SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 393
RECOGNITION OF HANDWRITTEN DIGITS USING RBF NEURAL
NETWORK
P P S Subhashini1
, V V K D V Prasad2
Department of ECE, RVR & JC College of Engineering, Chowdavaram, Guntur, 522019, A.P, India,
k_shiva_111@yahoo.co.in, varrevkdvp@rediffmail.com
Abstract
Pattern recognition is required in many fields for different purposes. Methods based on Radial basis function (RBF) neural networks
are found to be very successful in pattern classification problems. Training neural network is in general a challenging nonlinear
optimization problem. Several algorithms have been proposed for choosing the RBF neural network prototypes and training the
network. In this paper RBF neural network using decoupling Kalman filter method is proposed for handwritten digit recognition
applications. The efficacy of the proposed method is tested on the handwritten digits of different fonts and found that it is successful in
recognizing the digits.
Keywords: - Neural network, RBF neural network, Decoupled kalman filter Training, Zoning method
------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
Character recognition is classified into two categories, off-line
character recognition and on-line character recognition [1]. In
off-line character recognition the system accepts image as input
from the scanner. It is more difficult than on-line character
recognition because of unavailability of contextual information
and lack of prior knowledge like text position, size of text,
order of strokes, start point and stop point. Noise will also exist
in the images acquired in off-line character recognition.
Machine Printed character recognition comes under this
category [2]. On-line character recognition system accepts the
moment of pen from the hardware such as graphic tablet, light
pen and lot of information is available during the input process
such as current position, momentโ€™s direction, start points, stop
points and stroke orders.e.g. handwritten character recognition
[3].
There has been a drastic change in our perspective of concept
of communication and connectivity with digital revolution.
Biometrics play vital role in dealing with problem of
authentication. It is the science of identifying or verifying the
identity of a person based on physiological or behavioural
characteristics. Physiological characteristics include
fingerprints, iris, hand geometry and facial image [4]. The
behavioural characteristics are actions carried out by a person
in a characteristic way and include recognition of signature,
machine printed characters, handwriting, and voice. There have
been attempts to explore the possibility of efficient man-
machine communication through hand written characters.
Pattern recognition techniques using RBF neural network are
helpful in classification of hand written characters of different
users [5].
This paper focuses on handwritten digits recognition using
RBF neural network based on decoupling Kalman filter
training method. From the results it is found that the proposed
method has very high success rate in handwritten digit
recognition.
2. RBF NEURAL NETWORKS
Radial basis function network (RBF) is a type of artificial
network for applications to problems of supervised learning
e.g. regression, classification and time series prediction. RBF
networks can be used to solve classification problems [6]. The
classification problem can be treated as a non-parametric
regression problem if the outputs of the estimated function are
interpreted as the probability that the input belongs to the
corresponding classes.
The training output values are vectors of length equal to the
number of classes. After training, the network responds to a
new pattern with continuous values in each component of the
output vector and these values are interpreted as being
proportional to class probability. This network consists of three
layers, input layer, hidden layer, output layer as shown in Fig.
1. The m-dimensional input x is passed directly to a hidden
layer. Suppose there are c neurons in the hidden layer, each of
the c neurons in the hidden layer applies an activation function
which is a function of the Euclidean distance between the input
and an m-dimensional prototype vector [7].
Each hidden neuron contains its own prototype vector as a
parameter. The output of each hidden neuron is then weighted
and passed to the output layer. The outputs of the network
consist of sums of the weighted hidden layer neurons. The
design of an RBF requires several decisions that include the
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 394
number of hidden units in the hidden layer, values of the
prototypes, the functions used at the hidden units and the
weights applied between the hidden layer and the output layer.
The performance of an RBF network depends on the number
and location (in the input space) of the centres, the shape of the
RBF functions at the hidden units and the method used for
determining the network weights. Some researchers have
trained RBF networks by selecting the centers randomly from
the training data. Others have used unsupervised procedures
(such as the k-means algorithm) for selecting the RBF centers.
Still others have used supervised procedures for selecting the
RBF centers.
Fig 1 RBF Neural network architecture
2.1 Working Principle
The principle of radial basis functions derives from the theory
of functional approximation. Given N pairs
( ),i ix y
, one looks
for a function f of the form:
๏€จ ๏€ฉ
1
( )
k
i i
i
f x c h x t
๏€ฝ
๏€ฝ ๏€ญ๏ƒฅ
.In
this, h is the radial basis function (normally a Gaussian
function) and it
are the k centers which have to be selected.
The coefficients ic
are also unknown at the moment and have
to be computed. ix
and it
are elements of an n โ€“ dimensional
