Bounded Box-Zoning Integrated Approach For Children Handwriting Recognition
This study focuses on recognizing handwritten character datasets of children through the integration of image processing and machine learning. The bounding box, one of the best structural feature extraction methods, has demonstrated high performance in the optical character recognition (OCR) pipelin...
| Main Author: | Qausbee, Nik Nur Adlin Nik |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2024
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/62282/ http://eprints.usm.my/62282/1/24%20Pages%20from%20NIK%20NUR%20ADLIN%20BINTI%20NIK%20QAUSBEE.pdf |
Similar Items
Determining The Black-Box Component's Failure.
by: Hilal, Ibrahim, et al.
Published: (2007)
by: Hilal, Ibrahim, et al.
Published: (2007)
On the security bounds of CMC, EME, EME(+) and EME* - Modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Enhanced and automated approaches for fish recognition and classification system
by: Samma, Ali Salem Ali
Published: (2011)
by: Samma, Ali Salem Ali
Published: (2011)
Similarity Segmentation Approach For Sensor-Based Human Activity Recognition
by: Baraka, Abdulrahman M. A.
Published: (2024)
by: Baraka, Abdulrahman M. A.
Published: (2024)
Individual recognition based on human iris using fractal dimension approach
by: Lee, , PS, et al.
Published: (2004)
by: Lee, , PS, et al.
Published: (2004)
An integrated approach for head gesture based interface
by: Lee, Gin Chong, et al.
Published: (2012)
by: Lee, Gin Chong, et al.
Published: (2012)
An automated palmprint recognition system
by: CONNIE, T, et al.
Published: (2005)
by: CONNIE, T, et al.
Published: (2005)
Clustering In Fingerprint Recognition System.
by: Ooi, Boon Yaik, et al.
Published: (2004)
by: Ooi, Boon Yaik, et al.
Published: (2004)
A robust face recognition system
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
Binarized revocable biometrics in face recognition
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
Kernel Discriminant Embedding in face recognition
by: Han, Pang Ying, et al.
Published: (2011)
by: Han, Pang Ying, et al.
Published: (2011)
Feature Estraction In Automatic Shape Recognition System.
by: Salam, Rosalina Abdul, et al.
Published: (2004)
by: Salam, Rosalina Abdul, et al.
Published: (2004)
Regularized locality preserving discriminant embedding for face recognition
by: Pang, Ying Han, et al.
Published: (2012)
by: Pang, Ying Han, et al.
Published: (2012)
A discriminant pseudo Zernike moments in face recognition
by: Pang, Ying Han, et al.
Published: (2006)
by: Pang, Ying Han, et al.
Published: (2006)
Fuzzy modeling based recognition of multi-font numerals
by: Hanmandlu, Madasu, et al.
Published: (2003)
by: Hanmandlu, Madasu, et al.
Published: (2003)
Unconstrained handwritten character recognition based on fuzzy logic
by: Hanmandlu, M
Published: (2003)
by: Hanmandlu, M
Published: (2003)
Comparison between fuzzy and NN method for speech emotion recognition
by: Razak,, AA, et al.
Published: (2005)
by: Razak,, AA, et al.
Published: (2005)
Associative Memory Based Image and Object Recognition by Quantum Holography
by: Loo, Chu Kiong, et al.
Published: (2004)
by: Loo, Chu Kiong, et al.
Published: (2004)
An Approach to 3-D Object Recognition Using Legendre Moment Invariants
by: Ong, Lee-Yeng, et al.
Published: (2007)
by: Ong, Lee-Yeng, et al.
Published: (2007)
Face recognition using wavelet transform and non-negative matrix factorization
by: Foon, , NH, et al.
Published: (2004)
by: Foon, , NH, et al.
Published: (2004)
Parallelizing Algorithm For Object Recognition Based On Edge Detection On Sunfire Cluster.
by: Osman, Mohd Azam, et al.
Published: (2007)
by: Osman, Mohd Azam, et al.
