Handwritten Devanagari (Marathi) Compound Character Recognition using Seventh Central Moment
|
|
|
- Clement Black
- 9 years ago
- Views:
Transcription
1 Handwritten Devanagari (Marathi) Compound Character Recognition using Seventh Central Moment P.E.Ajmire 1, R V Dharaskar 2, V M Thakare 3 Associate Professor, Dept. of Computer Science, G. S. Science Arts & Comm. College, Khamgaon.(M.S.), India1 Former Director, Disha Education Scociety, Raipur, (C.G), India2 Professor & Head, Dept. Of Comp. Sci., PGTD of CS, S G B Amravati University, Amravati, (M.S.), India3 ABSTRACT: Compound character recognition of Devanagari Script (Marathi language) is one of the challenging tasks since the compound character is combination of one or more characters. These characters can be treated as fusion of two or more characters and hence these are complex in structure. Marathi, Hindi, Sanskrit and Nepali are written with Devanagari script. All these languages have compound characters. The characters may be formed with different sequence of combinations of basic characters such as vowels and consonants. Thus the recognition of compound characters makes this task more challenging to the researcher. So, as compared to English like Roman script, one of the major obstacles in handwritten Marathi character recognition is the large number of complex shaped compound characters. Considering the complexity of the problem, the present algorithm makes an attempt to identify the compound character. This paper discuss the recognition of compound character using combination of 7 Invariant Moment (Rotational Moment) and 7 th order Central Moment(Translation Moment). SVM is used as classifier. The overall performance of the proposed system is 93.87%. KEYWORDS: Compound Character, Feature Extraction, Handwritten character recognition. I. INTRODUCTION Historically, India is multilingual country and Indian constitution recognizes 22 languages which are written with 11 different scripts and nearly 6000 dialects used in different states of the country. Marathi is one of the widely spoken languages in India especially in the Maharashtra state. Hindi, Sanskrit, Marathi and Nepali use the Devanagari script for writing and speaking. During this many compound characters are used. These compound characters make the task of its recognition more difficult. In Pattern recognition area, Optical Character Recognition is still an active and challenging area of research, specially handwritten Marathi Characters. It is due to the different writing styles, which various from person to person. Compound characters are one of the most frequently used constructs in spoken as well as written Marathi Language. Like in any language, two or more consonants can be combined and pronounced together. e.g. In English word "fact" consonants "c" and "t" and pronounced together, but in Marathi we do not just write symbols one after other. There is little change done in symbol of first consonant which is to be pronounced half. So, consonant symbol is also written half. Half symbol(s) + full symbol is called ज ड र (jodakshar). A. Devanagari Characters As Devanagari characters[1,12], Marathi characters can be divided into three groups based on the presence and position of a vertical bar, namely: i. end bar characters Copyright to IJIRCCE DOI: /ijircce
2 ii. iii. middle bar characters and non-bar The position of the vertical bar is the left most column where number of black pixels is 80% or more of the character height. This is determined by scanning the vertical projection of the image from left to right. The first column where target numbers of pixels are present becomes the position of the vertical bar. Figure 1.shows some end bar characters. Fig.1 End Bar Characters In Marathi, there are only three characters written with centred vertical bar shown in figure 2. Fig.2 Centered vertical bar Characters. There are some characters written without any bar are given in figure 3. Fig.3 No bar Characters B. Compound Character In Marathi there is various form of compound character. For each compound character, it is corresponding to its "half" predefined character. For those symbol having vertical in them. Their half-symbol is created by omitting vertical line. The following table shows the half symbol with a व and the corresponding compound character. Full Symbol Half symbol Combining व (v) to half symbol ख(kh) ख ख व ग(g) ग ग व घ(gh) घ घ व च(ch) च च व ज(j) ज ज व झ(jh) झ झ व ण(N) ण ण व त(t) त त व थ(th) थ थ व ब(b) ब ब व भ(bh) भ भ व म(m) म म व य(y) य य व ल(l) ल ल व Copyright to IJIRCCE DOI: /ijircce
3 व(v) व व व श(sh) श or श व or ष(Sh) ष ष व स(s) स स व (ksh) व (dny) व Table 1: Shows Some Compound Characters In the above table, some compound characters formed by the combination of two basic characters, out of it one is basic character and other is व (v). Some other form the compound character is shown below. 