vector space.
The hidden units compute the Euclidean distance between the
input pattern and the vector, which is represented by the links
leading to this unit. The activation of the hidden units is
computed by applying the Euclidean distance to the function
h as
2 2
) /( ) ( ih x e x c r๏€ฝ ๏€ญ . The parameters for the function
h are its center c and its radius r . There have been a number
of activation functions that include Gaussian function, Thin
plate spline function, Multiquadric function and so on for the
hidden layer of RBF neural network. In this paper the following
function is considered.
1/(1 )
0(( ) ( )) p
g v g v ๏€ญ
๏€ฝ
where p is a parameter and 0 ( )g v is a linear function of the
form
0 ( )g v av b๏€ฝ ๏€ซ
where 0a ๏€พ and 0b ๏‚ณ . The single output neuron gets its
input from all hidden neurons. The links leading to the output
neuron hold the coefficients ci. The activation of the output
neuron is determined by the weighted sum of its inputs. An
RBF network is considered non-linear if the basis functions can
move or change size or if there is more than one hidden layer
otherwise the RBF network is considered linear. The above
architecture can easily be extended to include more than one
output node depending on the problem that the RBF network is
to solve e.g classification into different classes would need as
many output nodes as the number of classes.
When the RBF network is used in classification, the hidden
layer performs clustering while the output layer performs
classification. The hidden units would have the strongest
impulse when the input patterns are closed to the centers of the
hidden units and gradually weaker impulse as the input patterns
moved away from the centers. The output layer would linearly
combine all the outputs of the hidden layer. Each output node
would then give an output value, which represents the
probability that the input pattern falls under that class.
3 DECOUPLED KALMAN FILTER
For a large RBF network, the computational expense of the
Kalman filter could be burdensome [8]. In fact, the
computational expense of the Kalman filter is on the order of
AB2, where A is the dimension of the output of the dynamic
system and B is the number of parameters. In our case, there
are nM outputs and n(c+1)+mc parameters, where n is the
dimension of the RBF output, M is the number of training
samples, c is the number of prototypes, and m is the dimension
of the RBF input. Therefore, the computational expense of the
Kalman filter is on the order of nM[n(c+1)+mc]2.
The Kalman filter parameter vector can be decoupled by
assuming that certain parameter groups interact with each other
only at a second-order level. For instance, the Hk matrix
contains a lot of zeros, showing that the interaction between
various parameter groups can be neglected. In particular, the
Hk matrix consists of n+1 decoupled blocks. These n+1 blocks
correspond to the n sets of w weights that a4ect the n output
components, and the set of prototypes. This is intuitive
because, for example, the c+1 weights that impinge on the first
component of the output are completely independent of the c+1
(2)
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 395
weights that impinge on the second component of the output .
Let us use the notation that _ik refers to the ith group (out of
n+1 total) of parameters estimated at time step k. Then we have
ฮธ1k = w1 ...ฮธnk = wn
ฮธn+1k =[v1Tโ€ฆโ€ฆVcT]T
We will use the notation that Hi corresponding to the i th group
of parameters.
H1k = H....Hnk = HHn+1k = Hv
where H (with no subscript) is the (c+1)X m matrix .We will
use the notation that ykt refers to the element of the target
output of the RBF network that are effected by the i th group of
parameters
yk1 = [y11โ€ฆโ€ฆโ€ฆ.. y1m]T
ykn = [yn1โ€ฆโ€ฆโ€ฆ.. ynm]T
ykn+1 = [yn1โ€ฆโ€ฆy1mโ€ฆโ€ฆ y1nโ€ฆโ€ฆ.. ynm]T
Similarly , we use the notation that ht (ฮธึฟk-1) refers to the
elements of the actual output of the RBF network that are
effected by the i th group of parameters
h1(ฮธึฟk-1) = [แปน11โ€ฆโ€ฆ.. แปน1M]kT
hn(ฮธึฟk-1) = [แปนn1โ€ฆโ€ฆ.. แปนnM]kT
hk+1(ฮธึฟk-1) = [แปน11โ€ฆโ€ฆ.. แปน1M โ€ฆ แปนn1โ€ฆโ€ฆ.. แปนnM ]kT
The decoupled Kalman recursion for the ith parameter group is
then given by
ฮธ-tk = f(ฮธ-tk-1) + Kkt[ykt - ht (ฮธ-tk-1)]
Ki = PktHkt(Rt +(Hkt)T PktHkt)-1
Pk+1t =Fk(Pk- Kkt(Hkt)TPkt) FkT +QT
As before, f(.) is the identity mapping and Fk is the identity
matrix. The above recursion executes n+1 times. The first n
times, the recursion consists of M outputs and (c+1)
parameters. The last time, the recursion consists of nM outputs
and mc parameters. So the computational expense of the
Kalman filter has been reduced to the order of nM[(c + 1)2 +
(mc)2]. The ratio of the computational expense of
Standard KF Expense n2(c +1)2 + m2c2 + n(c
+1)mc
Decoupled KF Expens (c +1)2 + m2c2 : (42)
The computational savings will be most significant for large
problems, i.e., problem where n (the dimension of the output)
is large, m (the dimension of the input) is large, or c (the
number of prototypes) is large. Note that this complexity
analysis applies only to the Kalman recursion and does not
include the computational expense required for the calculation
of the partial derivatives. Also note that for both the standard
and decoupled Kalman filters, the computational expense
increases linearly with M (the number of training samples).
4. EXPERIMENTAL RESULTS
The results obtained on using the proposed RBF neural network
based on decoupling kalman filter training method for
recognition of handwritten digits of different fonts are
presented in this section. Hand written digits from 0 to 9 of 25
different fonts are taken and they are recognized by using this
method. For each hand written digit, after obtaining the thinned
image, 16 features are extracted using Zoning method. These
features are used to train RBF neural network [9].
The different steps involved in recognition of the digits using
this method are shown in the block diagram in the Fig.2
Fig. 2. Block Diagram of Handwritten digit recognition
The RBF networks are trained using the hidden layer function
of Eq. (1) The exponential parameter
p in Eq. (1) is taken as 2
in the results presented in this section. The training algorithms
are initialized with prototype vectors randomly selected from
the input data and with the weight matrix W set to zero[10].
From the experiments, it is found that Decoupled Kalman Filter
Training algorithm is terminated when the error decreases by
less than 0.1 percent. The performance of each of the training
methods is explored by averaging its performance over five
trials, where each trial consists of a random selection of
training and test data. The number of hidden units in the RBF
network is varied between 1 and 15 [11].
Fig. 3 shows the number of iterations required for
convergence. Percentage of correct classification for number of
hidden units is given in Fig.4 for decoupling Kalman filter
training [12]. The RBF network is trained with 13 different
fonts of each digit and is also tested with 12 other fonts which
are different from the trained fonts. It is observed that this
method is successful in recognizing the digits of all these 25
fonts.
For space consideration, the results of six hand written digits
viz 0 to 5 are only shown here. The features of these
handwritten digits are extracted and tabulated in Table 1 and 2.
=
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 396
Each digit has 16 features. The combination of all these
features is called a feature vector. The feature vector is applied
to neural network. If the digit is recognized, then the output
node corresponding to the digit is one and the remaining are
zeros. The training method here applied is supervised training
method. This requires the target vector that is the desired
output, which is tabulated in Table 3.
Table 1: Features of Handwritten Digits 0 to 5
Hand Written Digit Features of Handwritten Digits (8 features)
0 0.526316 0.526316 0.526316 0.526316 0 1.105263 1 0
1 0 0 0 0 0 1.842105 0 0
2 0 0 0 0 0 1.157895 0.631579 0
3 0 0 0 0 0 1.842105 1.315789 0
4 0 0.052632 0 0 0 1 1.526316 0
5 0 0 0 0 0 0 1 0.052632
Table 2: Features of Handwritten Digits 0 to 5
Hand Written Digit Features of Handwritten Digits (8 features)
0 0 1.421053 1.105263 0 0 0 0 0
1 0 0.842105 0 0 0 0 0 0
2 0 1.684211 1.157895 0.105263 0 0 0 0
3 0 0.894737 0.842105 0 0 0 0 0
4 0 0.631579 2 0.105263 0 0 0 0
5 0 0 1.210526 0 0 0.105263 0.421053 0
Table 3: Target vector for Hand written digits 0 to 5
Node Output
node1
Output
node2
Output
node3
Output
node4
Output
node5
Output
node6Digit
0 1 0 0 0 0 0
1 0 1 0 0 0 0
2 0 0 1 0 0 0
3 0 0 0 1 0 0
4 0 0 0 0 1 0
5 0 0 0 0 0 1
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 397
Fig 3. No.of iterations required for No. of hidden nodes
Fig 4. Percentage of Correct Classification for No of Hidden
Nodes
CONCLUSIONS
The RBF Neural Network using decoupled Kalman filter
training method is proposed for recognition of handwritten
digits of different fonts. The proposed method is tested on
handwritten digits of 0 to 9 of 25 different fonts. It is found that
this method has very high success rate in recognizing the
handwritten digits. This method can be extended to recognize
handwritten characters also.
ACKNOWLEDGMENTS
The authors place on record their thanks to the authorities of
RVR&JC College of Engineering, Guntur, A.P., India for the
facilities provided.
REFERENCES
[1] Naveed Bin Rais , M. Shehzad Hanif and rmtiaz A.
Taj, Adaptive Thresholding Technique for Document
Image Anaysis, IEEE Trans. on Systems, Man and
Cybernetics, Vol.8, 1978, pp.60-66.
[2] Sittisak Rodtook and Yuttapong Rangsanseri,
Adaptive Thresholding of Document Images on
Laplacian Sign, IEEE Transactions on Pattern analysis
and Machine Intelligence, vol.17, No.24, January,
2001.
[3] Jaekyu Ha & Robert M. Haralick Ihsin, T. Phillips,
Document Page Decomposition by the Bounding-Box
Projection Technique, IEEE Transactions on Systems,
Man, and Cybernetics, Vol.18, No.1, January 1995,
pp.1118-1122.
[4] Rangachar Kasturi, Lawrence Oโ€™Gorman and Venu
Govindaraju, Document analysis: A primer, Sadhana
Vol.27, Part 1, February 2002, pp. 3-22.
[5] Jaekyu Ha & Robert M. Haralick Ihsin, T. Phillips,
Document Page Decomposition by the Bounding-Box
Projection Technique, IEEE Transactions on Systems,
Man, and Cybernetics, Vol.18, No.1, pp.1118-1122,
January 1995.
[6] Brijesh K. Verma, Handwritten Hindi Character
Recognition Using Multilayer Perceptron and RBF
Neural Networks, IEEE Trans. On Neural Networks,
Vol.21, August 2004, pp. 2111-2115
[7] O.Batsaikhan and Y.P. Singh, Mongolian Character
Recognition using Multilayer Perceptron, Proceedings
of the 9th
International Conference on Neural
Information Processing, Vol. 2,2002.
[8] John Wiley & Sons, - Technology and Engineering,
Kalman Filtering and Neural Networks ,07-Apr-
2004.
[9] Oivind Due Trier, Anil K.Jain and Torfinn Taxt,
Feature Extraction methods for Character recognitionโ€“
A Survey, Pattern Recognition, Vol. 29, No. 4, 1996,
pp.641โ€“662.
[10] P. S. P. Wang and Y. Y. Zhang, A fast and flexible
thinning algorithm, IEEE Transactions on
Computers, Vol.38, No.5, May 1989.
[11] O.Batsaikhan and Y.P. Singh, Mongolian Character
Recognition using Multilayer Perceptron, Proceedings
of the 9th
International Conference on Neural
Information Processing, Vol. 2,2002.
[12] Military Communications Conference, 2003.
MILCOM '03. 2003 IEEE paper ,A steady state
decoupled Kalman filter technique for multiuser
detection Year: 2003 , Page(s): 987 - 992 Vol.2

More Related Content

What's hot

ssc_icml13
ssc_icml13ssc_icml13
ssc_icml13
Guy Lebanon
ย 
Myanmar Alphabet Recognition System Based on Artificial Neural Network
Myanmar Alphabet Recognition System Based on Artificial Neural NetworkMyanmar Alphabet Recognition System Based on Artificial Neural Network
Myanmar Alphabet Recognition System Based on Artificial Neural Network
ijtsrd
ย 
L046056365
L046056365L046056365
L046056365
IJERA Editor
ย 
E502024047
E502024047E502024047
E502024047
IJERA Editor
ย 

What's hot (18)

Radial basis function network ppt bySheetal,Samreen and Dhanashri
Radial basis function network ppt bySheetal,Samreen and DhanashriRadial basis function network ppt bySheetal,Samreen and Dhanashri
Radial basis function network ppt bySheetal,Samreen and Dhanashri
ย 
Inference & Learning in Linear Chain Conditional Random Fields (CRFs)
Inference & Learning in Linear Chain Conditional Random Fields (CRFs)Inference & Learning in Linear Chain Conditional Random Fields (CRFs)
Inference & Learning in Linear Chain Conditional Random Fields (CRFs)
ย 
ssc_icml13
ssc_icml13ssc_icml13
ssc_icml13
ย 
Hidden Layer Leraning Vector Quantizatio
Hidden Layer Leraning Vector Quantizatio Hidden Layer Leraning Vector Quantizatio
Hidden Layer Leraning Vector Quantizatio
ย 
Efficient design of feedforward network for pattern classification
Efficient design of feedforward network for pattern classificationEfficient design of feedforward network for pattern classification
Efficient design of feedforward network for pattern classification
ย 
Packet Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String KernelsPacket Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String Kernels
ย 
Neural object classification by pattern recognition of one dimensional data ...
Neural object classification by pattern recognition of one dimensional data...Neural object classification by pattern recognition of one dimensional data...
Neural object classification by pattern recognition of one dimensional data ...
ย 
Myanmar Alphabet Recognition System Based on Artificial Neural Network
Myanmar Alphabet Recognition System Based on Artificial Neural NetworkMyanmar Alphabet Recognition System Based on Artificial Neural Network
Myanmar Alphabet Recognition System Based on Artificial Neural Network
ย 
L046056365
L046056365L046056365
L046056365
ย 
An ann approach for network
An ann approach for networkAn ann approach for network
An ann approach for network
ย 
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
ย 
Predicting electricity consumption using hidden parameters
Predicting electricity consumption using hidden parametersPredicting electricity consumption using hidden parameters
Predicting electricity consumption using hidden parameters
ย 
Adaptive network based fuzzy
Adaptive network based fuzzyAdaptive network based fuzzy
Adaptive network based fuzzy
ย 
Web spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithmsWeb spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithms
ย 
E502024047
E502024047E502024047
E502024047
ย 
Text Independent Speaker Identification Using Imfcc Integrated With Ica
Text Independent Speaker Identification Using Imfcc Integrated With IcaText Independent Speaker Identification Using Imfcc Integrated With Ica
Text Independent Speaker Identification Using Imfcc Integrated With Ica
ย 
A survey research summary on neural networks
A survey research summary on neural networksA survey research summary on neural networks
A survey research summary on neural networks
ย 
Dycops2019
Dycops2019 Dycops2019
Dycops2019
ย 

Viewers also liked

Humanistictheory 140601005146-phpapp01 (1)
Humanistictheory 140601005146-phpapp01 (1)Humanistictheory 140601005146-phpapp01 (1)
Humanistictheory 140601005146-phpapp01 (1)
Cathy Co
ย 
China diapositivas-de-ingles
China diapositivas-de-inglesChina diapositivas-de-ingles
China diapositivas-de-ingles
Rafael Torres
ย 
Developing of decision support system for budget allocation of an r&d organiz...
Developing of decision support system for budget allocation of an r&d organiz...Developing of decision support system for budget allocation of an r&d organiz...
Developing of decision support system for budget allocation of an r&d organiz...
eSAT Publishing House
ย 
ๆฌกไธ–ไปฃใฎๆ–ฐใ—ใ„ไผๆฅญๆ”ฏๆดใ‚’ๅ‰ตใ‚‹ใ€ŒJASISAใฎใ”็ดนไป‹ใ€
ๆฌกไธ–ไปฃใฎๆ–ฐใ—ใ„ไผๆฅญๆ”ฏๆดใ‚’ๅ‰ตใ‚‹ใ€ŒJASISAใฎใ”็ดนไป‹ใ€ๆฌกไธ–ไปฃใฎๆ–ฐใ—ใ„ไผๆฅญๆ”ฏๆดใ‚’ๅ‰ตใ‚‹ใ€ŒJASISAใฎใ”็ดนไป‹ใ€
ๆฌกไธ–ไปฃใฎๆ–ฐใ—ใ„ไผๆฅญๆ”ฏๆดใ‚’ๅ‰ตใ‚‹ใ€ŒJASISAใฎใ”็ดนไป‹ใ€
Ryota Sakuragi
ย 
Indian domestic sector and the need for promoting community based microgenera...
Indian domestic sector and the need for promoting community based microgenera...Indian domestic sector and the need for promoting community based microgenera...
Indian domestic sector and the need for promoting community based microgenera...
eSAT Publishing House
ย 
The shortest not necessarily the best other path on the basis of the optimal ...
The shortest not necessarily the best other path on the basis of the optimal ...The shortest not necessarily the best other path on the basis of the optimal ...
The shortest not necessarily the best other path on the basis of the optimal ...
eSAT Publishing House
ย 

Viewers also liked (18)

Humanistictheory 140601005146-phpapp01 (1)
Humanistictheory 140601005146-phpapp01 (1)Humanistictheory 140601005146-phpapp01 (1)
Humanistictheory 140601005146-phpapp01 (1)
ย 
Godhead 5 - His Teaching in our Past History
Godhead 5 - His Teaching in our Past HistoryGodhead 5 - His Teaching in our Past History
Godhead 5 - His Teaching in our Past History
ย 
China diapositivas-de-ingles
China diapositivas-de-inglesChina diapositivas-de-ingles
China diapositivas-de-ingles
ย 
49 nd
49 nd49 nd
49 nd
ย 
Organizational Behaviour Chapter One
Organizational Behaviour Chapter OneOrganizational Behaviour Chapter One
Organizational Behaviour Chapter One
ย 
Khodchasri Architecture Chiangmai
Khodchasri Architecture ChiangmaiKhodchasri Architecture Chiangmai
Khodchasri Architecture Chiangmai
ย 
Conference and Registration details- ISIDD 2016
Conference and Registration details- ISIDD 2016Conference and Registration details- ISIDD 2016
Conference and Registration details- ISIDD 2016
ย 
Take your admisson in UG and PG course
Take your admisson in UG and PG courseTake your admisson in UG and PG course
Take your admisson in UG and PG course
ย 
Developing of decision support system for budget allocation of an r&d organiz...
Developing of decision support system for budget allocation of an r&d organiz...Developing of decision support system for budget allocation of an r&d organiz...
Developing of decision support system for budget allocation of an r&d organiz...
ย 
ๅ‹‰ๅผทไผš 2014-12-11 (spain)
ๅ‹‰ๅผทไผš 2014-12-11 (spain)ๅ‹‰ๅผทไผš 2014-12-11 (spain)
ๅ‹‰ๅผทไผš 2014-12-11 (spain)
ย 
Beowulf
BeowulfBeowulf
Beowulf
ย 
Physical Education
Physical EducationPhysical Education
Physical Education
ย 
10 tips for Street Photographers
10 tips for Street Photographers 10 tips for Street Photographers
10 tips for Street Photographers
ย 
ๆฌกไธ–ไปฃใฎๆ–ฐใ—ใ„ไผๆฅญๆ”ฏๆดใ‚’ๅ‰ตใ‚‹ใ€ŒJASISAใฎใ”็ดนไป‹ใ€
ๆฌกไธ–ไปฃใฎๆ–ฐใ—ใ„ไผๆฅญๆ”ฏๆดใ‚’ๅ‰ตใ‚‹ใ€ŒJASISAใฎใ”็ดนไป‹ใ€ๆฌกไธ–ไปฃใฎๆ–ฐใ—ใ„ไผๆฅญๆ”ฏๆดใ‚’ๅ‰ตใ‚‹ใ€ŒJASISAใฎใ”็ดนไป‹ใ€
ๆฌกไธ–ไปฃใฎๆ–ฐใ—ใ„ไผๆฅญๆ”ฏๆดใ‚’ๅ‰ตใ‚‹ใ€ŒJASISAใฎใ”็ดนไป‹ใ€
ย 
Punjab Medical College (PMC) Faisalabad Merit List 2014
Punjab Medical College (PMC) Faisalabad Merit List 2014Punjab Medical College (PMC) Faisalabad Merit List 2014
Punjab Medical College (PMC) Faisalabad Merit List 2014
ย 
Indian domestic sector and the need for promoting community based microgenera...
Indian domestic sector and the need for promoting community based microgenera...Indian domestic sector and the need for promoting community based microgenera...
Indian domestic sector and the need for promoting community based microgenera...
ย 
Css and its future
Css and its futureCss and its future
Css and its future
ย 
The shortest not necessarily the best other path on the basis of the optimal ...
The shortest not necessarily the best other path on the basis of the optimal ...The shortest not necessarily the best other path on the basis of the optimal ...
The shortest not necessarily the best other path on the basis of the optimal ...
ย 

