Artificial Neural Network and its Applicationsshritosh kumar
Abstract
This report is an introduction to Artificial Neural
Networks. The various types of neural networks are
explained and demonstrated, applications of neural
networks like ANNs in medicine are described, and a
detailed historical background is provided. The
connection between the artificial and the real thing is
also investigated and explained. Finally, the
mathematical models involved are presented and
demonstrated.
A Parallel Framework For Multilayer Perceptron For Human Face RecognitionCSCJournals
Artificial neural networks have already shown their success in face recognition and similar complex pattern recognition tasks. However, a major disadvantage of the technique is that it is extremely slow during training for larger classes and hence not suitable for real-time complex problems such as pattern recognition. This is an attempt to develop a parallel framework for the training algorithm of a perceptron. In this paper, two general architectures for a Multilayer Perceptron (MLP) have been demonstrated. The first architecture is All-Class-in-One-Network (ACON) where all the classes are placed in a single network and the second one is One-Class-in-One-Network (OCON) where an individual single network is responsible for each and every class. Capabilities of these two architectures were compared and verified in solving human face recognition, which is a complex pattern recognition task where several factors affect the recognition performance like pose variations, facial expression changes, occlusions, and most importantly illumination changes. Experimental results show that the proposed OCON structure performs better than the conventional ACON in terms of network training convergence speed and which can be easily exercised in a parallel environment.
Artificial Neural Network and its Applicationsshritosh kumar
Abstract
This report is an introduction to Artificial Neural
Networks. The various types of neural networks are
explained and demonstrated, applications of neural
networks like ANNs in medicine are described, and a
detailed historical background is provided. The
connection between the artificial and the real thing is
also investigated and explained. Finally, the
mathematical models involved are presented and
demonstrated.
A Parallel Framework For Multilayer Perceptron For Human Face RecognitionCSCJournals
Artificial neural networks have already shown their success in face recognition and similar complex pattern recognition tasks. However, a major disadvantage of the technique is that it is extremely slow during training for larger classes and hence not suitable for real-time complex problems such as pattern recognition. This is an attempt to develop a parallel framework for the training algorithm of a perceptron. In this paper, two general architectures for a Multilayer Perceptron (MLP) have been demonstrated. The first architecture is All-Class-in-One-Network (ACON) where all the classes are placed in a single network and the second one is One-Class-in-One-Network (OCON) where an individual single network is responsible for each and every class. Capabilities of these two architectures were compared and verified in solving human face recognition, which is a complex pattern recognition task where several factors affect the recognition performance like pose variations, facial expression changes, occlusions, and most importantly illumination changes. Experimental results show that the proposed OCON structure performs better than the conventional ACON in terms of network training convergence speed and which can be easily exercised in a parallel environment.
Neural network based numerical digits recognization using nnt in matlabijcses
Artificial neural networks are models inspired by human nervous system that is capable of learning. One of
the important applications of artificial neural network is character Recognition. Character Recognition
finds its application in number of areas, such as banking, security products, hospitals, in robotics also.
This paper is based on a system that recognizes a english numeral, given by the user, which is already
trained on the features of the numbers to be recognized using NNT (Neural network toolbox) .The system
has a neural network as its core, which is first trained on a database. The training of the neural network
extracts the features of the English numbers and stores in the database. The next phase of the system is to
recognize the number given by the user. The features of the number given by the user are extracted and
compared with the feature database and the recognized number is displayed.
Artificial Neural Networks: Applications In ManagementIOSR Journals
With the advancement of computer and communication technology, the tools used for management decisions have undergone a gigantic change. Finding the more effective solution and tools for managerial problems is one of the most important topics in the management studies today. Artificial Neural Networks (ANNs) are one of these tools that have become a critical component for business intelligence. The purpose of this article is to describe the basic behavior of neural networks as well as the works done in application of the same in management sciences and stimulate further research interests and efforts in the identified topics.
Abstract— This presents a comprehensible neural network tree (CNNTREE). CNNTREE is a proposed general modular neural network structure, where each node in this tree is a comprehensible expert neural network (CENN). One advantage of using CNNTREE is that it is a “gray box”; because it can be interpreted easily for symbolic systems; where each node in the CNNTREE is equivalent for symbolic operator in the symbolic system. Another advantage of CNNTREE is that it could be trained as any normal multi layer feed forward neural network. An evolutionary algorithm is given for designing the CNNTREE. Back propagation is also checked as local learning algorithm that fits for real time learning constraints. The tree generalization and training performance are examined using experiments with a digit recognition problem.
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...ijasuc
There is a vast amount of researched literature available on Route Finding and Link Establishment in
MANET protocols based on various concepts such as “pro-active”, “reactive”, “power awareness”,
“cross-layering” etc. Most of these techniques are rather restrictive, taking into account a few of the
several aspects that go into effective route establishment. When we look at practical implementations of
MANETs, we have to take into account various factors in totality, not in isolation. The several factors that
decide and influence the routing have to be considered as a whole in the difficult task of finding the best
solution in route finding and optimization. The inputs to the system are manifold and apparently unrelated.
Most of the parameters are imprecise or non-crisp in nature. The uncertainty and imprecision lead to think
that intelligent routing techniques are essential and important in evolving robust and dependable solutions
to route finding. The obvious method by which this can be achieved is the deployment of soft computing
techniques such as Neural Nets, Fuzzy Logic and Genetic algorithms. Neural Networks help us to solve the
complex problem of transforming the inputs to outputs without apriori knowledge of what the relationship
is between inputs and outputs. Fuzzy Logic helps us to deal with imprecise and ill-conditioned data.
Genetic Algorithms help us to select the best possible solution from the solution space in an optimal sense.
Our paper presented here below seeks to explore new horizons in this direction. The results of our
experimentation have been very satisfactory and we have achieved the goal of optimal route finding to a
large extent. There is of course considerable room for further refinements.
A systematic review on sequence-to-sequence learning with neural network and ...IJECEIAES
We develop a precise writing survey on sequence-to-sequence learning with neural network and its models. The primary aim of this report is to enhance the knowledge of the sequence-to-sequence neural network and to locate the best way to deal with executing it. Three models are mostly used in sequence-to-sequence neural network applications, namely: recurrent neural networks (RNN), connectionist temporal classification (CTC), and attention model. The evidence we adopted in conducting this survey included utilizing the examination inquiries or research questions to determine keywords, which were used to search for bits of peer-reviewed papers, articles, or books at scholastic directories. Through introductory hunts, 790 papers, and scholarly works were found, and with the assistance of choice criteria and PRISMA methodology, the number of papers reviewed decreased to 16. Every one of the 16 articles was categorized by their contribution to each examination question, and they were broken down. At last, the examination papers experienced a quality appraisal where the subsequent range was from 83.3% to 100%. The proposed systematic review enabled us to collect, evaluate, analyze, and explore different approaches of implementing sequence-to-sequence neural network models and pointed out the most common use in machine learning. We followed a methodology that shows the potential of applying these models to real-world applications.
Neural network based numerical digits recognization using nnt in matlabijcses
Artificial neural networks are models inspired by human nervous system that is capable of learning. One of
the important applications of artificial neural network is character Recognition. Character Recognition
finds its application in number of areas, such as banking, security products, hospitals, in robotics also.
This paper is based on a system that recognizes a english numeral, given by the user, which is already
trained on the features of the numbers to be recognized using NNT (Neural network toolbox) .The system
has a neural network as its core, which is first trained on a database. The training of the neural network
extracts the features of the English numbers and stores in the database. The next phase of the system is to
recognize the number given by the user. The features of the number given by the user are extracted and
compared with the feature database and the recognized number is displayed.
Artificial Neural Networks: Applications In ManagementIOSR Journals
With the advancement of computer and communication technology, the tools used for management decisions have undergone a gigantic change. Finding the more effective solution and tools for managerial problems is one of the most important topics in the management studies today. Artificial Neural Networks (ANNs) are one of these tools that have become a critical component for business intelligence. The purpose of this article is to describe the basic behavior of neural networks as well as the works done in application of the same in management sciences and stimulate further research interests and efforts in the identified topics.
Abstract— This presents a comprehensible neural network tree (CNNTREE). CNNTREE is a proposed general modular neural network structure, where each node in this tree is a comprehensible expert neural network (CENN). One advantage of using CNNTREE is that it is a “gray box”; because it can be interpreted easily for symbolic systems; where each node in the CNNTREE is equivalent for symbolic operator in the symbolic system. Another advantage of CNNTREE is that it could be trained as any normal multi layer feed forward neural network. An evolutionary algorithm is given for designing the CNNTREE. Back propagation is also checked as local learning algorithm that fits for real time learning constraints. The tree generalization and training performance are examined using experiments with a digit recognition problem.
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...ijasuc
There is a vast amount of researched literature available on Route Finding and Link Establishment in
MANET protocols based on various concepts such as “pro-active”, “reactive”, “power awareness”,
“cross-layering” etc. Most of these techniques are rather restrictive, taking into account a few of the
several aspects that go into effective route establishment. When we look at practical implementations of
MANETs, we have to take into account various factors in totality, not in isolation. The several factors that
decide and influence the routing have to be considered as a whole in the difficult task of finding the best
solution in route finding and optimization. The inputs to the system are manifold and apparently unrelated.
Most of the parameters are imprecise or non-crisp in nature. The uncertainty and imprecision lead to think
that intelligent routing techniques are essential and important in evolving robust and dependable solutions
to route finding. The obvious method by which this can be achieved is the deployment of soft computing
techniques such as Neural Nets, Fuzzy Logic and Genetic algorithms. Neural Networks help us to solve the
complex problem of transforming the inputs to outputs without apriori knowledge of what the relationship
is between inputs and outputs. Fuzzy Logic helps us to deal with imprecise and ill-conditioned data.
Genetic Algorithms help us to select the best possible solution from the solution space in an optimal sense.
Our paper presented here below seeks to explore new horizons in this direction. The results of our
experimentation have been very satisfactory and we have achieved the goal of optimal route finding to a
large extent. There is of course considerable room for further refinements.
