Unconstrained Handwritten Character Recognition Using Different Classification Strategies

Size: px
Start display at page:

Download "Unconstrained Handwritten Character Recognition Using Different Classification Strategies"

Transcription

1 Unconstrained Handwritten Character Recognition Using Different Classification Strategies Alessandro L. Koerich Department of Computer Science (PPGIA) Pontifical Catholic University of Paraná (PUCPR) Curitiba, PR, Brazil Abstract In this paper we tackle the problem of unconstrained handwritten character recognition using different classification strategies. For such an aim, four multilayer perceptron classifiers (MLP) are built and used into three different classification strategies: combination of two 26 class classifiers; a 26 metaclass classifier and a 52 class classifier. Experimental results on the NIST SD19 database show that better recognition performance is achieved by the metaclass classifier in which the uppercase and the lowercase representations of the characters are merged into single classes. 1 Introduction The recognition of handwritten characters is very challenging and it has been the subject of much attention in the field of handwriting recognition. Several proposals to solve this problem have been presented in the last years [2, 4, 6, 8, 9, 10]. However, most of the research efforts have been focused on the recognition of digits. In fact, digit recognition is just a subset, for which the solutions are much simpler and robust. But when we talk about the recognition of alphabetic characters, this problem becomes more complicated. The most obvious difference is the number of classes that can be up to 52, depending if uppercase (A Z) and lowercase (a z) characters are distinguished from each other. Consequently, there are a number of ambiguous alphabetic characters other than numerals. Character recognition is further complicated by other factors such as multiple patterns to represent a single character, cursive representation of letters, and the number of disconnected and multi stroke characters. Most of the approaches that have been proposed to the recognition of letters focus on specific writing styles: uppercase or lowercase characters [2, 8, 10]. The accuracy reported for the recognition of uppercase characters is between 90% and 98% and between 80% and 90% for lowercase characters, depending on the testing conditions and database used. A more difficult problem is the recognition of unconstrained characters because the writing style is not know a priori. This is a very relevant problem because most of the practical applications do not give any hint about the writing style, so, the recognition system itself has to find out and manage different writing styles. The difficulties related to the recognition of unconstrained handwritten characters arise from the fact that there are characters which belong to different classes but which have very similar shapes (e.g. O and D, q and g, I and l ). The accuracy reported for the recognition of unconstrained handwritten characters has been between 59% and 83% [1, 2, 6, 7, 12]. Neural networks classifiers (NN) have been used extensively in character recognition [1, 3, 4, 5, 6, 8]. Many recognition systems are based on multilayer perceptrons (MLPs) [1, 3, 4, 5, 8]. Gader et al. [4] describe an algorithm for handprinted word recognition that uses four 27 output 4 layer backpropagation networks to account for uppercase and lowercase characters. Recognition rates of 94% and 82% were achieved for uppercase and lowercase characters respectively. A similar approach but with a different feature set was proposed in [5]. Recognition rates of 86.24% for uppercase characters and 83.45% for lowercase characters were achieved. Instead of using separated networks to account for uppercase and lowercase characters, Blumenstein et al. [1] have used a 52 output neural network representing 26 uppercase and 26 lowercase characters. Case sensitive and case non sensitive experiments were conducted and the recognition accuracy achieved was almost 60%. Dong et al. [3] have presented a local learning framework consisting of quantization and ensemble layer for recognition of lowercase handwritten characters. Such an approach achieved recognition rate of 92.34% on a cleaned set of NIST database. Pedrazzi and Colla [8] presented a simple feature set for handprinted character representation build by the combination of average pixel density and measures of local alignment along some directions. Classification is carried out by a MLP and recognition rates of 96.08% and 87.40% are achieved for uppercase and lowercase characters respectively.

2 Is unconstrained character recognition a 26 class or a 52 class problem? In fact, for most practical applications it is not important to know the writing style but only which is the letter. In this paper we investigate the recognition of unconstrained handwritten characters using different number of classes and different classification strategies. Section 2 presents the feature set used to represent characters. Section 3 presents some strategies to build and combine classifiers according to the number of classes at the output. The experimental results are presented in Section 4. Some conclusions are drawn in Section 5. 2 Feature Extraction Several different types of features have been proposed to represent handwritten characters [2, 4, 6, 8, 9, 10, 11]. We have developed several types of features such as surface, extrema, orientation, excentricity, H/W ratio, and different zoning. We have carried out some exploratory experiments to determine which combination of features achieves the best recognition rates on the NIST SD19 database. The recognition rate was not the only criterion, we have also taken into account the dimension of the resulting feature vector where smaller is better. Such an empirical evaluation lead us to build a 108 dimensional feature vector by combining 3 different types of features: profiles, projection histograms, and contour directional histograms. Profiles The profile counts the number of pixels (distance) between the bounding box of the character image and the edge of the character. The profiles describe well the external shapes of characters and allow to distinguish between a great number of letters, such as p and q. Since the profiles depend on the image dimension, the features are made scale independent by normalizing the profiles to ten bins at each axis to have an equal number of elements for all characters 1. The profiles are taken at 4 positions: top, bottom, left and right hand sides as illustrated in Figure 1. Projection Histograms Projection histograms count the number of pixels in each column and row of a character image [11]. Projection histograms can separate characters such as m and n (3 and 2 peaks in vertical projection respectively) or E and F (3 and 2 peaks in horizontal projection respectively). The projection histograms are taken at the vertical and horizontal axis and they are made scale independent by normalizing to ten bins at each axis to have an equal number of elements for all characters. Figure 2 shows the vertical and horizontal projection histograms for the letter a. 1 The number of bins was determined empirically by exploratory experiments on the validation dataset where the character recognition rate and the dimensionality were used as evaluation criteria. Figure 1. The four projection profiles for the letter a": top, bottom, left and right hand side profiles. Figure 2. The vertical and horizontal projection histograms for the letter a. Contour Directional Histogram The contour of the character image is given by the outer and inner boundary pixels that can be easily found by examining each pixel within a 3 3 window. Figure 3 shows the contour for the letter a. The resulting contour is divided into 3 2 zones as show in Figure 3 [11]. For each of these zones the contour is followed and a directional histogram is obtained by analyzing the adjacent pixels in the 3 3 neighborhood of each contour s pixel. The goal of the zoning is to obtain local characteristics instead of global characteristics. Figure 3. The contour extracted from the letter a and the contour split in 6 parts corresponding to the 6 zones (3 2).