Similar to Recognition of handwritten digits using rbf neural network

Electricity Demand Forecasting Using Fuzzy-Neural Network
Electricity Demand Forecasting Using Fuzzy-Neural NetworkElectricity Demand Forecasting Using Fuzzy-Neural Network
Electricity Demand Forecasting Using Fuzzy-Neural Network
Naren Chandra Kattla
ย 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networks
IJECEIAES
ย 
Fault detection and_diagnosis
Fault detection and_diagnosisFault detection and_diagnosis
Fault detection and_diagnosis
M Reza Rahmati
ย 
An efficient fuzzy classifier with feature selection based
An efficient fuzzy classifier with feature selection basedAn efficient fuzzy classifier with feature selection based
An efficient fuzzy classifier with feature selection based
ssairayousaf
ย 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
ย 
Artificial Neural Networks (ANNS) For Prediction of California Bearing Ratio ...
Artificial Neural Networks (ANNS) For Prediction of California Bearing Ratio ...Artificial Neural Networks (ANNS) For Prediction of California Bearing Ratio ...
Artificial Neural Networks (ANNS) For Prediction of California Bearing Ratio ...
IJMER
ย 

Similar to Recognition of handwritten digits using rbf neural network (20)

Adaptive Training of Radial Basis Function Networks Based on Cooperative
Adaptive Training of Radial Basis Function Networks Based on CooperativeAdaptive Training of Radial Basis Function Networks Based on Cooperative
Adaptive Training of Radial Basis Function Networks Based on Cooperative
ย 
Application of support vector machines for prediction of anti hiv activity of...
Application of support vector machines for prediction of anti hiv activity of...Application of support vector machines for prediction of anti hiv activity of...
Application of support vector machines for prediction of anti hiv activity of...
ย 
Hand Written Digit Classification
Hand Written Digit ClassificationHand Written Digit Classification
Hand Written Digit Classification
ย 
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network AlgorithmsWeb Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
ย 
Classification of Iris Data using Kernel Radial Basis Probabilistic Neural N...
Classification of Iris Data using Kernel Radial Basis Probabilistic  Neural N...Classification of Iris Data using Kernel Radial Basis Probabilistic  Neural N...
Classification of Iris Data using Kernel Radial Basis Probabilistic Neural N...
ย 
Classification of Iris Data using Kernel Radial Basis Probabilistic Neural Ne...
Classification of Iris Data using Kernel Radial Basis Probabilistic Neural Ne...Classification of Iris Data using Kernel Radial Basis Probabilistic Neural Ne...
Classification of Iris Data using Kernel Radial Basis Probabilistic Neural Ne...
ย 
Efficiency of Neural Networks Study in the Design of Trusses
Efficiency of Neural Networks Study in the Design of TrussesEfficiency of Neural Networks Study in the Design of Trusses
Efficiency of Neural Networks Study in the Design of Trusses
ย 
Electricity Demand Forecasting Using Fuzzy-Neural Network
Electricity Demand Forecasting Using Fuzzy-Neural NetworkElectricity Demand Forecasting Using Fuzzy-Neural Network
Electricity Demand Forecasting Using Fuzzy-Neural Network
ย 
An efficient technique for color image classification based on lower feature ...
An efficient technique for color image classification based on lower feature ...An efficient technique for color image classification based on lower feature ...
An efficient technique for color image classification based on lower feature ...
ย 
Time Series Forecasting Using Novel Feature Extraction Algorithm and Multilay...
Time Series Forecasting Using Novel Feature Extraction Algorithm and Multilay...Time Series Forecasting Using Novel Feature Extraction Algorithm and Multilay...
Time Series Forecasting Using Novel Feature Extraction Algorithm and Multilay...
ย 
K means report
K means reportK means report
K means report
ย 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networks
ย 
Fault detection and_diagnosis
Fault detection and_diagnosisFault detection and_diagnosis
Fault detection and_diagnosis
ย 
An efficient fuzzy classifier with feature selection based
An efficient fuzzy classifier with feature selection basedAn efficient fuzzy classifier with feature selection based
An efficient fuzzy classifier with feature selection based
ย 
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkkOBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
ย 
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkkOBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
ย 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
ย 
Artificial Neural Networks (ANNS) For Prediction of California Bearing Ratio ...
Artificial Neural Networks (ANNS) For Prediction of California Bearing Ratio ...Artificial Neural Networks (ANNS) For Prediction of California Bearing Ratio ...
Artificial Neural Networks (ANNS) For Prediction of California Bearing Ratio ...
ย 
Neural Network Implementation Control Mobile Robot
Neural Network Implementation Control Mobile RobotNeural Network Implementation Control Mobile Robot
Neural Network Implementation Control Mobile Robot
ย 
Adaptive and online one class support vector machine-based outlier detection
Adaptive and online one class support vector machine-based outlier detectionAdaptive and online one class support vector machine-based outlier detection
Adaptive and online one class support vector machine-based outlier detection
ย 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
ย 
Impact of flood disaster in a drought prone area โ€“ case study of alampur vill...
Impact of flood disaster in a drought prone area โ€“ case study of alampur vill...Impact of flood disaster in a drought prone area โ€“ case study of alampur vill...
Impact of flood disaster in a drought prone area โ€“ case study of alampur vill...
eSAT Publishing House
ย 
Hudhud cyclone โ€“ a severe disaster in visakhapatnam
Hudhud cyclone โ€“ a severe disaster in visakhapatnamHudhud cyclone โ€“ a severe disaster in visakhapatnam
Hudhud cyclone โ€“ a severe disaster in visakhapatnam
eSAT Publishing House
ย 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
ย 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
ย 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
ย 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
ย 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
ย 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
ย 
Shear strength of rc deep beam panels โ€“ a review
Shear strength of rc deep beam panels โ€“ a reviewShear strength of rc deep beam panels โ€“ a review
Shear strength of rc deep beam panels โ€“ a review
eSAT Publishing House
ย 
Role of voluntary teams of professional engineers in dissater management โ€“ ex...
Role of voluntary teams of professional engineers in dissater management โ€“ ex...Role of voluntary teams of professional engineers in dissater management โ€“ ex...
Role of voluntary teams of professional engineers in dissater management โ€“ ex...
eSAT Publishing House
ย 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
ย 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
ย 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
ย 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
ย 
Coastal zones โ€“ seismic vulnerability an analysis from east coast of india
Coastal zones โ€“ seismic vulnerability an analysis from east coast of indiaCoastal zones โ€“ seismic vulnerability an analysis from east coast of india
Coastal zones โ€“ seismic vulnerability an analysis from east coast of india
eSAT Publishing House
ย 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
ย 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
ย 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
ย 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
ย 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
ย 
Impact of flood disaster in a drought prone area โ€“ case study of alampur vill...
Impact of flood disaster in a drought prone area โ€“ case study of alampur vill...Impact of flood disaster in a drought prone area โ€“ case study of alampur vill...
Impact of flood disaster in a drought prone area โ€“ case study of alampur vill...
ย 
Hudhud cyclone โ€“ a severe disaster in visakhapatnam
Hudhud cyclone โ€“ a severe disaster in visakhapatnamHudhud cyclone โ€“ a severe disaster in visakhapatnam
Hudhud cyclone โ€“ a severe disaster in visakhapatnam
ย 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
ย 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
ย 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
ย 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
ย 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
ย 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
ย 
Shear strength of rc deep beam panels โ€“ a review
Shear strength of rc deep beam panels โ€“ a reviewShear strength of rc deep beam panels โ€“ a review
Shear strength of rc deep beam panels โ€“ a review
ย 
Role of voluntary teams of professional engineers in dissater management โ€“ ex...
Role of voluntary teams of professional engineers in dissater management โ€“ ex...Role of voluntary teams of professional engineers in dissater management โ€“ ex...
Role of voluntary teams of professional engineers in dissater management โ€“ ex...
ย 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
ย 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
ย 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
ย 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
ย 
Coastal zones โ€“ seismic vulnerability an analysis from east coast of india
Coastal zones โ€“ seismic vulnerability an analysis from east coast of indiaCoastal zones โ€“ seismic vulnerability an analysis from east coast of india
Coastal zones โ€“ seismic vulnerability an analysis from east coast of india
ย 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
ย 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
ย 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
ย 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
ย 

