SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.5, October 2013

Neural network based Numerical digits
Recognization using NNT in Matlab
Amritpal kaur1, Madhavi Arora2
M.tech- ECE1, Assistant Professor2
Global institute of engineering and technology, Amritsar

ABSTRACT
Artificial neural networks are models inspired by human nervous system that is capable of learning. One of
the important applications of artificial neural network is character Recognition. Character Recognition
finds its application in number of areas, such as banking, security products, hospitals, in robotics also.
This paper is based on a system that recognizes a english numeral, given by the user, which is already
trained on the features of the numbers to be recognized using NNT (Neural network toolbox) .The system
has a neural network as its core, which is first trained on a database. The training of the neural network
extracts the features of the English numbers and stores in the database. The next phase of the system is to
recognize the number given by the user. The features of the number given by the user are extracted and
compared with the feature database and the recognized number is displayed.

KEYWORDS
Steepest Descent algorithm, Back propagation network, Artificial neural network, Feature extraction, Least
mean square

1. INTRODUCTION
The handwriting recognition refers to the identification of written characters. Handwriting
recognition has been become a very important and useful research area in recent years for the
ease of access of many applications. Numerous approaches have been proposed for character
recognition and considerable success has been reported [1]. Numeral recognition refers to the
process of translating images of handwritten, typewritten, or printed digits into a format
understood by the user for the purpose of editing, indexing, searching and reduction in storage
size .Number recognition can be online or offline. In online number recognition, data are captured
during the writing process with the help of special pen and an electronic interface. Offline
documents are scanned images of prewritten text, generally on sheet or paper [2]. Offline number
recognition is significantly different from online number recognition, because here, stoke
information is not available [3, 4]. In this paper, we work with offline numerals. In this paper
artificial neural network is used for recognition of numerals. Back propagation network is used
for training of artificial neural network. The learning rule used here is Steepest Descent algorithm
with adaptive learning capabilities.

1.1. STEEPEST DESCENT ALGORITHM
Steepest Descent algorithm calculates the gradient of function. Gradient means change of error
energy with respect to weight value. This algorithm is used to calculate the error. Training in
neural networks involves finding the minimum of a complicated non linear function (called error
DOI : 10.5121/ijcses.2013.4502

19
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.5, October 2013

function).This algorithm describes the error that a neural networks makes in approximating or
classifying the training data. The error that mainly occurs in training of network is mean square
error (mse). Mse is a network performance function. It measures the network performance
according to mean of squared errors.

1.2. ARTIFICAL NEURAL NETWORK
Artificial neural networks have been developed as generalizations of mathematical models of
biological nervous systems. A first wave of interest in neural networks emerged after the
introduction of simplified neurons by McCulloch and Pitts (1943). The basic processing elements
of neural networks are called artificial neurons [5] or simply neurons or nodes. In a simple
mathematical model of neuron, the effects of the synapses are represented by connection weights
that modulate the effect of associated input signals and the non linear characteristics exhibited by
the neurons that are represented by transfer function [6]. The neuron impulse function is
calculated as the weighted sum of input signals, with the help of the transfer function. The
Learning capability of artificial neurons is achieved by adjusting the weights in accordance with
chosen learning algorithm. The artificial neural network can be trained into two main groups that
are supervised and unsupervised learning. In supervised learning, the network learns by example
with help of some training algorithm and a target value is set, whereas in unsupervised learning,
no target value is set or no example is given. Unsupervised learning is very complex and difficult
to implement [7].

Figure 1.shows artificial neural network

1.3. BACK PROPAGATION NETWORK
Back propagation, an abbreviation for ‘backward propagation of errors’, is a method used for
training of artificial neural network. From the desired or actual output, the network learns from
number of inputs, similar to the way a child learns to identify a car from group of toys. It is
supervised learning method. It requires a dataset of desired output from set of many inputs,
making up the training set. A back propagation network consists of three layers of units- input
layer, hidden layer and output layer as shown in figure 2. These units are connected in feed
forward manner with input units fully connected with units in hidden layer and units in hidden
layer fully connected with units in output layer. When back propagation network is cycled, an
input pattern is propagated forward to the output units through input to hidden and hidden to
output weights. Back propagation is an iterative process that starts with last layer and moves
backward through the layers until the first layer is reached. This algorithm is based upon Widrow
hoff delta learning rule in which the weight adjustment is done through mean square error of
output response to sample input. The rest of these sample patters are repeatedly presented to the

20
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.5, October 2013

network until the error value is minimised. Weights are adjusted according to the error present in
the network.

Figure 2. shows Back Propagation Network

2. ADAPTIVE LEARNING RATE
The back propagation algorithms are basically of two types, gradient descent and gradient descent
with momentum. With standard steepest descent, the learning rate is held constant throughout
training. The performance of this algorithm is dependent on the proper setting of learning rate. If
the learning rate is set too high, the algorithm can starts oscillate and becomes unstable. If
learning rate is kept small, algorithm takes long time to converge. The performance of steepest
learning can be improve if learning rate is allowed to change during training process. An
adaptive learning rate has an advantage of keeping the learning step size as large as possible
while keeping learning process stable. The learning rate is made sensitive to the complexity of
mean square error. This process can increase the learning rate, but up to the extent that the
network can learn without having large number of errors.
One of the most popular algorithms in adaptive learning is least mean square (LMS) algorithm of
Widrow and Hoff. The LMS algorithm has been used here because of its robustness and
simplicity. Key parameter in this algorithm is step size. If the step size is made larger, the rate of
convergence of LMS algorithm is fast but on the other side, mean square error is increased. But,
if the step size is made smaller, the convergence rate of LMS algorithm is slow. Thus step size
provides a trade off between convergence rate and MSE. An intuitive way to improve the
performance of LMS algorithm is to make the step size variable rather than fixed, choose large
step size values during the initial convergence and use small step size values when the system is
close to its steady state , which results in variable step size (adaptive learning rate) LMS
algorithms. By using such approach both fast convergences rate and least MSE can be obtained.
In the VSSLMS algorithm, the step size µ is replaced with variable parameter µ(n) and
coefficient vector w(n) is updated as:
w(n+1) = w(n) + µ(n) e(n) x(n)
Where e(n) is error and x(n) is input to network.
21
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.5, October 2013