3 3 Design of the Character Classifier We have designed a simple unconstrained character recognizer based on a multilayer perceptron (MLP) with one hidden layer. The choice of such a classifier to perform the character recognition task is determined by some constraints such as: estimation of a posteriori probabilities at the output and recognition speed. To build a MLP classifier basically we have to determine the number of layers and the number of neurons in each layer. The number of hidden neurons was determined by a rule of thumb and some exploratory experiments where the error rates on the training and validation sets were used as criteria. Network output estimates a posteriori probabilities and the value of each output necessary remains between zero and one because of the sigmoidal function used. Many different classification strategies could be used to recognize unconstrained handwritten characters, however, in the scope of this paper, we have considered the followings: A 52 class classification problem: uppercase and lowercase representations of a single character are considered different classes (e.g. A and a are two distinct classes). A network with 52 outputs was designed (A Z, a z); A class classification problem: uppercase and lowercase representations of a single character are considered different classes. Two networks with 26 outputs, one for uppercase and one for lowercase characters were designed and the outputs are combined by several rules; A 26 class classification problem: uppercase and lowercase representations of a single character are merged into a unique class called metaclass (e.g. A and a form the metaclass Aa ). One network with 26 outputs was designed; A question that may arise is if it is really necessary to consider a 52 class problem. In many practical applications it is not important to recognize if a character is uppercase or lowercase. Furthermore, some character shapes are very similar, like an uppercase O and a lowercase o, an uppercase V and a lowercase v, an uppercase C and a lowercase c, an uppercase I and a lowercase i, etc. So, it seems useless to use up network resources to account for such cases where the separation between classes does not make sense in practice. On the other hand, some character shapes are not very similar, such as an uppercase A and a lowercase a, an uppercase E and a lowercase e, an uppercase G and a lowercase g, etc. So, the strategy of merging all uppercase and lowercase classes may also introduce some confusions to the recognition process. Table 1. Recognition rates for the uppercase classifier and the lowercase classifier on the respective datasets. Dataset Recognition Rate (%) NN26Lower NN26Upper Training Lowercase Validation Test Training Uppercase Validation Test Our goal here is to determine which classification strategy is the most appropriate for unconstrained handwritten character recognition. To such an aim, several experiments and analyses are carried out in the next section. 4 Experimental Results and Analysis The recognition strategies proposed in the previous section were implemented and tested on the NIST SD19 database which contains 814,255 binary alphanumeric characters. All experiment were conducted on a PC AMD Athlon 1.1GHz with 512MB of RAM and the average throughput is 4770 characters per second. From the hsf0, hsf1, hsf2, and hsf3 sets of the NIST database 1,440 samples per character class (A Z, a z) were taken randomly for training the classifiers using the backpropagation algorithm. Three different feature vectors were generated: one composed by uppercase characters (A Z), one composed by lowercase characters (a z) and one composed by characters resulting from the merging of both previous datasets. From the hsf7 set were generated three feature vectors to be used as validation sets during the training procedure to watch over the generalization and to stop the training at the minimum of the error. The first validation set is composed by uppercase characters, the second is composed by lowercase characters and the last with characters is composed by the combination of both previous datasets. From the hsf4 set were generated other three feature vectors to test the performance of the classifiers. The first testing set has uppercase characters, the second is composed by lowercase characters and the last, which is the combination of both previous datasets, has characters. First, two 26 class classifiers were built, one for uppercase characters (NN26Upper) and one for lowercase characters (NN26Lower). Both classifiers have 100 units in the hidden layer and 26 outputs. These classifiers were trained with uppercase characters (A Z) and lowercase characters (a z) respectively. Table 1 shows the recognition rates achieved by both classifiers on the respective training, validation and test datasets. In this experiment we have recognized uppercase and lowercase characters separately just to check the performance of the feature set on both datasets. The recogni-

4 tion rates achieved are satisfactory. However, our goal is to recognize unconstrained characters, that is, the recognition system do not know a priori the writing style of the characters. So, the outputs of the NN26Upper and the NN26Lower classifiers were combined by three combination rules: average, maximum and product. The recognition rates achieved by the combination of both classifiers are shown in Table 2. The results are case insensitive and they were obtained on the merged datasets (uppercase+lowercase). Next, a metaclass classifier (NN26UpperLower) was designed, which has 100 units in the hidden layer and 26 outputs. For such a classifier, we have considered uppercase and lowercase representations of characters as belonging to the same classes (metaclasses). This classifier was trained and validated with the merged dataset composed by and characters respectively. The recognition rates achieved by the NN26UpperLower classifier are shown in Table 2. Finally a 52 class classifier (NN52UpperLower) was designed, which has which has 150 units in the hidden layer and 52 outputs. This classifier was also trained and tested with the merged datasets. The output of such a classifier was obtained in two ways: case sensitive and case insensitive. In the first condition, we have considered if both the character class and case were recognized correctly (e.g. A is recognized as A ). In the second condition, we have only considered if the character class was recognized correctly (e.g. A is recognized as A or a ). The recognition rates achieved by such a classifier are also shown in Table 2. From the results shown in Table 2 it is clear that the metaclass classifier (NN26UpperLower) provides better recognition rates than the other classification strategies. The results achieved by the 52 class classifier are also very good even if more classes are involved in the network training. On the other hand the combination of two specialized classifiers did not have produced good results. It would be rash to conclude that the combination is not a good strategy. Maybe other combination rules might produce better results. 4.1 Analysis of Confusions It is interesting to investigate why the recognition scheme based on metaclasses has performed better than the others. To such an aim, we look at the effects of the metaclasses into the individual classes. Table 3 shows the recognition rates achieved by the metaclass classifier for each metaclass. The metaclass that merges uppercase and lowercase a s is denoted as Â. It is also shown in Table 3, the average recognition rate achieved by the 52 class classifier. Here we take the average of the recognition rates for the uppercase and the lowercase characters. The average recognition rate of the uppercase and lowercase a s is denoted as A-a. The last column of the Table shows the difference in the recognition rate between the Table 3. Recognition rates for each class on the training dataset for the metaclass classifier and for the 52 class classifier) Metaclass Classifier 52 Class Classifier Difference Recognition Recognition in Recognition Class Rate (%) Class Rate (%) Rates (%) Â A-a ˆB B-b Ĉ C-c ˆD D-d Ê E-e ˆF F-f Ĝ G-g Ĥ H-h Î I-i Ĵ J-j ˆK K-k ˆL L-l ˆM M-m ˆN N-n Ô O-o ˆP P-p ˆQ Q-q ˆR R-r Ŝ S-s ˆT T-t Û U-u ˆV V-v Ŵ W-w ˆX X-x Ŷ Y-y Ẑ Z-z metaclass classifier and the average of the uppercase and lowercase output of the 52 class classifier, for each class. We can observe that for some classes, the difference is very significant (e.g. over 10%) while for others, the difference is relatively small. So, why such differences? They can be viewed as a hint that shows which classes are more suitable to be merged. For example, there is not an advantage in merging uppercase and lowercase a s, on the other hand, merging uppercase and lowercase c s seems to be very interesting because many confusions can be eliminated at the classification level. Such a conclusion agrees with differences in shapes. For example, uppercase and lowercase c s have similar shapes and considering both as different classes causes many confusions. On the other hand, uppercase and lowercase b s have quite different shapes, so, merging both representation into a single metaclass will not bring any advantage. Such observations suggest that neither a 26 metaclass nor a 52 class problem are the most appropriate approaches to deal with unconstrained handwritten characters. Possibly, a strategy in between both, that merges only the uppercase and lowercase classes that have similar shapes, will achieve better recognition results.