Recently uploaded

Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
KreezheaRecto
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
ย 
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
SUHANI PANDEY
ย 
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night StandCall Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
amitlee9823
ย 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
ย 

Recently uploaded (20)

BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
ย 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ย 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
ย 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
ย 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
ย 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
ย 
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
ย 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
ย 
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night StandCall Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
ย 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ย 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
ย 

Recognition of handwritten digits using rbf neural network

  • 1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 393 RECOGNITION OF HANDWRITTEN DIGITS USING RBF NEURAL NETWORK P P S Subhashini1 , V V K D V Prasad2 Department of ECE, RVR & JC College of Engineering, Chowdavaram, Guntur, 522019, A.P, India, k_shiva_111@yahoo.co.in, varrevkdvp@rediffmail.com Abstract Pattern recognition is required in many fields for different purposes. Methods based on Radial basis function (RBF) neural networks are found to be very successful in pattern classification problems. Training neural network is in general a challenging nonlinear optimization problem. Several algorithms have been proposed for choosing the RBF neural network prototypes and training the network. In this paper RBF neural network using decoupling Kalman filter method is proposed for handwritten digit recognition applications. The efficacy of the proposed method is tested on the handwritten digits of different fonts and found that it is successful in recognizing the digits. Keywords: - Neural network, RBF neural network, Decoupled kalman filter Training, Zoning method ------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION Character recognition is classified into two categories, off-line character recognition and on-line character recognition [1]. In off-line character recognition the system accepts image as input from the scanner. It is more difficult than on-line character recognition because of unavailability of contextual information and lack of prior knowledge like text position, size of text, order of strokes, start point and stop point. Noise will also exist in the images acquired in off-line character recognition. Machine Printed character recognition comes under this category [2]. On-line character recognition system accepts the moment of pen from the hardware such as graphic tablet, light pen and lot of information is available during the input process such as current position, momentโ€™s direction, start points, stop points and stroke orders.e.g. handwritten character recognition [3]. There has been a drastic change in our perspective of concept of communication and connectivity with digital revolution. Biometrics play vital role in dealing with problem of authentication. It is the science of identifying or verifying the identity of a person based on physiological or behavioural characteristics. Physiological characteristics include fingerprints, iris, hand geometry and facial image [4]. The behavioural characteristics are actions carried out by a person in a characteristic way and include recognition of signature, machine printed characters, handwriting, and voice. There have been attempts to explore the possibility of efficient man- machine communication through hand written characters. Pattern recognition techniques using RBF neural network are helpful in classification of hand written characters of different users [5]. This paper focuses on handwritten digits recognition using RBF neural network based on decoupling Kalman filter training method. From the results it is found that the proposed method has very high success rate in handwritten digit recognition. 2. RBF NEURAL NETWORKS Radial basis function network (RBF) is a type of artificial network for applications to problems of supervised learning e.g. regression, classification and time series prediction. RBF networks can be used to solve classification problems [6]. The classification problem can be treated as a non-parametric regression problem if the outputs of the estimated function are interpreted as the probability that the input belongs to the corresponding classes. The training output values are vectors of length equal to the number of classes. After training, the network responds to a new pattern with continuous values in each component of the output vector and these values are interpreted as being proportional to class probability. This network consists of three layers, input layer, hidden layer, output layer as shown in Fig. 1. The m-dimensional input x is passed directly to a hidden layer. Suppose there are c neurons in the hidden layer, each of the c neurons in the hidden layer applies an activation function which is a function of the Euclidean distance between the input and an m-dimensional prototype vector [7]. Each hidden neuron contains its own prototype vector as a parameter. The output of each hidden neuron is then weighted and passed to the output layer. The outputs of the network consist of sums of the weighted hidden layer neurons. The design of an RBF requires several decisions that include the
  • 2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 394 number of hidden units in the hidden layer, values of the prototypes, the functions used at the hidden units and the weights applied between the hidden layer and the output layer. The performance of an RBF network depends on the number and location (in the input space) of the centres, the shape of the RBF functions at the hidden units and the method used for determining the network weights. Some researchers have trained RBF networks by selecting the centers randomly from the training data. Others have used unsupervised procedures (such as the k-means algorithm) for selecting the RBF centers. Still others have used supervised procedures for selecting the RBF centers. Fig 1 RBF Neural network architecture 2.1 Working Principle The principle of radial basis functions derives from the theory of functional approximation. Given N pairs ( ),i ix y , one looks for a function f of the form: ๏€จ ๏€ฉ 1 ( ) k i i i f x c h x t ๏€ฝ ๏€ฝ ๏€ญ๏ƒฅ .In this, h is the radial basis function (normally a Gaussian function) and it are the k centers which have to be selected. The coefficients ic are also unknown at the moment and have to be computed. ix and it are elements of an n โ€“ dimensional vector space. The hidden units compute the Euclidean distance between the input pattern and the vector, which is represented by the links leading to this unit. The activation of the hidden units is computed by applying the Euclidean distance to the function h as 2 2 ) /( ) ( ih x e x c r๏€ฝ ๏€ญ . The parameters for the function h are its center c and its radius r . There have been a number of activation functions that include Gaussian function, Thin plate spline function, Multiquadric function and so on for the hidden layer of RBF neural network. In this paper the following function is considered. 1/(1 ) 0(( ) ( )) p g v g v ๏€ญ ๏€ฝ where p is a parameter and 0 ( )g v is a linear function of the form 0 ( )g v av b๏€ฝ ๏€ซ where 0a ๏€พ and 0b ๏‚ณ . The single output neuron gets its input from all hidden neurons. The links leading to the output neuron hold the coefficients ci. The activation of the output neuron is determined by the weighted sum of its inputs. An RBF network is considered non-linear if the basis functions can move or change size or if there is more than one hidden layer otherwise the RBF network is considered linear. The above architecture can easily be extended to include more than one output node depending on the problem that the RBF network is to solve e.g classification into different classes would need as many output nodes as the number of classes. When the RBF network is used in classification, the hidden layer performs clustering while the output layer performs classification. The hidden units would have the strongest impulse when the input patterns are closed to the centers of the hidden units and gradually weaker impulse as the input patterns moved away from the centers. The output layer would linearly combine all the outputs of the hidden layer. Each output node would then give an output value, which represents the probability that the input pattern falls under that class. 3 DECOUPLED KALMAN FILTER For a large RBF network, the computational expense of the Kalman filter could be burdensome [8]. In fact, the computational expense of the Kalman filter is on the order of AB2, where A is the dimension of the output of the dynamic system and B is the number of parameters. In our case, there are nM outputs and n(c+1)+mc parameters, where n is the dimension of the RBF output, M is the number of training samples, c is the number of prototypes, and m is the dimension of the RBF input. Therefore, the computational expense of the Kalman filter is on the order of nM[n(c+1)+mc]2. The Kalman filter parameter vector can be decoupled by assuming that certain parameter groups interact with each other only at a second-order level. For instance, the Hk matrix contains a lot of zeros, showing that the interaction between various parameter groups can be neglected. In particular, the Hk matrix consists of n+1 decoupled blocks. These n+1 blocks correspond to the n sets of w weights that a4ect the n output components, and the set of prototypes. This is intuitive because, for example, the c+1 weights that impinge on the first component of the output are completely independent of the c+1 (2)