3. METHODOLOGY USED
This paper recognizes the English numerals given as an image to the system automatically using
the intelligence of the two layered neural network. The neural network applied in the system
utilizes the Steepest Descent Algorithm with Adaptive Learning Rate as the learning rule, which
is used for the training of the neural network. The basic flow of the system is shown as below:
Neural Network
Initialization and Training

Extracted Feature
Database

Input Test Image

Select the image of the
number to recognize

Image Pre-processing

Test Image Feature
Extraction

Recognizing the Number
based on feature extracted
The methodology used here can be explained as:

3.1. Neural Network Initialization and Training
In the Ist step, neural network is initialised and trained with the help of back propagation
network. Once the network has been initialised, the network is ready to train. Some issues that
need to address upon training the network are: What should be the values of- learning rate,
sigmoid shape, gradient, weight bias and how many values of Iterations (Epochs) are to be taken
for the training of network for given set of inputs. Here the network learns what we have taught to
it.

22
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.5, October 2013

Figure 3.shows NN toolbox for English numeral recognition

Neural network is trained as shown in fig.4. Here we have set 5000 iterations for the network to
train. Following figure.5 shows that our performance goal is met with only 313 iterations out of
5000 iterations. Other parameters of network are also displayed. Time taken for training of
network is displayed as 0:05:26 as well as performance and gradient are also displayed here.

Figure 4.shows training of ANN

23
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.5, October 2013

3.2. Feature Extraction
Feature Extraction is used to extract relevant features for recognition of characters. First features
are computed and extracted and then most relevant features are selected to construct feature
vector which is used for recognition. The computation of features is based on statistical,
structural, directional, moment, transformation like approaches. Feature extraction is extracting
information from raw data which is more relevant for classification purpose and that minimises
the variation within a class and maximizes the variations between classes[8].

3.3. Input Test Image
Input the image which is to be tested. Input images maybe any numerals between 0 to 9. It may
be 0,1,2,3,4,5,6,7,8,9 as well as combination of two or three numbers. The arrow indicates to load
image by which image can be loaded into the system. Here we take an image of 5*7 matrixes
which is displayed in fig.6.

Figure.5 shows Ist step of loading of image in ANN

Figure.6 shows 2nd step of loading image in ANN

24
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.5, October 2013

3.4. Image Pre-Processing
Raw image may carry some unwanted noise. In Pre-processing stage, we basically remove the
unwanted noise and distortion of image. In Image pre processing, the input image is first
converted into gray scale image and then to binary image. This process is called digitization of
image. The scanned image has some noise, the noise is due to some unnecessary details present in
the image. Image Pre processing is used for skeletonization (thinning) and noise reduction or
removal .Skeletonization is necessary here as it decreases the line width of text from many pixels
to single pixel. Noise removal is necessary as it remove unwanted details which do not play any
important role. Image dilation and filling of holes are performed to produce the pre processed
image suitable for segmentation [9]. In segmentation stage, an image consisting of sequence of
characters is decomposed into sub images of individual character [10].In Segmentation, the
position of the object that is the number in the image is find out and size of number is cropped as
shown in figure.7.

Figure.7 shows pre processing of image

3.5. Test image feature extraction
The image from the segmented stage is matched with all the number which is preload into the
system. In this step, the nearest match of the stored and input number is finding out. Once, the
matching is completed the number with maximum matching is declared as the number present in
the image.

3.6. Recognizing the number
This is the final stage .Here the recognized number is displayed as shown: The number that is
highlighted in blue is selected and is recognized. In figure 8, a single number ‘6’ is selected and is
displayed as shown. In figure 9, two numbers ‘67’ is selected and is displayed as 67 shown in
figure.9.

25
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.5, October 2013

Figure.8 shows recognition of numeral ‘6’

Figure.9 shows recognition of numeral ‘67’

4. PERFORMANCE PARAMETERS
The performance parameters show the accuracy of the system in terms of its parameters like
gradient, validation, learning rate and training.

26
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.5, October 2013
Gradient = 0.11536, at epoch 313

2

gradient

10

0

10

-2

10

Validation Checks = 0, at epoch 313
val fail

1
0
-1
Learning Rate = 7.6934, at epoch 313

lr

10
5
0

0

50

100

150
313 Epochs

200

250

300

Best Training Performance is 0.098379 at epoch 313
2

10

Sum Squared Error (sse)

Train
Best
Goal
1

10

0

10

-1

10

-2

10

0

50

100

150

200

250

300

313 Epochs

27
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.5, October 2013

Training: R=0.99935
1

Output ~= 0.96*Target + 0.0056

0.9

Data
Fit
Y =T

0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
0

0.2

0.4

0.6

0.8

1

Target

5. CONCLUSION AND FUTURE SCOPE
The application of neural network in character recognition has been a field of study recently.
Neural networks are used to solve the tasks which are difficult for conventional computers or
human beings to solve. This paper aims at recognition of English numeral recognition using
gradient descent based back propagation training algorithm. The main aim of using this
algorithm is to reduce the error which is difference between the computed value of neural
network and desired value. By using artificial neural network methodology of English numeral
recognition, 99% accuracy is achieved. The method used in this paper can be further extended to
recognize multilingual characters.