5 Table 2. Recognition rates achieved by the combination of the specialized classifiers, by the metaclass classifier (NN26UpperLower) and by the 52 class classifier. Recognition Rate (%) Dataset Combination NN52UpperLower NN26Upper & NN26Lower NN26 Case Case Average Maximum Product UpperLower Sensitive Insensitive Uppercase Training Validation Lowercase Test *The results are case insensitive. Table 4. Summary of results in isolated handwritten character recognition Dataset Recognition Rate (%) Reference # Case Case Database Samples Sensitive Insensitive Blumenstein[1] CEDAR 1, Camastra[2] CEDAR 16,213 NA Kimura[6] USPS 9, Kimura[7] CEDAR NA Yamada[12] CEDAR 1, Conclusion We have developed three classification strategies to recognize unconstrained handwritten characters. The experiments that have been carried out on the NIST database to assess the performance of each classification strategy have shown that it is preferable to deal with a 26 class classification problem, where uppercase and lowercase characters are merged into metaclasses, even if for some character classes, the shape of uppercase and lowercase characters varies significantly. This can be due to the amount of data used to train each metaclass, which is twice the amount of data used to train each class in the other classifiers. Table 4 presents the performance of some other character recognition systems. The recognition rates achieved in this paper compare favorably with the results reported in other works, which vary from 59% to 83%. However, notice that a direct comparison is not fair, since the results were obtained on different test conditions and on different datasets. Besides the good performance in terms of recognition rate, the recognition strategy based on the metaclass classifier is simple and requires short training and recognition times. It is important to notice that the features used in this work were not adapted to metaclasses. Further studies are necessary to find a feature set that better represents the intra-class variation (upper lower) of the shapes into the metaclasses. We expect that this new feature set will improve further the recognition rates. Finally, the last remark is that we believe that the metaclass strategy can be further improved by merging not all uppercase and lowercase representations, but only those that have similar shapes and those that introduce many errors when considered separately. References [1] Blumenstein and B. Verma. Neural based solutions for the segmentation and recognition of difficult handwritten words from a benchmark database. In Proc. 5th International Conference on Document Analysis and Recognition, pages , Bangalore, India, [2] F. Camastra and A. Vinciarelli. Cursive character recognition by learning vector quantization. Pattern Recognition Letters, 22: , [3] J. Dong, A. Krzyzak, and C. Y. Suen. Local learning framework for recognition of lowercase handwritten characters. In Proc. International Workshop on Machine Learning and Data Mining in Pattern Recognition, page to appear, Leipizig, Germany, [4] P. Gader, M. Whalen, M. Ganzberger, and D. Hepp. Handprinted word recognition on a nist data set. Machine Vision and Applications, 8:31 41, [5] P. D. Gader, M. A. Mohamed, and J. H. Chiang. Handwritten word recognition with character and inter character neural networks. IEEE Transactions on Systems, Man and Cybernetics Part B, 27: , [6] F. Kimura, N. Kayahara, Y. Miyake, and M. Shridhar. Machine and human recognition of segmented characters from handwritten words. In Proc. 4th International Conference on Document Analysis and Recognition, pages , Ulm, Germany, [7] F. Kimura, M. Shridhar, and Z. Chen. Improvements of a lexicon directed algorithm for recognition of unconstrained handwritten words. In Proc. International Conference on Document Analysis and Recognition, pages 18 22, Tsukuba, Japan, [8] P. Pedrazzi and A. M. Colla. Simple feature extraction for handwritten character recognition. In Proc. International Conference on Image Processing, pages , Washington, USA, [9] S. N. Srihari. Recognition of handwritten and machine printed text for postal address interpretations. Pattern Recognition Letters, 14: , [10] H. Takahashi and T. D. Griffin. Recognition enhancement by linear tournament verification. In Proc. International Conference on Document Analysis and Recognition, pages , Tsukuba, Japan, [11] O. Trier, A. K. Jain, and T. Taxt. Feature extraction methods for character recognition. Pattern Recognition, 29(4): , [12] H. Yamada and Y. Nakano. Cursive handwritten word recognition using multiple segmentation determined by contour analysis. IEICE Transactions on Information Systems, 79(5): , 1996.

