Author of the publication

Performance evaluation of MLP and RBF feed forward neural network for the recognition of off-line handwritten characters.

, , , , , and . ICDIP, volume 7546 of SPIE Proceedings, page 754633. SPIE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Binarization Feature Extraction Approach to OCR: MLP vs. RBF., , and . ICDCIT, volume 8337 of Lecture Notes in Computer Science, page 341-346. Springer, (2014)A New Approach to Detect and Extract Characters from Off-Line Printed Images and Text., , and . ITQM, volume 17 of Procedia Computer Science, page 434-440. Elsevier, (2013)Modelling and analysis of two-unit hot standby database system with random inspection of standby unit., , , and . Int. J. Math. Oper. Res., 15 (2): 156-180 (2019)Performance evaluation of MLP and RBF feed forward neural network for the recognition of off-line handwritten characters., , , , , and . ICDIP, volume 7546 of SPIE Proceedings, page 754633. SPIE, (2010)A Secure Multimedia Browsing Scheme Based On Advanced Video Coding & Encryption For Network Applications., , , and . Enterprise Information Systems and Web Technologies, page 7-13. ISRST, (2008)An adaptive reconfigurable antenna for cognitive radio system., , and . ICACCI, page 1121-1125. IEEE, (2017)A Neural Approach to Cursive Handwritten Character Recognition Using Features Extracted from Binarization Technique., , and . Complex System Modelling and Control Through Intelligent Soft Computations, volume 319 of Studies in Fuzziness and Soft Computing, Springer, (2015)A New Character Segmentation Approach for Off-Line Cursive Handwritten Words., , and . ITQM, volume 17 of Procedia Computer Science, page 88-95. Elsevier, (2013)Improving the character recognition efficiency of feed forward BP neural network, and . CoRR, (2011)ARP and ICMP weaknesses: Impact and network performance analysis of a novel attack strategy., , and . Communication, Network, and Information Security, page 144-149. IASTED/ACTA Press, (2006)