1. Small cross line connected to the central vertical line of first half character. E.g क + र = but it is. 2. Small cross line connected to vertical line of the first character. E.g प + र = but it is. 3. If the first character does not have any vertical then the compound character will have another form. E.g ट + र = but it is. 4. If the first character is र then we have another fom. E.g र + ह = but it is In this way there are 36x36=1296 compound characters form with consonants are available in Marathi. In addition to this there are compound characters formed with vowels i.e. upper and lower modifiers are in Marathi, which are commonly used in the language in written and in spoken language. II. RELATED WORK There are many script and Languages in the world. The researchers have done work on some of them like English, Chinese, Latin, Arabic, Japanese, Thai and Devanagari. India is a multi-lingual and multi-script country comprising of eleven different scripts and not much work has been done towards handwritten recognition of Indian scripts. Recognition of handwritten characters is important because of its applicability to a number of problems, like postal code recognition and information extraction from fields of different forms. In the Indian context, there exists a need for development and/or evaluation of the existing techniques for recognition of handwritten character in Indian scripts. A variety of statistical techniques, model and techniques has emerged, influenced by developments in the field of pattern recognition such as character recognition[2,3,4,6], face recognition, finger print recognition, etc. In this paper, we have mentioned the statistical features extraction techniques for its recognition. Selection of a feature extraction method is probably the single most important factor in achieving high recognition performance in character recognition systems. Different feature extraction methods are designed for different representations of the characters, such as solid binary characters, character contours, skeletons (thinned characters), or gray level sub-images of each individual character[8]. The feature extraction methods are discussed in terms of invariance properties, re-constructability, and expected distortions and variability of the characters. When a few promising feature extraction methods have been identified, they need to be evaluated experimentally to find the best method for the given application. A consonant or vowel[10] following a consonant, sometimes takes a compound orthographic shape, which we call as compound character. Compound characters can be combinations of two consonants as well as a consonant and a vowel. Compounding of three or four characters also exists in the script[2]. This becomes the huge set of characters, which is nearly The Copyright to IJIRCCE DOI: /ijircce
4 F ISSN(Online) : complexity of a handwritten character recognition system increases mainly because of various writing styles of different individuals. This is another challenging aspect in the development of recognition system. There are two different ways are proposed for recognition of compound characters [3]. One way by separation of the character and another is without separation of character. i.e. the compound character is consider as a one character. A. Database Preparation To the best of our knowledge standard dataset of Handwritten Marathi character is not available. Therefore, dataset of handwritten Marathi Characters is design by collecting the handwritten documents from writers of different age groups of different mother tong. There are variations in writing styles. Some writer use Shirorekha some doesn t use Shirorekha. These contain some basic as well as compound characters with and without Shirorekha. Some words and characters are given in figure 4. Fig 4. Handwritten words with compound characters B. Pre-processing Pre-processing is the first step in any character recognition system because this affects the results of method. Preprocessing of compound character involves following steps: RGB to Gray Conversion: The handwritten data sheet is scan with resolution 300 dpi in color format of JPG (JPEG) file. For character recognition we need Binary image. So the RGB is converted to Gray and then to Binary. Thresholding: The scan image of the character (Gray or Color) is taken as an input to convert into binary image, based on the threshold level[4]. Binarization: Binarization is an important image processing step in which the pixel values are separated into two groups; white as background and black as foreground. Only two colors, white and black, can be present in a binary. The aim of binarization is to minimize the unwanted information present in the image while protecting the useful information [5]. Noise Reduction : In image processing, noise reduction and restoration of image is expected to improve the qualitative inspection of an image and the performance criteria of quantitative image analysis techniques Digital image is inclined to a variety of noise which affects the quality of image. The main purpose of denoising the image is to restore the detail of original image as much as possible [6]. Normalization: Normalization is An important operation that helps improve the contrast in an image is called Auto-Normalization. The goal of auto-normalization is to improve the contrast of the image by stretching the range of intensity values to span a greater range of (luminance) values. Auto-normalization is performed on every image we process. It s a linear, lossless operation that can take a low-contrast image and make it more legible. On images that have good contrast to begin with, auto-normalization has little to no effect. Thinning: Thinning of the character reduced the thickness of the character to one pixel. This process is also called skeletonization. We performed morphological operation skel on binary image. [8] Fig.4 Sample compound characters after pre-processing III. SEGMENTATION Segmentation refers to the process in which an image is subdivided into constituent regions or objects. These objects can be further processed or analyzed for the extraction of quantitative information. There are various types of segmentation which are paragraph segmentation, line segmentation, word segmentation and character segmentation. Character segmentation is a procedure in which from the word segmentation. Character segmentation is a critical step of OCR system. Character segmentation is an operation that seeks to decompose an image of a sequence of characters Copyright to IJIRCCE DOI: /ijircce