The Role of Size Normalization on the Recognition Rate of Handwritten Numerals

The Role of Size Normalization on the Recognition Rate of Handwritten Numerals The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,

More information

Printing Letters Correctly

Printing Letters Correctly Printing Letters Correctly The ball and stick method of teaching beginners to print has been proven to be the best. Letters formed this way are easier for small children to print, and this print is similar

More information

Using Lexical Similarity in Handwritten Word Recognition

Using Lexical Similarity in Handwritten Word Recognition Using Lexical Similarity in Handwritten Word Recognition Jaehwa Park and Venu Govindaraju Center of Excellence for Document Analysis and Recognition (CEDAR) Department of Computer Science and Engineering

More information

DIAGONAL BASED FEATURE EXTRACTION FOR HANDWRITTEN ALPHABETS RECOGNITION SYSTEM USING NEURAL NETWORK

DIAGONAL BASED FEATURE EXTRACTION FOR HANDWRITTEN ALPHABETS RECOGNITION SYSTEM USING NEURAL NETWORK DIAGONAL BASED FEATURE EXTRACTION FOR HANDWRITTEN ALPHABETS RECOGNITION SYSTEM USING NEURAL NETWORK J.Pradeep 1, E.Srinivasan 2 and S.Himavathi 3 1,2 Department of ECE, Pondicherry College Engineering,

More information

Copperplate Victorian Handwriting. Victorian. Exploring your History. Created by Causeway Museum Service

Copperplate Victorian Handwriting. Victorian. Exploring your History. Created by Causeway Museum Service Victorian Coleraine Exploring your History Copperplate Victorian Handwriting Postcards courtesy of Coleraine Museum Collection Created by Causeway Museum Service In Victorian times hand writing was very

More information

Neural Computation - Assignment

Neural Computation - Assignment Neural Computation - Assignment Analysing a Neural Network trained by Backpropagation AA SSt t aa t i iss i t i icc aa l l AA nn aa l lyy l ss i iss i oo f vv aa r i ioo i uu ss l lee l aa r nn i inn gg

More information

B. Franklin, Printer. LESSON 3: Learning the Printing Trade

B. Franklin, Printer. LESSON 3: Learning the Printing Trade B. Franklin, Printer Elementary School (Grades K-2) LESSON 3: Learning the Printing Trade OVERVIEW Benjamin Franklin was born January 17, 1706, to Josiah and Abiah Franklin. He was the ninth of eleven

More information

Document Image Retrieval using Signatures as Queries

Document Image Retrieval using Signatures as Queries Document Image Retrieval using Signatures as Queries Sargur N. Srihari, Shravya Shetty, Siyuan Chen, Harish Srinivasan, Chen Huang CEDAR, University at Buffalo(SUNY) Amherst, New York 14228 Gady Agam and

More information

Signature Segmentation from Machine Printed Documents using Conditional Random Field

Signature Segmentation from Machine Printed Documents using Conditional Random Field 2011 International Conference on Document Analysis and Recognition Signature Segmentation from Machine Printed Documents using Conditional Random Field Ranju Mandal Computer Vision and Pattern Recognition

More information

Programming Exercise 3: Multi-class Classification and Neural Networks

Programming Exercise 3: Multi-class Classification and Neural Networks Programming Exercise 3: Multi-class Classification and Neural Networks Machine Learning November 4, 2011 Introduction In this exercise, you will implement one-vs-all logistic regression and neural networks

More information

SUCCESSFUL PREDICTION OF HORSE RACING RESULTS USING A NEURAL NETWORK

SUCCESSFUL PREDICTION OF HORSE RACING RESULTS USING A NEURAL NETWORK SUCCESSFUL PREDICTION OF HORSE RACING RESULTS USING A NEURAL NETWORK N M Allinson and D Merritt 1 Introduction This contribution has two main sections. The first discusses some aspects of multilayer perceptrons,

More information

Handwritten digit segmentation: a comparative study

Handwritten digit segmentation: a comparative study IJDAR (2013) 16:127 137 DOI 10.1007/s10032-012-0185-9 ORIGINAL PAPER Handwritten digit segmentation: a comparative study F. C. Ribas L. S. Oliveira A. S. Britto Jr. R. Sabourin Received: 6 July 2010 /

More information

Analecta Vol. 8, No. 2 ISSN 2064-7964

Analecta Vol. 8, No. 2 ISSN 2064-7964 EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,

More information

Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature

Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature 3rd International Conference on Multimedia Technology ICMT 2013) Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature Qian You, Xichang Wang, Huaying Zhang, Zhen Sun

More information

The ABC s of Web Site Evaluation

The ABC s of Web Site Evaluation The ABC s of Web Site Evaluation by Kathy Schrock Digital Literacy by Paul Gilster Digital literacy is the ability to understand and use information in multiple formats from a wide range of sources when

More information

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification

More information

III. SEGMENTATION. A. Origin Segmentation

III. SEGMENTATION. A. Origin Segmentation 2012 International Conference on Frontiers in Handwriting Recognition Handwritten English Word Recognition based on Convolutional Neural Networks Aiquan Yuan, Gang Bai, Po Yang, Yanni Guo, Xinting Zhao

More information

9 Summary of California Law (10th), Partnership

9 Summary of California Law (10th), Partnership 9 Summary of California Law (10th), Partnership I. INTRODUCTION A. [ 1] Statutes Affecting Partnerships. B. Fictitious Business Name. 1. [ 2] In General. 2. [ 3] Fictitious Name Defined. 3. [ 4] Coverage

More information

Novelty Detection in image recognition using IRF Neural Networks properties

Novelty Detection in image recognition using IRF Neural Networks properties Novelty Detection in image recognition using IRF Neural Networks properties Philippe Smagghe, Jean-Luc Buessler, Jean-Philippe Urban Université de Haute-Alsace MIPS 4, rue des Frères Lumière, 68093 Mulhouse,

More information

Note: This information copied with permission. Thanks to Kevin K. Custer W3KKC, Masters Communications, Inc.