A systematic review on sequence-to-sequence learning with neural network and ...IJECEIAES
We develop a precise writing survey on sequence-to-sequence learning with neural network and its models. The primary aim of this report is to enhance the knowledge of the sequence-to-sequence neural network and to locate the best way to deal with executing it. Three models are mostly used in sequence-to-sequence neural network applications, namely: recurrent neural networks (RNN), connectionist temporal classification (CTC), and attention model. The evidence we adopted in conducting this survey included utilizing the examination inquiries or research questions to determine keywords, which were used to search for bits of peer-reviewed papers, articles, or books at scholastic directories. Through introductory hunts, 790 papers, and scholarly works were found, and with the assistance of choice criteria and PRISMA methodology, the number of papers reviewed decreased to 16. Every one of the 16 articles was categorized by their contribution to each examination question, and they were broken down. At last, the examination papers experienced a quality appraisal where the subsequent range was from 83.3% to 100%. The proposed systematic review enabled us to collect, evaluate, analyze, and explore different approaches of implementing sequence-to-sequence neural network models and pointed out the most common use in machine learning. We followed a methodology that shows the potential of applying these models to real-world applications.
Neural Network and Artificial Intelligence.
Neural Network and Artificial Intelligence.
WHAT IS NEURAL NETWORK?
The method calculation is based on the interaction of plurality of processing elements inspired by biological nervous system called neurons.
It is a powerful technique to solve real world problem.
A neural network is composed of a number of nodes, or units[1], connected by links. Each linkhas a numeric weight[2]associated with it. .
Weights are the primary means of long-term storage in neural networks, and learning usually takes place by updating the weights.
Artificial neurons are the constitutive units in an artificial neural network.
WHY USE NEURAL NETWORKS?
It has ability to Learn from experience.
It can deal with incomplete information.
It can produce result on the basis of input, has not been taught to deal with.
It is used to extract useful pattern from given data i.e. pattern Recognition etc.
Biological Neurons
Four parts of a typical nerve cell :• DENDRITES: Accepts the inputs• SOMA : Process the inputs• AXON : Turns the processed inputs into outputs.• SYNAPSES : The electrochemical contactbetween the neurons.
ARTIFICIAL NEURONS MODEL
Inputs to the network arerepresented by the x1mathematical symbol, xn
Each of these inputs are multiplied by a connection weight , wn
sum = w1 x1 + ……+ wnxn
These products are simplysummed, fed through the transfer function, f( ) to generate a result and then output.
NEURON MODEL
Neuron Consist of:
Inputs (Synapses): inputsignal.Weights (Dendrites):determines the importance ofincoming value.Output (Axon): output toother neuron or of NN .
Pattern Recognition using Artificial Neural NetworkEditor IJCATR
An artificial neural network (ANN) usually called neural network. It can be considered as a resemblance to a paradigm
which is inspired by biological nervous system. In network the signals are transmitted by the means of connections links. The links
possess an associated way which is multiplied along with the incoming signal. The output signal is obtained by applying activation to
the net input NN are one of the most exciting and challenging research areas. As ANN mature into commercial systems, they are likely
to be implemented in hardware. Their fault tolerance and reliability are therefore vital to the functioning of the system in which they
are embedded. The pattern recognition system is implemented with Back propagation network and Hopfield network to remove the
distortion from the input. The Hopfield network has high fault tolerance which supports this system to get the accurate output.
Artificial neural network for machine learninggrinu
An Artificial Neurol Network (ANN) is a computational model. It is based on the structure and functions of biological neural networks. It works like the way human brain processes information. ANN includes a large number of connected processing units that work together to process information. They also generate meaningful results from it.
This article aims to classify texts and predict the categories of occurrences, through the study of Artificial Intelligence models, using Machine Learning and Deep Learning for the classification of texts and analysis of predictions, suggesting the best option with the smallest error.
The solution was designed to be implemented in two stages: Machine Learning and Application, according to the diagram below from the Data Science Academy.
The paper is based on feed forward neural network (FFNN) optimization by particle swarm intelligence (PSI) used to provide initial weights and biases to train neural network. Once the weights and biases are found using Particle swarm optimization (PSO) with neural network used as training algorithm for specified epoch, the same are used to train the neural network for training and classification of benchmark problems. Further the approach is tested for offline signature classifications. A comparison is made between normal FFNN with random weights and biases and FFNN with particle swarm optimized weights and biases. Firstly, the performance is tested on two benchmark databases for neural network, The Breast Cancer Database and the Diabetic Database. Result shows that neural network performs better with initial weights and biases obtained by Particle Swarm optimization. The network converges faster with PSO obtained initial weights and biases for FFNN and classification accuracy is increased.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Tamil Character Recognition based on Back Propagation Neural Networks
1. Neural Computing and Applications
Special Issue on Theory and Applications of Neural Computation
Vol. 13, Issue 1, April 2004, pp. 121-135 121
Tamil Character Recognition based on Back
Propagation Neural Networks
P.S.Jagadeesh Kumar
Department of Computer Science and Engineering
Annamalai University, Chidambaram, Tamil Nadu, India
psj.kumar@gmail.com
Abstract. In this manuscript, a neural network based classifier using optical
character recognition engine for Tamil language is proposed. At the first level,
features derived at each sample point of the preprocessed character are used to
construct a subspace using Optical Character Recognition (OCR) software.
Recognition of the test sample is performed using a neural network based
classifier. Based on the analysis of the proposed method, it was identified that
Tamil character recognition was optimal and the implementation reduces the
coding complexity to a greater extent. The proposed method can be used to
recognize any language characters but in the current work only Tamil characters
were tested for recognition. As a future enhancement, implementation of speech
processing can be used to identify the classified characters to visually impaired
persons for ease. The proposed method can be recycled to resolve confusions
between triplets and quadruples of similar characters. The same technique could
be carried out not only for individual character recognition but also for words.
