Bangla numeral recognition using multilayer feed forward, Computer Engineering

Assignment Help:

Assignment 4: Handwritten Bangla Numeral Recognition using Multilayer Feed Forward Neural Network.

In this assignment, you will design a multi layer feed forward neural network (MLP) classifier that will be used to recognize handwritten Bangla numerals. There are ten numerals in Bangla alphabet. The data set that will be used consists of image samples of handwritten Bangla numerals which were found by asking people of various professions to write down the numerals in paper and then scanning the paper to images. The data set consists of a training and test set where in each set there are 25 samples for each numeral. Therefore, in each dataset, there are 10X25 = 250 samples. You will have to use MATLAB image processing functions to do this assignment.

1.       Download the training and test data from my website.

2.       This machine learning task involves four key phases.

a.       Phase 1- Preprocessing:  

 i.      In this step, the images samples will be read using MATLAB function imread. The raw data that will be returned by imread is the pixel-by-pixel luminosity. So, if image size is 50x50, the imread function a 50x50 matrix, where each cell denotes the intensity of the image in the corresponding pixel. Intensity is between 0 and 1. This is what called grayscale image.

 ii.      Since, each image is not of the same size; there we have to resize them to a uniform size. In this step, use the MATLAB function imresize to resize each image matrix into a uniform size of 40x40.

 iii.      After resizing, you have to convert the grayscale image to a binary image (where each pixel will be either 0 or 1). This will be done by using graythresh and im2bw function.

 iv.      [You can thin the image using bwmorph function. Although this step is not necessary for this assignment, however you can experiment with it, whether thinning gives improvement in performance

b.       Phase 2- Feature extraction:

i.      In this phase, you will extract features. In this assignment, feature will correspond to the average intensity of a 5x5 size box centered at each pixel. All such average intensities will form the feature vector.

c.        Phase 3- Training the MLP:

 i.      Train the back propagation neural network using training data set.

d.       Phase 4- Testing: Test the learned neural network and find accuracy measures.

3.       Perform experiments by varying:

a.       Number of hidden layers: Experiment with 5, 10, 25, 50.

b.       Number of iterations: Experiment with 100, 300, 500, 1000.

c.        Size of the box: Experiment with 3x3, 5x5, 9x9, 15x15.

d.       In each of the above experiments, take average of 25 runs.

4.       If you want to determine the effect of factors stated in (3), then run 4x4x4 = 64 experiments. Comment on the results.

5.       Write a report commenting on the experiment results. State your findings explicitly. These findings will give you better marks.


Related Discussions:- Bangla numeral recognition using multilayer feed forward

Concepts of an address and data, The heart of a computer is often one integ...

The heart of a computer is often one integrated circuit; one typical circuit is a 68Hc11 Microprocessor. Let us consider a typical 68Hc11 hardware design.           The mic

Quantity amounts (data type quan), A field containing quantity amounts (dat...

A field containing quantity amounts (data type QUAN) must be assigned to a reference table and a reference field. Explain? As a reference table, a system table having all the v

What is redefines clause, Redefines clause is used to permit the similar st...

Redefines clause is used to permit the similar storage allocation to be referenced by dissimilar data names.

Arithmetic-logic section in computer system, Arithmetic-logic section in co...

Arithmetic-logic section in computer system: The   arithmetic-logic section performs arithmetic   operations, such subtraction, addition, multiplication, and division. Throug

State the various security tools, State the various Security Tools Sec...

State the various Security Tools Securing an Intranet is not a simple task. Just as articles in a house are protected by use of various types of security systems such as lock

Can we delete a domain, Can you delete a domain, which is being used by dat...

Can you delete a domain, which is being used by data elements? No.

Explain the scan code, What is meant by scan code?  When a key is press...

What is meant by scan code?  When a key is pressed on the keyboard, the keyboard controller places a code take to the key pressed into a part of the memory known as the keyboar

Describe big notation, Q. Describe Big Notation? Big O Notation : The ...

Q. Describe Big Notation? Big O Notation : The set O (g(n)) comprises all functions f(n) for that there exists   positive constants c such that for satisfactorily large values

Control of program, Example:                         CMP    AX,BX    ;...

Example:                         CMP    AX,BX    ; compare instruction: sets flags JE        THERE    ; if equal then skip the ADD instruction  ADD  AX, 02    ; add 02

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd