SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 393
RECOGNITION OF HANDWRITTEN DIGITS USING RBF NEURAL
NETWORK
P P S Subhashini1
, V V K D V Prasad2
Department of ECE, RVR & JC College of Engineering, Chowdavaram, Guntur, 522019, A.P, India,
k_shiva_111@yahoo.co.in, varrevkdvp@rediffmail.com
Abstract
Pattern recognition is required in many fields for different purposes. Methods based on Radial basis function (RBF) neural networks
are found to be very successful in pattern classification problems. Training neural network is in general a challenging nonlinear
optimization problem. Several algorithms have been proposed for choosing the RBF neural network prototypes and training the
network. In this paper RBF neural network using decoupling Kalman filter method is proposed for handwritten digit recognition
applications. The efficacy of the proposed method is tested on the handwritten digits of different fonts and found that it is successful in
recognizing the digits.
Keywords: - Neural network, RBF neural network, Decoupled kalman filter Training, Zoning method
------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
Character recognition is classified into two categories, off-line
character recognition and on-line character recognition [1]. In
off-line character recognition the system accepts image as input
from the scanner. It is more difficult than on-line character
recognition because of unavailability of contextual information
and lack of prior knowledge like text position, size of text,
order of strokes, start point and stop point. Noise will also exist
in the images acquired in off-line character recognition.
Machine Printed character recognition comes under this
category [2]. On-line character recognition system accepts the
moment of pen from the hardware such as graphic tablet, light
pen and lot of information is available during the input process
such as current position, moment’s direction, start points, stop
points and stroke orders.e.g. handwritten character recognition
[3].
There has been a drastic change in our perspective of concept
of communication and connectivity with digital revolution.
Biometrics play vital role in dealing with problem of
authentication. It is the science of identifying or verifying the
identity of a person based on physiological or behavioural
characteristics. Physiological characteristics include
fingerprints, iris, hand geometry and facial image [4]. The
behavioural characteristics are actions carried out by a person
in a characteristic way and include recognition of signature,
machine printed characters, handwriting, and voice. There have
been attempts to explore the possibility of efficient man-
machine communication through hand written characters.
Pattern recognition techniques using RBF neural network are
helpful in classification of hand written characters of different
users [5].
This paper focuses on handwritten digits recognition using
RBF neural network based on decoupling Kalman filter
training method. From the results it is found that the proposed
method has very high success rate in handwritten digit
recognition.
2. RBF NEURAL NETWORKS
Radial basis function network (RBF) is a type of artificial
network for applications to problems of supervised learning
e.g. regression, classification and time series prediction. RBF
networks can be used to solve classification problems [6]. The
classification problem can be treated as a non-parametric
regression problem if the outputs of the estimated function are
interpreted as the probability that the input belongs to the
corresponding classes.
The training output values are vectors of length equal to the
number of classes. After training, the network responds to a
new pattern with continuous values in each component of the
output vector and these values are interpreted as being
proportional to class probability. This network consists of three
layers, input layer, hidden layer, output layer as shown in Fig.
1. The m-dimensional input x is passed directly to a hidden
layer. Suppose there are c neurons in the hidden layer, each of
the c neurons in the hidden layer applies an activation function
which is a function of the Euclidean distance between the input
and an m-dimensional prototype vector [7].
Each hidden neuron contains its own prototype vector as a
parameter. The output of each hidden neuron is then weighted
and passed to the output layer. The outputs of the network
consist of sums of the weighted hidden layer neurons. The
design of an RBF requires several decisions that include the
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 394
number of hidden units in the hidden layer, values of the
prototypes, the functions used at the hidden units and the
weights applied between the hidden layer and the output layer.
The performance of an RBF network depends on the number
and location (in the input space) of the centres, the shape of the
RBF functions at the hidden units and the method used for
determining the network weights. Some researchers have
trained RBF networks by selecting the centers randomly from
the training data. Others have used unsupervised procedures
(such as the k-means algorithm) for selecting the RBF centers.
Still others have used supervised procedures for selecting the
RBF centers.
Fig 1 RBF Neural network architecture
2.1 Working Principle
The principle of radial basis functions derives from the theory
of functional approximation. Given N pairs
( ),i ix y
, one looks
for a function f of the form:
 
1
( )
k
i i
i
f x c h x t

 
.In
this, h is the radial basis function (normally a Gaussian
function) and it
are the k centers which have to be selected.
The coefficients ic
are also unknown at the moment and have
to be computed. ix
and it
are elements of an n – dimensional
vector space.
The hidden units compute the Euclidean distance between the
input pattern and the vector, which is represented by the links
leading to this unit. The activation of the hidden units is
computed by applying the Euclidean distance to the function
h as
2 2
) /( ) ( ih x e x c r  . The parameters for the function
h are its center c and its radius r . There have been a number
of activation functions that include Gaussian function, Thin
plate spline function, Multiquadric function and so on for the
hidden layer of RBF neural network. In this paper the following
function is considered.
1/(1 )
0(( ) ( )) p
g v g v 

