Optical Recognition of Isolated Machine Printed Sindhi Characters using Fourier Descriptors
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 6
Abstract
The scale invariance characteristics play an essential role in pattern recognition applications, for example in computer vision, OCR (Optical Character Recognition), electronic publication, etc. In this paper, the shape based feature extraction techniques are used in terms of invariant properties and the region based FD (Fourier Descriptors) have been used for the recognition of isolated printed Sindhi characters. There are 56 isolated characters in Sindhi language than can be categorized to 20 different classes considering the shape of the base of each character. In this work, the dataset contains 4704 images of isolated printed Sindhi characters. The simulation result shows that the proposed method is a capable discriminating algorithm of Similar Sindhi characters and can easily extract the scale invariant features.
Authors and Affiliations
Nasreen Nizamani, Mujtaba Shaikh, Jawed Unar, Ehsan Ali, Ghulam Mustafa Bhutto, Abdul Rafay
Resource Utilization in Cloud Computing as an Optimization Problem
In this paper, an algorithm for resource utilization problem in cloud computing based on greedy method is presented. A privately-owned cloud that provides services to a huge number of users is assumed. For a given resour...
Image Transmission Model with Quality of Service and Energy Economy in Wireless Multimedia Sensor Network
The objective of this article is to present the efficiency of image compression in the Wireless Multimedia Sensor Network (WMSN), the method used in this work is based on the lifting scheme coupled with the SPIHT coding...
Feature Fusion: H-ELM based Learned Features and Hand-Crafted Features for Human Activity Recognition
Recognizing human activities is one of the main goals of human-centered intelligent systems. Smartphone sensors produce a continuous sequence of observations. These observations are noisy, unstructured and high dimension...
Defending Polymorphic Worms in Computer Network using Honeypot
Polymorphic worms are a major threat to internet infrastructure security. In this mechanism we are using gate-translator, double honeypot, sticky honeypot, internal translator and antivirus of Cloud AV,which attracts pol...
Chemical Reaction Optimization Algorithm to Find Maximum Independent Set in a Graph
Finding maximum independent set (MIS) in a graph is considered one of the fundamental problems in the computer science field, where it can be used to provide solutions for various real life applications. For example, it...