Handwritten Tamil Character Recognition and Conversion using Neural Network
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 7
Abstract
Hand written Tamil Character recognition refers to the process of conversion of handwritten Tamil character into Unicode Tamil character. The scanned image is segmented into paragraphs using spatial space detection technique, aragraphs into lines using vertical histogram, lines into words using horizontal histogram, and words into character image glyphs using horizontal histogram. The extracted features considered for recognition are given to Support Vector achine, Self Organizing Map, RCS, Fuzzy Neural Network and Radial Basis Network. Where the characters are classified using supervised learning algorithm. These classes are mapped onto Unicode for recognition. Then the text is reconstructed using Unicode fonts. This character recognition finds applications in document analysis where the handwritten document can be converted to editable printed document. This approach can be extended to recognition and reproduction of hand written documents in South Indian languages. In the training set, a recognition rate of 100% was achieved and in the test set the recognized speed for each character is 0.1sec and accuracy is 97%. derstandably, the training set produced much higher ecognition rate than the test set. Structure nalysis suggested that the proposed system of RCS with back propagation network is given higher recognition rate.
Authors and Affiliations
C. Sureshkumar , Dr. T. Ravichandran
Prediction of Rainfall Using Backpropagation Neural Network Model
Agriculture is the predominant occupation in India, accounting for about 52% of employment. The Irrigation acilities are nadequate, as revealed by the fact that only 52.6% of the land was irrigated in 2009–10 which res...
Detection of Copy-Move Forgery of Images Using Discrete Wavelet Transform
Digital images are used everywhere and it is easy to manipulate and edit because of availability of various image processing and editing software. In a copy-move image forgery, a part of an image is copied and then paste...
SECURING WMN USING HONEYPOT TECHNIQUE
WMN has been a field of active research in the recent years. Lot of research has focused various routing mechanism but very little effort has been made towards attack detection or intrusion detection. In this paper, we p...
A Novel Document Clustering Algorithm Using Squared Distance Optimization Through Genetic Algorithms
K-Means Algorithm is most widely used algorithms in document clustering. However, it still suffer some shortcomings like random initialization, solution converges to local minima, and empty cluster formation. Genetic alg...
An analysis of cross avoidance techniques in optical multistage interconnection networks
It is expected that users of telecommunication services such as Internet, Web browsing, and tele-education will increase dramatically. This has greatly increased the demand for high bandwidth and high capacity communicat...