where p is a parameter and 0 ( )g v is a linear function of the
form
0 ( )g v av b 
where 0a  and 0b  . The single output neuron gets its
input from all hidden neurons. The links leading to the output
neuron hold the coefficients ci. The activation of the output
neuron is determined by the weighted sum of its inputs. An
RBF network is considered non-linear if the basis functions can
move or change size or if there is more than one hidden layer
otherwise the RBF network is considered linear. The above
architecture can easily be extended to include more than one
output node depending on the problem that the RBF network is
to solve e.g classification into different classes would need as
many output nodes as the number of classes.
When the RBF network is used in classification, the hidden
layer performs clustering while the output layer performs
classification. The hidden units would have the strongest
impulse when the input patterns are closed to the centers of the
hidden units and gradually weaker impulse as the input patterns
moved away from the centers. The output layer would linearly
combine all the outputs of the hidden layer. Each output node
would then give an output value, which represents the
probability that the input pattern falls under that class.
3 DECOUPLED KALMAN FILTER
For a large RBF network, the computational expense of the
Kalman filter could be burdensome [8]. In fact, the
computational expense of the Kalman filter is on the order of
AB2, where A is the dimension of the output of the dynamic
system and B is the number of parameters. In our case, there
are nM outputs and n(c+1)+mc parameters, where n is the
dimension of the RBF output, M is the number of training
samples, c is the number of prototypes, and m is the dimension
of the RBF input. Therefore, the computational expense of the
Kalman filter is on the order of nM[n(c+1)+mc]2.
The Kalman filter parameter vector can be decoupled by
assuming that certain parameter groups interact with each other
only at a second-order level. For instance, the Hk matrix
contains a lot of zeros, showing that the interaction between
various parameter groups can be neglected. In particular, the
Hk matrix consists of n+1 decoupled blocks. These n+1 blocks
correspond to the n sets of w weights that a4ect the n output
components, and the set of prototypes. This is intuitive
because, for example, the c+1 weights that impinge on the first
component of the output are completely independent of the c+1
(2)
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 395
weights that impinge on the second component of the output .
Let us use the notation that _ik refers to the ith group (out of
n+1 total) of parameters estimated at time step k. Then we have
θ1k = w1 ...θnk = wn
θn+1k =[v1T……VcT]T
We will use the notation that Hi corresponding to the i th group
of parameters.
H1k = H....Hnk = HHn+1k = Hv
where H (with no subscript) is the (c+1)X m matrix .We will
use the notation that ykt refers to the element of the target
output of the RBF network that are effected by the i th group of
parameters
yk1 = [y11……….. y1m]T
ykn = [yn1……….. ynm]T
ykn+1 = [yn1……y1m…… y1n…….. ynm]T
Similarly , we use the notation that ht (θֿk-1) refers to the
elements of the actual output of the RBF network that are
effected by the i th group of parameters
h1(θֿk-1) = [ỹ11…….. ỹ1M]kT
hn(θֿk-1) = [ỹn1…….. ỹnM]kT
hk+1(θֿk-1) = [ỹ11…….. ỹ1M … ỹn1…….. ỹnM ]kT
The decoupled Kalman recursion for the ith parameter group is
then given by
θ-tk = f(θ-tk-1) + Kkt[ykt - ht (θ-tk-1)]
Ki = PktHkt(Rt +(Hkt)T PktHkt)-1
Pk+1t =Fk(Pk- Kkt(Hkt)TPkt) FkT +QT
As before, f(.) is the identity mapping and Fk is the identity
matrix. The above recursion executes n+1 times. The first n
times, the recursion consists of M outputs and (c+1)
parameters. The last time, the recursion consists of nM outputs
and mc parameters. So the computational expense of the
Kalman filter has been reduced to the order of nM[(c + 1)2 +
(mc)2]. The ratio of the computational expense of
Standard KF Expense n2(c +1)2 + m2c2 + n(c
+1)mc
Decoupled KF Expens (c +1)2 + m2c2 : (42)
The computational savings will be most significant for large
problems, i.e., problem where n (the dimension of the output)
is large, m (the dimension of the input) is large, or c (the
number of prototypes) is large. Note that this complexity
analysis applies only to the Kalman recursion and does not
include the computational expense required for the calculation
of the partial derivatives. Also note that for both the standard
and decoupled Kalman filters, the computational expense
increases linearly with M (the number of training samples).
4. EXPERIMENTAL RESULTS
The results obtained on using the proposed RBF neural network
based on decoupling kalman filter training method for
recognition of handwritten digits of different fonts are
presented in this section. Hand written digits from 0 to 9 of 25
different fonts are taken and they are recognized by using this
method. For each hand written digit, after obtaining the thinned
image, 16 features are extracted using Zoning method. These
features are used to train RBF neural network [9].
The different steps involved in recognition of the digits using
this method are shown in the block diagram in the Fig.2
Fig. 2. Block Diagram of Handwritten digit recognition
The RBF networks are trained using the hidden layer function
of Eq. (1) The exponential parameter
p in Eq. (1) is taken as 2
in the results presented in this section. The training algorithms
are initialized with prototype vectors randomly selected from
the input data and with the weight matrix W set to zero[10].
From the experiments, it is found that Decoupled Kalman Filter
Training algorithm is terminated when the error decreases by
less than 0.1 percent. The performance of each of the training
methods is explored by averaging its performance over five
trials, where each trial consists of a random selection of
training and test data. The number of hidden units in the RBF
network is varied between 1 and 15 [11].
Fig. 3 shows the number of iterations required for
convergence. Percentage of correct classification for number of
hidden units is given in Fig.4 for decoupling Kalman filter
training [12]. The RBF network is trained with 13 different
fonts of each digit and is also tested with 12 other fonts which
are different from the trained fonts. It is observed that this
method is successful in recognizing the digits of all these 25
fonts.
For space consideration, the results of six hand written digits
viz 0 to 5 are only shown here. The features of these
handwritten digits are extracted and tabulated in Table 1 and 2.
=
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 396
Each digit has 16 features. The combination of all these
features is called a feature vector. The feature vector is applied
to neural network. If the digit is recognized, then the output
node corresponding to the digit is one and the remaining are
zeros. The training method here applied is supervised training
method. This requires the target vector that is the desired
output, which is tabulated in Table 3.
Table 1: Features of Handwritten Digits 0 to 5
Hand Written Digit Features of Handwritten Digits (8 features)
0 0.526316 0.526316 0.526316 0.526316 0 1.105263 1 0
1 0 0 0 0 0 1.842105 0 0
2 0 0 0 0 0 1.157895 0.631579 0
3 0 0 0 0 0 1.842105 1.315789 0
4 0 0.052632 0 0 0 1 1.526316 0
5 0 0 0 0 0 0 1 0.052632
Table 2: Features of Handwritten Digits 0 to 5
Hand Written Digit Features of Handwritten Digits (8 features)
0 0 1.421053 1.105263 0 0 0 0 0
1 0 0.842105 0 0 0 0 0 0
2 0 1.684211 1.157895 0.105263 0 0 0 0
3 0 0.894737 0.842105 0 0 0 0 0
4 0 0.631579 2 0.105263 0 0 0 0
5 0 0 1.210526 0 0 0.105263 0.421053 0
Table 3: Target vector for Hand written digits 0 to 5
Node Output
node1
Output
node2
Output
node3
Output
node4
Output
node5
Output
node6Digit
0 1 0 0 0 0 0
1 0 1 0 0 0 0
2 0 0 1 0 0 0
3 0 0 0 1 0 0
4 0 0 0 0 1 0
5 0 0 0 0 0 1
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 397
Fig 3. No.of iterations required for No. of hidden nodes
Fig 4. Percentage of Correct Classification for No of Hidden
Nodes
CONCLUSIONS
The RBF Neural Network using decoupled Kalman filter
training method is proposed for recognition of handwritten
digits of different fonts. The proposed method is tested on
handwritten digits of 0 to 9 of 25 different fonts. It is found that
this method has very high success rate in recognizing the
handwritten digits. This method can be extended to recognize
handwritten characters also.
ACKNOWLEDGMENTS
The authors place on record their thanks to the authorities of
RVR&JC College of Engineering, Guntur, A.P., India for the
facilities provided.
REFERENCES
[1] Naveed Bin Rais , M. Shehzad Hanif and rmtiaz A.
Taj, Adaptive Thresholding Technique for Document
Image Anaysis, IEEE Trans. on Systems, Man and
Cybernetics, Vol.8, 1978, pp.60-66.
[2] Sittisak Rodtook and Yuttapong Rangsanseri,
Adaptive Thresholding of Document Images on
Laplacian Sign, IEEE Transactions on Pattern analysis
and Machine Intelligence, vol.17, No.24, January,
2001.
[3] Jaekyu Ha & Robert M. Haralick Ihsin, T. Phillips,
Document Page Decomposition by the Bounding-Box
Projection Technique, IEEE Transactions on Systems,
Man, and Cybernetics, Vol.18, No.1, January 1995,
pp.1118-1122.
[4] Rangachar Kasturi, Lawrence O’Gorman and Venu
Govindaraju, Document analysis: A primer, Sadhana
Vol.27, Part 1, February 2002, pp. 3-22.
[5] Jaekyu Ha & Robert M. Haralick Ihsin, T. Phillips,
Document Page Decomposition by the Bounding-Box
Projection Technique, IEEE Transactions on Systems,
Man, and Cybernetics, Vol.18, No.1, pp.1118-1122,
January 1995.
[6] Brijesh K. Verma, Handwritten Hindi Character
Recognition Using Multilayer Perceptron and RBF
Neural Networks, IEEE Trans. On Neural Networks,
Vol.21, August 2004, pp. 2111-2115
[7] O.Batsaikhan and Y.P. Singh, Mongolian Character
Recognition using Multilayer Perceptron, Proceedings
of the 9th
International Conference on Neural
Information Processing, Vol. 2,2002.
[8] John Wiley & Sons, - Technology and Engineering,
Kalman Filtering and Neural Networks ,07-Apr-
2004.
[9] Oivind Due Trier, Anil K.Jain and Torfinn Taxt,
Feature Extraction methods for Character recognition–
A Survey, Pattern Recognition, Vol. 29, No. 4, 1996,
pp.641–662.
[10] P. S. P. Wang and Y. Y. Zhang, A fast and flexible
thinning algorithm, IEEE Transactions on
Computers, Vol.38, No.5, May 1989.
[11] O.Batsaikhan and Y.P. Singh, Mongolian Character
Recognition using Multilayer Perceptron, Proceedings
of the 9th
International Conference on Neural
Information Processing, Vol. 2,2002.
[12] Military Communications Conference, 2003.
MILCOM '03. 2003 IEEE paper ,A steady state
decoupled Kalman filter technique for multiuser
detection Year: 2003 , Page(s): 987 - 992 Vol.2