REFERENCES
[1]. R. Plamondon
and S.N. Srihari., 2000, “Online and off-line handwriting recognition: a
comprehensive survey.”, Pattern Analysis and Machine Intelligence, IEEE Transac-tions on, vol.
22(1), pp 63–84.
[2]. Munish kumar, M.K.Jindal and R.K Sharma,”Classification of characters and grading writers in
offline handwritten gurmukhi script”,2011 International Conference on image information processing
(ICIIP 2011)
[3]. M. Lorigo and V. Govindaraju, “Offline Arabic handwriting recognition: a survey”, IEEE
Transactions on PAMI, Vol. 28(5), pp. 712-724, 2006.
[4]. R. Plamondon and S. N. Srihari, ''On-line and off- line handwritten character recognition: A
comprehensive survey'', IEEE Transactions on PAMI, Vol. 22 (1), pp. 63-84, 2000.

28
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.5, October 2013
[5]. M. Schuster and K. K. Paliwal, November 1997 , “Bidirectional recurrent neural networks”, IEEE
Transactions on Signal Processing,vol 45, pp 2673–2681.”.
[6]. Yusuf Perwej , November 2012, “ Recurrent Neural Network Method in Arabic Words Recognition
System” ,International Journal of Computer Science and Telecommunications (IJCST), published by
Sysbase Solution (Ltd), UK, London (http://www.ijcst.org) , vol. 3, Issue 11, pp 43-48.
[7]. Sang Sung park,Won Gyo Jung,Young Geun Shin,Dong Sik Jang, Department of Industrial system
and Information Engineering, Korea University, South Korea, “Optical character system Using BP
Algorithm
[8]. O. D. Trier, A. K. Jain and T. Taxt, 1996, ”Feature Extraction Methods for Character Recognition A
Survey”, Pattern Recognition, vol. 29, pp. 641-662.
[9]. Gonzalez ,R.C.woods, R.E.and Eddins, S.L. ,”Digital image processing using MATLAB”, Pearson
Education, Dorling Kindersley,South Asia,(2002).
[10]. Casey, R.G. and Lecolinet, E.,”A Survey of Methods and Strategies in Character Segmentation.”
IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.18, No. 7, (1996),690-706.

Authors
Amritpal kaur is pursuing M. Tech in Electronics and Communication Engineering from
Global Institute of Engineering & Technology, Amritsar. She did her B.Tech degree in
Electronics and Communication Engineering from Sai Institute of Engineering &
Technology, Amritsar, Punjab, India. Her area of interest is Image Processing and fuzzy
logic.
Madhavi Arora is presently working as a A.P in Global college of Management and
Emerging Technology. She has done her M. Tech in Electronics and Communication
Engineering from Amritsar College of Engineering & Technology .She did her B.Tech
degree in Electronics and Communication Engineering from Guru Nanak Dev University,
Amritsar, Punjab, India. Her area of interest is Image Processing and fuzzy logic.

29

Weitere ähnliche Inhalte

Was ist angesagt?

character recognition: Scope and challenges
 character recognition: Scope and challenges character recognition: Scope and challenges
character recognition: Scope and challengesVikas Dongre
 
Recognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural networkRecognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural networkeSAT Publishing House
 
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...Editor IJMTER
 
Handwritten character recognition in
Handwritten character recognition inHandwritten character recognition in
Handwritten character recognition inijaia
 
Representation and recognition of handwirten digits using deformable templates
Representation and recognition of handwirten digits using deformable templatesRepresentation and recognition of handwirten digits using deformable templates
Representation and recognition of handwirten digits using deformable templatesAhmed Abd-Elwasaa
 
Dissertation character recognition - Report
Dissertation character recognition - ReportDissertation character recognition - Report
Dissertation character recognition - Reportsachinkumar Bharadva
 
Handwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionHandwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionNaiyan Noor
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...iosrjce
 
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIERHANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIERvineet raj
 
OCR processing with deep learning: Apply to Vietnamese documents
OCR processing with deep learning: Apply to Vietnamese documents OCR processing with deep learning: Apply to Vietnamese documents
OCR processing with deep learning: Apply to Vietnamese documents Viet-Trung TRAN
 
Handwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHandwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHarshana Madusanka Jayamaha
 
Off-line English Character Recognition: A Comparative Survey
Off-line English Character Recognition: A Comparative SurveyOff-line English Character Recognition: A Comparative Survey
Off-line English Character Recognition: A Comparative Surveyidescitation
 
Devanagari Character Recognition
Devanagari Character RecognitionDevanagari Character Recognition
Devanagari Character RecognitionPulkit Goyal
 
Handwritten digit recognition using image processing
Handwritten digit recognition using image processing Handwritten digit recognition using image processing
Handwritten digit recognition using image processing anita maharjan
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...ijfcstjournal
 
Use of artificial neural network in pattern recognition
Use of artificial neural network in pattern recognitionUse of artificial neural network in pattern recognition
Use of artificial neural network in pattern recognitionkamalsrit
 
Handwriting Recognition
Handwriting RecognitionHandwriting Recognition
Handwriting RecognitionBindu Karki
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataeSAT Publishing House
 
Automatic handwriting recognition
Automatic handwriting recognitionAutomatic handwriting recognition
Automatic handwriting recognitionBIJIT GHOSH
 

Was ist angesagt? (20)

character recognition: Scope and challenges
 character recognition: Scope and challenges character recognition: Scope and challenges
character recognition: Scope and challenges
 
Recognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural networkRecognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural network
 
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
 
Handwritten character recognition in
Handwritten character recognition inHandwritten character recognition in
Handwritten character recognition in
 
Representation and recognition of handwirten digits using deformable templates
Representation and recognition of handwirten digits using deformable templatesRepresentation and recognition of handwirten digits using deformable templates
Representation and recognition of handwirten digits using deformable templates
 
Dissertation character recognition - Report
Dissertation character recognition - ReportDissertation character recognition - Report
Dissertation character recognition - Report
 
Handwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionHandwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer Version
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
 
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIERHANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
 
OCR processing with deep learning: Apply to Vietnamese documents
OCR processing with deep learning: Apply to Vietnamese documents OCR processing with deep learning: Apply to Vietnamese documents
OCR processing with deep learning: Apply to Vietnamese documents
 
Handwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHandwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural network
 
Off-line English Character Recognition: A Comparative Survey
Off-line English Character Recognition: A Comparative SurveyOff-line English Character Recognition: A Comparative Survey
Off-line English Character Recognition: A Comparative Survey
 
Devanagari Character Recognition
Devanagari Character RecognitionDevanagari Character Recognition
Devanagari Character Recognition
 
Handwritten digit recognition using image processing
Handwritten digit recognition using image processing Handwritten digit recognition using image processing
Handwritten digit recognition using image processing
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
Use of artificial neural network in pattern recognition
Use of artificial neural network in pattern recognitionUse of artificial neural network in pattern recognition
Use of artificial neural network in pattern recognition
 
Handwriting Recognition
Handwriting RecognitionHandwriting Recognition
Handwriting Recognition
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
 
Handwritten Character Recognition
Handwritten Character RecognitionHandwritten Character Recognition
Handwritten Character Recognition
 
Automatic handwriting recognition
Automatic handwriting recognitionAutomatic handwriting recognition
Automatic handwriting recognition
 

Ähnlich wie Neural network based numerical digits recognization using nnt in matlab

Survey on Artificial Neural Network Learning Technique Algorithms
Survey on Artificial Neural Network Learning Technique AlgorithmsSurvey on Artificial Neural Network Learning Technique Algorithms
Survey on Artificial Neural Network Learning Technique AlgorithmsIRJET Journal
 
Neural Network Based Individual Classification System
Neural Network Based Individual Classification SystemNeural Network Based Individual Classification System
Neural Network Based Individual Classification SystemIRJET Journal
 
Comparison of Neural Network Training Functions for Hematoma Classification i...
Comparison of Neural Network Training Functions for Hematoma Classification i...Comparison of Neural Network Training Functions for Hematoma Classification i...
Comparison of Neural Network Training Functions for Hematoma Classification i...IOSR Journals
 
Introduction Of Artificial neural network
Introduction Of Artificial neural networkIntroduction Of Artificial neural network
Introduction Of Artificial neural networkNagarajan
 
Levenberg marquardt-algorithm-for-karachi-stock-exchange-share-rates-forecast...
Levenberg marquardt-algorithm-for-karachi-stock-exchange-share-rates-forecast...Levenberg marquardt-algorithm-for-karachi-stock-exchange-share-rates-forecast...
Levenberg marquardt-algorithm-for-karachi-stock-exchange-share-rates-forecast...Cemal Ardil
 
Web spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithmsWeb spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithmsaciijournal
 
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network AlgorithmsWeb Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network Algorithmsaciijournal
 
Neural Network Implementation Control Mobile Robot
Neural Network Implementation Control Mobile RobotNeural Network Implementation Control Mobile Robot
Neural Network Implementation Control Mobile RobotIRJET Journal
 
Open CV Implementation of Object Recognition Using Artificial Neural Networks
Open CV Implementation of Object Recognition Using Artificial Neural NetworksOpen CV Implementation of Object Recognition Using Artificial Neural Networks
Open CV Implementation of Object Recognition Using Artificial Neural Networksijceronline
 
Fuzzy Logic Final Report
Fuzzy Logic Final ReportFuzzy Logic Final Report
Fuzzy Logic Final ReportShikhar Agarwal
 
Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech ...
Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech ...Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech ...
Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech ...ijistjournal
 
Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech ...
Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech ...Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech ...
Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech ...ijistjournal
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...IJEEE
 
Evolutionary Algorithm for Optimal Connection Weights in Artificial Neural Ne...
Evolutionary Algorithm for Optimal Connection Weights in Artificial Neural Ne...Evolutionary Algorithm for Optimal Connection Weights in Artificial Neural Ne...
Evolutionary Algorithm for Optimal Connection Weights in Artificial Neural Ne...CSCJournals
 
Neural basics
Neural basicsNeural basics
Neural basicscoursesub
 
2. NEURAL NETWORKS USING GENETIC ALGORITHMS.pptx
2. NEURAL NETWORKS USING GENETIC ALGORITHMS.pptx2. NEURAL NETWORKS USING GENETIC ALGORITHMS.pptx
2. NEURAL NETWORKS USING GENETIC ALGORITHMS.pptxssuser67281d
 

Ähnlich wie Neural network based numerical digits recognization using nnt in matlab (20)

Survey on Artificial Neural Network Learning Technique Algorithms
Survey on Artificial Neural Network Learning Technique AlgorithmsSurvey on Artificial Neural Network Learning Technique Algorithms
Survey on Artificial Neural Network Learning Technique Algorithms
 
Neural Network Based Individual Classification System
Neural Network Based Individual Classification SystemNeural Network Based Individual Classification System
Neural Network Based Individual Classification System
 
Comparison of Neural Network Training Functions for Hematoma Classification i...
Comparison of Neural Network Training Functions for Hematoma Classification i...Comparison of Neural Network Training Functions for Hematoma Classification i...
Comparison of Neural Network Training Functions for Hematoma Classification i...
 
