Handwritten Character Recognition - A Comprehensive Review
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 9
Abstract
Character recognition comes into picture when various patterns of handwritten or optical characters are to be recognized digitally. Many researchers have proposed different approaches for character recognition in different languages. In this paper, we have reviewed several techniques of character recognition. The main important phases of character recognition include preprocessing, segmentation, feature extraction and classification. Various feature extraction techniques and classification techniques have been surveyed in this paper and an attempt is made here to draw a conclusion regarding HCR techniques from the literature survey.
Authors and Affiliations
Mahesh M Goyani, Harsh Dani, Chahna Dixit
A Novel Technique for Creative Problem-Solving by using Q-learning and Association algorithm
for a single problem there are multiple solutions or multiple ideas from different users. Means every one gave an idea (solution) for solving the given problem if we distribute that particular problem to the different...
Performance Analysis of AOMDV, OLSR and DSR Routing Protocols Using UDP agents in MANETS
Mobile Ad hoc Network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administ...
Content-based image retrieval using DWT based feature extraction and texture, shape and color features
Content Based Image Retrieval (CBIR) is the retrieval of images based on visual features such as colour, texture and shape. In this paper, we propose the algorithm on the basis of extraction and matching of color and...
Delay reduction for testing using LPFRSE
Tracing the memory with a BIST approach is phenomenal, but verifying each bit in the memory and tracing the result is a high time consuming, high power utilizing and area constrained process. Here we are approaching...
Person Authentication by voice and image using ANFIS and Shifted MFCC
In security systems, the interest in using biometric technologies for person authentication has grown rapidly. Voice is one of the most promising and mature biometric modalities for secured access control. Here prese...