More Related Content

What's hot

Radial basis function network ppt bySheetal,Samreen and Dhanashri
Radial basis function network ppt bySheetal,Samreen and DhanashriRadial basis function network ppt bySheetal,Samreen and Dhanashri
Radial basis function network ppt bySheetal,Samreen and Dhanashrisheetal katkar
 
Inference & Learning in Linear Chain Conditional Random Fields (CRFs)
Inference & Learning in Linear Chain Conditional Random Fields (CRFs)Inference & Learning in Linear Chain Conditional Random Fields (CRFs)
Inference & Learning in Linear Chain Conditional Random Fields (CRFs)Anmol Dwivedi
 
Hidden Layer Leraning Vector Quantizatio
Hidden Layer Leraning Vector Quantizatio Hidden Layer Leraning Vector Quantizatio
Hidden Layer Leraning Vector Quantizatio Armando Vieira
 
Efficient design of feedforward network for pattern classification
Efficient design of feedforward network for pattern classificationEfficient design of feedforward network for pattern classification
Efficient design of feedforward network for pattern classificationIOSR Journals
 
Packet Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String KernelsPacket Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String KernelsIJERA Editor
 
Neural object classification by pattern recognition of one dimensional data ...
Neural object classification by pattern recognition of one dimensional data...Neural object classification by pattern recognition of one dimensional data...
Neural object classification by pattern recognition of one dimensional data ...naschibo
 
Myanmar Alphabet Recognition System Based on Artificial Neural Network
Myanmar Alphabet Recognition System Based on Artificial Neural NetworkMyanmar Alphabet Recognition System Based on Artificial Neural Network
Myanmar Alphabet Recognition System Based on Artificial Neural Networkijtsrd
 
An ann approach for network
An ann approach for networkAn ann approach for network
An ann approach for networkIJNSA Journal
 
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...IRJET Journal
 
Predicting electricity consumption using hidden parameters
Predicting electricity consumption using hidden parametersPredicting electricity consumption using hidden parameters
Predicting electricity consumption using hidden parametersIJLT EMAS
 
Adaptive network based fuzzy
Adaptive network based fuzzyAdaptive network based fuzzy
Adaptive network based fuzzyijaia
 
Web spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithmsWeb spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithmsaciijournal
 
Text Independent Speaker Identification Using Imfcc Integrated With Ica
Text Independent Speaker Identification Using Imfcc Integrated With IcaText Independent Speaker Identification Using Imfcc Integrated With Ica
Text Independent Speaker Identification Using Imfcc Integrated With IcaIOSR Journals
 
A survey research summary on neural networks
A survey research summary on neural networksA survey research summary on neural networks
A survey research summary on neural networkseSAT Publishing House
 

What's hot (18)

Radial basis function network ppt bySheetal,Samreen and Dhanashri
Radial basis function network ppt bySheetal,Samreen and DhanashriRadial basis function network ppt bySheetal,Samreen and Dhanashri
Radial basis function network ppt bySheetal,Samreen and Dhanashri
 
