handwritten Bangla Numeral Recognition System and Its Application to Postal
Automation. Pattern Recognition. 2007; 40(1): 99-107.
[4] CD Zhang, XN Huang. Off-line Handwritten Digit Recognition Based on Improved BP Artificial Neural
Network. IEEE International Conference on Service Operations and Logistics, and Informatics. 2008;
1: 626-629.
[5] G Sarker, M Besra, S Dhua. A Malsburg Learning Back Propagation Combination for Handwritten
Alpha Numeral Recognition. Computer Engineering and Applications, IEEE. 2015: 493-498.
[6] Z Liu, L Li, M Yu. An Algorithm of Handwritten Digital Recognition Based on BP-Bagging.
International Conference on Information Technology and Management Innovation. 2015: 1164-1168.
[7] D Mellouli, TM Hamdani, AM Alimi. Deep Neural Network with RBF and Sparse Auto-encoders for
Numeral Recognition. International Conference on Intelligent Systems Design and Applications, IEEE.
2015: 468-472.
[8] B Lu, YL Wang. Overview of Handwritten Numeral Recognition Based on BP Neural Network.
International Conference on Computer Science and Network Technology. 2011: 1502-1505.
[9] A Elnagar, F Al-Kharousi, S Harous. Recognition of Handwritten Hindi Numerals using Structural
Descriptors. IEEE International Conference on Computational Cybernetics and Simulation. 1997; 2:
983-988.
[10] V Radha, M Krishnaveni. Threshold Based Segmentation Using Median Filter for Sign Language
Recognition System. World Congress on Nature & Biologically Inspired Computing. 2009: 1394-1399.
[11] RG Casey, E Lecolinet. A survey of Methods and Strategies in Character Segmentation. IEEE
Transactions on Pattern Analysis and Machine Intelligence. 1996; 18(7): 690-706.
[12] A Rahman, B Verma. Effect of Ensemble Classifier Composition on Offline Cursive Character
Recognition. Information Processing and Management. 2013; 49: 852-864.
[13] GH Zhang, ZY Xiong, K Li, CY Xing, SY Xia. A Novel Image Segmentation Algorithm Based on
Graph Cut Optimization Problem. TELKOMNIKA Telecommunication, Computing, Electronics and
Control. 2015; 13(4): 1337-1342.
[14] J Zhang, CJ Xie, LT Song, R Li, HB Chen. Robust Image Segmentation Using LBP Embedded
Region Merging. TELKOMNIKA Telecommunication, Computing, Electronics and Control. 2016;
14(1): 368-377.
[15] YR Du, B Xie, LP Wang. Thinning Algorithm of Binary Image Based on Improved Templates. Applied
Mechanics and Materials. 2014; 543(54): 2547-2550.
[16] WL Shen, CW Hsien. Effective Multiple-features Extraction for Off-line SVM-Based Handwritten
Numeral Recognition. International Conference on Information Security and Intelligence Control.
2012; 194-197.
[17] L Sukhan, JC Pan. Unconstrained Handwritten Numeral Recognition Based on Radial Basis
Competitive and Cooperative Networks with Spatio-Temporal Feature Representation. IEEE
Transactions on Neural Networks. 1996; 7(2): 455-474.