A Comprehensive Study On Handwritten Character RecognitionSystem
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2
Abstract
Abstract: Nowadays handwritten character recognition is still remain an open problem because of thevariability in writing style. Conversion of handwritten characters is important for making manuscripts intomachine recognizable form so that it can be easily accessed and preserved. Many researchers have worked inthe area of handwriting recognition and numerous techniques and models have been developed to recognizehandwritten text. The study investigates that in any character recognition system there exist three major stagessuch as Preprocessing, Feature Extraction and Classification. This paper provides a comprehensive review ofexisting works in offline handwritten character recognition.
Authors and Affiliations
Renjini L , Rubeena B
Efficient Data Caching Based On Fuzzy Decision Routing InVehicle Disruption Tolerant Networks
Abstract: Disruption tolerant networks (DTNs) are characterized by low node density, unpredictable nodemobility, and lack of global network information. Most of current research efforts in DTNs focus on dataforward...
Aisha Email System
The Paper Entitle “Aisha Email System” deals with identifying the clients to send and receive mail with the same login. This utility will allow multiple clients to login under the same login name and still have &...
Cloud Based Vital Health Stats Monitoring using IoT
Abstract : While there are lot of devices and applications available for monitoring the vital health statistics of human beings, there is still room for enhancement and improvement. This paper’s intention is to address o...
Anonymizied Approach to Preserve Privacy of Published Data Through Record Elimination
Abstract: Data mining is the process of analyzing data. Data Privacy is collection of data and dissemination of data. Privacy issues arise in different area such as health care, intellectual property, biological da...
A Study on A Hybrid Approach of Genetic Algorithm & Fuzzy To Improve Anomaly or Intrusion
Abstract: This paper describes a technique of applying Genetic Algorithm (GA) and fuzzy to network Intrusion Detection Systems (IDSs). A brief overview of a hybrid approach of genetic algorithm and fuzzy to improve anoma...