Note: This information copied with permission. Thanks to Kevin K. Custer W3KKC, Masters Communications, Inc. TV Channel, CATV and FM Broadcast Frequencies Note: This information copied with permission. Thanks to Kevin K. Custer W3KKC, Masters Communications, Inc. Newsgroups: sci.electronics From: andy@cbrown.claremont.edu

More information

Neural Network based Vehicle Classification for Intelligent Traffic Control

Neural Network based Vehicle Classification for Intelligent Traffic Control Neural Network based Vehicle Classification for Intelligent Traffic Control Saeid Fazli 1, Shahram Mohammadi 2, Morteza Rahmani 3 1,2,3 Electrical Engineering Department, Zanjan University, Zanjan, IRAN

More information

Component Ordering in Independent Component Analysis Based on Data Power

Component Ordering in Independent Component Analysis Based on Data Power Component Ordering in Independent Component Analysis Based on Data Power Anne Hendrikse Raymond Veldhuis University of Twente University of Twente Fac. EEMCS, Signals and Systems Group Fac. EEMCS, Signals

More information

Dr.Web anti-viruses Visual standards

Dr.Web anti-viruses Visual standards Dr.Web anti-viruses Visual standards Contents Who are we? The main Dr.Web logo Logos of Dr.Web products Registered trademarks Typography 1 Who are we? Doctor Web is a Russian developer of information security

More information

Face Recognition For Remote Database Backup System

Face Recognition For Remote Database Backup System Face Recognition For Remote Database Backup System Aniza Mohamed Din, Faudziah Ahmad, Mohamad Farhan Mohamad Mohsin, Ku Ruhana Ku-Mahamud, Mustafa Mufawak Theab 2 Graduate Department of Computer Science,UUM

More information

Neural Networks for Sentiment Detection in Financial Text

Neural Networks for Sentiment Detection in Financial Text Neural Networks for Sentiment Detection in Financial Text Caslav Bozic* and Detlef Seese* With a rise of algorithmic trading volume in recent years, the need for automatic analysis of financial news emerged.

More information

Face detection is a process of localizing and extracting the face region from the

Face detection is a process of localizing and extracting the face region from the Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.

More information

Data quality in Accounting Information Systems

Data quality in Accounting Information Systems Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania

More information

COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS

COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS B.K. Mohan and S. N. Ladha Centre for Studies in Resources Engineering IIT

More information

Handwritten Digit Recognition with a Back-Propagation Network

Handwritten Digit Recognition with a Back-Propagation Network 396 Le Cun, Boser, Denker, Henderson, Howard, Hubbard and Jackel Handwritten Digit Recognition with a Back-Propagation Network Y. Le Cun, B. Boser, J. S. Denker, D. Henderson, R. E. Howard, W. Hubbard,

More information

TIE Kinetix BRAND GUIDE. Global Marketing

TIE Kinetix BRAND GUIDE. Global Marketing TIE Kinetix BRAND GUIDE Global Marketing Company Profile Official Typography Logo Usage Official Brand Colors Used Dimensions Video Standards BRAND GUIDE VERSION 1.0-10 October 2013 1. Introduction 3 1.1.

More information

Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.

Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines. International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer

More information

PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION

PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION Introduction In the previous chapter, we explored a class of regression models having particularly simple analytical

More information

Numerical Field Extraction in Handwritten Incoming Mail Documents

Numerical Field Extraction in Handwritten Incoming Mail Documents Numerical Field Extraction in Handwritten Incoming Mail Documents Guillaume Koch, Laurent Heutte and Thierry Paquet PSI, FRE CNRS 2645, Université de Rouen, 76821 Mont-Saint-Aignan, France Laurent.Heutte@univ-rouen.fr

More information

FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS

FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS Breno C. Costa, Bruno. L. A. Alberto, André M. Portela, W. Maduro, Esdras O. Eler PDITec, Belo Horizonte,

More information

The Scientific Data Mining Process

The Scientific Data Mining Process Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In

More information

Neural Networks and Support Vector Machines

Neural Networks and Support Vector Machines INF5390 - Kunstig intelligens Neural Networks and Support Vector Machines Roar Fjellheim INF5390-13 Neural Networks and SVM 1 Outline Neural networks Perceptrons Neural networks Support vector machines

More information

1. Classification problems

1. Classification problems Neural and Evolutionary Computing. Lab 1: Classification problems Machine Learning test data repository Weka data mining platform Introduction Scilab 1. Classification problems The main aim of a classification

More information

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic

More information

Handwritten Signature Verification using Neural Network

Handwritten Signature Verification using Neural Network Handwritten Signature Verification using Neural Network Ashwini Pansare Assistant Professor in Computer Engineering Department, Mumbai University, India Shalini Bhatia Associate Professor in Computer Engineering

More information

CS4700/CS5700 Fundamentals of Computer Networking

CS4700/CS5700 Fundamentals of Computer Networking CS4700/CS5700 Fundamentals of Computer Networking Prof. Alan Mislove Lecture 2: Overview Slides adapted with permission from Eugene Ng, Rice COMP 413 September 10th, 2009 What is a network? 2 What is a

More information

Generalization Capacity of Handwritten Outlier Symbols Rejection with Neural Network

Generalization Capacity of Handwritten Outlier Symbols Rejection with Neural Network Generalization Capacity of Handwritten Outlier Symbols Rejection with Neural Network Harold Mouchère, Eric Anquetil To cite this version: Harold Mouchère, Eric Anquetil. Generalization Capacity of Handwritten

More information

Signature verification using Kolmogorov-Smirnov. statistic

Signature verification using Kolmogorov-Smirnov. statistic Signature verification using Kolmogorov-Smirnov statistic Harish Srinivasan, Sargur N.Srihari and Matthew J Beal University at Buffalo, the State University of New York, Buffalo USA {srihari,hs32}@cedar.buffalo.edu,mbeal@cse.buffalo.edu

More information

Introduction to Machine Learning and Data Mining. Prof. Dr. Igor Trajkovski trajkovski@nyus.edu.mk

Introduction to Machine Learning and Data Mining. Prof. Dr. Igor Trajkovski trajkovski@nyus.edu.mk Introduction to Machine Learning and Data Mining Prof. Dr. Igor Trakovski trakovski@nyus.edu.mk Neural Networks 2 Neural Networks Analogy to biological neural systems, the most robust learning systems