Keywords: Optical Character Recognition, Neural Network, Tamil language,
Feature matrix, Character Switching, Nearest neighbor classifier, Character
grid, Neural network based classifier
1 Introduction
Tamil is a popular classical language spoken by a significant population in south East
Asian countries. There are 156 distinct symbols in Tamil. For the recognition of
Tamil characters, earlier methods use class specific subspaces and employed elastic
matching schemes as in hidden markov models for recognition of Tamil characters. In
this paper, a neural network based classifier using optical character recognition engine
is proposed. For the first level of classification, Optical character recognition [1]
algorithm for the extraction of features from Tamil characters in a subspace was
implemented. For the classification of a test character, a neural network based
classifier is employed. It is an established fact that one way of assessing the
performance of any given classifier depends on how well it can perform on an
unknown test sample [2]. The nearest neighbor classifier in the first stage fails to
capture finer nuances between certain structural shapes that form the basic cues in
2. Tamil Character Recognition based on Back Propagation Neural Networks 122
making certain characters distinct. To further improve the classification accuracy of
the system, it becomes imperative to design a robust, neural network classification
scheme to distinguish between visually similar misclassified characters.
2 Neural Networks
Neural networks are typically organized in layers. Layers are made up of a number
of interconnected 'nodes' which contain an 'activation function'. Patterns are
presented to the network via the 'input layer', which communicates to one or more
'hidden layers' where the actual processing is done via a system of weighted
'connections'. The hidden layers then link to an 'output layer' where the answer is
output as shown in Fig.1. Most ANNs contain some form of 'learning rule' which
modifies the weights of the connections according to the input patterns that it is
presented with. In a sense, ANNs learn by example as do their biological
counterparts; a child learns to recognize dogs from examples of dogs. Although
there are many different kinds of learning rules used by neural networks, this
demonstration is concerned only with one; the delta rule. The delta rule is often
utilized by the most common class of ANNs called 'back propagation neural
networks' (BPNNs).
Back propagation is an abbreviation for the backwards propagation of error. With
the delta rule, as with other types of back propagation, 'learning' is a supervised
process that occurs with each cycle or 'epoch' (i.e. each time the network is
presented with a new input pattern) through a forward activation flow of outputs,
and the backwards error propagation of weight adjustments.
Fig. 1. Layers in Neural Network
More simply, when a neural network is initially presented with a pattern it makes a
random 'guess' as to what it might be. It then sees how far its answer was from the
actual one and makes an appropriate adjustment to its connection weights. Back
propagation performs a gradient descent within the solution's vector space towards a
'global minimum' along the steepest vector of the error surface. The error surface
itself is a hyper paraboloid but is seldom 'smooth'. Indeed, in most problems, the
3. Neural Computing and Applications,
Special Issue on Theory and Applications of Neural Computation (2004) 123
solution space is quite irregular with numerous 'pits' and 'hills' which may cause the
network to settle down in a 'local minimum' which is not the best overall solution.
Since the nature of the error space cannot be known a prioi, neural network analysis
often requires a large number of individual runs to determine the best solution. Most
learning rules have built- in mathematical terms to assist in this process which control
the 'speed' (Beta-coefficient) and the 'momentum' of the learning. The speed of
learning is actually the rate of convergence between the current solution and the
global minimum. Momentum helps the network to overcome obstacles (local minima)
in the error surface and settle down at or near the global minimum [3, 7].
Once a neural network is 'trained' to a satisfactory level it may be used as an
analytical tool on other data. To do this, the user no longer specifies any training runs
and instead allows the network to work in forward propagation mode only. New
inputs are presented to the input pattern where they filter into and are processed by the
middle layers as though training were taking place, however, at this point the output is
retained and no back propagation occurs. The output of a forward propagation run is
the predicted model for the data which can then be used for further analysis and
interpretation. It is also possible to over-train a neural network, which means that the
network has been trained exactly to respond to only one type of input; which is much
like rote memorization. If this should happen then learning can no longer occur and
the network is referred to as having been "grand mothered" in neural network jargon.
In real-world applications this situation is not very useful since one would need a
separate grand mothered network for each new kind of input.
There are many advantages and limitations to neural network analysis and to discuss
this subject properly, should be looked at each individual type of network, which isn't
necessary for this general discussion. Depending on the nature of the application and
the strength of the internal data patterns you can generally expect a network to train
quite well. This applies to problems where the relationships may be quite dynamic or
non-linear. ANNs provide an analytical alternative to conventional techniques which
are often limited by strict assumptions of normality, linearity, variable independence
etc. Because an ANN can capture many kinds of relationships it allows the user to
quickly and relatively easily model phenomena which otherwise may have been very
difficult or impossible to explain otherwise. In reference to back propagation
networks however, there are some specific issues potential users should be aware of.
Back propagation neural networks (and many other types of networks) are in a sense
the ultimate 'black boxes'. Apart from defining the general architecture of a network
and perhaps initially seeding it with a random numbers, the user has no other role than
to feed it input and watch it train and await the output. In fact, it has been said that
with back propagation, "you almost don't know what you're doing". Some software
freely available software packages do allow the user to sample the networks
progresses at regular time intervals, but the learning itself progresses on its own. The
final product of this activity is a trained network that provides no equations or
coefficients defining a relationship (as in regression) beyond its own internal
mathematics. The network 'IS' the final equation of the relationship. Back propagation
networks also tend to be slower to train than other types of networks and sometimes
require thousands of epochs. If run on a truly parallel computer system this issue is
not really a problem, but if the BPNN is being simulated on standard serial machine
4. Tamil Character Recognition based on Back Propagation Neural Networks 124
(i.e. a single SPARC, Mac or PC) training can take some time. This is because the
machines CPU must compute the function of each node and connection separately,
which can be problematic in very large networks with a large amount of data.