5 into sub images of individual symbols. It is depends on the script used in writing the document. A poor segmentation process produces misrecognition or rejection segmentation process carried after out only the pre processing of image [9]. There are various problem can be occur in character segmentation because all characters has not fixed size & shapes in handwritten document [8]. The problems in character segmentation can be divided into a variety of categories as following as: i. Problem of broken characters ii. Problem of overlapped characters iii. Problem of Touching characters iv. Problem of Skewed characters v. Problem of irregular intensity with the character IV. FEATURE SELECTION & EXTRACTION The features of the character are the distinct characteristics of that character which help to recognize it. For pattern recognition the features should be easily computed and robust. Two types of features used in pattern recognition. The first one has clear physical meaning, such as structural or statistical features. Another type of features has no physical meaning, but these features are treated as mapping features. The advantage of mapping features is that they can make classification easier. Statistical Features is a technique to machine intelligence which is based on statistical model in hand; one applies probability theory and decision theory to get an algorithm. Features are the measurements which represent the character such as size, shape and intensity. The statistical model one uses is crucially dependent on the choice of features. Hence it is useful to consider alternative representations of the same measurements (i.e. different features). For example, different representations of the character values in an image. Moment invariants have been frequently used as features for image processing [10], remote sensing, shape recognition and classification. Moments can its shape. Invariant shape recognition is provided characteristics of an object that uniquely represent performed by classification in the multidimensional moment invariant feature space. Several techniques have been developed that derive invariant features from moments for object recognition and representation. These techniques are distinguished by their moment definition, such as the type of data exploited and the method for deriving invariant values from the image moments. It was Hu that first set out the mathematical foundation for twodimensional moment invariants and demonstrated their applications to shape recognition. These moment invariant values are invariant with respect to translation, scale and rotation of the shape. Traditionally, moment invariants are computed based on the information provided by both the shape boundary and its interior region. The moments used to construct the moment invariants are defined in the continuous but for practical implementation they are computed in the discrete form. Given a function f(x,y), these regular moments are defined by: p q pq x y f ( x, y) dxdy (1) Where, Mpq is the two-dimensional moment of the function f(x y) for p, q = 0,1, 2,. The order of the moment is (p+q) where p and q are both natural numbers. For implementation in digital form this becomes: pq x p y q f ( x, y) V. CENTRAL MOMENT A central moment is a moment of a probability distribution of random variable about the random variable's mean. The rth moment about any point is called a central moment; it is the expected value of a specified integer power of the deviation of the random variable from the mean. The various moments form one set of values by which the properties of a probability distribution can be usefully characterized. Central moments are used in preference to ordinary moments, computed in terms of deviations from the mean instead of from the zero, because the higher-order central moments relate only to the spread and shape of the distribution, rather than also to its location. The central moment of a multivariate probability density function can be similarly defined as (2) Copyright to IJIRCCE DOI: /ijircce
