SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 393
RECOGNITION OF HANDWRITTEN DIGITS USING RBF NEURAL
NETWORK
P P S Subhashini1
, V V K D V Prasad2
Department of ECE, RVR & JC College of Engineering, Chowdavaram, Guntur, 522019, A.P, India,
k_shiva_111@yahoo.co.in, varrevkdvp@rediffmail.com
Abstract
Pattern recognition is required in many fields for different purposes. Methods based on Radial basis function (RBF) neural networks
are found to be very successful in pattern classification problems. Training neural network is in general a challenging nonlinear
optimization problem. Several algorithms have been proposed for choosing the RBF neural network prototypes and training the
network. In this paper RBF neural network using decoupling Kalman filter method is proposed for handwritten digit recognition
applications. The efficacy of the proposed method is tested on the handwritten digits of different fonts and found that it is successful in
recognizing the digits.
Keywords: - Neural network, RBF neural network, Decoupled kalman filter Training, Zoning method
------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
Character recognition is classified into two categories, off-line
character recognition and on-line character recognition [1]. In
off-line character recognition the system accepts image as input
from the scanner. It is more difficult than on-line character
recognition because of unavailability of contextual information
and lack of prior knowledge like text position, size of text,
order of strokes, start point and stop point. Noise will also exist
in the images acquired in off-line character recognition.
Machine Printed character recognition comes under this
category [2]. On-line character recognition system accepts the
moment of pen from the hardware such as graphic tablet, light
pen and lot of information is available during the input process
such as current position, moment’s direction, start points, stop
points and stroke orders.e.g. handwritten character recognition
[3].
There has been a drastic change in our perspective of concept
of communication and connectivity with digital revolution.
Biometrics play vital role in dealing with problem of
authentication. It is the science of identifying or verifying the
identity of a person based on physiological or behavioural
characteristics. Physiological characteristics include
fingerprints, iris, hand geometry and facial image [4]. The
behavioural characteristics are actions carried out by a person
in a characteristic way and include recognition of signature,
machine printed characters, handwriting, and voice. There have
been attempts to explore the possibility of efficient man-
machine communication through hand written characters.
Pattern recognition techniques using RBF neural network are
helpful in classification of hand written characters of different
users [5].
This paper focuses on handwritten digits recognition using
RBF neural network based on decoupling Kalman filter
training method. From the results it is found that the proposed
method has very high success rate in handwritten digit
recognition.
2. RBF NEURAL NETWORKS
Radial basis function network (RBF) is a type of artificial
network for applications to problems of supervised learning
e.g. regression, classification and time series prediction. RBF
networks can be used to solve classification problems [6]. The
classification problem can be treated as a non-parametric
regression problem if the outputs of the estimated function are
interpreted as the probability that the input belongs to the
corresponding classes.
The training output values are vectors of length equal to the
number of classes. After training, the network responds to a
new pattern with continuous values in each component of the
output vector and these values are interpreted as being
proportional to class probability. This network consists of three
layers, input layer, hidden layer, output layer as shown in Fig.
1. The m-dimensional input x is passed directly to a hidden
layer. Suppose there are c neurons in the hidden layer, each of
the c neurons in the hidden layer applies an activation function
which is a function of the Euclidean distance between the input
and an m-dimensional prototype vector [7].
Each hidden neuron contains its own prototype vector as a
parameter. The output of each hidden neuron is then weighted
and passed to the output layer. The outputs of the network
consist of sums of the weighted hidden layer neurons. The
design of an RBF requires several decisions that include the
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 394
number of hidden units in the hidden layer, values of the
prototypes, the functions used at the hidden units and the
weights applied between the hidden layer and the output layer.
The performance of an RBF network depends on the number
and location (in the input space) of the centres, the shape of the
RBF functions at the hidden units and the method used for
determining the network weights. Some researchers have
trained RBF networks by selecting the centers randomly from
the training data. Others have used unsupervised procedures
(such as the k-means algorithm) for selecting the RBF centers.
Still others have used supervised procedures for selecting the
RBF centers.
Fig 1 RBF Neural network architecture
2.1 Working Principle
The principle of radial basis functions derives from the theory
of functional approximation. Given N pairs
( ),i ix y
, one looks
for a function f of the form:
 
1
( )
k
i i
i
f x c h x t

 
.In
this, h is the radial basis function (normally a Gaussian
function) and it
are the k centers which have to be selected.
The coefficients ic
are also unknown at the moment and have
to be computed. ix
and it
are elements of an n – dimensional
vector space.
The hidden units compute the Euclidean distance between the
input pattern and the vector, which is represented by the links
leading to this unit. The activation of the hidden units is
computed by applying the Euclidean distance to the function
h as
2 2
) /( ) ( ih x e x c r  . The parameters for the function
h are its center c and its radius r . There have been a number
of activation functions that include Gaussian function, Thin
plate spline function, Multiquadric function and so on for the
hidden layer of RBF neural network. In this paper the following
function is considered.
1/(1 )
0(( ) ( )) p
g v g v 

