PowerPoint Presentation

Published on Slideshow
Static slideshow
Download presentation
Download Presentation
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Scene 1 (0s)

Character Recognition using Approaches of Artificial Neural Network: A Review Presented By: Alankrita Aggarwal Associate Professor Panipat Institute of Engineering and Technology Panipat, Haryana Paper ID: 6045.

Scene 2 (11s)

INDEX Abstract Introduction Properties of Neural Classifier Literature Review Specific Studies on various OCRs using Neural Networks Conclusion & Future Scope.

Scene 3 (20s)

ABSTRACT Methods based on learning from examples that have been widely applied to character recognition is considered as one of the classification methods. T his class of methods includes statistical methods, artificial neural network, support vector machines, multiple classifier combination, etc. among these artificial neural networks are quite popular and have gained more attention . The paper presents a survey on ANNs applied for recognizing character and the features applied as the inputs. The principal objective of this paper is to help researchers attempting to apply ANN for character recognition and analysis the networks and the features extracted to improve the classification accuracy..

Scene 4 (48s)

INTRODUCTION Man-made intellectual competence is the task of giving machines human-like limits. This is conceivably the most troublesome locale in computer programming over the two or three numerous years. A large variety of work has been done in the related field, at this point simultaneously; the issue stays puzzling from an all-out viewpoint . Configuration organizing is maybe the most distorted methodology used conspicuously in the first place period of OCR (optical character affirmation) creative work in this various design giving the base distance in yield . This technique works reasonably with the affirmation of standard content styles anyway gives a dreary appearance composed of hand characters ..

Scene 5 (1m 15s)

Continued…. Feature assessment is another direct procedure, where the quantifiable dissemination of centers is taken apart and balanced properties are isolated . Affirmation is done by finding the distance of the component vector of the data picture with those set aside in the informational index and yielding the picture with the least deviation. Disregarding the way that this technique gives better results on composed by hand characters moreover; it is outstandingly sensitive to the upheaval and edge thickness. the features removed in this technique will overall be mathematical [3,4].In the basic assessment, of course, an undertaking is made to remove features that can be successfully translated. To misuse huge model data, the character affirmation neighborhood coordinated focus toward gathering strategies subject to acquiring from the model’s framework especially fake neural associations from the last piece of the 1980s till 1990s..

Scene 6 (1m 51s)

Continued…. Tuning and the affirmation accuracy has incited considering acquiring from colossal model data by learning..

Scene 7 (2m 11s)

MRCN-2022. Neural affiliations have been used in a wide degree of the region to deal with a wide level of issues. Not in the least like human characters that can see and hold characters in form of digits or letters; PCs treat such types as twofold plans. Subsequently, appraisals are essential to see and see each character. A neural alliance is dealing with a contraption, either evaluation or genuine stuff, whose approach was empowered by the strategy and working of animal frontal cortexes and parts thereof. The neural affiliations can obtain from models, which makes them genuinely adaptable and wavering..

Scene 8 (2m 38s)

Collect features from characters using geometry based character feature. 108 of feature value ANN Output Measure the accuracy of the recognition.

Scene 9 (2m 51s)

Dependent upon the given issues, a total number of features and their assembling differ according to the procedures and frameworks for depiction. In various reasonable applications, it’s exceptional to face issues including different features. One can feel that each part is huge for likely a dash of partition. In any case, it has been found over the long haul beyond a particular point, the breaker of further features prompts sadder rather than better execution and fabricates the managing time As such, the affirmation of features, i.e., keeping suitable features and frustrating insignificant or likely abundance ones, is a fundamental improvement in a model statement structure plan. Character affirmation can be segregated into two giant plans: typewritten and really made. In Typewritten declaration sees a report that has been really made and checked to go before affirmation progress..

Scene 10 (3m 26s)

Properties of Neural Classifier. Training complexity: The limits of neural classifiers are generally changed by point dive. By dealing with the readiness tests a fixed number of degrees the planning time taken is forthright with the number of tests. The flexibility of training: limits of neural classifiers can be changed in string level of configuration level getting ready by point plunge resolved to smooth out overall execution. For the present circumstance, the neural classifier is embedded in the string or plan affirmation for character affirmation Storage & execution complexity: Neural classifiers have numerous fewer limits and the number of limits isn't hard to control. Thusly, neural association classifiers consume less limit and estimation.