6 Therefore, For example,...(3) (4) (5) Similarly, the multivariate central moments can be expressed in terms of the multivariate cumulants. For example, µ1,1=k1,1 µ2,1= K 2,1 µ3,1=3 K 1,1 K 2,1 + K 3,1 µ4,1=6 K 2,0 K 2,1 + 4 K 1,1 K 3,0 + K 4,1 µ5,1=[15k22,0 + 10K2,1K3,0+10K2,0K3,1+5K1,1K4,0]+K5,1 (6) In this way 7th order Central moments features are extracted from the compound character. These values are combined with seven invariant moment features values. VI. CLASSIFICATION AND RECOGNITION The statistical technique has been most intensively studied and used in practice. More recently, neural network techniques and methods imported from statistical learning theory have been receiving increasing attention. The design of a recognition system requires careful attention to the following issues: definition of pattern classes, sensing environment, pattern representation, feature extraction and selection, cluster analysis, classifier design and learning, selection of training and test samples, and performance evaluation. The invariant moments are well known to be invariant under translation, scaling, rotation and reflection. They are measures of the pixel distribution around the centre of gravity of the character and allow capturing the global character shape information. Traditionally, moment invariants are computed based on the information provided by both the shape boundary and its interior region. The moments used to construct the moment invariants are defined in the continuous but for practical implementation they are computed in the discrete form. Support vector machine was first introduced by V. Vapnik [8,13], it is simple and achieve good performance. The SVM is capable of learning a finite amount of data given for training. The principle of an SVM is to map the input data onto a higher dimensional feature space nonlinearly related to the input space and determine a separating hyper plane with maximum margin between the two classes in the feature space. [11]. VII. RESULT AND DISCUSSION In this system we used combination of invariant moments and central moments. We used both types of compound character i.e with Shirorekha and without Shirorekha so that the proposed system should be implemented in any case. Hence the pre-processing task of detection and removal Shirorekha is reduced. This means the recognition time is minimized. The table 2 shows, average recognition rate of some of the sample compound characters. Copyright to IJIRCCE DOI: /ijircce
7 Accuracy in Compound Character %age mya nya swa tya dhva tva stra Avg Table 2: Accuracy of Recognition of Some compound characters. We have selected the samples with Shirorekha and without Shirorekha and also the combination of different characters. It is noted that the Shirorekha doesn t affect the recognition rate. As in case of tya, dhav the recognition rate is 96.66% for stra it is 97.14% where as in case of tva recognition rate is 90%. These compound characters are with Shirorekha. The proposed system with different kinds of compound characters, the average accuracy of recognition rate is 93.87%. This recognition rate is increased by using some hybrid methods such as structural and statistical methods. Current research employs models not only of characters, but also words and phrases, and even entire documents, and powerful tools such as HMM[14], neural nets, contextual methods are being brought to bear. It is hoped that this comprehensive discussion will provide insight into the concepts involved, and perhaps provoke further advances in this area. VIII. CONCLUSION AND FUTURE WORK The simulation results showed that the proposed algorithm performs better with the total transmission energy metric than the maximum number of hops metric. The proposed algorithm provides energy efficient path for data transmission and maximizes the lifetime of entire network. As the performance of the proposed algorithm is analyzed between two metrics in future with some modifications in design considerations the performance of the proposed algorithm can be compared with other energy efficient algorithm. We have used very small network of 5 nodes, as number of nodes increases the complexity will increase. We can increase the number of nodes and analyze the performance. REFERENCES 1. Veena Bansal and R. M. K. Sinha Segmentation of touching characters in Devanagari, Indian Conference on Computer Vision, Graphics and Image Processing, Vol.-Issue.ICVGIP 98, pp , U. Pal, T. Wakabayashi and F. Kimura. Comparative study of Devanagari Handwritten character recognition using different Features and Classifier, , IEEE, ICDAR, Chavan S V, Kale K.V, Kazi M M and Rode Y S Recognition of Handwritten Devanagari Compound Character A Moment Feature Based approach, International Journal of Machinne Intelligence, Vol. 5, Issue 1, pp , V. S. Tapkir, S, D. Shelke OCR For handwritten Marathi Script, International Journal of Scientific & Engineering Research, Vol. 3, Issue 8, Amit Choudhary, Rahul Rishi, Savita Ahlawat Off-Line Handwritten Character Recognition using Features Extracted from Binarization Technique., Conference on Intelligent Systems and Control, AASRI Procedia Vol. 4, pp , Priyanka Kamboj and Versha Rani A Briff Study of Various Noise Model and Filtering Techniques, Journal of Global Research in Computer Science, Vol.4, Issue. 4, Vneeta Rani, Dr.Vijay laxmi Segmentation of Handwritten Text Document Written in Devanagari Script for Simple character, skewed character and broken character International Journal of Computers & Technology, Vol. 8, Issue No 1, pp , Karbhari V. Kale, P D. Deshmukh, S V. Chavan, M M. Kazi and Yogesh S. Rode, Zernike Moment Feature Extraction for Handwritten Devanagari (Marathi) Compound Character Recognition, International Journal of Advanced Research in Artificial Intelligence, (IJARAI), Vol. 3, Issue.1, Copyright to IJIRCCE DOI: /ijircce