where p is a parameter and 0 ( )g v is a linear function of the
form
0 ( )g v av b 
where 0a  and 0b  . The single output neuron gets its
input from all hidden neurons. The links leading to the output
neuron hold the coefficients ci. The activation of the output
neuron is determined by the weighted sum of its inputs. An
RBF network is considered non-linear if the basis functions can
move or change size or if there is more than one hidden layer
otherwise the RBF network is considered linear. The above
architecture can easily be extended to include more than one
output node depending on the problem that the RBF network is
to solve e.g classification into different classes would need as
many output nodes as the number of classes.
When the RBF network is used in classification, the hidden
layer performs clustering while the output layer performs
classification. The hidden units would have the strongest
impulse when the input patterns are closed to the centers of the
hidden units and gradually weaker impulse as the input patterns
moved away from the centers. The output layer would linearly
combine all the outputs of the hidden layer. Each output node
would then give an output value, which represents the
probability that the input pattern falls under that class.
3 DECOUPLED KALMAN FILTER
For a large RBF network, the computational expense of the
Kalman filter could be burdensome [8]. In fact, the
computational expense of the Kalman filter is on the order of
AB2, where A is the dimension of the output of the dynamic
system and B is the number of parameters. In our case, there
are nM outputs and n(c+1)+mc parameters, where n is the
dimension of the RBF output, M is the number of training
samples, c is the number of prototypes, and m is the dimension
of the RBF input. Therefore, the computational expense of the
Kalman filter is on the order of nM[n(c+1)+mc]2.
The Kalman filter parameter vector can be decoupled by
assuming that certain parameter groups interact with each other
only at a second-order level. For instance, the Hk matrix
contains a lot of zeros, showing that the interaction between
various parameter groups can be neglected. In particular, the
Hk matrix consists of n+1 decoupled blocks. These n+1 blocks
correspond to the n sets of w weights that a4ect the n output
components, and the set of prototypes. This is intuitive
because, for example, the c+1 weights that impinge on the first
component of the output are completely independent of the c+1
(2)
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 395
weights that impinge on the second component of the output .
Let us use the notation that _ik refers to the ith group (out of
n+1 total) of parameters estimated at time step k. Then we have
θ1k = w1 ...θnk = wn
θn+1k =[v1T……VcT]T
We will use the notation that Hi corresponding to the i th group
of parameters.
H1k = H....Hnk = HHn+1k = Hv
where H (with no subscript) is the (c+1)X m matrix .We will
use the notation that ykt refers to the element of the target
output of the RBF network that are effected by the i th group of
parameters
yk1 = [y11……….. y1m]T
ykn = [yn1……….. ynm]T
ykn+1 = [yn1……y1m…… y1n…….. ynm]T
Similarly , we use the notation that ht (θֿk-1) refers to the
elements of the actual output of the RBF network that are
effected by the i th group of parameters
h1(θֿk-1) = [ỹ11…….. ỹ1M]kT
hn(θֿk-1) = [ỹn1…….. ỹnM]kT
hk+1(θֿk-1) = [ỹ11…….. ỹ1M … ỹn1…….. ỹnM ]kT
The decoupled Kalman recursion for the ith parameter group is
then given by
θ-tk = f(θ-tk-1) + Kkt[ykt - ht (θ-tk-1)]
Ki = PktHkt(Rt +(Hkt)T PktHkt)-1
Pk+1t =Fk(Pk- Kkt(Hkt)TPkt) FkT +QT
As before, f(.) is the identity mapping and Fk is the identity
matrix. The above recursion executes n+1 times. The first n
times, the recursion consists of M outputs and (c+1)
parameters. The last time, the recursion consists of nM outputs
and mc parameters. So the computational expense of the
Kalman filter has been reduced to the order of nM[(c + 1)2 +
(mc)2]. The ratio of the computational expense of
Standard KF Expense n2(c +1)2 + m2c2 + n(c
+1)mc
Decoupled KF Expens (c +1)2 + m2c2 : (42)
The computational savings will be most significant for large
problems, i.e., problem where n (the dimension of the output)
is large, m (the dimension of the input) is large, or c (the
number of prototypes) is large. Note that this complexity
analysis applies only to the Kalman recursion and does not
include the computational expense required for the calculation
of the partial derivatives. Also note that for both the standard
and decoupled Kalman filters, the computational expense
increases linearly with M (the number of training samples).
4. EXPERIMENTAL RESULTS
The results obtained on using the proposed RBF neural network
based on decoupling kalman filter training method for
recognition of handwritten digits of different fonts are
presented in this section. Hand written digits from 0 to 9 of 25
different fonts are taken and they are recognized by using this
method. For each hand written digit, after obtaining the thinned
image, 16 features are extracted using Zoning method. These
features are used to train RBF neural network [9].
The different steps involved in recognition of the digits using
this method are shown in the block diagram in the Fig.2
Fig. 2. Block Diagram of Handwritten digit recognition
The RBF networks are trained using the hidden layer function
of Eq. (1) The exponential parameter