F017533540
F017533540F017533540
F017533540
 
Introduction Of Artificial neural network
Introduction Of Artificial neural networkIntroduction Of Artificial neural network
Introduction Of Artificial neural network
 
Levenberg marquardt-algorithm-for-karachi-stock-exchange-share-rates-forecast...
Levenberg marquardt-algorithm-for-karachi-stock-exchange-share-rates-forecast...Levenberg marquardt-algorithm-for-karachi-stock-exchange-share-rates-forecast...
Levenberg marquardt-algorithm-for-karachi-stock-exchange-share-rates-forecast...
 
B42010712
B42010712B42010712
B42010712
 
Web spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithmsWeb spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithms
 
N ns 1
N ns 1N ns 1
N ns 1
 
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network AlgorithmsWeb Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
 
Neural Network Implementation Control Mobile Robot
Neural Network Implementation Control Mobile RobotNeural Network Implementation Control Mobile Robot
Neural Network Implementation Control Mobile Robot
 
Open CV Implementation of Object Recognition Using Artificial Neural Networks
Open CV Implementation of Object Recognition Using Artificial Neural NetworksOpen CV Implementation of Object Recognition Using Artificial Neural Networks
Open CV Implementation of Object Recognition Using Artificial Neural Networks
 
Fuzzy Logic Final Report
Fuzzy Logic Final ReportFuzzy Logic Final Report
Fuzzy Logic Final Report
 
Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech ...
Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech ...Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech ...
Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech ...
 
Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech ...
Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech ...Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech ...
Implementation Of Back-Propagation Neural Network For Isolated Bangla Speech ...
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...
 
Evolutionary Algorithm for Optimal Connection Weights in Artificial Neural Ne...
Evolutionary Algorithm for Optimal Connection Weights in Artificial Neural Ne...Evolutionary Algorithm for Optimal Connection Weights in Artificial Neural Ne...
Evolutionary Algorithm for Optimal Connection Weights in Artificial Neural Ne...
 
Neural basics
Neural basicsNeural basics
Neural basics
 
2. NEURAL NETWORKS USING GENETIC ALGORITHMS.pptx
2. NEURAL NETWORKS USING GENETIC ALGORITHMS.pptx2. NEURAL NETWORKS USING GENETIC ALGORITHMS.pptx
2. NEURAL NETWORKS USING GENETIC ALGORITHMS.pptx
 

Mehr von ijcses

Vision based entomology a survey
Vision based entomology  a surveyVision based entomology  a survey
Vision based entomology a surveyijcses
 
A survey on cost effective survivable network design in wireless access network
A survey on cost effective survivable network design in wireless access networkA survey on cost effective survivable network design in wireless access network
A survey on cost effective survivable network design in wireless access networkijcses
 
A comparative survey based on processing network traffic data using hadoop pi...
A comparative survey based on processing network traffic data using hadoop pi...A comparative survey based on processing network traffic data using hadoop pi...
A comparative survey based on processing network traffic data using hadoop pi...ijcses
 
ADAPTIVE MAP FOR SIMPLIFYING BOOLEAN EXPRESSIONS
ADAPTIVE MAP FOR SIMPLIFYING BOOLEAN EXPRESSIONSADAPTIVE MAP FOR SIMPLIFYING BOOLEAN EXPRESSIONS
ADAPTIVE MAP FOR SIMPLIFYING BOOLEAN EXPRESSIONSijcses
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hidingijcses
 
Congestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback modelCongestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback modelijcses
 
Ijcses(most cited articles)
Ijcses(most cited articles)Ijcses(most cited articles)
Ijcses(most cited articles)ijcses
 
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKS
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKSMULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKS
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKSijcses
 
A survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networksA survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networksijcses
 
An Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet SniffingAn Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet Sniffingijcses
 
Artificial intelligence markup language: a Brief tutorial
Artificial intelligence markup language: a Brief tutorialArtificial intelligence markup language: a Brief tutorial
Artificial intelligence markup language: a Brief tutorialijcses
 
A NOBEL HYBRID APPROACH FOR EDGE DETECTION
A NOBEL HYBRID APPROACH FOR EDGE  DETECTIONA NOBEL HYBRID APPROACH FOR EDGE  DETECTION
A NOBEL HYBRID APPROACH FOR EDGE DETECTIONijcses
 
RESEARCH ON DISTRIBUTED SOFTWARE TESTING PLATFORM BASED ON CLOUD RESOURCE
RESEARCH ON DISTRIBUTED SOFTWARE TESTING  PLATFORM BASED ON CLOUD RESOURCERESEARCH ON DISTRIBUTED SOFTWARE TESTING  PLATFORM BASED ON CLOUD RESOURCE
RESEARCH ON DISTRIBUTED SOFTWARE TESTING PLATFORM BASED ON CLOUD RESOURCEijcses
 
PHYSICAL MODELING AND SIMULATION OF THERMAL HEATING IN VERTICAL INTEGRATED ...
PHYSICAL MODELING AND SIMULATION  OF THERMAL HEATING IN VERTICAL  INTEGRATED ...PHYSICAL MODELING AND SIMULATION  OF THERMAL HEATING IN VERTICAL  INTEGRATED ...
PHYSICAL MODELING AND SIMULATION OF THERMAL HEATING IN VERTICAL INTEGRATED ...ijcses
 

Mehr von ijcses (14)

Vision based entomology a survey
Vision based entomology  a surveyVision based entomology  a survey
Vision based entomology a survey
 
A survey on cost effective survivable network design in wireless access network
A survey on cost effective survivable network design in wireless access networkA survey on cost effective survivable network design in wireless access network
A survey on cost effective survivable network design in wireless access network
 
A comparative survey based on processing network traffic data using hadoop pi...
A comparative survey based on processing network traffic data using hadoop pi...A comparative survey based on processing network traffic data using hadoop pi...
A comparative survey based on processing network traffic data using hadoop pi...
 