8 9. Vneeta Rani, Pankaj Kumar Problems of character segmentation in Handwritten Text Documents written in Devanagari Script, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Vol..2, Issue 3, P.E.Ajmire and S E Warkhede Handwritten Marathi Character (Vowel) Recognition, Advances in Information Mining, ISSN: , Vol. 2, Issue 2, pp-11-13, K V. Kale, P D. Deshmukh, S V. Chavan, M M. Kazi and Yogesh S. Rode, Handwritten and Printed Devanagari Compound using Multiclass SVM Classifier with Orthogonal moment Feature, International Journal of Computer Applications ( ) Volume 71 No.24, pp.31-37, N. Joshi, G. Sita, A.G. Ramakrishnana, Deepu V, S.Mahdavnath, Machine recognition of online handwritten Devanagari characters, Document Analysis and Recognition, Proceedings. Eighth International Conference, Vol.2, pp , V. Vapnik., The nature of statistical learning theory, Book published by Springer, N.Y. ISBN , U. Bhattacharya, S.K.Parui, B. Shaw, K. Bhattacharya Neural Combination of ANN and HMM for handwritten Devanagari Numeral Recognition, Proceedings of the 10th IWFHR, pp , BIOGRAPHY Prafulla Eknathrao Ajmire is a working as Associate Professor in the Department of Computer Science, G S Science, Arts & Commerce College, Khamgaon Dist. Buldana (M.S.), India. He received Master of Science.M.Sc.[Physics] from R.T.M. Nagpur University, Master of Science(M.S) in [Software System] degree in 1993 from BITS, Pilani, India. He received M.Phil [ Comp.Sci.] degree in 2009 from S.G.B, Amravati University. Dr. Rajiv V Dharaskar, Former Director, Disha Education Society (DIMAT - Disha Technical Campus), Raipur, C.G Former Director, MPGI Group of Institutions Integrated Campus, Nanded Former Professor and Head, PG Department of Computer Science and Engineering, G H Raisoni College of Engineering, a TEQIP II benefited Autonomous Institute, Nagpur.(India) Dr. Vilas M Thakare, Professor and Head in Computer Science, Faculty of Engineering & Technology, Post Graduate Department of Computer Science, Sant Gadgebaba Amravati University, Amravati. Ph.D.(Computer Science), M.E. (Advance Electronics), M.Sc.(Applied Electronics), Diploma in Computer Management. Copyright to IJIRCCE DOI: /ijircce
DEVNAGARI DOCUMENT SEGMENTATION USING HISTOGRAM APPROACH
DEVNAGARI DOCUMENT SEGMENTATION USING HISTOGRAM APPROACH Vikas J Dongre 1 Vijay H Mankar 2 Department of Electronics & Telecommunication, Government Polytechnic, Nagpur, India 1 [email protected]; 2
Signature Segmentation from Machine Printed Documents using Conditional Random Field
2011 International Conference on Document Analysis and Recognition Signature Segmentation from Machine Printed Documents using Conditional Random Field Ranju Mandal Computer Vision and Pattern Recognition
ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan
Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification
DIAGONAL BASED FEATURE EXTRACTION FOR HANDWRITTEN ALPHABETS RECOGNITION SYSTEM USING NEURAL NETWORK
DIAGONAL BASED FEATURE EXTRACTION FOR HANDWRITTEN ALPHABETS RECOGNITION SYSTEM USING NEURAL NETWORK J.Pradeep 1, E.Srinivasan 2 and S.Himavathi 3 1,2 Department of ECE, Pondicherry College Engineering,
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
A Simple Feature Extraction Technique of a Pattern By Hopfield Network
A Simple Feature Extraction Technique of a Pattern By Hopfield Network A.Nag!, S. Biswas *, D. Sarkar *, P.P. Sarkar *, B. Gupta **! Academy of Technology, Hoogly - 722 *USIC, University of Kalyani, Kalyani
How To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
Automatic Extraction of Signatures from Bank Cheques and other Documents
Automatic Extraction of Signatures from Bank Cheques and other Documents Vamsi Krishna Madasu *, Mohd. Hafizuddin Mohd. Yusof, M. Hanmandlu ß, Kurt Kubik * *Intelligent Real-Time Imaging and Sensing group,
Automatic Detection of PCB Defects
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 6 November 2014 ISSN (online): 2349-6010 Automatic Detection of PCB Defects Ashish Singh PG Student Vimal H.
Introduction to Pattern Recognition
Introduction to Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University [email protected] CS 551, Spring 2009 CS 551, Spring 2009 c 2009, Selim Aksoy (Bilkent University)
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
Script and Language Identification for Handwritten Document Images. Judith Hochberg Kevin Bowers * Michael Cannon Patrick Kelly
Script and Language Identification for Handwritten Document Images Judith Hochberg Kevin Bowers * Michael Cannon Patrick Kelly Computer Research and Applications Group (CIC-3) Mail Stop B265 Los Alamos
Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.
International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer
Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature
3rd International Conference on Multimedia Technology ICMT 2013) Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature Qian You, Xichang Wang, Huaying Zhang, Zhen Sun
How To Filter Spam Image From A Picture By Color Or Color
Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among
Signature Region of Interest using Auto cropping
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 Signature Region of Interest using Auto cropping Bassam Al-Mahadeen 1, Mokhled S. AlTarawneh 2 and Islam H. AlTarawneh 2 1 Math. And Computer Department,
How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
Galaxy Morphological Classification
Galaxy Morphological Classification Jordan Duprey and James Kolano Abstract To solve the issue of galaxy morphological classification according to a classification scheme modelled off of the Hubble Sequence,
Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap
Palmprint Recognition By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palm print Palm Patterns are utilized in many applications: 1. To correlate palm patterns with medical disorders, e.g. genetic
SIGNATURE VERIFICATION
SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University
Online Farsi Handwritten Character Recognition Using Hidden Markov Model
Online Farsi Handwritten Character Recognition Using Hidden Markov Model Vahid Ghods*, Mohammad Karim Sohrabi Department of Electrical and Computer Engineering, Semnan Branch, Islamic Azad University,
Text-To-Speech for Languages without an Orthography अ रप त नसल भ ष स ठ व ण स षण
Text-To-Speech for Languages without an Orthography Sukhada Palkar Alan W Black Alok Parlikar Language Technologies Institute Carnegie Mellon University Pittsburgh (PA), USA {spalkar, awb, aup} @cs.cmu.edu
Character Image Patterns as Big Data
22 International Conference on Frontiers in Handwriting Recognition Character Image Patterns as Big Data Seiichi Uchida, Ryosuke Ishida, Akira Yoshida, Wenjie Cai, Yaokai Feng Kyushu University, Fukuoka,
A Lightweight and Effective Music Score Recognition on Mobile Phone
J Inf Process Syst, http://dx.doi.org/.3745/jips ISSN 1976-913X (Print) ISSN 92-5X (Electronic) A Lightweight and Effective Music Score Recognition on Mobile Phone Tam Nguyen* and Gueesang Lee** Abstract
Low-resolution Character Recognition by Video-based Super-resolution
2009 10th International Conference on Document Analysis and Recognition Low-resolution Character Recognition by Video-based Super-resolution Ataru Ohkura 1, Daisuke Deguchi 1, Tomokazu Takahashi 2, Ichiro
ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL
International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS
COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS B.K. Mohan and S. N. Ladha Centre for Studies in Resources Engineering IIT
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents
SVM Based License Plate Recognition System
SVM Based License Plate Recognition System Kumar Parasuraman, Member IEEE and Subin P.S Abstract In this paper, we review the use of support vector machine concept in license plate recognition. Support
Visual Structure Analysis of Flow Charts in Patent Images
Visual Structure Analysis of Flow Charts in Patent Images Roland Mörzinger, René Schuster, András Horti, and Georg Thallinger JOANNEUM RESEARCH Forschungsgesellschaft mbh DIGITAL - Institute for Information
The Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
FPGA Implementation of Human Behavior Analysis Using Facial Image
RESEARCH ARTICLE OPEN ACCESS FPGA Implementation of Human Behavior Analysis Using Facial Image A.J Ezhil, K. Adalarasu Department of Electronics & Communication Engineering PSNA College of Engineering
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N.Ganorkar 1, Kalyani Pendke 2 1 Mtech, 4 th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra),
Analecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
Handwritten Kannada Characters Recognition using Curvelet Transform
Kannada Characters Recognition using Curvelet Transform Shashikala Parameshwarppa Department of Computer Science and Engineering, Govt. Engg. College, Raichur Karnataka, India. B.V. Dhandra Department
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
DATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
CHARACTERISTICS IN FLIGHT DATA ESTIMATION WITH LOGISTIC REGRESSION AND SUPPORT VECTOR MACHINES
CHARACTERISTICS IN FLIGHT DATA ESTIMATION WITH LOGISTIC REGRESSION AND SUPPORT VECTOR MACHINES Claus Gwiggner, Ecole Polytechnique, LIX, Palaiseau, France Gert Lanckriet, University of Berkeley, EECS,
2. IMPLEMENTATION. International Journal of Computer Applications (0975 8887) Volume 70 No.18, May 2013
Prediction of Market Capital for Trading Firms through Data Mining Techniques Aditya Nawani Department of Computer Science, Bharati Vidyapeeth s College of Engineering, New Delhi, India Himanshu Gupta
ISSN: 2348 9510. A Review: Image Retrieval Using Web Multimedia Mining
A Review: Image Retrieval Using Web Multimedia Satish Bansal*, K K Yadav** *, **Assistant Professor Prestige Institute Of Management, Gwalior (MP), India Abstract Multimedia object include audio, video,
Feature Selection using Integer and Binary coded Genetic Algorithm to improve the performance of SVM Classifier
Feature Selection using Integer and Binary coded Genetic Algorithm to improve the performance of SVM Classifier D.Nithya a, *, V.Suganya b,1, R.Saranya Irudaya Mary c,1 Abstract - This paper presents,
Use of Data Mining Techniques to Improve the Effectiveness of Sales and Marketing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,
Index Terms: Face Recognition, Face Detection, Monitoring, Attendance System, and System Access Control.
Modern Technique Of Lecture Attendance Using Face Recognition. Shreya Nallawar, Neha Giri, Neeraj Deshbhratar, Shamal Sane, Trupti Gautre, Avinash Bansod Bapurao Deshmukh College Of Engineering, Sewagram,
HAND GESTURE BASEDOPERATINGSYSTEM CONTROL
HAND GESTURE BASEDOPERATINGSYSTEM CONTROL Garkal Bramhraj 1, palve Atul 2, Ghule Supriya 3, Misal sonali 4 1 Garkal Bramhraj mahadeo, 2 Palve Atule Vasant, 3 Ghule Supriya Shivram, 4 Misal Sonali Babasaheb,
3)Skilled Forgery: It is represented by suitable imitation of genuine signature mode.it is also called Well-Versed Forgery[4].