However, the speed of most current machines is such that this is typically not much of
an issue.
3 Optical Character Recognition
The mechanical or electronic conversion of typewritten or printed text into machine-
encoded text is called Optical Character Recognition (OCR). It is widely used as a
form of data entry from printed paper data records, whether passport documents,
invoices, bank statements, computerized receipts, business cards, mail, printouts of
static-data, or any suitable documentation. It is a common method of digitizing
printed texts so that it can be electronically edited, searched, stored more compactly,
displayed on-line, and used in machine processes such as machine translation, text-
to-speech, key data and text mining. OCR is a field of research in pattern recognition,
artificial intelligence and computer vision [2]. Early versions needed to be trained
with images of each character, and worked on one font at a time. Advanced systems
capable of producing a high degree of recognition accuracy for most fonts are now
common. Some systems are capable of reproducing formatted output that closely
approximates the original page including images, columns, and other non-textual
components. Early optical character recognition may be traced to technologies
involving telegraphy and creating reading devices for the blind. In 1914, Emanuel
Goldberg developed a machine that read characters and converted them into standard
telegraph code. Concurrently, Edmund Fournier d'Albe developed the Optophone, a
handheld scanner that when moved across a printed page, produced tones that
corresponded to specific letters or characters. In the late 1920s and into the 1930s
Emanuel Goldberg developed what he called a "Statistical Machine" for searching
microfilm archives using an optical code recognition system. In 1931 he was granted
USA Patent number 1,838,389 for the invention. The patent was acquired by IBM.
4 Tamil Language
Tamil belongs to the southern branch of the Dravidian languages, a family of around
26 languages native to the Indian subcontinent. It is also classified as being part of a
Tamil language family, which alongside Tamil proper, also includes the languages of
about 35 ethno-linguistic groups such as the Irula and Yerukula languages. The
closest major relative of Tamil is Malayalam; the two began diverging around the 9th
century. Although many of the differences between Tamil and Malayalam
demonstrate a pre-historic split of the western dialect, the process of separation into a
distinct language, Malayalam, was not completed until sometime in the 13th or 14th
century. According to Hindu legend, Tamil, or in personification form Tamil Tāy
(Mother Tamil), was created by Shiva. Shiva's Son, Lord Murugan, known as Lord
Kartikeya in other Indian languages, and the sage Agastya brought it to people [4].
5. Neural Computing and Applications,
Special Issue on Theory and Applications of Neural Computation (2004) 125
Tamil phonology is characterized by the presence of retroflex consonants and
multiple rhotics. Tamil does not distinguish phonologically between voiced and
unvoiced consonants; phonetically, voice is assigned depending on a consonant's
position in a word. Tamil phonology permits few consonant clusters, which can never
be word initial. Native grammarians classify Tamil phonemes into vowels,
consonants, and a "secondary character", the āytam. The vocabulary of Tamil is
mainly Dravidian. A strong sense of linguistic purism is found in Modern Tamil,
which opposes the use of foreign loanwords. Nonetheless, a number of words used in
classical and modern Tamil are loanwords from the languages of neighboring groups.
In more modern times, Tamil has imported words from Urdu and Marathi, reflecting
groups that have influenced the Tamil area at various points of time, and from
neighboring languages such as Telugu, Kannada, and Sinhala. During the modern
period, words have also been adapted from European languages, such as Portuguese,
French, and English.
The strongest impact of purism in Tamil has been on words taken from Sanskrit.
During its history, Tamil, along with other languages like Telugu, Kannada,
Malayalam etc., was influenced by Sanskrit in terms of vocabulary, grammar and
literary styles, reflecting the trend of Sanskritisation in the Tamil country. Tamil
vocabulary never became quite as heavily sanskritised as that of the other Dravidian
languages, and unlike in those languages, it was and remains possible to express
complex ideas (including in science, art, religion and law) without the use of Sanskrit
loan words. In addition, Sanskritisation was actively resisted by a number of authors
of the late medieval period, culminating in the 20th century in a movement called
taṉit tamiḻ iyakkam (meaning "pure Tamil movement"), led by Parithimaar Kalaignar
and Maraimalai Adigal, which sought to remove the accumulated influence of
Sanskrit on Tamil. As a result of this, Tamil in formal documents, literature and
public speeches has seen a marked decline in the use Sanskrit loan words in the past
few decades, under some estimates having fallen from 40–50% to about 20%. As a
result, the Prakrit and Sanskrit loan words used in modern Tamil are, unlike in some
other Dravidian languages, restricted mainly to some spiritual terminology and
abstract nouns. In the 20th century, institutions and learned bodies have, with
government support, generated technical dictionaries for Tamil containing neologisms
and words derived from Tamil roots to replace loan words from English and other
languages [5].
5 Implementation
The proposed method is realized with the help of MATLAB Simulink environment.
