Printed and Handwritten Mixed Kannada Numerals Recognition Using SVM
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5
Abstract
A mixer of printed and handwritten numerals may appear in a single document such as application forms, postal mail, and official documents. The process of identifying of such mixed numerals and sending it to respective OCRs is a complex task. In this paper, we present a novel method for recognition of printed and hand written isolated Kannada numerals using ingle OCR system. Printed/hand written Kannada numeral is scan converted to binary image and normalized to a size of 40 x 40 pixels. The boundary of the numeral is traced and chain code of the image is determined. These codes are epresented in a complex plane and 10 dimensional Fourier descriptors are computed that form the feature vector. The 10 dimensional Fourier descriptors are input to multi-class SVM classifier to recognize the numeral class. The proposed algorithm is experimented on 5000 numeral images consisting of he experiment is carried using five-fold cross validation method and yielded recognition accuracy of 97.76%.
Authors and Affiliations
G. G. Rajput, , Rajeswari Horakeri, , Sidramappa Chandrakant
Cheapest Paths in Multi-Interface Networks A Distributed Approach
Let G = (V,E) be a graph which models a set of wireless devices (nodes V) that can communicate by means of multiple radio interfaces , according to activating the common interface rule at each node. Every Interface can b...
Grid Computing: A Collaborative Approach in Distributed Environment for Achieving Parallel Performance and Better Resource Utilization
From the very beginning various measures are taken or consider for better utilization of available limited resources in he computer system for operational environment, this is came n consideration because most of the...
Efficient Processing of XML Documents in Hadoop Map Reduce
XML has dominated the enterprise landscape for fifteen years and still remains the most commonly used data format. Despite its popularity the usage of XML for "Big Data" is challenging due to its semi-structured nature a...
Public Key Cryptosystem based on Pell’s Equation Using The Gnu Mp Library
Protection of data is the utmost thing for any company related to digital information. There are several malicious methods adapted, based on the priority of demand of that piece of information. There are several cryptosy...
A Novel Architecture of Agent based Crawling for OAI Resources
Nowadays, most of the search engines are competing to index as much of the Surface Web as possible with leaving a lurch at the OAI content (pdf documents), which holds a huge amount of information than surface web. In th...