More information

Blood Vessel Classification into Arteries and Veins in Retinal Images

Blood Vessel Classification into Arteries and Veins in Retinal Images Blood Vessel Classification into Arteries and Veins in Retinal Images Claudia Kondermann and Daniel Kondermann a and Michelle Yan b a Interdisciplinary Center for Scientific Computing (IWR), University

More information

A Simple Feature Extraction Technique of a Pattern By Hopfield Network

A Simple Feature Extraction Technique of a Pattern By Hopfield Network A Simple Feature Extraction Technique of a Pattern By Hopfield Network A.Nag!, S. Biswas *, D. Sarkar *, P.P. Sarkar *, B. Gupta **! Academy of Technology, Hoogly - 722 *USIC, University of Kalyani, Kalyani

More information

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA

More information

Artist's Craft. Seuss photos may be found at either of the websites below: http://www.randomhouse.com/seussville/morefun/ted.html

Artist's Craft. Seuss photos may be found at either of the websites below: http://www.randomhouse.com/seussville/morefun/ted.html A-Book-A-Week: Cllassroom Instructiion Dr. Seuss's ABC Acctti ivvi ittyy Caarrd #1 Suuggggeesstteed Acctti ivvi ittyy Orrdeerr Dr. Seuss (pseudonym of Theodore Seuss Geisel) will become an important part

More information

Character Image Patterns as Big Data

Character Image Patterns as Big Data 22 International Conference on Frontiers in Handwriting Recognition Character Image Patterns as Big Data Seiichi Uchida, Ryosuke Ishida, Akira Yoshida, Wenjie Cai, Yaokai Feng Kyushu University, Fukuoka,

More information

Car Insurance. Havránek, Pokorný, Tomášek

Car Insurance. Havránek, Pokorný, Tomášek Car Insurance Havránek, Pokorný, Tomášek Outline Data overview Horizontal approach + Decision tree/forests Vertical (column) approach + Neural networks SVM Data overview Customers Viewed policies Bought

More information

Online Farsi Handwritten Character Recognition Using Hidden Markov Model

Online Farsi Handwritten Character Recognition Using Hidden Markov Model Online Farsi Handwritten Character Recognition Using Hidden Markov Model Vahid Ghods*, Mohammad Karim Sohrabi Department of Electrical and Computer Engineering, Semnan Branch, Islamic Azad University,

More information

SELECTING NEURAL NETWORK ARCHITECTURE FOR INVESTMENT PROFITABILITY PREDICTIONS

SELECTING NEURAL NETWORK ARCHITECTURE FOR INVESTMENT PROFITABILITY PREDICTIONS UDC: 004.8 Original scientific paper SELECTING NEURAL NETWORK ARCHITECTURE FOR INVESTMENT PROFITABILITY PREDICTIONS Tonimir Kišasondi, Alen Lovren i University of Zagreb, Faculty of Organization and Informatics,

More information

A new normalization technique for cursive handwritten words

A new normalization technique for cursive handwritten words Pattern Recognition Letters 22 2001) 1043±1050 www.elsevier.nl/locate/patrec A new normalization technique for cursive handwritten words Alessandro Vinciarelli *, Juergen Luettin 1 IDIAP ± Institut Dalle

More information

MANDATE OF THE BOARD

MANDATE OF THE BOARD 1 MANDATE OF THE BOARD Introduction to Stewardship Duties The purposes and responsibilities outlined in this Mandate and accompanying Board materials are meant to serve as guidelines rather than inflexible

More information

Effective Data Mining Using Neural Networks

Effective Data Mining Using Neural Networks IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 8, NO. 6, DECEMBER 1996 957 Effective Data Mining Using Neural Networks Hongjun Lu, Member, IEEE Computer Society, Rudy Setiono, and Huan Liu,

More information

STATEMENTS OF COST SPECIAL ASSESSMENTS SEPTEMBER, 2014

STATEMENTS OF COST SPECIAL ASSESSMENTS SEPTEMBER, 2014 STATEMENTS OF COST SPECIAL ASSESSMENTS SEPTEMBER, 2014 WATER: a. Statement of Cost for constructing Water Distribution System to serve Greenwich Business Center Addition (east of Greenwich, south of 29

More information

Euclidean Minimum Spanning Trees Based on Well Separated Pair Decompositions Chaojun Li. Advised by: Dave Mount. May 22, 2014

Euclidean Minimum Spanning Trees Based on Well Separated Pair Decompositions Chaojun Li. Advised by: Dave Mount. May 22, 2014 Euclidean Minimum Spanning Trees Based on Well Separated Pair Decompositions Chaojun Li Advised by: Dave Mount May 22, 2014 1 INTRODUCTION In this report we consider the implementation of an efficient

More information

Assessment. Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall

Assessment. Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall Automatic Photo Quality Assessment Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall Estimating i the photorealism of images: Distinguishing i i paintings from photographs h Florin

More information

Visualization of large data sets using MDS combined with LVQ.

Visualization of large data sets using MDS combined with LVQ. Visualization of large data sets using MDS combined with LVQ. Antoine Naud and Włodzisław Duch Department of Informatics, Nicholas Copernicus University, Grudziądzka 5, 87-100 Toruń, Poland. www.phys.uni.torun.pl/kmk

More information

Determining optimal window size for texture feature extraction methods

Determining optimal window size for texture feature extraction methods IX Spanish Symposium on Pattern Recognition and Image Analysis, Castellon, Spain, May 2001, vol.2, 237-242, ISBN: 84-8021-351-5. Determining optimal window size for texture feature extraction methods Domènec

More information

McGraw Hill Wonders. Reading At A Glance. Kendra Stuppi

McGraw Hill Wonders. Reading At A Glance. Kendra Stuppi McGraw Hill Wonders Reading At A Glance Kendra Stuppi Thank you for downloading/purchasing! 0 Kendra Stuppi All rights reserved by author. Permission to copy for single classroom use only. Electronic distribution

More information

Recognition of Handwritten Digits using Structural Information

Recognition of Handwritten Digits using Structural Information Recognition of Handwritten Digits using Structural Information Sven Behnke Martin-Luther University, Halle-Wittenberg' Institute of Computer Science 06099 Halle, Germany { behnke Irojas} @ informatik.uni-halle.de

