Optimal Feed Forward MLPArchitecture for Off-Line Cursive Numeral Recognition
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 1
Abstract
The purpose of this work is to analyze the performance of back-propagation feed-forward algorithm using various different activation functions for the neurons of hidden and output layer and varying the number of neurons in the hidden layer. For sample creation, 250 numerals were gathered form 35 people of different ages including male and female. After binarization, these numerals were clubbed together to form training patterns for the neural network. Network was trained to learn its behavior by adjusting the connection strengths at every iteration. The conjugate gradient descent of each presented training pattern was calculated to identify the minima on the error surface for each training pattern. Experiments were performed by selecting different combinations of two activation functions out of the three activation functions logsig, tansig and purelin for the neurons of the hidden and output layers and the results revealed that as the number of neurons in the hidden layer is increased, the network gets trained in small number of epochs and the percentage recognition accuracy of the neural network was observed to increase up to certain level and then it starts decreasing when number of hidden neurons exceeds a certain level.
Authors and Affiliations
Amit Choudhary , Rahul Rishi , Savita Ahlawat , Vijaypal Singh Dhaka
Semantic Inference Model For DatabaseInference Detection Violation
Database Security has become a major problem in modern day’s applications. Generally for Information security everybody tries to protect sensitive data by using different security techniques. Despite these security measu...
Dynamic Resource Allocation in Desktop Grids
Grid computing (or the use of computational grids) is the application of several computers to a single problem at the same time. In grid computing ,the computing becomes pervasive and individual users(or client applicati...
Improving Ischemic Beat Classification Using Fuzzy- Genetic Based PCA And ICA
In this paper, an improved version of Principal Component nalysis (PCA) and Independent Component Analysis (ICA) is proposed for feature extraction to classify the ischemic beats from electrocardiogram (ECG) signal. The...
A Novel Benchmark K-Means Clustering on Continuous Data
Cluster analysis is one of the prominent techniques in the field of data mining and k-means is one of the most well known popular and partitioned based clustering algorithms. K-means clustering algorithm is widely used i...
Symmetric-key Inter-domain end-to-end Authentication Protocols for Mobile System
Our goal is to propose and design a symmetric-key interdomain end-to-end authentication protocols for a mobile system. We will be considering three mobile service domains; each has an authentication server. We denote by...