Hilditch’s Algorithm Based Tamil Character Recognition
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 3
Abstract
Character identification plays a vital role in the contemporary world of Image processing. It can solve many composite problems and makes human’s work easier. An instance is Handwritten Character detection. Handwritten recognition is not a novel expertise, but it has not gained community notice until Now. The eventual aim of designing Handwritten Character recognition structure with an accurateness rate of 100% is pretty illusionary. Tamil Handwritten Character recognition system uses the Neural Networks to distinguish them. Neural Network and structural characteristics are used to instruct and recognize written characters. After training and testing the exactness rate reached 99%. This correctness rate is extremely high. In this paper we are exploring image processing through the Hilditch algorithm foundation and structural characteristics of a character in the image. And we recognized some character of the Tamil language, and we are trying to identify all the character of Tamil In our future works.
Authors and Affiliations
V. Karthikeyan
SURVEY ON SIMULATION AND EMULATION TOOLS IN WIRELESS SENSOR NETWORK
Sensor networks are dense wireless networks of small, low-cost sensors which collect and propagate environmental data. Wireless sensor networks (WSNs) assist monitoring and controlling of physical environments from remot...
Survey of Dimensionality Reduction and Mining Techniques on Scientific Data
Dimensionality reduction techniques on scientific data are currently a focused approach to understand the underlying scientific knowledge in a dataset resulted from scientific experiments and simulations. The sole purpos...
MaRFI: Maximal Regular Frequent Itemset Mining using a pair of Transaction-ids
Frequent pattern mining is the fundamental and most dominant research area in data mining. Maximal frequent patterns are one of the compact representations of frequent itemsets. There is more number of algorithms to find...
A Survey on Security Issues and Vulnerabilities on Cloud Computing
Cloud computing has gained significant traction for recent years. It is a form of distributed computing whereby resources and application platform are shared over the internet through on demand and pay on utilization bas...
AN EFFICIENT APPROACH FOR COOPERATIVE ROUTING IN MANETS
a mobile ad hoc network (MANET) is also a cluster of volatile nodes, self configuring and infrastructure less and will set at anytime and at any site. Cooperative Communication is a latest research area, it combines the...