ADAPTIVE MAP FOR SIMPLIFYING BOOLEAN EXPRESSIONS
ADAPTIVE MAP FOR SIMPLIFYING BOOLEAN EXPRESSIONSADAPTIVE MAP FOR SIMPLIFYING BOOLEAN EXPRESSIONS
ADAPTIVE MAP FOR SIMPLIFYING BOOLEAN EXPRESSIONS
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hiding
 
Congestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback modelCongestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback model
 
Ijcses(most cited articles)
Ijcses(most cited articles)Ijcses(most cited articles)
Ijcses(most cited articles)
 
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKS
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKSMULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKS
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKS
 
A survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networksA survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networks
 
An Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet SniffingAn Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet Sniffing
 
Artificial intelligence markup language: a Brief tutorial
Artificial intelligence markup language: a Brief tutorialArtificial intelligence markup language: a Brief tutorial
Artificial intelligence markup language: a Brief tutorial
 
A NOBEL HYBRID APPROACH FOR EDGE DETECTION
A NOBEL HYBRID APPROACH FOR EDGE  DETECTIONA NOBEL HYBRID APPROACH FOR EDGE  DETECTION
A NOBEL HYBRID APPROACH FOR EDGE DETECTION
 
RESEARCH ON DISTRIBUTED SOFTWARE TESTING PLATFORM BASED ON CLOUD RESOURCE
RESEARCH ON DISTRIBUTED SOFTWARE TESTING  PLATFORM BASED ON CLOUD RESOURCERESEARCH ON DISTRIBUTED SOFTWARE TESTING  PLATFORM BASED ON CLOUD RESOURCE
RESEARCH ON DISTRIBUTED SOFTWARE TESTING PLATFORM BASED ON CLOUD RESOURCE
 
PHYSICAL MODELING AND SIMULATION OF THERMAL HEATING IN VERTICAL INTEGRATED ...
PHYSICAL MODELING AND SIMULATION  OF THERMAL HEATING IN VERTICAL  INTEGRATED ...PHYSICAL MODELING AND SIMULATION  OF THERMAL HEATING IN VERTICAL  INTEGRATED ...
PHYSICAL MODELING AND SIMULATION OF THERMAL HEATING IN VERTICAL INTEGRATED ...
 

Kürzlich hochgeladen

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Neural network based numerical digits recognization using nnt in matlab

