Artificial Neural Network For Recognition Of HandwrittenDevanagari Character
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1
Abstract
Abstract: Information gathering is one of the most important thing in the digital world, manyorganizationsstill use handwritten documents for storing their information. So it is important task to convert this informationin to digital world. Handwritten character recognition helps user to convert their handwritten documents in todigital information. Purpose of this dissertation work is to implement zone based feature extraction methodwhich is combination of image centroid zone and zone centroid zone of individual character image. In featureextraction using zone based approach, individual character image is divided into n equal size zones thenaverage distance of all pixels with respect to image centroid or zone centroid is computed. In combination ofimage centroid and zone centroid approach it computes average distance of all pixels present in each zone withrespect to image centroid as well as zone centroid which gives feature vector of size 2Xn features. This featurevector is presented to feed forward neural network for recognition.
Authors and Affiliations
Ms. Seema A. Dongare , Prof. Dhananjay B. Kshirsagar , Mr. Nitin J. Khapale , Ms. Amruta D. Pawar
Steps to System Reconfiguration in a Distributed DatabaseSystem: A Fault-tolerant Approach
Abstract: In this paper, we examine steps to system reconfiguration in a Distributed Database using some faulttolerance scheme for a distributed database system that is compatible with respect to system failure i.e...
Two Phase Multi Party Secured Multiplication (2PMSM) In Vertically Distributed Databases
Abstract : Secured multi party computation which is also known as secured computation or multi party computation (SMC) plays a vital role in achieving secured computation in Privacy preserving data mining. Various SMC al...
A Testing On Secure Key Policy Attribute-Based Encryption Policy For Data Sharing Among Dynamic Groups In The Cloud
Performance testing is based on the assertion that language and culture study are best brought together when the teacher is effective in the affective as well as cognitive and skills domains, teaching strategies and acti...
Image Security With Different Techniques Of Cryptography And Coding: A Survey
Abstract: Due to the growth of multimedia applications, the protection of this multimedia data becomes a very important issue of communication and storage; especially when it is transferred over an insecure channel...
Study of Simulation for Data Webhousing System by ChallengingTechnology and Performing Tuning Techniques
Abstract: One of the most widely discussedtechnologiesare theInternet and itsassociated environmenttheWorldWide Web.Web technologyhasa broad popular supportamong entrepreneursand technicians likewise.The web environment...