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Technique
Automatic Recognition Algorithm of Quick Response Code Based on Embedded System
Automatic Recognition Algorithm of Quick Response Code Based on Embedded System Yue Liu Department of Information Science and Engineering, Jinan University Jinan, China [email protected] Mingjun Liu
A Dynamic Approach to Extract Texts and Captions from Videos
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER
HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER Gholamreza Anbarjafari icv Group, IMS Lab, Institute of Technology, University of Tartu, Tartu 50411, Estonia [email protected]
Euler Vector: A Combinatorial Signature for Gray-Tone Images
Euler Vector: A Combinatorial Signature for Gray-Tone Images Arijit Bishnu, Bhargab B. Bhattacharya y, Malay K. Kundu, C. A. Murthy fbishnu t, bhargab, malay, [email protected] Indian Statistical Institute,
Hybrid Lossless Compression Method For Binary Images
M.F. TALU AND İ. TÜRKOĞLU/ IU-JEEE Vol. 11(2), (2011), 1399-1405 Hybrid Lossless Compression Method For Binary Images M. Fatih TALU, İbrahim TÜRKOĞLU Inonu University, Dept. of Computer Engineering, Engineering
Sub: Selection for the post of CHAIRMAN, INDIAN OIL CORPORATION LIMITED(IOCL) in schedule 'A' of the CPSE
No. 6/3/2016-PESB भ रत सरक र / Government of India क र म क एव प रर क षण ववभ ग / Department of Personnel & Training ल क उद यम चयन ब र / Public Enterprises Selection Board *** ब ल क स ख य 14, स ज ओ क म प
Efficient on-line Signature Verification System
International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information
Building an Advanced Invariant Real-Time Human Tracking System
UDC 004.41 Building an Advanced Invariant Real-Time Human Tracking System Fayez Idris 1, Mazen Abu_Zaher 2, Rashad J. Rasras 3, and Ibrahiem M. M. El Emary 4 1 School of Informatics and Computing, German-Jordanian
Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras
Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras W3A.5 Douglas Chai and Florian Hock Visual Information Processing Research Group School of Engineering and Mathematics Edith
EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set
EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set Amhmed A. Bhih School of Electrical and Electronic Engineering Princy Johnson School of Electrical and Electronic Engineering Martin
RFID and Camera-based Hybrid Approach to Track Vehicle within Campus
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore RFID and Camera-based Hybrid Approach to Track Vehicle within
Data, Measurements, Features
Data, Measurements, Features Middle East Technical University Dep. of Computer Engineering 2009 compiled by V. Atalay What do you think of when someone says Data? We might abstract the idea that data are
Image Processing Based Automatic Visual Inspection System for PCBs
IOSR Journal of Engineering (IOSRJEN) ISSN: 2250-3021 Volume 2, Issue 6 (June 2012), PP 1451-1455 www.iosrjen.org Image Processing Based Automatic Visual Inspection System for PCBs Sanveer Singh 1, Manu
Neural Networks in Data Mining
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 03 (March. 2014), V6 PP 01-06 www.iosrjen.org Neural Networks in Data Mining Ripundeep Singh Gill, Ashima Department
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
Applied Mathematical Sciences, Vol. 7, 2013, no. 112, 5591-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.
Applied Mathematical Sciences, Vol. 7, 2013, no. 112, 5591-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.38457 Accuracy Rate of Predictive Models in Credit Screening Anirut Suebsing
STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK
Volume 6, Issue 3, pp: 335343 IJESET STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK Dipti Verma 1, Sipi Dubey 2 1 Department of Computer
Signature verification using Kolmogorov-Smirnov. statistic
Signature verification using Kolmogorov-Smirnov statistic Harish Srinivasan, Sargur N.Srihari and Matthew J Beal University at Buffalo, the State University of New York, Buffalo USA {srihari,hs32}@cedar.buffalo.edu,[email protected]
APPLYING COMPUTER VISION TECHNIQUES TO TOPOGRAPHIC OBJECTS
APPLYING COMPUTER VISION TECHNIQUES TO TOPOGRAPHIC OBJECTS Laura Keyes, Adam Winstanley Department of Computer Science National University of Ireland Maynooth Co. Kildare, Ireland [email protected], [email protected]
Document Image Retrieval using Signatures as Queries
Document Image Retrieval using Signatures as Queries Sargur N. Srihari, Shravya Shetty, Siyuan Chen, Harish Srinivasan, Chen Huang CEDAR, University at Buffalo(SUNY) Amherst, New York 14228 Gady Agam and
Email Spam Detection Using Customized SimHash Function
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email
PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM
PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM Rohan Ashok Mandhare 1, Pragati Upadhyay 2,Sudha Gupta 3 ME Student, K.J.SOMIYA College of Engineering, Vidyavihar, Mumbai, Maharashtra,
Scalable Developments for Big Data Analytics in Remote Sensing
Scalable Developments for Big Data Analytics in Remote Sensing Federated Systems and Data Division Research Group High Productivity Data Processing Dr.-Ing. Morris Riedel et al. Research Group Leader,
Sub: Selection for the post of DIRECTOR (ENGINEERING), MECON LIMITED in schedule 'A' of the CPSE.