Inference & Learning in Linear Chain Conditional Random Fields (CRFs)
Inference & Learning in Linear Chain Conditional Random Fields (CRFs)Inference & Learning in Linear Chain Conditional Random Fields (CRFs)
Inference & Learning in Linear Chain Conditional Random Fields (CRFs)
 
ssc_icml13
ssc_icml13ssc_icml13
ssc_icml13
 
Hidden Layer Leraning Vector Quantizatio
Hidden Layer Leraning Vector Quantizatio Hidden Layer Leraning Vector Quantizatio
Hidden Layer Leraning Vector Quantizatio
 
Efficient design of feedforward network for pattern classification
Efficient design of feedforward network for pattern classificationEfficient design of feedforward network for pattern classification
Efficient design of feedforward network for pattern classification
 
Packet Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String KernelsPacket Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String Kernels
 
Neural object classification by pattern recognition of one dimensional data ...
Neural object classification by pattern recognition of one dimensional data...Neural object classification by pattern recognition of one dimensional data...
Neural object classification by pattern recognition of one dimensional data ...
 
Myanmar Alphabet Recognition System Based on Artificial Neural Network
Myanmar Alphabet Recognition System Based on Artificial Neural NetworkMyanmar Alphabet Recognition System Based on Artificial Neural Network
Myanmar Alphabet Recognition System Based on Artificial Neural Network
 
L046056365
L046056365L046056365
L046056365
 
An ann approach for network
An ann approach for networkAn ann approach for network
An ann approach for network
 
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
 
Predicting electricity consumption using hidden parameters
Predicting electricity consumption using hidden parametersPredicting electricity consumption using hidden parameters
Predicting electricity consumption using hidden parameters
 
Adaptive network based fuzzy
Adaptive network based fuzzyAdaptive network based fuzzy
Adaptive network based fuzzy
 
Web spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithmsWeb spam classification using supervised artificial neural network algorithms
Web spam classification using supervised artificial neural network algorithms
 
E502024047
E502024047E502024047
E502024047
 
Text Independent Speaker Identification Using Imfcc Integrated With Ica
Text Independent Speaker Identification Using Imfcc Integrated With IcaText Independent Speaker Identification Using Imfcc Integrated With Ica
Text Independent Speaker Identification Using Imfcc Integrated With Ica
 
A survey research summary on neural networks
A survey research summary on neural networksA survey research summary on neural networks
A survey research summary on neural networks
 
Dycops2019
Dycops2019 Dycops2019
Dycops2019
 

Viewers also liked

Humanistictheory 140601005146-phpapp01 (1)
Humanistictheory 140601005146-phpapp01 (1)Humanistictheory 140601005146-phpapp01 (1)
Humanistictheory 140601005146-phpapp01 (1)Cathy Co
 
Godhead 5 - His Teaching in our Past History
Godhead 5 - His Teaching in our Past HistoryGodhead 5 - His Teaching in our Past History
Godhead 5 - His Teaching in our Past HistorySami Wilberforce
 
China diapositivas-de-ingles
China diapositivas-de-inglesChina diapositivas-de-ingles
China diapositivas-de-inglesRafael Torres
 
Organizational Behaviour Chapter One
Organizational Behaviour Chapter OneOrganizational Behaviour Chapter One
Organizational Behaviour Chapter OneGanta Kishore Kumar
 
Conference and Registration details- ISIDD 2016
Conference and Registration details- ISIDD 2016Conference and Registration details- ISIDD 2016
Conference and Registration details- ISIDD 2016Bishwjit Ghoshal
 
Take your admisson in UG and PG course
Take your admisson in UG and PG courseTake your admisson in UG and PG course
Take your admisson in UG and PG courseHarsh Vardhan Sharma
 
Developing of decision support system for budget allocation of an r&d organiz...
Developing of decision support system for budget allocation of an r&d organiz...Developing of decision support system for budget allocation of an r&d organiz...
Developing of decision support system for budget allocation of an r&d organiz...eSAT Publishing House
 
勉強会 2014-12-11 (spain)
勉強会 2014-12-11 (spain)勉強会 2014-12-11 (spain)
勉強会 2014-12-11 (spain)cct-inc
 
次世代の新しい企業支援を創る「JASISAのご紹介」
次世代の新しい企業支援を創る「JASISAのご紹介」次世代の新しい企業支援を創る「JASISAのご紹介」
次世代の新しい企業支援を創る「JASISAのご紹介」Ryota Sakuragi
 
Punjab Medical College (PMC) Faisalabad Merit List 2014
Punjab Medical College (PMC) Faisalabad Merit List 2014Punjab Medical College (PMC) Faisalabad Merit List 2014
Punjab Medical College (PMC) Faisalabad Merit List 2014Rana Waqar
 
Indian domestic sector and the need for promoting community based microgenera...
Indian domestic sector and the need for promoting community based microgenera...Indian domestic sector and the need for promoting community based microgenera...
Indian domestic sector and the need for promoting community based microgenera...eSAT Publishing House
 
The shortest not necessarily the best other path on the basis of the optimal ...
The shortest not necessarily the best other path on the basis of the optimal ...The shortest not necessarily the best other path on the basis of the optimal ...
The shortest not necessarily the best other path on the basis of the optimal ...eSAT Publishing House
 

Viewers also liked (18)

Humanistictheory 140601005146-phpapp01 (1)
Humanistictheory 140601005146-phpapp01 (1)Humanistictheory 140601005146-phpapp01 (1)
Humanistictheory 140601005146-phpapp01 (1)
 
Godhead 5 - His Teaching in our Past History
Godhead 5 - His Teaching in our Past HistoryGodhead 5 - His Teaching in our Past History
Godhead 5 - His Teaching in our Past History
 
China diapositivas-de-ingles
China diapositivas-de-inglesChina diapositivas-de-ingles
China diapositivas-de-ingles
 
49 nd
49 nd49 nd
49 nd
 
Organizational Behaviour Chapter One
Organizational Behaviour Chapter OneOrganizational Behaviour Chapter One
Organizational Behaviour Chapter One
 
Khodchasri Architecture Chiangmai
Khodchasri Architecture ChiangmaiKhodchasri Architecture Chiangmai
Khodchasri Architecture Chiangmai
 
Conference and Registration details- ISIDD 2016
Conference and Registration details- ISIDD 2016Conference and Registration details- ISIDD 2016
Conference and Registration details- ISIDD 2016
 
Take your admisson in UG and PG course
Take your admisson in UG and PG courseTake your admisson in UG and PG course
Take your admisson in UG and PG course
 
Developing of decision support system for budget allocation of an r&d organiz...
Developing of decision support system for budget allocation of an r&d organiz...Developing of decision support system for budget allocation of an r&d organiz...
Developing of decision support system for budget allocation of an r&d organiz...
 