More information

Environmental Remote Sensing GEOG 2021

Environmental Remote Sensing GEOG 2021 Environmental Remote Sensing GEOG 2021 Lecture 4 Image classification 2 Purpose categorising data data abstraction / simplification data interpretation mapping for land cover mapping use land cover class

More information

Accurate and robust image superresolution by neural processing of local image representations

Accurate and robust image superresolution by neural processing of local image representations Accurate and robust image superresolution by neural processing of local image representations Carlos Miravet 1,2 and Francisco B. Rodríguez 1 1 Grupo de Neurocomputación Biológica (GNB), Escuela Politécnica

More information

GLOSSARY of Paratransit Terms

GLOSSARY of Paratransit Terms Innovation in Transit GLOSSARY of Paratransit Terms January 2007 FORWARD: ABOUT PACE PARATRANSIT SERVICES Pace provides a variety of public transportation services. ADA Paratransit, which operates in the

More information

Distributed forests for MapReduce-based machine learning

Distributed forests for MapReduce-based machine learning Distributed forests for MapReduce-based machine learning Ryoji Wakayama, Ryuei Murata, Akisato Kimura, Takayoshi Yamashita, Yuji Yamauchi, Hironobu Fujiyoshi Chubu University, Japan. NTT Communication

More information

Part-Based Recognition

Part-Based Recognition Part-Based Recognition Benedict Brown CS597D, Fall 2003 Princeton University CS 597D, Part-Based Recognition p. 1/32 Introduction Many objects are made up of parts It s presumably easier to identify simple

More information

Establishing the Uniqueness of the Human Voice for Security Applications

Establishing the Uniqueness of the Human Voice for Security Applications Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 7th, 2004 Establishing the Uniqueness of the Human Voice for Security Applications Naresh P. Trilok, Sung-Hyuk Cha, and Charles C.

More information

P. Lu, Sh. Huang and K. Jiang

P. Lu, Sh. Huang and K. Jiang 416 Rev. Adv. Mater. Sci. 33 (2013) 416-422 P. Lu, Sh. Huang and K. Jiang NUMERICAL ANALYSIS FOR THREE-DIMENSIONAL BULK METAL FORMING PROCESSES WITH ARBITRARILY SHAPED DIES USING THE RIGID/VISCO-PLASTIC

More information

Categorical Data Visualization and Clustering Using Subjective Factors

Categorical Data Visualization and Clustering Using Subjective Factors Categorical Data Visualization and Clustering Using Subjective Factors Chia-Hui Chang and Zhi-Kai Ding Department of Computer Science and Information Engineering, National Central University, Chung-Li,

More information

Image Classification for Dogs and Cats

Image Classification for Dogs and Cats Image Classification for Dogs and Cats Bang Liu, Yan Liu Department of Electrical and Computer Engineering {bang3,yan10}@ualberta.ca Kai Zhou Department of Computing Science kzhou3@ualberta.ca Abstract

More information

High-Performance Signature Recognition Method using SVM

High-Performance Signature Recognition Method using SVM High-Performance Signature Recognition Method using SVM Saeid Fazli Research Institute of Modern Biological Techniques University of Zanjan Shima Pouyan Electrical Engineering Department University of

More information

Islands 1 Wordlist. Islands Alphabet booklet. Islands 1 Grammar Booklet. Islands 1 Pupils Book. Islands 1 Activity Book.

Islands 1 Wordlist. Islands Alphabet booklet. Islands 1 Grammar Booklet. Islands 1 Pupils Book. Islands 1 Activity Book. Islands 1 Junior A Components Islands Alphabet let Islands 1 Islands 1 Pupils Book Islands 1 Islands 1 Online World Book Also: Teacher s Book Test Audio material (in the ActiveTeach) Online World ActiveTeach

More information

AUTOMATION OF ENERGY DEMAND FORECASTING. Sanzad Siddique, B.S.

AUTOMATION OF ENERGY DEMAND FORECASTING. Sanzad Siddique, B.S. AUTOMATION OF ENERGY DEMAND FORECASTING by Sanzad Siddique, B.S. A Thesis submitted to the Faculty of the Graduate School, Marquette University, in Partial Fulfillment of the Requirements for the Degree

More information

Neural Network Add-in

Neural Network Add-in Neural Network Add-in Version 1.5 Software User s Guide Contents Overview... 2 Getting Started... 2 Working with Datasets... 2 Open a Dataset... 3 Save a Dataset... 3 Data Pre-processing... 3 Lagging...

More information

Standards for Working Drawings

Standards for Working Drawings Standards for Working Drawings 27 August 2013 Department of Mechanical and Mechatronic Engineering and Sustainable Manufacturing California State University, Chico Chico, California 95929-0789 Contents

More information

Multimodal Biometric Recognition Security System

Multimodal Biometric Recognition Security System Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security

More information

Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks

Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the

More information

Extend Table Lens for High-Dimensional Data Visualization and Classification Mining

Extend Table Lens for High-Dimensional Data Visualization and Classification Mining Extend Table Lens for High-Dimensional Data Visualization and Classification Mining CPSC 533c, Information Visualization Course Project, Term 2 2003 Fengdong Du fdu@cs.ubc.ca University of British Columbia

More information

Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing and Developing E-mail Classifier

Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing and Developing E-mail Classifier International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-1, Issue-6, January 2013 Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing

More information

MyOWNMcMaster Degree Pathway: Diploma in Business Administration & Bachelor of Arts in History

MyOWNMcMaster Degree Pathway: Diploma in Business Administration & Bachelor of Arts in History MyOWNMcMaster Degree Pathway: Diploma in Business Administration & Bachelor of Arts in History Requirements The MyOWNMcMaster degree pathway has three parts: diploma, elective and undergraduate courses.

More information

Jiří Matas. Hough Transform

Jiří Matas. Hough Transform Hough Transform Jiří Matas Center for Machine Perception Department of Cybernetics, Faculty of Electrical Engineering Czech Technical University, Prague Many slides thanks to Kristen Grauman and Bastian

More information

Requirements The MyOWNMcMaster degree pathway has three parts: diploma, elective and undergraduate courses.

Requirements The MyOWNMcMaster degree pathway has three parts: diploma, elective and undergraduate courses. MyOWNMcMaster Degree Pathway: Diploma in Business Administration with a Concentration in Marketing & Bachelor of Arts in History Requirements The MyOWNMcMaster degree pathway has three parts: diploma,

More information

Aa Bb Cc Dd Ee Ff Gg Hh Ii Jj Kk Ll Mm Nn Oo Pp Qq Rr Ss Tt Uu Vv Ww Xx Yy Zz 1 2 3 4 5 6 7 8 9 0

Aa Bb Cc Dd Ee Ff Gg Hh Ii Jj Kk Ll Mm Nn Oo Pp Qq Rr Ss Tt Uu Vv Ww Xx Yy Zz 1 2 3 4 5 6 7 8 9 0 Brand Standards 1 Header Font Lobster 1.4 Regular is the header font for Wildwood. This font should always appear with a gradient and rounded stroke. This should be used for promotion, ad headlines and

More information

The MyOWNMcMaster degree pathway has three parts: diploma, elective and undergraduate courses.

The MyOWNMcMaster degree pathway has three parts: diploma, elective and undergraduate courses. MyOWNMcMaster Degree Pathway: Diploma in Human Resources Management & Bachelor of Arts in History Requirements The MyOWNMcMaster degree pathway has three parts: diploma, elective and undergraduate courses.

More information

County Council of Cuyahoga County, Ohio. Resolution No. R2014-0200

County Council of Cuyahoga County, Ohio. Resolution No. R2014-0200 County Council of Cuyahoga County, Ohio Resolution No. R2014-0200 Sponsored by: County Executive FitzGerald/Department of Workforce Development, in partnership with City of Cleveland, as designated Local

More information

Handwritten Character Recognition from Bank Cheque

Handwritten Character Recognition from Bank Cheque International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 Handwritten Character Recognition from Bank Cheque Siddhartha Banerjee*

More information

A Beginner s Guide To English Grammar

A Beginner s Guide To English Grammar A Beginner s Guide To English Grammar Noncredit ESL Glendale Community College Concept by: Deborah Robiglio Created by: Edwin Fallahi, Rocio Fernandez, Glenda Gartman, Robert Mott, and Deborah Robiglio

More information

Drawing a histogram using Excel

Drawing a histogram using Excel Drawing a histogram using Excel STEP 1: Examine the data to decide how many class intervals you need and what the class boundaries should be. (In an assignment you may be told what class boundaries to

More information

SERVICES CATALOG. FRONTIER COMMUNICATIONS OF ALABAMA, LLC Section 16 Original Sheet 1 S16. CENTREX

SERVICES CATALOG. FRONTIER COMMUNICATIONS OF ALABAMA, LLC Section 16 Original Sheet 1 S16. CENTREX Original Sheet 1 S16.1 GENERAL A. Centrex is a Central Office based business communications service which provides capabilities similar to those offered on a Private Branch Exchange, but without requiring

More information

Feed-Forward mapping networks KAIST 바이오및뇌공학과 정재승

Feed-Forward mapping networks KAIST 바이오및뇌공학과 정재승 Feed-Forward mapping networks KAIST 바이오및뇌공학과 정재승 How much energy do we need for brain functions? Information processing: Trade-off between energy consumption and wiring cost Trade-off between energy consumption

More information

. Learn the number of classes and the structure of each class using similarity between unlabeled training patterns

. Learn the number of classes and the structure of each class using similarity between unlabeled training patterns Outline Part 1: of data clustering Non-Supervised Learning and Clustering : Problem formulation cluster analysis : Taxonomies of Clustering Techniques : Data types and Proximity Measures : Difficulties

More information

I Have...Who Has... Multiplication Game

I Have...Who Has... Multiplication Game How to play the game: Distribute the cards randomly to your students. Some students may get more than one card. Select a student to begin by reading their card aloud. (example: 35. who has 4x4?) 35 4 x

More information

advertise to announce that a product is for sale or that a service is offered in order to encourage people to buy it or to use it

advertise to announce that a product is for sale or that a service is offered in order to encourage people to buy it or to use it Aa Acquisition process by which a company buys another company advertise to announce that a product is for sale or that a service is offered in order to encourage people to buy it or to use it advertiser

More information

A Study of Automatic License Plate Recognition Algorithms and Techniques

A Study of Automatic License Plate Recognition Algorithms and Techniques A Study of Automatic License Plate Recognition Algorithms and Techniques Nima Asadi Intelligent Embedded Systems Mälardalen University Västerås, Sweden nai10001@student.mdh.se ABSTRACT One of the most

More information

Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems

Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems

More information

Machine Learning Logistic Regression

Machine Learning Logistic Regression Machine Learning Logistic Regression Jeff Howbert Introduction to Machine Learning Winter 2012 1 Logistic regression Name is somewhat misleading. Really a technique for classification, not regression.

More information

A Lightweight and Effective Music Score Recognition on Mobile Phone

A Lightweight and Effective Music Score Recognition on Mobile Phone J Inf Process Syst, http://dx.doi.org/.3745/jips ISSN 1976-913X (Print) ISSN 92-5X (Electronic) A Lightweight and Effective Music Score Recognition on Mobile Phone Tam Nguyen* and Gueesang Lee** Abstract

More information

STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK

STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK Volume 6, Issue 3, pp: 335343 IJESET STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK Dipti Verma 1, Sipi Dubey 2 1 Department of Computer

More information

Efficient online learning of a non-negative sparse autoencoder

Efficient online learning of a non-negative sparse autoencoder and Machine Learning. Bruges (Belgium), 28-30 April 2010, d-side publi., ISBN 2-93030-10-2. Efficient online learning of a non-negative sparse autoencoder Andre Lemme, R. Felix Reinhart and Jochen J. Steil

More information

Planning Workforce Management for Bank Operation Centers with Neural Networks

Planning Workforce Management for Bank Operation Centers with Neural Networks Plaing Workforce Management for Bank Operation Centers with Neural Networks SEFIK ILKIN SERENGIL Research and Development Center SoftTech A.S. Tuzla Teknoloji ve Operasyon Merkezi, Tuzla 34947, Istanbul

More information