The MATLAB high-performance language for technical computing integrates
computation, visualization, and programming in an easy-to-use environment where
problems and solutions are expressed in familiar mathematical notation. MATLAB is
a high-level technical computing language and interactive environment for algorithm
development, data visualization, data analysis, and numeric computation. Using the
MATLAB product, one can solve technical computing problems faster than with
traditional programming languages, such as C, C++, and FORTRAN. MATLAB can
6. Tamil Character Recognition based on Back Propagation Neural Networks 126
be used in a wide range of applications, including signal and image processing,
communications, control design, test and measurement, financial modeling and
analysis, and computational biology. It include features like high-level language for
technical computing, development environment for managing code, files, and data,
interactive tools for iterative exploration, design, and problem solving, mathematical
functions for linear algebra, statistics, Fourier analysis, filtering, optimization, and
numerical integration, 2-D and 3-D graphics functions for visualizing data and tools
for building custom graphical user interfaces, Tamil character to be recognized is
given as the input. Initially the Tamil character is converted to grayscale and the
grayscale image is converted into binary image in-order to make it convenient for pre-
processing. Most of the recognition and classification techniques require the data to
be in a predefined type and format which satisfy several requirements like size,
quality, and invariance. These requirements are generally not met in the case of
regional languages, because of many factors such as noise during digitalizing,
irregularity, and styles variations. Preprocessing is performed to overcome these
problems by performing smoothing, point clustering and dehooking. First smoothing
is performed using low pass filter algorithm to reduce noise and remove imperfection
caused by acquisition device. Point clustering is then performed in order to eliminate
redundant points by averaging the neighboring points. Dehooking is the final
preprocessing procedure to eliminate the part of the stroke which contains hooks
which are commonly encountered at the strokes ends. The input characters are
sampled to 60 points and feature matrix is formed. The matrix is then transformed
into 8 subspaces using OCR. There are two basic types of core OCR algorithm, which
may produce a ranked list of candidate characters. Matrix matching involves
comparing an image to a stored glyph on a pixel-by-pixel basis; it is also known as
pattern matching, pattern recognition or image correlation. This relies on the input
glyph being correctly isolated from the rest of the image, and on the stored glyph
being in a similar font and at the same scale. This technique works best with
typewritten text and does not work well when new fonts are encountered. This is the
technique the early physical photocell-based OCR implemented, rather directly.
Feature extraction decomposes glyphs into "features" like lines, closed loops, line
direction, and line intersections. These are compared with an abstract vector-like
representation of a character, which might reduce to one or more glyph prototypes.
General techniques of feature detection in computer vision are applicable to this type
of OCR, which is commonly seen in "intelligent" handwriting recognition and
indeed most modern OCR software. Nearest neighbor classifiers such as the k- nearest
neighbor algorithm are used to compare image features with stored glyph features and
choose the nearest match. Software such as Cuneiform and Tesseract use a two-pass
approach to character recognition. The second pass is known as "adaptive
recognition" and uses the letter shapes recognized with high confidence on the first
pass to recognize better the remaining letters on the second pass. This is advantageous
for unusual fonts or low-quality scans where the font is distorted (e.g. blurred or
faded). In the method, feature extraction consists of three steps: extreme coordinates
measurement, grabbing character into grid, and character digitization. The Tamil
character is captured by its extreme coordinates from left/right and top/bottom and is
subdivided into a rectangular grid of specific rows and columns. The algorithm
automatically adjusts the size of grid and its constituents according to the dimensions
7. Neural Computing and Applications,
Special Issue on Theory and Applications of Neural Computation (2004) 127
of the character. Then it searches the presence of character pixels in every box of the
grid. The boxes found with character pixels are considered “on” and the rest are
marked “off” as shown in Fig. 2, 3, 4, 5.
A binary string of each character is formed locating the “on” and “off” boxes (named
as character switching) and presented to the neural network input for training and
recognition purposes. The total number of grid boxes represented the number of
binary inputs. A 14x8 grid thus resulted in 112 inputs to the recognition model. An
equivalent statement would be that a 14x8 grid provided a 112 dimensional input
feature vector. The developed software contains a display of this phenomenon by
filling up the intersected squares as shown in Fig. 6. The work flow for the neural
network design process has seven steps:
a) Collect data
b) Create the network
c) Configure the network
d) Initialize the weights and biases
e) Train the network
f) Validate the network
g) Use the network
After a neural network has been created, it needs to be configured and then trained.
Configuration involves arranging the network so that it is optimal with classifying the
Tamil characters, as defined by sample data [3]. After the network has been
configured, the adjustable network parameters (called weights and biases) need to be
tuned, so that the network performance is optimized. This tuning process is referred to
as training the network. Configuration and training require that the network be
provided with example data. For many types of neural networks, the weight function
is a product of a weight times the input, but other weight functions (e.g., the distance
between the weight and the input, |w − p|) are sometimes used. The most common net
input function is the summation of the weighted inputs with the bias, but other
operations, such as multiplication, can be used [6, 7].
6 Testing and its Strategies
a) Unit testing is conducted to verify the functional performance of each
modular component of the software. Unit testing focuses on the smallest unit
of the software design (i.e.), the module. The white-box testing techniques
were heavily employed for unit testing.
b) Functional test cases involved exercising the code with nominal input values
for which the expected results are known, as well as boundary values and
special values, such as logically related inputs, files of identical elements,
and empty files. Three types of tests in Functional test: Performance Test,
Stress Test, Structured Test
c) Performance test determines the amount of execution time spent in various
parts of the unit, program throughput, and response time and device
utilization by the program unit.