勉強会 2014-12-11 (spain)
勉強会 2014-12-11 (spain)勉強会 2014-12-11 (spain)
勉強会 2014-12-11 (spain)
 
Beowulf
BeowulfBeowulf
Beowulf
 
Physical Education
Physical EducationPhysical Education
Physical Education
 
10 tips for Street Photographers
10 tips for Street Photographers 10 tips for Street Photographers
10 tips for Street Photographers
 
次世代の新しい企業支援を創る「JASISAのご紹介」
次世代の新しい企業支援を創る「JASISAのご紹介」次世代の新しい企業支援を創る「JASISAのご紹介」
次世代の新しい企業支援を創る「JASISAのご紹介」
 
Punjab Medical College (PMC) Faisalabad Merit List 2014
Punjab Medical College (PMC) Faisalabad Merit List 2014Punjab Medical College (PMC) Faisalabad Merit List 2014
Punjab Medical College (PMC) Faisalabad Merit List 2014
 
Indian domestic sector and the need for promoting community based microgenera...
Indian domestic sector and the need for promoting community based microgenera...Indian domestic sector and the need for promoting community based microgenera...
Indian domestic sector and the need for promoting community based microgenera...
 
Css and its future
Css and its futureCss and its future
Css and its future
 
The shortest not necessarily the best other path on the basis of the optimal ...
The shortest not necessarily the best other path on the basis of the optimal ...The shortest not necessarily the best other path on the basis of the optimal ...
The shortest not necessarily the best other path on the basis of the optimal ...
 

Similar to Recognition of handwritten digits using rbf neural network

Adaptive Training of Radial Basis Function Networks Based on Cooperative
Adaptive Training of Radial Basis Function Networks Based on CooperativeAdaptive Training of Radial Basis Function Networks Based on Cooperative
Adaptive Training of Radial Basis Function Networks Based on CooperativeESCOM
 
Application of support vector machines for prediction of anti hiv activity of...
Application of support vector machines for prediction of anti hiv activity of...Application of support vector machines for prediction of anti hiv activity of...
Application of support vector machines for prediction of anti hiv activity of...Alexander Decker
 
Hand Written Digit Classification
Hand Written Digit ClassificationHand Written Digit Classification
Hand Written Digit Classificationijtsrd
 
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network AlgorithmsWeb Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network Algorithmsaciijournal
 
Classification of Iris Data using Kernel Radial Basis Probabilistic Neural N...
Classification of Iris Data using Kernel Radial Basis Probabilistic  Neural N...Classification of Iris Data using Kernel Radial Basis Probabilistic  Neural N...
Classification of Iris Data using Kernel Radial Basis Probabilistic Neural N...Scientific Review SR
 
Classification of Iris Data using Kernel Radial Basis Probabilistic Neural Ne...
Classification of Iris Data using Kernel Radial Basis Probabilistic Neural Ne...Classification of Iris Data using Kernel Radial Basis Probabilistic Neural Ne...
Classification of Iris Data using Kernel Radial Basis Probabilistic Neural Ne...Scientific Review
 
Efficiency of Neural Networks Study in the Design of Trusses
Efficiency of Neural Networks Study in the Design of TrussesEfficiency of Neural Networks Study in the Design of Trusses
Efficiency of Neural Networks Study in the Design of TrussesIRJET Journal
 
Electricity Demand Forecasting Using Fuzzy-Neural Network
Electricity Demand Forecasting Using Fuzzy-Neural NetworkElectricity Demand Forecasting Using Fuzzy-Neural Network
Electricity Demand Forecasting Using Fuzzy-Neural NetworkNaren Chandra Kattla
 
An efficient technique for color image classification based on lower feature ...
An efficient technique for color image classification based on lower feature ...An efficient technique for color image classification based on lower feature ...
An efficient technique for color image classification based on lower feature ...Alexander Decker
 
Time Series Forecasting Using Novel Feature Extraction Algorithm and Multilay...
Time Series Forecasting Using Novel Feature Extraction Algorithm and Multilay...Time Series Forecasting Using Novel Feature Extraction Algorithm and Multilay...
Time Series Forecasting Using Novel Feature Extraction Algorithm and Multilay...Editor IJCATR
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networksIJECEIAES
 
Fault detection and_diagnosis
Fault detection and_diagnosisFault detection and_diagnosis
Fault detection and_diagnosisM Reza Rahmati
 
An efficient fuzzy classifier with feature selection based
An efficient fuzzy classifier with feature selection basedAn efficient fuzzy classifier with feature selection based
An efficient fuzzy classifier with feature selection basedssairayousaf
 
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkkOBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkkshesnasuneer
 
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkkOBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkkshesnasuneer
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Artificial Neural Networks (ANNS) For Prediction of California Bearing Ratio ...
Artificial Neural Networks (ANNS) For Prediction of California Bearing Ratio ...Artificial Neural Networks (ANNS) For Prediction of California Bearing Ratio ...
Artificial Neural Networks (ANNS) For Prediction of California Bearing Ratio ...IJMER
 
Neural Network Implementation Control Mobile Robot
Neural Network Implementation Control Mobile RobotNeural Network Implementation Control Mobile Robot
Neural Network Implementation Control Mobile RobotIRJET Journal
 
Adaptive and online one class support vector machine-based outlier detection
Adaptive and online one class support vector machine-based outlier detectionAdaptive and online one class support vector machine-based outlier detection
Adaptive and online one class support vector machine-based outlier detectionNguyen Duong
 

Similar to Recognition of handwritten digits using rbf neural network (20)

Adaptive Training of Radial Basis Function Networks Based on Cooperative
Adaptive Training of Radial Basis Function Networks Based on CooperativeAdaptive Training of Radial Basis Function Networks Based on Cooperative
Adaptive Training of Radial Basis Function Networks Based on Cooperative
 
Application of support vector machines for prediction of anti hiv activity of...
Application of support vector machines for prediction of anti hiv activity of...Application of support vector machines for prediction of anti hiv activity of...
Application of support vector machines for prediction of anti hiv activity of...
 