Scene 11 (3m 56s)

Literature Review. Secret Markov Model is a completed quantifiable model that endeavors to expect the faint game-plan. Thus, it in like route attempts to see the faint character which is given as data. A system to make a flexible character affirmation structure using a neural alliance. Back-Propagation Neural Network with one mystery layer is used to make the structure. The development is ready and concentrated with printed and framed by hand English letter sets and showed up in his test outcomes that printed text gives the best exactness in attestation over-deciphered characters . The back-propagation appraisal changes the schematic of the agreement by using a sigmoidal limit. The advantage of quite far is that beyond what many would consider possible is differentiable works decently on principal masterminding issues. Regardless, as the badly arranged whimsies grow. The introduction of back-propagation tumbles off rapidly under the way that magnificent spaces have essentially by and large minima which are little among the close by minima ..

Scene 12 (4m 48s)

Comparative observation of ANN and the one proposed technique for breast cancer recognition and detection is done [26]. Along with the design, an edge detection Algorithm by Artificial Neural Network (ANN) for cancer detection [27] and providing security features of cryptography recognition can be done [28,29,30]. Different approaches of risk management in recognition some frameworks are defined [29] and by using the machine learning algorithms and random forest approach the risk in recognition of errors can be minimized [31,32,33]..

Scene 13 (5m 12s)

Specific Studies on various OCRs using Neural Networks.

Scene 14 (5m 42s)

Conclusion & Future Scope. F undamental exploration of the creative methodologies of fake neural organization in character acknowledgment to do significant job after care of character acknowledgment and inquiring imaginative methodologies applied by the various analysts for transcribed character acknowledgment utilizing counterfeit neural organizations. Even though multi-facet feed-forward neural organization design is all the more normally utilized, numerous specialists have attempted to investigate another engineering to accomplish higher acknowledgment correctness. A ton of issues is should have been contemplated concerning the acknowledgment exactness. The division, highlight extraction, and proper choice of reasonable neural organization design oversee the arrangement precision. The highlights extricated ought to be revolution and size invariant and sufficiently able to arrange the character proficiently for the given order conspire..

Scene 15 (6m 14s)

Continued…. More accentuation is to be given to complex issues identified with over-divided and covering characters to deal with fluctuation associated with the composing style of various people; strong engineering of neural organization ought to be thought of. Further acknowledgment of Indian written by hand script acknowledgment needs to confront additional difficult errands because vowel modifiers are present leads to improvement in transformation and composite characters. The techniques for seeing interpreted character font are presented with projected strategy can be applied to various dull characters where ANN assists the framework for seeing the character whether specific model can be opened in the data set. The neural affiliation-based strategy gives an exactness of 85 % but not applied to see cursive penmanship recognition. In future we endeavor indistinguishable tests of various characters, certain additional or fresh cutoff points to improve the precision..

Scene 16 (6m 49s)

REFERENCES D. A. Varma and M. Narayanan, "Identifying malicious nodes in Mobile Ad-Hoc Networks using polynomial reduction algorithm," 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, 2016, pp. 1179-1184. Bandana Mahapatraa and Prof.(Dr) Srikanta Patnaik, “Self Adaptive Intrusion Detection Technique Using Data Mining concept in an Ad-Hoc Network,” 2nd International Conference on Intelligent Computing, Communication & Convergence(ICCC-2016) Manjula C. Belavagi and BalachandraMuniyal , “Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection,” 12th International Multi-Conference on Information Processing-2016 (IMCIP-2016). PreetiAggarwala and Sudhir Kumar Sharmab , “Analysis of KDD Dataset Attributes - Class wise For Intrusion Detection,” 3rd International Conference on Recent Trends in Computing 2015 (ICRTC-2015). Ciza Thomas, Vishwas Sharma and N. Balakrishnan, “Usefulness of DARPA Dataset for Intrusion Detection System Evaluation.

Scene 17 (7m 27s)

REFERENCES P.Natesan and P.Balasubramanie , “Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection,” International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.3, May 2012M. Tavallaee , E. Bagheri , W. Lu and A. A. Ghorbani , "A detailed analysis of the KDD CUP 99 data set," 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, 2009, pp. 1-6..

Scene 18 (7m 51s)

THANKYOU. MRCN-2022.