p in Eq. (1) is taken as 2
in the results presented in this section. The training algorithms
are initialized with prototype vectors randomly selected from
the input data and with the weight matrix W set to zero[10].
From the experiments, it is found that Decoupled Kalman Filter
Training algorithm is terminated when the error decreases by
less than 0.1 percent. The performance of each of the training
methods is explored by averaging its performance over five
trials, where each trial consists of a random selection of
training and test data. The number of hidden units in the RBF
network is varied between 1 and 15 [11].
Fig. 3 shows the number of iterations required for
convergence. Percentage of correct classification for number of
hidden units is given in Fig.4 for decoupling Kalman filter
training [12]. The RBF network is trained with 13 different
fonts of each digit and is also tested with 12 other fonts which
are different from the trained fonts. It is observed that this
method is successful in recognizing the digits of all these 25
fonts.
For space consideration, the results of six hand written digits
viz 0 to 5 are only shown here. The features of these
handwritten digits are extracted and tabulated in Table 1 and 2.
=
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 396
Each digit has 16 features. The combination of all these
features is called a feature vector. The feature vector is applied
to neural network. If the digit is recognized, then the output
node corresponding to the digit is one and the remaining are
zeros. The training method here applied is supervised training
method. This requires the target vector that is the desired
output, which is tabulated in Table 3.
Table 1: Features of Handwritten Digits 0 to 5
Hand Written Digit Features of Handwritten Digits (8 features)
0 0.526316 0.526316 0.526316 0.526316 0 1.105263 1 0
1 0 0 0 0 0 1.842105 0 0
2 0 0 0 0 0 1.157895 0.631579 0
3 0 0 0 0 0 1.842105 1.315789 0
4 0 0.052632 0 0 0 1 1.526316 0
5 0 0 0 0 0 0 1 0.052632
Table 2: Features of Handwritten Digits 0 to 5
Hand Written Digit Features of Handwritten Digits (8 features)
0 0 1.421053 1.105263 0 0 0 0 0
1 0 0.842105 0 0 0 0 0 0
2 0 1.684211 1.157895 0.105263 0 0 0 0
3 0 0.894737 0.842105 0 0 0 0 0
4 0 0.631579 2 0.105263 0 0 0 0
5 0 0 1.210526 0 0 0.105263 0.421053 0
Table 3: Target vector for Hand written digits 0 to 5
Node Output
node1
Output
node2
Output
node3
Output
node4
Output
node5
Output
node6Digit
0 1 0 0 0 0 0
1 0 1 0 0 0 0
2 0 0 1 0 0 0
3 0 0 0 1 0 0
4 0 0 0 0 1 0
5 0 0 0 0 0 1
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 397
Fig 3. No.of iterations required for No. of hidden nodes
Fig 4. Percentage of Correct Classification for No of Hidden
Nodes
CONCLUSIONS
The RBF Neural Network using decoupled Kalman filter
training method is proposed for recognition of handwritten
digits of different fonts. The proposed method is tested on
handwritten digits of 0 to 9 of 25 different fonts. It is found that
this method has very high success rate in recognizing the
handwritten digits. This method can be extended to recognize
handwritten characters also.
ACKNOWLEDGMENTS
The authors place on record their thanks to the authorities of
RVR&JC College of Engineering, Guntur, A.P., India for the
facilities provided.
REFERENCES
[1] Naveed Bin Rais , M. Shehzad Hanif and rmtiaz A.
Taj, Adaptive Thresholding Technique for Document
Image Anaysis, IEEE Trans. on Systems, Man and
Cybernetics, Vol.8, 1978, pp.60-66.
[2] Sittisak Rodtook and Yuttapong Rangsanseri,
Adaptive Thresholding of Document Images on
Laplacian Sign, IEEE Transactions on Pattern analysis
and Machine Intelligence, vol.17, No.24, January,
2001.
[3] Jaekyu Ha & Robert M. Haralick Ihsin, T. Phillips,
Document Page Decomposition by the Bounding-Box
Projection Technique, IEEE Transactions on Systems,
Man, and Cybernetics, Vol.18, No.1, January 1995,
pp.1118-1122.
[4] Rangachar Kasturi, Lawrence O’Gorman and Venu
Govindaraju, Document analysis: A primer, Sadhana
Vol.27, Part 1, February 2002, pp. 3-22.
[5] Jaekyu Ha & Robert M. Haralick Ihsin, T. Phillips,
Document Page Decomposition by the Bounding-Box
Projection Technique, IEEE Transactions on Systems,
Man, and Cybernetics, Vol.18, No.1, pp.1118-1122,
January 1995.
[6] Brijesh K. Verma, Handwritten Hindi Character
Recognition Using Multilayer Perceptron and RBF
Neural Networks, IEEE Trans. On Neural Networks,
Vol.21, August 2004, pp. 2111-2115
[7] O.Batsaikhan and Y.P. Singh, Mongolian Character
Recognition using Multilayer Perceptron, Proceedings
of the 9th
International Conference on Neural
Information Processing, Vol. 2,2002.
[8] John Wiley & Sons, - Technology and Engineering,
Kalman Filtering and Neural Networks ,07-Apr-
2004.
[9] Oivind Due Trier, Anil K.Jain and Torfinn Taxt,
Feature Extraction methods for Character recognition–
A Survey, Pattern Recognition, Vol. 29, No. 4, 1996,
pp.641–662.
[10] P. S. P. Wang and Y. Y. Zhang, A fast and flexible
thinning algorithm, IEEE Transactions on
Computers, Vol.38, No.5, May 1989.
[11] O.Batsaikhan and Y.P. Singh, Mongolian Character
Recognition using Multilayer Perceptron, Proceedings
of the 9th
International Conference on Neural
Information Processing, Vol. 2,2002.
[12] Military Communications Conference, 2003.
MILCOM '03. 2003 IEEE paper ,A steady state
decoupled Kalman filter technique for multiuser
detection Year: 2003 , Page(s): 987 - 992 Vol.2