  • 1. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.5, October 2013 Neural network based Numerical digits Recognization using NNT in Matlab Amritpal kaur1, Madhavi Arora2 M.tech- ECE1, Assistant Professor2 Global institute of engineering and technology, Amritsar ABSTRACT Artificial neural networks are models inspired by human nervous system that is capable of learning. One of the important applications of artificial neural network is character Recognition. Character Recognition finds its application in number of areas, such as banking, security products, hospitals, in robotics also. This paper is based on a system that recognizes a english numeral, given by the user, which is already trained on the features of the numbers to be recognized using NNT (Neural network toolbox) .The system has a neural network as its core, which is first trained on a database. The training of the neural network extracts the features of the English numbers and stores in the database. The next phase of the system is to recognize the number given by the user. The features of the number given by the user are extracted and compared with the feature database and the recognized number is displayed. KEYWORDS Steepest Descent algorithm, Back propagation network, Artificial neural network, Feature extraction, Least mean square 1. INTRODUCTION The handwriting recognition refers to the identification of written characters. Handwriting recognition has been become a very important and useful research area in recent years for the ease of access of many applications. Numerous approaches have been proposed for character recognition and considerable success has been reported [1]. Numeral recognition refers to the process of translating images of handwritten, typewritten, or printed digits into a format understood by the user for the purpose of editing, indexing, searching and reduction in storage size .Number recognition can be online or offline. In online number recognition, data are captured during the writing process with the help of special pen and an electronic interface. Offline documents are scanned images of prewritten text, generally on sheet or paper [2]. Offline number recognition is significantly different from online number recognition, because here, stoke information is not available [3, 4]. In this paper, we work with offline numerals. In this paper artificial neural network is used for recognition of numerals. Back propagation network is used for training of artificial neural network. The learning rule used here is Steepest Descent algorithm with adaptive learning capabilities. 1.1. STEEPEST DESCENT ALGORITHM Steepest Descent algorithm calculates the gradient of function. Gradient means change of error energy with respect to weight value. This algorithm is used to calculate the error. Training in neural networks involves finding the minimum of a complicated non linear function (called error DOI : 10.5121/ijcses.2013.4502 19
  • 2. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.5, October 2013 function).This algorithm describes the error that a neural networks makes in approximating or classifying the training data. The error that mainly occurs in training of network is mean square error (mse). Mse is a network performance function. It measures the network performance according to mean of squared errors. 1.2. ARTIFICAL NEURAL NETWORK Artificial neural networks have been developed as generalizations of mathematical models of biological nervous systems. A first wave of interest in neural networks emerged after the introduction of simplified neurons by McCulloch and Pitts (1943). The basic processing elements of neural networks are called artificial neurons [5] or simply neurons or nodes. In a simple mathematical model of neuron, the effects of the synapses are represented by connection weights that modulate the effect of associated input signals and the non linear characteristics exhibited by the neurons that are represented by transfer function [6]. The neuron impulse function is calculated as the weighted sum of input signals, with the help of the transfer function. The Learning capability of artificial neurons is achieved by adjusting the weights in accordance with chosen learning algorithm. The artificial neural network can be trained into two main groups that are supervised and unsupervised learning. In supervised learning, the network learns by example with help of some training algorithm and a target value is set, whereas in unsupervised learning, no target value is set or no example is given. Unsupervised learning is very complex and difficult to implement [7]. Figure 1.shows artificial neural network 1.3. BACK PROPAGATION NETWORK Back propagation, an abbreviation for ‘backward propagation of errors’, is a method used for training of artificial neural network. From the desired or actual output, the network learns from number of inputs, similar to the way a child learns to identify a car from group of toys. It is supervised learning method. It requires a dataset of desired output from set of many inputs, making up the training set. A back propagation network consists of three layers of units- input layer, hidden layer and output layer as shown in figure 2. These units are connected in feed forward manner with input units fully connected with units in hidden layer and units in hidden layer fully connected with units in output layer. When back propagation network is cycled, an input pattern is propagated forward to the output units through input to hidden and hidden to output weights. Back propagation is an iterative process that starts with last layer and moves backward through the layers until the first layer is reached. This algorithm is based upon Widrow hoff delta learning rule in which the weight adjustment is done through mean square error of output response to sample input. The rest of these sample patters are repeatedly presented to the 20
  • 3. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.5, October 2013 network until the error value is minimised. Weights are adjusted according to the error present in the network. Figure 2. shows Back Propagation Network 2. ADAPTIVE LEARNING RATE The back propagation algorithms are basically of two types, gradient descent and gradient descent with momentum. With standard steepest descent, the learning rate is held constant throughout training. The performance of this algorithm is dependent on the proper setting of learning rate. If the learning rate is set too high, the algorithm can starts oscillate and becomes unstable. If learning rate is kept small, algorithm takes long time to converge. The performance of steepest learning can be improve if learning rate is allowed to change during training process. An adaptive learning rate has an advantage of keeping the learning step size as large as possible while keeping learning process stable. The learning rate is made sensitive to the complexity of mean square error. This process can increase the learning rate, but up to the extent that the network can learn without having large number of errors. One of the most popular algorithms in adaptive learning is least mean square (LMS) algorithm of Widrow and Hoff. The LMS algorithm has been used here because of its robustness and simplicity. Key parameter in this algorithm is step size. If the step size is made larger, the rate of convergence of LMS algorithm is fast but on the other side, mean square error is increased. But, if the step size is made smaller, the convergence rate of LMS algorithm is slow. Thus step size provides a trade off between convergence rate and MSE. An intuitive way to improve the performance of LMS algorithm is to make the step size variable rather than fixed, choose large step size values during the initial convergence and use small step size values when the system is close to its steady state , which results in variable step size (adaptive learning rate) LMS algorithms. By using such approach both fast convergences rate and least MSE can be obtained. In the VSSLMS algorithm, the step size µ is replaced with variable parameter µ(n) and coefficient vector w(n) is updated as: w(n+1) = w(n) + µ(n) e(n) x(n) Where e(n) is error and x(n) is input to network. 21