8. Tamil Character Recognition based on Back Propagation Neural Networks 128
d) Stress test is those test designed to intentionally break the unit. A Great deal
can be learned about the strength and limitations of a program by examining
the manner in which a programmer in which a program unit breaks.
e) Structure tests are concerned with exercising the internal logic of a program
and traversing particular execution paths. The way in which White-Box test
strategy was employed to ensure that the test cases could Guarantee that all
independent paths within a module have been have been exercised at least
once. Exercise all logical decisions on their true or false sides. Execute all
loops at their boundaries and within their operational bounds. Exercise
internal data structures to assure their validity. Checking attributes for their
correctness. Handling end of file condition, I/O errors, buffer problems and
textual errors in output information.
f) Integration testing is a systematic technique for construction the program
structure while at the same time conducting tests to uncover errors associated
with interfacing. i.e., integration testing is the complete testing of the set of
modules which makes up the product. The objective is to take untested
modules and build a program structure tester should identify critical
modules. Critical modules should be tested as early as possible. One
approach is to wait until all the units have passed testing, and then combine
them and then tested. This approach is evolved from unstructured testing of
small programs. Another strategy is to construct the product in increments of
tested units. A small set of modules are integrated together and tested, to
which another module is added and tested in combination. And so on. The
advantages of this approach are that, interface dispenses can be easily found
and corrected. The major error that was faced during the implementation is
linking error. When all the modules are combined the link is not set properly
with all support files. Then the check is out for interconnection and the links.
Errors are localized to the new module and its interconnections. The product
development can be staged, and modules integrated in as they complete unit
testing. Testing is completed when the last module is integrated and tested.
Testing is a process of executing a program with the intent of finding an error. A good
test case is one that has a high probability of finding an as-yet –undiscovered error. A
successful test is one that uncovers an as-yet- undiscovered error. System testing is
the stage of implementation, which is aimed at ensuring that the system works
accurately and efficiently as expected before live operation commences. It verifies
that the whole set of programs hang together. System testing requires a test consists of
several key activities and steps for run program, string, system and is important in
adopting a successful new system. This is the last chance to detect and correct errors
before the system is installed for user acceptance testing. The software testing process
commences once the program is created and the documentation and related data
structures are designed. Software testing is essential for correcting errors. Otherwise
the program is not said to be complete. Software testing is the critical element of
software quality assurance and represents the ultimate the review of specification
design and coding. Testing is the process of executing the program with the intent of
finding the error. A good test case design is one that as a probability of finding a yet
undiscovered error. A successful test is one that uncovers a yet undiscovered error.
9. Neural Computing and Applications,
Special Issue on Theory and Applications of Neural Computation (2004) 129
Any engineering product can be tested in one of the two ways:
a) White box testing:
This testing is also called as Glass box testing. In this testing, by knowing the specific
functions that a product has been design to perform test can be conducted that
demonstrate each function is fully operational at the same time searching for errors in
each function. It is a test case design method that uses the control structure of the
procedural design to derive test cases. Basis path testing is a white box testing. Basis
path testing: Flow graph notation, Cyclometric complexity, Deriving test cases, Graph
matrices Control.
b) Black box testing:
In this testing by knowing the internal operation of a product, test can be conducted to
ensure that “all gears mesh”, that is the internal operation performs according to
specification and all internal components have been adequately exercised. It
fundamentally focuses on the functional requirements of the software. The steps
involved in black box test case design are: Graph based testing methods, Equivalence
partitioning, Boundary value analysis, Comparison testing.
A software testing strategy provides a road map for the software developer. Testing is
a set activity that can be planned in advance and conducted systematically. For this
reason a template for software testing, a set of steps into which a specific test case
design methods should be strategy must have the following characteristics: Testing
begins at the module level and works “outward” toward the integration of the entire
computer based system, Different testing techniques are appropriate at different points
in time, The developer of the software and an independent test group conducts testing,
Testing and Debugging are different activities but debugging must be accommodated
in any of the following testing strategies.
a) Integration testing:
Integration testing is a systematic technique for constructing the program structure
while at the same time conducting tests to uncover errors associated with. Individual
modules, which are highly prone to interface errors, should not be assumed to work
instantly when put them together. The problem of course, is “putting them together”-
interfacing. There may be the chances of data lost across on another’s sub functions,
when combined may not produce the desired major function; individually acceptable
impression may be magnified to unacceptable levels; global data structures can
present problems [8].
b) Program testing:
The logical and syntax errors have been pointed out by program testing. A syntax
error is an error in a program statement that in violates one or more rules of the
language in which it is written. An improperly defined field dimension or omitted
keywords are common syntax error. These errors are shown through error messages
generated by the computer. A logic error on the other hand deals with the incorrect
data fields, out-off-range items and invalid combinations. Since the compiler s will
not deduct logical error, the programmer must examine the output. Condition testing
exercises the logical conditions contained in a module. The possible types of elements
10. Tamil Character Recognition based on Back Propagation Neural Networks 130
in a condition include a Boolean operator, Boolean variable, a pair of Boolean
parentheses, a relational operator or an arithmetic expression. Condition testing
method focuses on testing each condition in the program. The purpose of condition
test is to deduct not only errors in the condition of a program but also other a errors in
the program.
c) Security testing:
Security testing attempts to verify the protection mechanisms built in to a system well,
in fact, protect it from improper penetration. The system security must be tested for
invulnerability from frontal attack must also be tested for invulnerability from rear
attack. During security, the tester places the role of individual who desires to
penetrate system.
d) Validation testing
At the culmination of integration testing, software is completely assembled as a
package. Interfacing errors have been uncovered and corrected and a final series of
software test-validation testing begins. Validation testing can be defined in many
ways, but a simple definition is that validation succeeds when the software functions
in manner that is reasonably expected by the customer. Software validation is
achieved through a series of black box tests that demonstrate conformity with
requirement. After validation test has been conducted, one of two conditions exists;
the function or performance characteristics confirm to specifications and are accepted,
validation from specification is uncovered and a deficiency created. Deviation or
errors discovered at this step in the proposed method is corrected prior to its
completion with the help of the user by negotiating to establish a method for resolving
deficiencies. Thus the proposed system under consideration has been tested by using
validation testing and found to be working satisfactorily. Though there were
deficiencies in the system they were not catastrophic.
e) User acceptance testing
User acceptance of the system is key factor for the success of any system. The system
under consideration is tested for user acceptance by constantly keeping in touch with
prospective system and user at the time of developing and making changes whenever
required. This is done in regarding to the following points: Input screen design and
Output screen design.
11. Neural Computing and Applications,
Special Issue on Theory and Applications of Neural Computation (2004) 131
7 Conclusion
The proposed technique is tested on a dataset of Tamil Characters. Five training
samples for each character were used. The characters are resampled to 60 points and
normalized to (0, 1). A character feature matrices of size 60x15 was constructed and
transform the features to an 8-dimensional subspace by performing ORC software. A
nearest neighbor classifier is used to classify the test character in the subspace. If the
estimated class label is one of the confusion pairs, input the test character to an
appropriate neural network based classifier at the next level. There is an increase in
the classification accuracy of a few frequently confused characters after the neural
network classifier. The improvement in performance is observed in both the
validation/training and test sets.
In a ROC curve the true positive rate (Sensitivity) is plotted in function of the false
positive rate (Specificity) for different cut-off points of a parameter. Each point on the
ROC curve represents a sensitivity/specificity pair corresponding to a particular
decision threshold. The area under the ROC curve is a measure of how well a
parameter can distinguish between two diagnostic groups as shown in Fig. 7.
As a future enhancement, in addition to giving visual feedback of the recognized
character, it is feasible to provide audio feedback of the same. The same technique
can be used to resolve confusions between triplets and quadruples of similar
characters. The same recognition could be carried out not only for individual
characters but Tamil words also.
Fig. 2. Grayscale Image
12. Tamil Character Recognition based on Back Propagation Neural Networks 132
Fig. 3. Converted Binary Image
Fig. 4. Pad for Writing the Characters
13. Neural Computing and Applications,
Special Issue on Theory and Applications of Neural Computation (2004) 133
Fig. 5. Character Written on Pad for Recognition
Fig. 6. Displaying the Recognized Character
14. Tamil Character Recognition based on Back Propagation Neural Networks 134
Fig. 7. ROC Curve
References
[1] R. Jagadeesh Kannan, R. Prabhakar, “A Comparative Study of Optical Character Recognition for
Tamil Script”, European Journal of Scientific Research, Vol.35 No.4, 2002, pp: 570-582.
[2] R.Indra Gandhi, Dr.K.Iyakutti, “An Attempt to Recognize Handwritten Tamil Character Using
Kohonen SOM” International Journal of Advance Networking and Applications, Volume 1, Issue 3,
2000, pp: 188-192.
[3] P.S.Jagadeesh Kumar, “Speech Processing and Audio feedback for Tamil Alphabets using Artificial
Neural Networks”, Speech Signal Processing, PLoS ONE, 4(6), December 2003, pp. 1-8.
[4] Amitabh Wahi, Sundaramurthy.S, Poovizhi.P, “Recognition of Handwritten Tamil Characters using
Wavelet International Journal of Computer Science & Engineering Technology”, Vol. 5 No. 4, Apr
2003, pp: 335-340.
[5] M.Sivasankari, S.P.Victor, “Multilingual Handwritten Text Verification”, International Journal of
Computer Science and Information Technologies, Vol. 5, 1999, pp: 3605-3607.
[6] Harshal Bobade, Amit Sahu, “Character Recognition Technique using Neural Network”,
International Journal of Engineering Research and Applications, Vol. 3, Issue 2, March - April
2000, pp:1778-1783.
[7] Prashant M. Kakde, Vivek R. Raut, “Performance analysis of handwritten Devnagri characters
recognition through Machine intelligence”, International Journal of Emerging Technology and
Advanced Engineering, Volume 2, Issue 7, July 2002, pp: 238-247.
[8] Dhiraj K. Das, “Comparative Analysis of PCA and 2DPCA in Face Recognition”, International
Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 1, January 1996, pp:
330- 336.
15. Neural Computing and Applications,
Special Issue on Theory and Applications of Neural Computation (2004) 135
Author’s Biography
P.S.Jagadeesh Kumar received his B.E degree from the University of Madras
in Electrical and Electronics Engineering discipline in the year 1999. He
obtained his MBA degree in HRD from University of Strathclyde, Glasgow,
and the United Kingdom in the year 2002. He is pursuing his M.E degree in
with the specialization in Computer Science and Engineering from Annamalai
University, Chidambaram.