No. 7/84/2015-PESB भ रत सरक र Government of India क र म क एव प रर क षण ववभ ग Department of Personnel and Training (ल क उद यम चयन ब र ) (Public Enterprises Selection Board) ब ल क स ख य १४ स.ज.ओ. क म प ल
Poker Vision: Playing Cards and Chips Identification based on Image Processing
Poker Vision: Playing Cards and Chips Identification based on Image Processing Paulo Martins 1, Luís Paulo Reis 2, and Luís Teófilo 2 1 DEEC Electrical Engineering Department 2 LIACC Artificial Intelligence
Navigation Aid And Label Reading With Voice Communication For Visually Impaired People
Navigation Aid And Label Reading With Voice Communication For Visually Impaired People A.Manikandan 1, R.Madhuranthi 2 1 M.Kumarasamy College of Engineering, [email protected],karur,india 2 M.Kumarasamy
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing and Developing E-mail Classifier
International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-1, Issue-6, January 2013 Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing
Kendriya Vidyalaya Social Science Exhibition-cum-National Integration Camp 2016-17
Kendriya Vidyalaya Social Science Exhibition-cum-National Integration Camp 2016-17 Dear Parents and students, Organizing Social Science Exhibition cum-national Integration Camp is a permanent feature of
Component Ordering in Independent Component Analysis Based on Data Power
Component Ordering in Independent Component Analysis Based on Data Power Anne Hendrikse Raymond Veldhuis University of Twente University of Twente Fac. EEMCS, Signals and Systems Group Fac. EEMCS, Signals
HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT
International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT Akhil Gupta, Akash Rathi, Dr. Y. Radhika
Impelling Heart Attack Prediction System using Data Mining and Artificial Neural Network
General Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Impelling
Support Vector Machine-Based Human Behavior Classification in Crowd through Projection and Star Skeletonization
Journal of Computer Science 6 (9): 1008-1013, 2010 ISSN 1549-3636 2010 Science Publications Support Vector Machine-Based Human Behavior Classification in Crowd through Projection and Star Skeletonization
TEXT TO SPEECH SYSTEM FOR KONKANI ( GOAN ) LANGUAGE
TEXT TO SPEECH SYSTEM FOR KONKANI ( GOAN ) LANGUAGE Sangam P. Borkar M.E. (Electronics)Dissertation Guided by Prof. S. P. Patil Head of Electronics Department Rajarambapu Institute of Technology Sakharale,
Blood Vessel Classification into Arteries and Veins in Retinal Images
Blood Vessel Classification into Arteries and Veins in Retinal Images Claudia Kondermann and Daniel Kondermann a and Michelle Yan b a Interdisciplinary Center for Scientific Computing (IWR), University
Fingerprint s Core Point Detection using Gradient Field Mask
Fingerprint s Core Point Detection using Gradient Field Mask Ashish Mishra Assistant Professor Dept. of Computer Science, GGCT, Jabalpur, [M.P.], Dr.Madhu Shandilya Associate Professor Dept. of Electronics.MANIT,Bhopal[M.P.]
JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions
Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai
PageX: An Integrated Document Processing and Management Software for Digital Libraries
PageX: An Integrated Document Processing and Management Software for Digital Libraries Hanchuan Peng, Zheru Chi, Wanchi Siu, and David Dagan Feng Department of Electronic & Information Engineering The
Novelty Detection in image recognition using IRF Neural Networks properties
Novelty Detection in image recognition using IRF Neural Networks properties Philippe Smagghe, Jean-Luc Buessler, Jean-Philippe Urban Université de Haute-Alsace MIPS 4, rue des Frères Lumière, 68093 Mulhouse,
Knowledge Discovery from patents using KMX Text Analytics
Knowledge Discovery from patents using KMX Text Analytics Dr. Anton Heijs [email protected] Treparel Abstract In this white paper we discuss how the KMX technology of Treparel can help searchers
Template-based Eye and Mouth Detection for 3D Video Conferencing
Template-based Eye and Mouth Detection for 3D Video Conferencing Jürgen Rurainsky and Peter Eisert Fraunhofer Institute for Telecommunications - Heinrich-Hertz-Institute, Image Processing Department, Einsteinufer
AUTO CLAIM FRAUD DETECTION USING MULTI CLASSIFIER SYSTEM
AUTO CLAIM FRAUD DETECTION USING MULTI CLASSIFIER SYSTEM ABSTRACT Luis Alexandre Rodrigues and Nizam Omar Department of Electrical Engineering, Mackenzie Presbiterian University, Brazil, São Paulo [email protected],[email protected]
Prediction of Heart Disease Using Naïve Bayes Algorithm
Prediction of Heart Disease Using Naïve Bayes Algorithm R.Karthiyayini 1, S.Chithaara 2 Assistant Professor, Department of computer Applications, Anna University, BIT campus, Tiruchirapalli, Tamilnadu,
Morphological segmentation of histology cell images
Morphological segmentation of histology cell images A.Nedzved, S.Ablameyko, I.Pitas Institute of Engineering Cybernetics of the National Academy of Sciences Surganova, 6, 00 Minsk, Belarus E-mail [email protected]
Mobile Phone APP Software Browsing Behavior using Clustering Analysis
Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Mobile Phone APP Software Browsing Behavior using Clustering Analysis
Handwritten Signature Verification using Neural Network
Handwritten Signature Verification using Neural Network Ashwini Pansare Assistant Professor in Computer Engineering Department, Mumbai University, India Shalini Bhatia Associate Professor in Computer Engineering
Classifying Large Data Sets Using SVMs with Hierarchical Clusters. Presented by :Limou Wang
Classifying Large Data Sets Using SVMs with Hierarchical Clusters Presented by :Limou Wang Overview SVM Overview Motivation Hierarchical micro-clustering algorithm Clustering-Based SVM (CB-SVM) Experimental