Weitere ähnliche Inhalte

Was ist angesagt?

Intelligent Handwriting Recognition_MIL_presentation_v3_final
Intelligent Handwriting Recognition_MIL_presentation_v3_finalIntelligent Handwriting Recognition_MIL_presentation_v3_final
Intelligent Handwriting Recognition_MIL_presentation_v3_final
Suhas Pillai
 
offline character recognition for handwritten gujarati text
offline character recognition for handwritten gujarati textoffline character recognition for handwritten gujarati text
offline character recognition for handwritten gujarati text
Bhumika Patel
 
Handwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionHandwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer Version
Naiyan Noor
 
Unsupervised Feature Learning
Unsupervised Feature LearningUnsupervised Feature Learning
Unsupervised Feature Learning
Amgad Muhammad
 

Was ist angesagt? (18)

Character Recognition using Machine Learning
Character Recognition using Machine LearningCharacter Recognition using Machine Learning
Character Recognition using Machine Learning
 
character recognition: Scope and challenges
 character recognition: Scope and challenges character recognition: Scope and challenges
character recognition: Scope and challenges
 
Handwritten character recognition in
Handwritten character recognition inHandwritten character recognition in
Handwritten character recognition in
 
Text Detection and Recognition
Text Detection and RecognitionText Detection and Recognition
Text Detection and Recognition
 
Intelligent Handwriting Recognition_MIL_presentation_v3_final
Intelligent Handwriting Recognition_MIL_presentation_v3_finalIntelligent Handwriting Recognition_MIL_presentation_v3_final
Intelligent Handwriting Recognition_MIL_presentation_v3_final
 
offline character recognition for handwritten gujarati text
offline character recognition for handwritten gujarati textoffline character recognition for handwritten gujarati text
offline character recognition for handwritten gujarati text
 
Handwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionHandwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer Version
 
MATLAB Code + Description : Very Simple Automatic English Optical Character R...
MATLAB Code + Description : Very Simple Automatic English Optical Character R...MATLAB Code + Description : Very Simple Automatic English Optical Character R...
MATLAB Code + Description : Very Simple Automatic English Optical Character R...
 
Artificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari CharacterArtificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari Character
 
Character Recognition using Artificial Neural Networks
Character Recognition using Artificial Neural NetworksCharacter Recognition using Artificial Neural Networks
Character Recognition using Artificial Neural Networks
 
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
 
Handwritten Character Recognition
Handwritten Character RecognitionHandwritten Character Recognition
Handwritten Character Recognition
 
Unsupervised Feature Learning
Unsupervised Feature LearningUnsupervised Feature Learning
Unsupervised Feature Learning
 
Performance Evaluation of Classifiers used for Identification of Encryption A...
Performance Evaluation of Classifiers used for Identification of Encryption A...Performance Evaluation of Classifiers used for Identification of Encryption A...
Performance Evaluation of Classifiers used for Identification of Encryption A...
 
Handwritten Digit Recognition(Convolutional Neural Network) PPT
Handwritten Digit Recognition(Convolutional Neural Network) PPTHandwritten Digit Recognition(Convolutional Neural Network) PPT
Handwritten Digit Recognition(Convolutional Neural Network) PPT
 
Mixed Language Based Offline Handwritten Character Recognition Using First St...
Mixed Language Based Offline Handwritten Character Recognition Using First St...Mixed Language Based Offline Handwritten Character Recognition Using First St...
Mixed Language Based Offline Handwritten Character Recognition Using First St...
 
Hand Written Digit Classification
Hand Written Digit ClassificationHand Written Digit Classification
Hand Written Digit Classification
 
Autoencoders for image_classification
Autoencoders for image_classificationAutoencoders for image_classification
Autoencoders for image_classification
 

Andere mochten auch

Automatic handwriting recognition
Automatic handwriting recognitionAutomatic handwriting recognition
Automatic handwriting recognition
BIJIT GHOSH
 
Image Classification And Support Vector Machine
Image Classification And Support Vector MachineImage Classification And Support Vector Machine
Image Classification And Support Vector Machine
Shao-Chuan Wang
 
optical character recognition system
optical character recognition systemoptical character recognition system
optical character recognition system
Vijay Apurva
 
Support Vector Machines
Support Vector MachinesSupport Vector Machines
Support Vector Machines
nextlib
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks
Chiranjeevi Adi
 

Andere mochten auch (9)

Flag segmentation, feature extraction & identification using support vector m...
Flag segmentation, feature extraction & identification using support vector m...Flag segmentation, feature extraction & identification using support vector m...
Flag segmentation, feature extraction & identification using support vector m...
 
Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...
Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...
Support Vector Machine (SVM) Based Classifier For Khmer Printed Character-set...
 
Automatic handwriting recognition
Automatic handwriting recognitionAutomatic handwriting recognition
Automatic handwriting recognition
 
Image Classification And Support Vector Machine
Image Classification And Support Vector MachineImage Classification And Support Vector Machine
Image Classification And Support Vector Machine
 
optical character recognition system
optical character recognition systemoptical character recognition system
optical character recognition system
 
Support Vector Machines
Support Vector MachinesSupport Vector Machines
Support Vector Machines
 
Support Vector Machines for Classification
Support Vector Machines for ClassificationSupport Vector Machines for Classification
Support Vector Machines for Classification
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011
 

Ähnlich wie Recognition of handwritten digits using rbf neural network

Paper id 252014146
Paper id 252014146Paper id 252014146
Paper id 252014146
IJRAT
 
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
cscpconf
 
Electricity Demand Forecasting Using Fuzzy-Neural Network
Electricity Demand Forecasting Using Fuzzy-Neural NetworkElectricity Demand Forecasting Using Fuzzy-Neural Network
Electricity Demand Forecasting Using Fuzzy-Neural Network
Naren Chandra Kattla
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networks
IJECEIAES
 
Fault detection and_diagnosis
Fault detection and_diagnosisFault detection and_diagnosis
Fault detection and_diagnosis
M Reza Rahmati
 
An efficient fuzzy classifier with feature selection based
An efficient fuzzy classifier with feature selection basedAn efficient fuzzy classifier with feature selection based
An efficient fuzzy classifier with feature selection based
ssairayousaf
 

Ähnlich wie Recognition of handwritten digits using rbf neural network (20)

Paper id 252014146
Paper id 252014146Paper id 252014146
Paper id 252014146
 
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
 
Adaptive Training of Radial Basis Function Networks Based on Cooperative
Adaptive Training of Radial Basis Function Networks Based on CooperativeAdaptive Training of Radial Basis Function Networks Based on Cooperative
Adaptive Training of Radial Basis Function Networks Based on Cooperative
 
Application of support vector machines for prediction of anti hiv activity of...
Application of support vector machines for prediction of anti hiv activity of...Application of support vector machines for prediction of anti hiv activity of...
Application of support vector machines for prediction of anti hiv activity of...
 
Efficient design of feedforward network for pattern classification
Efficient design of feedforward network for pattern classificationEfficient design of feedforward network for pattern classification
Efficient design of feedforward network for pattern classification
 
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network AlgorithmsWeb Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
 
Web spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithmsWeb spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithms
 
Classification of Iris Data using Kernel Radial Basis Probabilistic Neural N...
Classification of Iris Data using Kernel Radial Basis Probabilistic  Neural N...Classification of Iris Data using Kernel Radial Basis Probabilistic  Neural N...
Classification of Iris Data using Kernel Radial Basis Probabilistic Neural N...
 
Classification of Iris Data using Kernel Radial Basis Probabilistic Neural Ne...
Classification of Iris Data using Kernel Radial Basis Probabilistic Neural Ne...Classification of Iris Data using Kernel Radial Basis Probabilistic Neural Ne...
Classification of Iris Data using Kernel Radial Basis Probabilistic Neural Ne...
 
Efficiency of Neural Networks Study in the Design of Trusses
Efficiency of Neural Networks Study in the Design of TrussesEfficiency of Neural Networks Study in the Design of Trusses
Efficiency of Neural Networks Study in the Design of Trusses
 
F017533540
F017533540F017533540
F017533540
 
A survey research summary on neural networks
A survey research summary on neural networksA survey research summary on neural networks
A survey research summary on neural networks
 
Electricity Demand Forecasting Using Fuzzy-Neural Network
Electricity Demand Forecasting Using Fuzzy-Neural NetworkElectricity Demand Forecasting Using Fuzzy-Neural Network
Electricity Demand Forecasting Using Fuzzy-Neural Network
 
An efficient technique for color image classification based on lower feature ...
An efficient technique for color image classification based on lower feature ...An efficient technique for color image classification based on lower feature ...
An efficient technique for color image classification based on lower feature ...
 
Time Series Forecasting Using Novel Feature Extraction Algorithm and Multilay...
Time Series Forecasting Using Novel Feature Extraction Algorithm and Multilay...Time Series Forecasting Using Novel Feature Extraction Algorithm and Multilay...
Time Series Forecasting Using Novel Feature Extraction Algorithm and Multilay...
 