Published: (2007)
Fusion of locally linear embedding and principal component analysis for face recognition (FLLEPCA)
by: Abusham, , EE, et al.
Published: (2005)
by: Abusham, , EE, et al.
Published: (2005)
Improvement Of Facial Recognition Accuracy Using Eye-Lids Movement And Tensorflow Model
by: Sukri, Syazwan Syafiqah
Published: (2021)
by: Sukri, Syazwan Syafiqah
Published: (2021)
Improving visual evoked potential feature classification for person recognition using PCA and normalization
by: Palaniappan, Ramaswamy, et al.
Published: (2006)
by: Palaniappan, Ramaswamy, et al.
Published: (2006)
Enhanced Conditional Generative Adversarial Network For Handling Subject Variability In Human Activity Recognition
by: Jimale, Ali Olow
Published: (2023)
by: Jimale, Ali Olow
Published: (2023)
Fusion Of Global Shape And Local Features Using Multi Classifier Framework For Object Class Recognition
by: Manshor, Noridayu
Published: (2013)
by: Manshor, Noridayu
Published: (2013)
A Framework For Automatic Code Switching Speech Recognition With Multilingual Acoustic And Pronunciation Models Adaptation
by: Ahmed, Basem H. A.
Published: (2014)
by: Ahmed, Basem H. A.
Published: (2014)
Universal scaling laws in surface water bodies and their zones of influence
by: Sagar, B. S. Daya
Published: (2007)
by: Sagar, B. S. Daya
Published: (2007)
Smart Child Portal: User Requirements For Children‟S Portal
by: Basim Obaid N, Althagfi
Published: (2010)
by: Basim Obaid N, Althagfi
Published: (2010)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
Underwater Image Enhancement Using An Integrated Colour Model.
by: Iqbal, Kashif, et al.
Published: (2007)
by: Iqbal, Kashif, et al.
Published: (2007)
Digital camera based fingerprint recognition
by: Hiew, Bee Yan, et al.
Published: (2007)
by: Hiew, Bee Yan, et al.
Published: (2007)
Touch-less Fingerprint Recognition System
by: Hiew, Bee Yan, et al.
Published: (2007)
by: Hiew, Bee Yan, et al.
Published: (2007)
An Approach For Detection Of Logical Inconsistency
by: Yadav, Rinki
Published: (2012)
by: Yadav, Rinki
Published: (2012)
High security Iris verification system based on random secret integration
by: SIEWCHIN, C, et al.
Published: (2006)
by: SIEWCHIN, C, et al.
Published: (2006)
Supervised Locally Linear Embedding in face recognition
by: Ying Han, Pang, et al.
Published: (2008)
by: Ying Han, Pang, et al.
Published: (2008)
Classification of alcohol abusers: An intelligent approach
by: Kanna,, PS, et al.
Published: (2005)
by: Kanna,, PS, et al.
Published: (2005)
A Visual Approach For Requirement Traceability
by: Madaki, Abdulkadir Ahmad
Published: (2022)
by: Madaki, Abdulkadir Ahmad
Published: (2022)
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004)
by: Teoh, , ABJ, et al.
Published: (2004)
Integrated Framework For Secure Distributed Management Of
Duplicated Ipv6 Address Detection
by: Ul Rehman, Shafiq
Published: (2017)
by: Ul Rehman, Shafiq
Published: (2017)
Similar Items
-
Determining The Black-Box Component's Failure.
by: Hilal, Ibrahim, et al.
Published: (2007) -
On the security bounds of CMC, EME, EME(+) and EME* - Modes of operation
by: Phan, , RCW, et al.
Published: (2005) -
Enhanced and automated approaches for fish recognition and classification system
by: Samma, Ali Salem Ali
Published: (2011) -
Similarity Segmentation Approach For Sensor-Based Human Activity Recognition
by: Baraka, Abdulrahman M. A.
Published: (2024) -
Individual recognition based on human iris using fractal dimension approach
by: Lee, , PS, et al.
Published: (2004)