Hand Written Digit Classification
Hand Written Digit ClassificationHand Written Digit Classification
Hand Written Digit Classification
 
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network AlgorithmsWeb Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
 
Classification of Iris Data using Kernel Radial Basis Probabilistic Neural N...
Classification of Iris Data using Kernel Radial Basis Probabilistic  Neural N...Classification of Iris Data using Kernel Radial Basis Probabilistic  Neural N...
Classification of Iris Data using Kernel Radial Basis Probabilistic Neural N...
 
Classification of Iris Data using Kernel Radial Basis Probabilistic Neural Ne...
Classification of Iris Data using Kernel Radial Basis Probabilistic Neural Ne...Classification of Iris Data using Kernel Radial Basis Probabilistic Neural Ne...
Classification of Iris Data using Kernel Radial Basis Probabilistic Neural Ne...
 
Efficiency of Neural Networks Study in the Design of Trusses
Efficiency of Neural Networks Study in the Design of TrussesEfficiency of Neural Networks Study in the Design of Trusses
Efficiency of Neural Networks Study in the Design of Trusses
 
Electricity Demand Forecasting Using Fuzzy-Neural Network
Electricity Demand Forecasting Using Fuzzy-Neural NetworkElectricity Demand Forecasting Using Fuzzy-Neural Network
Electricity Demand Forecasting Using Fuzzy-Neural Network
 
An efficient technique for color image classification based on lower feature ...
An efficient technique for color image classification based on lower feature ...An efficient technique for color image classification based on lower feature ...
An efficient technique for color image classification based on lower feature ...
 
Time Series Forecasting Using Novel Feature Extraction Algorithm and Multilay...
Time Series Forecasting Using Novel Feature Extraction Algorithm and Multilay...Time Series Forecasting Using Novel Feature Extraction Algorithm and Multilay...
Time Series Forecasting Using Novel Feature Extraction Algorithm and Multilay...
 
K means report
K means reportK means report
K means report
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networks
 
Fault detection and_diagnosis
Fault detection and_diagnosisFault detection and_diagnosis
Fault detection and_diagnosis
 
An efficient fuzzy classifier with feature selection based
An efficient fuzzy classifier with feature selection basedAn efficient fuzzy classifier with feature selection based
An efficient fuzzy classifier with feature selection based
 
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkkOBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
 
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkkOBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Artificial Neural Networks (ANNS) For Prediction of California Bearing Ratio ...
Artificial Neural Networks (ANNS) For Prediction of California Bearing Ratio ...Artificial Neural Networks (ANNS) For Prediction of California Bearing Ratio ...
Artificial Neural Networks (ANNS) For Prediction of California Bearing Ratio ...
 
Neural Network Implementation Control Mobile Robot
Neural Network Implementation Control Mobile RobotNeural Network Implementation Control Mobile Robot
Neural Network Implementation Control Mobile Robot
 
Adaptive and online one class support vector machine-based outlier detection
Adaptive and online one class support vector machine-based outlier detectionAdaptive and online one class support vector machine-based outlier detection
Adaptive and online one class support vector machine-based outlier detection
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 

Recently uploaded (20)

Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 

Recognition of handwritten digits using rbf neural network

  • 1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 393 RECOGNITION OF HANDWRITTEN DIGITS USING RBF NEURAL NETWORK P P S Subhashini1 , V V K D V Prasad2 Department of ECE, RVR & JC College of Engineering, Chowdavaram, Guntur, 522019, A.P, India, k_shiva_111@yahoo.co.in, varrevkdvp@rediffmail.com Abstract Pattern recognition is required in many fields for different purposes. Methods based on Radial basis function (RBF) neural networks are found to be very successful in pattern classification problems. Training neural network is in general a challenging nonlinear optimization problem. Several algorithms have been proposed for choosing the RBF neural network prototypes and training the network. In this paper RBF neural network using decoupling Kalman filter method is proposed for handwritten digit recognition applications. The efficacy of the proposed method is tested on the handwritten digits of different fonts and found that it is successful in recognizing the digits. Keywords: - Neural network, RBF neural network, Decoupled kalman filter Training, Zoning method ------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION Character recognition is classified into two categories, off-line character recognition and on-line character recognition [1]. In off-line character recognition the system accepts image as input from the scanner. It is more difficult than on-line character recognition because of unavailability of contextual information and lack of prior knowledge like text position, size of text, order of strokes, start point and stop point. Noise will also exist in the images acquired in off-line character recognition. Machine Printed character recognition comes under this category [2]. On-line character recognition system accepts the moment of pen from the hardware such as graphic tablet, light pen and lot of information is available during the input process such as current position, moment’s direction, start points, stop points and stroke orders.e.g. handwritten character recognition [3]. There has been a drastic change in our perspective of concept of communication and connectivity with digital revolution. Biometrics play vital role in dealing with problem of authentication. It is the science of identifying or verifying the identity of a person based on physiological or behavioural characteristics. Physiological characteristics include fingerprints, iris, hand geometry and facial image [4]. The behavioural characteristics are actions carried out by a person in a characteristic way and include recognition of signature, machine printed characters, handwriting, and voice. There have been attempts to explore the possibility of efficient man- machine communication through hand written characters. Pattern recognition techniques using RBF neural network are helpful in classification of hand written characters of different users [5]. This paper focuses on handwritten digits recognition using RBF neural network based on decoupling Kalman filter training method. From the results it is found that the proposed method has very high success rate in handwritten digit recognition. 2. RBF NEURAL NETWORKS Radial basis function network (RBF) is a type of artificial network for applications to problems of supervised learning e.g. regression, classification and time series prediction. RBF networks can be used to solve classification problems [6]. The classification problem can be treated as a non-parametric regression problem if the outputs of the estimated function are interpreted as the probability that the input belongs to the corresponding classes. The training output values are vectors of length equal to the number of classes. After training, the network responds to a new pattern with continuous values in each component of the output vector and these values are interpreted as being proportional to class probability. This network consists of three layers, input layer, hidden layer, output layer as shown in Fig. 1. The m-dimensional input x is passed directly to a hidden layer. Suppose there are c neurons in the hidden layer, each of the c neurons in the hidden layer applies an activation function which is a function of the Euclidean distance between the input and an m-dimensional prototype vector [7]. Each hidden neuron contains its own prototype vector as a parameter. The output of each hidden neuron is then weighted and passed to the output layer. The outputs of the network consist of sums of the weighted hidden layer neurons. The design of an RBF requires several decisions that include the
  • 2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 394 number of hidden units in the hidden layer, values of the prototypes, the functions used at the hidden units and the weights applied between the hidden layer and the output layer. The performance of an RBF network depends on the number and location (in the input space) of the centres, the shape of the RBF functions at the hidden units and the method used for determining the network weights. Some researchers have trained RBF networks by selecting the centers randomly from the training data. Others have used unsupervised procedures (such as the k-means algorithm) for selecting the RBF centers. Still others have used supervised procedures for selecting the RBF centers. Fig 1 RBF Neural network architecture 2.1 Working Principle The principle of radial basis functions derives from the theory of functional approximation. Given N pairs ( ),i ix y , one looks for a function f of the form:   1 ( ) k i i i f x c h x t    .In this, h is the radial basis function (normally a Gaussian function) and it are the k centers which have to be selected. The coefficients ic are also unknown at the moment and have to be computed. ix and it are elements of an n – dimensional vector space. The hidden units compute the Euclidean distance between the input pattern and the vector, which is represented by the links leading to this unit. The activation of the hidden units is computed by applying the Euclidean distance to the function h as 2 2 ) /( ) ( ih x e x c r  . The parameters for the function h are its center c and its radius r . There have been a number of activation functions that include Gaussian function, Thin plate spline function, Multiquadric function and so on for the hidden layer of RBF neural network. In this paper the following function is considered. 1/(1 ) 0(( ) ( )) p g v g v   where p is a parameter and 0 ( )g v is a linear function of the form 0 ( )g v av b  where 0a  and 0b  . The single output neuron gets its input from all hidden neurons. The links leading to the output neuron hold the coefficients ci. The activation of the output neuron is determined by the weighted sum of its inputs. An RBF network is considered non-linear if the basis functions can move or change size or if there is more than one hidden layer otherwise the RBF network is considered linear. The above architecture can easily be extended to include more than one output node depending on the problem that the RBF network is to solve e.g classification into different classes would need as many output nodes as the number of classes. When the RBF network is used in classification, the hidden layer performs clustering while the output layer performs classification. The hidden units would have the strongest impulse when the input patterns are closed to the centers of the hidden units and gradually weaker impulse as the input patterns moved away from the centers. The output layer would linearly combine all the outputs of the hidden layer. Each output node would then give an output value, which represents the probability that the input pattern falls under that class. 3 DECOUPLED KALMAN FILTER For a large RBF network, the computational expense of the Kalman filter could be burdensome [8]. In fact, the computational expense of the Kalman filter is on the order of AB2, where A is the dimension of the output of the dynamic system and B is the number of parameters. In our case, there are nM outputs and n(c+1)+mc parameters, where n is the dimension of the RBF output, M is the number of training samples, c is the number of prototypes, and m is the dimension of the RBF input. Therefore, the computational expense of the Kalman filter is on the order of nM[n(c+1)+mc]2. The Kalman filter parameter vector can be decoupled by assuming that certain parameter groups interact with each other only at a second-order level. For instance, the Hk matrix contains a lot of zeros, showing that the interaction between various parameter groups can be neglected. In particular, the Hk matrix consists of n+1 decoupled blocks. These n+1 blocks correspond to the n sets of w weights that a4ect the n output components, and the set of prototypes. This is intuitive because, for example, the c+1 weights that impinge on the first component of the output are completely independent of the c+1 (2)
  • 3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 395 weights that impinge on the second component of the output . Let us use the notation that _ik refers to the ith group (out of n+1 total) of parameters estimated at time step k. Then we have θ1k = w1 ...θnk = wn θn+1k =[v1T……VcT]T We will use the notation that Hi corresponding to the i th group of parameters. H1k = H....Hnk = HHn+1k = Hv where H (with no subscript) is the (c+1)X m matrix .We will use the notation that ykt refers to the element of the target output of the RBF network that are effected by the i th group of parameters yk1 = [y11……….. y1m]T ykn = [yn1……….. ynm]T ykn+1 = [yn1……y1m…… y1n…….. ynm]T Similarly , we use the notation that ht (θֿk-1) refers to the elements of the actual output of the RBF network that are effected by the i th group of parameters h1(θֿk-1) = [ỹ11…….. ỹ1M]kT hn(θֿk-1) = [ỹn1…….. ỹnM]kT hk+1(θֿk-1) = [ỹ11…….. ỹ1M … ỹn1…….. ỹnM ]kT The decoupled Kalman recursion for the ith parameter group is then given by θ-tk = f(θ-tk-1) + Kkt[ykt - ht (θ-tk-1)] Ki = PktHkt(Rt +(Hkt)T PktHkt)-1 Pk+1t =Fk(Pk- Kkt(Hkt)TPkt) FkT +QT As before, f(.) is the identity mapping and Fk is the identity matrix. The above recursion executes n+1 times. The first n times, the recursion consists of M outputs and (c+1) parameters. The last time, the recursion consists of nM outputs and mc parameters. So the computational expense of the Kalman filter has been reduced to the order of nM[(c + 1)2 + (mc)2]. The ratio of the computational expense of Standard KF Expense n2(c +1)2 + m2c2 + n(c +1)mc Decoupled KF Expens (c +1)2 + m2c2 : (42) The computational savings will be most significant for large problems, i.e., problem where n (the dimension of the output) is large, m (the dimension of the input) is large, or c (the number of prototypes) is large. Note that this complexity analysis applies only to the Kalman recursion and does not include the computational expense required for the calculation of the partial derivatives. Also note that for both the standard and decoupled Kalman filters, the computational expense increases linearly with M (the number of training samples). 4. EXPERIMENTAL RESULTS The results obtained on using the proposed RBF neural network based on decoupling kalman filter training method for recognition of handwritten digits of different fonts are presented in this section. Hand written digits from 0 to 9 of 25 different fonts are taken and they are recognized by using this method. For each hand written digit, after obtaining the thinned image, 16 features are extracted using Zoning method. These features are used to train RBF neural network [9]. The different steps involved in recognition of the digits using this method are shown in the block diagram in the Fig.2 Fig. 2. Block Diagram of Handwritten digit recognition The RBF networks are trained using the hidden layer function of Eq. (1) The exponential parameter p in Eq. (1) is taken as 2 in the results presented in this section. The training algorithms are initialized with prototype vectors randomly selected from the input data and with the weight matrix W set to zero[10]. From the experiments, it is found that Decoupled Kalman Filter Training algorithm is terminated when the error decreases by less than 0.1 percent. The performance of each of the training methods is explored by averaging its performance over five trials, where each trial consists of a random selection of training and test data. The number of hidden units in the RBF network is varied between 1 and 15 [11]. Fig. 3 shows the number of iterations required for convergence. Percentage of correct classification for number of hidden units is given in Fig.4 for decoupling Kalman filter training [12]. The RBF network is trained with 13 different fonts of each digit and is also tested with 12 other fonts which are different from the trained fonts. It is observed that this method is successful in recognizing the digits of all these 25 fonts. For space consideration, the results of six hand written digits viz 0 to 5 are only shown here. The features of these handwritten digits are extracted and tabulated in Table 1 and 2. =
  • 4. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 396 Each digit has 16 features. The combination of all these features is called a feature vector. The feature vector is applied to neural network. If the digit is recognized, then the output node corresponding to the digit is one and the remaining are zeros. The training method here applied is supervised training method. This requires the target vector that is the desired output, which is tabulated in Table 3. Table 1: Features of Handwritten Digits 0 to 5 Hand Written Digit Features of Handwritten Digits (8 features) 0 0.526316 0.526316 0.526316 0.526316 0 1.105263 1 0 1 0 0 0 0 0 1.842105 0 0 2 0 0 0 0 0 1.157895 0.631579 0 3 0 0 0 0 0 1.842105 1.315789 0 4 0 0.052632 0 0 0 1 1.526316 0 5 0 0 0 0 0 0 1 0.052632 Table 2: Features of Handwritten Digits 0 to 5 Hand Written Digit Features of Handwritten Digits (8 features) 0 0 1.421053 1.105263 0 0 0 0 0 1 0 0.842105 0 0 0 0 0 0 2 0 1.684211 1.157895 0.105263 0 0 0 0 3 0 0.894737 0.842105 0 0 0 0 0 4 0 0.631579 2 0.105263 0 0 0 0 5 0 0 1.210526 0 0 0.105263 0.421053 0 Table 3: Target vector for Hand written digits 0 to 5 Node Output node1 Output node2 Output node3 Output node4 Output node5 Output node6Digit 0 1 0 0 0 0 0 1 0 1 0 0 0 0 2 0 0 1 0 0 0 3 0 0 0 1 0 0 4 0 0 0 0 1 0 5 0 0 0 0 0 1
  • 5. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 397 Fig 3. No.of iterations required for No. of hidden nodes Fig 4. Percentage of Correct Classification for No of Hidden Nodes CONCLUSIONS The RBF Neural Network using decoupled Kalman filter training method is proposed for recognition of handwritten digits of different fonts. The proposed method is tested on handwritten digits of 0 to 9 of 25 different fonts. It is found that this method has very high success rate in recognizing the handwritten digits. This method can be extended to recognize handwritten characters also. ACKNOWLEDGMENTS The authors place on record their thanks to the authorities of RVR&JC College of Engineering, Guntur, A.P., India for the facilities provided. REFERENCES [1] Naveed Bin Rais , M. Shehzad Hanif and rmtiaz A. Taj, Adaptive Thresholding Technique for Document Image Anaysis, IEEE Trans. on Systems, Man and Cybernetics, Vol.8, 1978, pp.60-66. [2] Sittisak Rodtook and Yuttapong Rangsanseri, Adaptive Thresholding of Document Images on Laplacian Sign, IEEE Transactions on Pattern analysis and Machine Intelligence, vol.17, No.24, January, 2001. [3] Jaekyu Ha & Robert M. Haralick Ihsin, T. Phillips, Document Page Decomposition by the Bounding-Box Projection Technique, IEEE Transactions on Systems, Man, and Cybernetics, Vol.18, No.1, January 1995, pp.1118-1122. [4] Rangachar Kasturi, Lawrence O’Gorman and Venu Govindaraju, Document analysis: A primer, Sadhana Vol.27, Part 1, February 2002, pp. 3-22. [5] Jaekyu Ha & Robert M. Haralick Ihsin, T. Phillips, Document Page Decomposition by the Bounding-Box Projection Technique, IEEE Transactions on Systems, Man, and Cybernetics, Vol.18, No.1, pp.1118-1122, January 1995. [6] Brijesh K. Verma, Handwritten Hindi Character Recognition Using Multilayer Perceptron and RBF Neural Networks, IEEE Trans. On Neural Networks, Vol.21, August 2004, pp. 2111-2115 [7] O.Batsaikhan and Y.P. Singh, Mongolian Character Recognition using Multilayer Perceptron, Proceedings of the 9th International Conference on Neural Information Processing, Vol. 2,2002. [8] John Wiley & Sons, - Technology and Engineering, Kalman Filtering and Neural Networks ,07-Apr- 2004. [9] Oivind Due Trier, Anil K.Jain and Torfinn Taxt, Feature Extraction methods for Character recognition– A Survey, Pattern Recognition, Vol. 29, No. 4, 1996, pp.641–662. [10] P. S. P. Wang and Y. Y. Zhang, A fast and flexible thinning algorithm, IEEE Transactions on Computers, Vol.38, No.5, May 1989. [11] O.Batsaikhan and Y.P. Singh, Mongolian Character Recognition using Multilayer Perceptron, Proceedings of the 9th International Conference on Neural Information Processing, Vol. 2,2002. [12] Military Communications Conference, 2003. MILCOM '03. 2003 IEEE paper ,A steady state decoupled Kalman filter technique for multiuser detection Year: 2003 , Page(s): 987 - 992 Vol.2