K means report
K means reportK means report
K means report
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networks
 
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
 
Fault detection and_diagnosis
Fault detection and_diagnosisFault detection and_diagnosis
Fault detection and_diagnosis
 
An efficient fuzzy classifier with feature selection based
An efficient fuzzy classifier with feature selection basedAn efficient fuzzy classifier with feature selection based
An efficient fuzzy classifier with feature selection based
 

Mehr von eSAT Journals

Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
eSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
 

Mehr von eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Kürzlich hochgeladen

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 

Kürzlich hochgeladen (20)

Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 

Recognition of handwritten digits using rbf neural network

  • 1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 393 RECOGNITION OF HANDWRITTEN DIGITS USING RBF NEURAL NETWORK P P S Subhashini1 , V V K D V Prasad2 Department of ECE, RVR & JC College of Engineering, Chowdavaram, Guntur, 522019, A.P, India, k_shiva_111@yahoo.co.in, varrevkdvp@rediffmail.com Abstract Pattern recognition is required in many fields for different purposes. Methods based on Radial basis function (RBF) neural networks are found to be very successful in pattern classification problems. Training neural network is in general a challenging nonlinear optimization problem. Several algorithms have been proposed for choosing the RBF neural network prototypes and training the network. In this paper RBF neural network using decoupling Kalman filter method is proposed for handwritten digit recognition applications. The efficacy of the proposed method is tested on the handwritten digits of different fonts and found that it is successful in recognizing the digits. Keywords: - Neural network, RBF neural network, Decoupled kalman filter Training, Zoning method ------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION Character recognition is classified into two categories, off-line character recognition and on-line character recognition [1]. In off-line character recognition the system accepts image as input from the scanner. It is more difficult than on-line character recognition because of unavailability of contextual information and lack of prior knowledge like text position, size of text, order of strokes, start point and stop point. Noise will also exist in the images acquired in off-line character recognition. Machine Printed character recognition comes under this category [2]. On-line character recognition system accepts the moment of pen from the hardware such as graphic tablet, light pen and lot of information is available during the input process such as current position, moment’s direction, start points, stop points and stroke orders.e.g. handwritten character recognition [3]. There has been a drastic change in our perspective of concept of communication and connectivity with digital revolution. Biometrics play vital role in dealing with problem of authentication. It is the science of identifying or verifying the identity of a person based on physiological or behavioural characteristics. Physiological characteristics include fingerprints, iris, hand geometry and facial image [4]. The behavioural characteristics are actions carried out by a person in a characteristic way and include recognition of signature, machine printed characters, handwriting, and voice. There have been attempts to explore the possibility of efficient man- machine communication through hand written characters. Pattern recognition techniques using RBF neural network are helpful in classification of hand written characters of different users [5]. This paper focuses on handwritten digits recognition using RBF neural network based on decoupling Kalman filter training method. From the results it is found that the proposed method has very high success rate in handwritten digit recognition. 2. RBF NEURAL NETWORKS Radial basis function network (RBF) is a type of artificial network for applications to problems of supervised learning e.g. regression, classification and time series prediction. RBF networks can be used to solve classification problems [6]. The classification problem can be treated as a non-parametric regression problem if the outputs of the estimated function are interpreted as the probability that the input belongs to the corresponding classes. The training output values are vectors of length equal to the number of classes. After training, the network responds to a new pattern with continuous values in each component of the output vector and these values are interpreted as being proportional to class probability. This network consists of three layers, input layer, hidden layer, output layer as shown in Fig. 1. The m-dimensional input x is passed directly to a hidden layer. Suppose there are c neurons in the hidden layer, each of the c neurons in the hidden layer applies an activation function which is a function of the Euclidean distance between the input and an m-dimensional prototype vector [7]. Each hidden neuron contains its own prototype vector as a parameter. The output of each hidden neuron is then weighted and passed to the output layer. The outputs of the network consist of sums of the weighted hidden layer neurons. The design of an RBF requires several decisions that include the