  • 3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 395 weights that impinge on the second component of the output . Let us use the notation that _ik refers to the ith group (out of n+1 total) of parameters estimated at time step k. Then we have ฮธ1k = w1 ...ฮธnk = wn ฮธn+1k =[v1Tโ€ฆโ€ฆVcT]T We will use the notation that Hi corresponding to the i th group of parameters. H1k = H....Hnk = HHn+1k = Hv where H (with no subscript) is the (c+1)X m matrix .We will use the notation that ykt refers to the element of the target output of the RBF network that are effected by the i th group of parameters yk1 = [y11โ€ฆโ€ฆโ€ฆ.. y1m]T ykn = [yn1โ€ฆโ€ฆโ€ฆ.. ynm]T ykn+1 = [yn1โ€ฆโ€ฆy1mโ€ฆโ€ฆ y1nโ€ฆโ€ฆ.. ynm]T Similarly , we use the notation that ht (ฮธึฟk-1) refers to the elements of the actual output of the RBF network that are effected by the i th group of parameters h1(ฮธึฟk-1) = [แปน11โ€ฆโ€ฆ.. แปน1M]kT hn(ฮธึฟk-1) = [แปนn1โ€ฆโ€ฆ.. แปนnM]kT hk+1(ฮธึฟk-1) = [แปน11โ€ฆโ€ฆ.. แปน1M โ€ฆ แปนn1โ€ฆโ€ฆ.. แปนnM ]kT The decoupled Kalman recursion for the ith parameter group is then given by ฮธ-tk = f(ฮธ-tk-1) + Kkt[ykt - ht (ฮธ-tk-1)] Ki = PktHkt(Rt +(Hkt)T PktHkt)-1 Pk+1t =Fk(Pk- Kkt(Hkt)TPkt) FkT +QT As before, f(.) is the identity mapping and Fk is the identity matrix. The above recursion executes n+1 times. The first n times, the recursion consists of M outputs and (c+1) parameters. The last time, the recursion consists of nM outputs and mc parameters. So the computational expense of the Kalman filter has been reduced to the order of nM[(c + 1)2 + (mc)2]. The ratio of the computational expense of Standard KF Expense n2(c +1)2 + m2c2 + n(c +1)mc Decoupled KF Expens (c +1)2 + m2c2 : (42) The computational savings will be most significant for large problems, i.e., problem where n (the dimension of the output) is large, m (the dimension of the input) is large, or c (the number of prototypes) is large. Note that this complexity analysis applies only to the Kalman recursion and does not include the computational expense required for the calculation of the partial derivatives. Also note that for both the standard and decoupled Kalman filters, the computational expense increases linearly with M (the number of training samples). 4. EXPERIMENTAL RESULTS The results obtained on using the proposed RBF neural network based on decoupling kalman filter training method for recognition of handwritten digits of different fonts are presented in this section. Hand written digits from 0 to 9 of 25 different fonts are taken and they are recognized by using this method. For each hand written digit, after obtaining the thinned image, 16 features are extracted using Zoning method. These features are used to train RBF neural network [9]. The different steps involved in recognition of the digits using this method are shown in the block diagram in the Fig.2 Fig. 2. Block Diagram of Handwritten digit recognition The RBF networks are trained using the hidden layer function of Eq. (1) The exponential parameter p in Eq. (1) is taken as 2 in the results presented in this section. The training algorithms are initialized with prototype vectors randomly selected from the input data and with the weight matrix W set to zero[10]. From the experiments, it is found that Decoupled Kalman Filter Training algorithm is terminated when the error decreases by less than 0.1 percent. The performance of each of the training methods is explored by averaging its performance over five trials, where each trial consists of a random selection of training and test data. The number of hidden units in the RBF network is varied between 1 and 15 [11]. Fig. 3 shows the number of iterations required for convergence. Percentage of correct classification for number of hidden units is given in Fig.4 for decoupling Kalman filter training [12]. The RBF network is trained with 13 different fonts of each digit and is also tested with 12 other fonts which are different from the trained fonts. It is observed that this method is successful in recognizing the digits of all these 25 fonts. For space consideration, the results of six hand written digits viz 0 to 5 are only shown here. The features of these handwritten digits are extracted and tabulated in Table 1 and 2. =
  • 4. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 396 Each digit has 16 features. The combination of all these features is called a feature vector. The feature vector is applied to neural network. If the digit is recognized, then the output node corresponding to the digit is one and the remaining are zeros. The training method here applied is supervised training method. This requires the target vector that is the desired output, which is tabulated in Table 3. Table 1: Features of Handwritten Digits 0 to 5 Hand Written Digit Features of Handwritten Digits (8 features) 0 0.526316 0.526316 0.526316 0.526316 0 1.105263 1 0 1 0 0 0 0 0 1.842105 0 0 2 0 0 0 0 0 1.157895 0.631579 0 3 0 0 0 0 0 1.842105 1.315789 0 4 0 0.052632 0 0 0 1 1.526316 0 5 0 0 0 0 0 0 1 0.052632 Table 2: Features of Handwritten Digits 0 to 5 Hand Written Digit Features of Handwritten Digits (8 features) 0 0 1.421053 1.105263 0 0 0 0 0 1 0 0.842105 0 0 0 0 0 0 2 0 1.684211 1.157895 0.105263 0 0 0 0 3 0 0.894737 0.842105 0 0 0 0 0 4 0 0.631579 2 0.105263 0 0 0 0 5 0 0 1.210526 0 0 0.105263 0.421053 0 Table 3: Target vector for Hand written digits 0 to 5 Node Output node1 Output node2 Output node3 Output node4 Output node5 Output node6Digit 0 1 0 0 0 0 0 1 0 1 0 0 0 0 2 0 0 1 0 0 0 3 0 0 0 1 0 0 4 0 0 0 0 1 0 5 0 0 0 0 0 1
  • 5. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 397 Fig 3. No.of iterations required for No. of hidden nodes Fig 4. Percentage of Correct Classification for No of Hidden Nodes CONCLUSIONS The RBF Neural Network using decoupled Kalman filter training method is proposed for recognition of handwritten digits of different fonts. The proposed method is tested on handwritten digits of 0 to 9 of 25 different fonts. It is found that this method has very high success rate in recognizing the handwritten digits. This method can be extended to recognize handwritten characters also. ACKNOWLEDGMENTS The authors place on record their thanks to the authorities of RVR&JC College of Engineering, Guntur, A.P., India for the facilities provided. REFERENCES [1] Naveed Bin Rais , M. Shehzad Hanif and rmtiaz A. Taj, Adaptive Thresholding Technique for Document Image Anaysis, IEEE Trans. on Systems, Man and Cybernetics, Vol.8, 1978, pp.60-66. [2] Sittisak Rodtook and Yuttapong Rangsanseri, Adaptive Thresholding of Document Images on Laplacian Sign, IEEE Transactions on Pattern analysis and Machine Intelligence, vol.17, No.24, January, 2001. [3] Jaekyu Ha & Robert M. Haralick Ihsin, T. Phillips, Document Page Decomposition by the Bounding-Box Projection Technique, IEEE Transactions on Systems, Man, and Cybernetics, Vol.18, No.1, January 1995, pp.1118-1122. [4] Rangachar Kasturi, Lawrence Oโ€™Gorman and Venu Govindaraju, Document analysis: A primer, Sadhana Vol.27, Part 1, February 2002, pp. 3-22. [5] Jaekyu Ha & Robert M. Haralick Ihsin, T. Phillips, Document Page Decomposition by the Bounding-Box Projection Technique, IEEE Transactions on Systems, Man, and Cybernetics, Vol.18, No.1, pp.1118-1122, January 1995. [6] Brijesh K. Verma, Handwritten Hindi Character Recognition Using Multilayer Perceptron and RBF Neural Networks, IEEE Trans. On Neural Networks, Vol.21, August 2004, pp. 2111-2115 [7] O.Batsaikhan and Y.P. Singh, Mongolian Character Recognition using Multilayer Perceptron, Proceedings of the 9th International Conference on Neural Information Processing, Vol. 2,2002. [8] John Wiley & Sons, - Technology and Engineering, Kalman Filtering and Neural Networks ,07-Apr- 2004. [9] Oivind Due Trier, Anil K.Jain and Torfinn Taxt, Feature Extraction methods for Character recognitionโ€“ A Survey, Pattern Recognition, Vol. 29, No. 4, 1996, pp.641โ€“662. [10] P. S. P. Wang and Y. Y. Zhang, A fast and flexible thinning algorithm, IEEE Transactions on Computers, Vol.38, No.5, May 1989. [11] O.Batsaikhan and Y.P. Singh, Mongolian Character Recognition using Multilayer Perceptron, Proceedings of the 9th International Conference on Neural Information Processing, Vol. 2,2002. [12] Military Communications Conference, 2003. MILCOM '03. 2003 IEEE paper ,A steady state decoupled Kalman filter technique for multiuser detection Year: 2003 , Page(s): 987 - 992 Vol.2