Handwritten Character Recognition with Feedback Neural Network
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 1
Abstract
The ability of a machine to interpret handwritten characters from sources like paper document, photograph, etc. to some editable computerized form is the first and foremost aim of handwritten character recognition systems. Several challenges are there to construct this kind of systems, including the tasks eg. Digitization, segmentation, normalization, feature extraction, reorganization, and reconstruction. Here, an attempt has been made to recognize individual handwritten characters by the use of artificial neurons with feedback connection. The topology of the network is formed with two layers of artificial neurons, input and output. The neurons of output layer have a feedback connection from their output line.
Authors and Affiliations
Apash Roy , N. R. Manna
TDB Based Optimistic RSUs Deployment in VANETs
Now–a–days Vehicular Ad Hoc Networks (VANETs) has attracted the attention of both the industry and academia. Roadside units (RSUs) are one of the fundamental components of Vehicular ad hoc network (VANET). VANET comprise...
An Adoptive approach in Demosaicing True Color from Digital Camera having Bayer Color Filter
Single sensor with Bayer pattern color filters are used to reduce size and cost of consumer digital cameras. These cameras use various demosaicing algorithms to construct the entire image with true colors from the acquir...
One Dominant Graph Topology for Heterogeneous Wireless Sensor Networks
The integration of different wired and wireless access technologies constitute the nextgeneration heterogeneous network. A typical wireless sensor network configuration consists of sensors sensing and transmitting their...
A Comparative Study of Various Fault Localization Methodologies
Fault in terms of Software Engineering is referred to as a bug, an error or a problem which causes a program to crash or generate invalid results. The problem is caused by either incorrect logic or insufficient logic. Fa...
Encryption/decryption tool with cryptanalysis
The dissertation titled” Encryption/Decryption Tool with Cryptanalysis” is based on the concept of cryptographic system. We have implemented a set of encryption/decryption methods which include Hill Cipher, Caesar Cipher...