  • 4. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.5, October 2013 3. METHODOLOGY USED This paper recognizes the English numerals given as an image to the system automatically using the intelligence of the two layered neural network. The neural network applied in the system utilizes the Steepest Descent Algorithm with Adaptive Learning Rate as the learning rule, which is used for the training of the neural network. The basic flow of the system is shown as below: Neural Network Initialization and Training Extracted Feature Database Input Test Image Select the image of the number to recognize Image Pre-processing Test Image Feature Extraction Recognizing the Number based on feature extracted The methodology used here can be explained as: 3.1. Neural Network Initialization and Training In the Ist step, neural network is initialised and trained with the help of back propagation network. Once the network has been initialised, the network is ready to train. Some issues that need to address upon training the network are: What should be the values of- learning rate, sigmoid shape, gradient, weight bias and how many values of Iterations (Epochs) are to be taken for the training of network for given set of inputs. Here the network learns what we have taught to it. 22
  • 5. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.5, October 2013 Figure 3.shows NN toolbox for English numeral recognition Neural network is trained as shown in fig.4. Here we have set 5000 iterations for the network to train. Following figure.5 shows that our performance goal is met with only 313 iterations out of 5000 iterations. Other parameters of network are also displayed. Time taken for training of network is displayed as 0:05:26 as well as performance and gradient are also displayed here. Figure 4.shows training of ANN 23
  • 6. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.5, October 2013 3.2. Feature Extraction Feature Extraction is used to extract relevant features for recognition of characters. First features are computed and extracted and then most relevant features are selected to construct feature vector which is used for recognition. The computation of features is based on statistical, structural, directional, moment, transformation like approaches. Feature extraction is extracting information from raw data which is more relevant for classification purpose and that minimises the variation within a class and maximizes the variations between classes[8]. 3.3. Input Test Image Input the image which is to be tested. Input images maybe any numerals between 0 to 9. It may be 0,1,2,3,4,5,6,7,8,9 as well as combination of two or three numbers. The arrow indicates to load image by which image can be loaded into the system. Here we take an image of 5*7 matrixes which is displayed in fig.6. Figure.5 shows Ist step of loading of image in ANN Figure.6 shows 2nd step of loading image in ANN 24
  • 7. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.5, October 2013 3.4. Image Pre-Processing Raw image may carry some unwanted noise. In Pre-processing stage, we basically remove the unwanted noise and distortion of image. In Image pre processing, the input image is first converted into gray scale image and then to binary image. This process is called digitization of image. The scanned image has some noise, the noise is due to some unnecessary details present in the image. Image Pre processing is used for skeletonization (thinning) and noise reduction or removal .Skeletonization is necessary here as it decreases the line width of text from many pixels to single pixel. Noise removal is necessary as it remove unwanted details which do not play any important role. Image dilation and filling of holes are performed to produce the pre processed image suitable for segmentation [9]. In segmentation stage, an image consisting of sequence of characters is decomposed into sub images of individual character [10].In Segmentation, the position of the object that is the number in the image is find out and size of number is cropped as shown in figure.7. Figure.7 shows pre processing of image 3.5. Test image feature extraction The image from the segmented stage is matched with all the number which is preload into the system. In this step, the nearest match of the stored and input number is finding out. Once, the matching is completed the number with maximum matching is declared as the number present in the image. 3.6. Recognizing the number This is the final stage .Here the recognized number is displayed as shown: The number that is highlighted in blue is selected and is recognized. In figure 8, a single number ‘6’ is selected and is displayed as shown. In figure 9, two numbers ‘67’ is selected and is displayed as 67 shown in figure.9. 25
  • 8. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.5, October 2013 Figure.8 shows recognition of numeral ‘6’ Figure.9 shows recognition of numeral ‘67’ 4. PERFORMANCE PARAMETERS The performance parameters show the accuracy of the system in terms of its parameters like gradient, validation, learning rate and training. 26
  • 9. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.5, October 2013 Gradient = 0.11536, at epoch 313 2 gradient 10 0 10 -2 10 Validation Checks = 0, at epoch 313 val fail 1 0 -1 Learning Rate = 7.6934, at epoch 313 lr 10 5 0 0 50 100 150 313 Epochs 200 250 300 Best Training Performance is 0.098379 at epoch 313 2 10 Sum Squared Error (sse) Train Best Goal 1 10 0 10 -1 10 -2 10 0 50 100 150 200 250 300 313 Epochs 27
  • 10. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.5, October 2013 Training: R=0.99935 1 Output ~= 0.96*Target + 0.0056 0.9 Data Fit Y =T 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0 0.2 0.4 0.6 0.8 1 Target 5. CONCLUSION AND FUTURE SCOPE The application of neural network in character recognition has been a field of study recently. Neural networks are used to solve the tasks which are difficult for conventional computers or human beings to solve. This paper aims at recognition of English numeral recognition using gradient descent based back propagation training algorithm. The main aim of using this algorithm is to reduce the error which is difference between the computed value of neural network and desired value. By using artificial neural network methodology of English numeral recognition, 99% accuracy is achieved. The method used in this paper can be further extended to recognize multilingual characters. REFERENCES [1]. R. Plamondon and S.N. Srihari., 2000, “Online and off-line handwriting recognition: a comprehensive survey.”, Pattern Analysis and Machine Intelligence, IEEE Transac-tions on, vol. 22(1), pp 63–84. [2]. Munish kumar, M.K.Jindal and R.K Sharma,”Classification of characters and grading writers in offline handwritten gurmukhi script”,2011 International Conference on image information processing (ICIIP 2011) [3]. M. Lorigo and V. Govindaraju, “Offline Arabic handwriting recognition: a survey”, IEEE Transactions on PAMI, Vol. 28(5), pp. 712-724, 2006. [4]. R. Plamondon and S. N. Srihari, ''On-line and off- line handwritten character recognition: A comprehensive survey'', IEEE Transactions on PAMI, Vol. 22 (1), pp. 63-84, 2000. 28
  • 11. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.5, October 2013 [5]. M. Schuster and K. K. Paliwal, November 1997 , “Bidirectional recurrent neural networks”, IEEE Transactions on Signal Processing,vol 45, pp 2673–2681.”. [6]. Yusuf Perwej , November 2012, “ Recurrent Neural Network Method in Arabic Words Recognition System” ,International Journal of Computer Science and Telecommunications (IJCST), published by Sysbase Solution (Ltd), UK, London (http://www.ijcst.org) , vol. 3, Issue 11, pp 43-48. [7]. Sang Sung park,Won Gyo Jung,Young Geun Shin,Dong Sik Jang, Department of Industrial system and Information Engineering, Korea University, South Korea, “Optical character system Using BP Algorithm [8]. O. D. Trier, A. K. Jain and T. Taxt, 1996, ”Feature Extraction Methods for Character Recognition A Survey”, Pattern Recognition, vol. 29, pp. 641-662. [9]. Gonzalez ,R.C.woods, R.E.and Eddins, S.L. ,”Digital image processing using MATLAB”, Pearson Education, Dorling Kindersley,South Asia,(2002). [10]. Casey, R.G. and Lecolinet, E.,”A Survey of Methods and Strategies in Character Segmentation.” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.18, No. 7, (1996),690-706. Authors Amritpal kaur is pursuing M. Tech in Electronics and Communication Engineering from Global Institute of Engineering & Technology, Amritsar. She did her B.Tech degree in Electronics and Communication Engineering from Sai Institute of Engineering & Technology, Amritsar, Punjab, India. Her area of interest is Image Processing and fuzzy logic. Madhavi Arora is presently working as a A.P in Global college of Management and Emerging Technology. She has done her M. Tech in Electronics and Communication Engineering from Amritsar College of Engineering & Technology .She did her B.Tech degree in Electronics and Communication Engineering from Guru Nanak Dev University, Amritsar, Punjab, India. Her area of interest is Image Processing and fuzzy logic. 29