  • 2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 394 number of hidden units in the hidden layer, values of the prototypes, the functions used at the hidden units and the weights applied between the hidden layer and the output layer. The performance of an RBF network depends on the number and location (in the input space) of the centres, the shape of the RBF functions at the hidden units and the method used for determining the network weights. Some researchers have trained RBF networks by selecting the centers randomly from the training data. Others have used unsupervised procedures (such as the k-means algorithm) for selecting the RBF centers. Still others have used supervised procedures for selecting the RBF centers. Fig 1 RBF Neural network architecture 2.1 Working Principle The principle of radial basis functions derives from the theory of functional approximation. Given N pairs ( ),i ix y , one looks for a function f of the form:   1 ( ) k i i i f x c h x t    .In this, h is the radial basis function (normally a Gaussian function) and it are the k centers which have to be selected. The coefficients ic are also unknown at the moment and have to be computed. ix and it are elements of an n – dimensional vector space. The hidden units compute the Euclidean distance between the input pattern and the vector, which is represented by the links leading to this unit. The activation of the hidden units is computed by applying the Euclidean distance to the function h as 2 2 ) /( ) ( ih x e x c r  . The parameters for the function h are its center c and its radius r . There have been a number of activation functions that include Gaussian function, Thin plate spline function, Multiquadric function and so on for the hidden layer of RBF neural network. In this paper the following function is considered. 1/(1 ) 0(( ) ( )) p g v g v   where p is a parameter and 0 ( )g v is a linear function of the form 0 ( )g v av b  where 0a  and 0b  . The single output neuron gets its input from all hidden neurons. The links leading to the output neuron hold the coefficients ci. The activation of the output neuron is determined by the weighted sum of its inputs. An RBF network is considered non-linear if the basis functions can move or change size or if there is more than one hidden layer otherwise the RBF network is considered linear. The above architecture can easily be extended to include more than one output node depending on the problem that the RBF network is to solve e.g classification into different classes would need as many output nodes as the number of classes. When the RBF network is used in classification, the hidden layer performs clustering while the output layer performs classification. The hidden units would have the strongest impulse when the input patterns are closed to the centers of the hidden units and gradually weaker impulse as the input patterns moved away from the centers. The output layer would linearly combine all the outputs of the hidden layer. Each output node would then give an output value, which represents the probability that the input pattern falls under that class. 3 DECOUPLED KALMAN FILTER For a large RBF network, the computational expense of the Kalman filter could be burdensome [8]. In fact, the computational expense of the Kalman filter is on the order of AB2, where A is the dimension of the output of the dynamic system and B is the number of parameters. In our case, there are nM outputs and n(c+1)+mc parameters, where n is the dimension of the RBF output, M is the number of training samples, c is the number of prototypes, and m is the dimension of the RBF input. Therefore, the computational expense of the Kalman filter is on the order of nM[n(c+1)+mc]2. The Kalman filter parameter vector can be decoupled by assuming that certain parameter groups interact with each other only at a second-order level. For instance, the Hk matrix contains a lot of zeros, showing that the interaction between various parameter groups can be neglected. In particular, the Hk matrix consists of n+1 decoupled blocks. These n+1 blocks correspond to the n sets of w weights that a4ect the n output components, and the set of prototypes. This is intuitive because, for example, the c+1 weights that impinge on the first component of the output are completely independent of the c+1 (2)
  • 3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 395 weights that impinge on the second component of the output . Let us use the notation that _ik refers to the ith group (out of n+1 total) of parameters estimated at time step k. Then we have θ1k = w1 ...θnk = wn θn+1k =[v1T……VcT]T We will use the notation that Hi corresponding to the i th group of parameters. H1k = H....Hnk = HHn+1k = Hv where H (with no subscript) is the (c+1)X m matrix .We will use the notation that ykt refers to the element of the target output of the RBF network that are effected by the i th group of parameters yk1 = [y11……….. y1m]T ykn = [yn1……….. ynm]T ykn+1 = [yn1……y1m…… y1n…….. ynm]T Similarly , we use the notation that ht (θֿk-1) refers to the elements of the actual output of the RBF network that are effected by the i th group of parameters h1(θֿk-1) = [ỹ11…….. ỹ1M]kT hn(θֿk-1) = [ỹn1…….. ỹnM]kT hk+1(θֿk-1) = [ỹ11…….. ỹ1M … ỹn1…….. ỹnM ]kT The decoupled Kalman recursion for the ith parameter group is then given by θ-tk = f(θ-tk-1) + Kkt[ykt - ht (θ-tk-1)] Ki = PktHkt(Rt +(Hkt)T PktHkt)-1 Pk+1t =Fk(Pk- Kkt(Hkt)TPkt) FkT +QT As before, f(.) is the identity mapping and Fk is the identity matrix. The above recursion executes n+1 times. The first n times, the recursion consists of M outputs and (c+1) parameters. The last time, the recursion consists of nM outputs and mc parameters. So the computational expense of the Kalman filter has been reduced to the order of nM[(c + 1)2 + (mc)2]. The ratio of the computational expense of Standard KF Expense n2(c +1)2 + m2c2 + n(c +1)mc Decoupled KF Expens (c +1)2 + m2c2 : (42) The computational savings will be most significant for large problems, i.e., problem where n (the dimension of the output) is large, m (the dimension of the input) is large, or c (the number of prototypes) is large. Note that this complexity analysis applies only to the Kalman recursion and does not include the computational expense required for the calculation of the partial derivatives. Also note that for both the standard and decoupled Kalman filters, the computational expense increases linearly with M (the number of training samples). 4. EXPERIMENTAL RESULTS The results obtained on using the proposed RBF neural network based on decoupling kalman filter training method for recognition of handwritten digits of different fonts are presented in this section. Hand written digits from 0 to 9 of 25 different fonts are taken and they are recognized by using this method. For each hand written digit, after obtaining the thinned image, 16 features are extracted using Zoning method. These features are used to train RBF neural network [9]. The different steps involved in recognition of the digits using this method are shown in the block diagram in the Fig.2 Fig. 2. Block Diagram of Handwritten digit recognition The RBF networks are trained using the hidden layer function of Eq. (1) The exponential parameter p in Eq. (1) is taken as 2 in the results presented in this section. The training algorithms are initialized with prototype vectors randomly selected from the input data and with the weight matrix W set to zero[10]. From the experiments, it is found that Decoupled Kalman Filter Training algorithm is terminated when the error decreases by less than 0.1 percent. The performance of each of the training methods is explored by averaging its performance over five trials, where each trial consists of a random selection of training and test data. The number of hidden units in the RBF network is varied between 1 and 15 [11]. Fig. 3 shows the number of iterations required for convergence. Percentage of correct classification for number of hidden units is given in Fig.4 for decoupling Kalman filter training [12]. The RBF network is trained with 13 different fonts of each digit and is also tested with 12 other fonts which are different from the trained fonts. It is observed that this method is successful in recognizing the digits of all these 25 fonts. For space consideration, the results of six hand written digits viz 0 to 5 are only shown here. The features of these handwritten digits are extracted and tabulated in Table 1 and 2. =
  • 4. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 396 Each digit has 16 features. The combination of all these features is called a feature vector. The feature vector is applied to neural network. If the digit is recognized, then the output node corresponding to the digit is one and the remaining are zeros. The training method here applied is supervised training method. This requires the target vector that is the desired output, which is tabulated in Table 3. Table 1: Features of Handwritten Digits 0 to 5 Hand Written Digit Features of Handwritten Digits (8 features) 0 0.526316 0.526316 0.526316 0.526316 0 1.105263 1 0 1 0 0 0 0 0 1.842105 0 0 2 0 0 0 0 0 1.157895 0.631579 0 3 0 0 0 0 0 1.842105 1.315789 0 4 0 0.052632 0 0 0 1 1.526316 0 5 0 0 0 0 0 0 1 0.052632 Table 2: Features of Handwritten Digits 0 to 5 Hand Written Digit Features of Handwritten Digits (8 features) 0 0 1.421053 1.105263 0 0 0 0 0 1 0 0.842105 0 0 0 0 0 0 2 0 1.684211 1.157895 0.105263 0 0 0 0 3 0 0.894737 0.842105 0 0 0 0 0 4 0 0.631579 2 0.105263 0 0 0 0 5 0 0 1.210526 0 0 0.105263 0.421053 0 Table 3: Target vector for Hand written digits 0 to 5 Node Output node1 Output node2 Output node3 Output node4 Output node5 Output node6Digit 0 1 0 0 0 0 0 1 0 1 0 0 0 0 2 0 0 1 0 0 0 3 0 0 0 1 0 0 4 0 0 0 0 1 0 5 0 0 0 0 0 1
  • 5. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 397 Fig 3. No.of iterations required for No. of hidden nodes Fig 4. Percentage of Correct Classification for No of Hidden Nodes CONCLUSIONS The RBF Neural Network using decoupled Kalman filter training method is proposed for recognition of handwritten digits of different fonts. The proposed method is tested on handwritten digits of 0 to 9 of 25 different fonts. It is found that this method has very high success rate in recognizing the handwritten digits. This method can be extended to recognize handwritten characters also. ACKNOWLEDGMENTS The authors place on record their thanks to the authorities of RVR&JC College of Engineering, Guntur, A.P., India for the facilities provided. REFERENCES [1] Naveed Bin Rais , M. Shehzad Hanif and rmtiaz A. Taj, Adaptive Thresholding Technique for Document Image Anaysis, IEEE Trans. on Systems, Man and Cybernetics, Vol.8, 1978, pp.60-66. [2] Sittisak Rodtook and Yuttapong Rangsanseri, Adaptive Thresholding of Document Images on Laplacian Sign, IEEE Transactions on Pattern analysis and Machine Intelligence, vol.17, No.24, January, 2001. [3] Jaekyu Ha & Robert M. Haralick Ihsin, T. Phillips, Document Page Decomposition by the Bounding-Box Projection Technique, IEEE Transactions on Systems, Man, and Cybernetics, Vol.18, No.1, January 1995, pp.1118-1122. [4] Rangachar Kasturi, Lawrence O’Gorman and Venu Govindaraju, Document analysis: A primer, Sadhana Vol.27, Part 1, February 2002, pp. 3-22. [5] Jaekyu Ha & Robert M. Haralick Ihsin, T. Phillips, Document Page Decomposition by the Bounding-Box Projection Technique, IEEE Transactions on Systems, Man, and Cybernetics, Vol.18, No.1, pp.1118-1122, January 1995. [6] Brijesh K. Verma, Handwritten Hindi Character Recognition Using Multilayer Perceptron and RBF Neural Networks, IEEE Trans. On Neural Networks, Vol.21, August 2004, pp. 2111-2115 [7] O.Batsaikhan and Y.P. Singh, Mongolian Character Recognition using Multilayer Perceptron, Proceedings of the 9th International Conference on Neural Information Processing, Vol. 2,2002. [8] John Wiley & Sons, - Technology and Engineering, Kalman Filtering and Neural Networks ,07-Apr- 2004. [9] Oivind Due Trier, Anil K.Jain and Torfinn Taxt, Feature Extraction methods for Character recognition– A Survey, Pattern Recognition, Vol. 29, No. 4, 1996, pp.641–662. [10] P. S. P. Wang and Y. Y. Zhang, A fast and flexible thinning algorithm, IEEE Transactions on Computers, Vol.38, No.5, May 1989. [11] O.Batsaikhan and Y.P. Singh, Mongolian Character Recognition using Multilayer Perceptron, Proceedings of the 9th International Conference on Neural Information Processing, Vol. 2,2002. [12] Military Communications Conference, 2003. MILCOM '03. 2003 IEEE paper ,A steady state decoupled Kalman filter technique for multiuser detection Year: 2003 , Page(s): 987 - 992 Vol.2