Approach using CNN for Recognition of Devanagari Handwritten Content
Keywords:
Devanagari, Handwritten text recognition, CNN, Deep learning, Image recognitionAbstract
This document discusses the use of Convolutional Neural Networks (CNN) for Devanagari Handwritten Text Recognition (DHTR) tasks. DHTR is a complex task due to the variability and diversity of handwritten characters in the Devanagari script. CNNs are a type of deep learning algorithm that can automatically learn features from images and are widely used in image recognition tasks. This paper presents a CNN-based approach for DHTR the proposed method has shown out performed on a popular dataset commonly used for evaluating image recognition systems. The proposed approach involves a preprocessing step to normalize and segment the input images, followed by a CNN architecture that consists of several convolutional layers and fully connected layers. The network is trained using a large dataset of labeled Devanagari characters. The results show that the proposed approach achieves high accuracy in recognizing Devanagari characters, and can be applied to real-world applications such as document digitization and text-to-speech conversion.
Downloads
References
K. Malhotra, Y. Kumar, and P. Bhattacherjee, "A CNN-based approach for Devanagari HCR," Journal of Advanced CS and App. vol. 8, no. 6, pp. 303-309, 2017.
S. Mittal, S. Kumar, and S. Bhatia’s, Paper “Devanagari script recognition using deep CNN," International Journal of Computer Applications, vol. 156, no. 4, pp. 28-34, 2017.
N. Aggarwal, S. Kumar, and A. Jain, "A review on Devanagari Handwritten Character Recognition using Deep Learning," International Journal of Computer Science and Information Security, vol. 16, no. 3, pp. 80-88, 2018.
A. Kumar and A. Kumar, "Devanagari Handwritten Character Recognition using Convolutional Neural Networks," in Proceedings of the International Conference on Computing, Communication and Automation, 2016, pp. 480-485.
S. Phadikar and In P.Roy's article "A Complete Review of Handwritten Devanagari Character Recognition Methods," published in International Journal of Machine Learning and Computing, vol.3, no. 1, pp. 9-14, 2013.
Joshi, D., Saini, P., & Sharma, D. (2021). A Comprehensive Study on Devanagari Handwritten Character Recognition. International Journal of Recent Technology and Engineering, 9(1), 5311-5316.
Prasad, S., & Subramanian, K. (2017). Devanagari HCR Using CNN. International paper of Computer software and Applications, 176(4), 22-26.
Kumar, S., & Gupta, S. K. (2019). DL based Handwritten Devanagari Character Recognition. International Journal of Computer software and applications, 182(17), 1-6.
Singh, N., & Vyas, S. (2019). HDCR using CNN. Journal of Research in CSE and Information Technology, 5(1), 453-458.
Bajaj, N., Singh, N., & Garg, R. (2021). Handwritten Devanagari Character Recognition using Convolutional Neural Network with Augmented Dataset. International Journal of Artificial Intelligence and Machine Learning, 13(1), 58-66.
Kumar, P. (2021). A Proposed Methodology to Mitigate the Ransomware Attack. In Recent Trends in Intensive Computing (pp. 16-21). IOS Press.
Salunke, M., Kabra, R., & Kumar, A. (2015). Layered architecture for DoS attack detection system by combined approach of Naive Bayes and Improved K-means Clustering Algorithm. International Research Journal of Engineering And Technology, 2(3), 372-377.
Salunke, M. D., & Kabra, R. (2014). Denial-of-service attack detection. International Journal of Innovative Research in Advanced Engineering, 1(11), 16-20.
Salunke, M. D., Kumbharkar, P. B., & Kumar, S. (2020). Proposed Methodology to Prevent a Ransomware Attack. International Journal of Recent Technology and Engineering (IJRTE), 9(1), 2723-2725.
Salunke M. D., Dr. Kumbharkar P. B., Dr. Yogesh Kumar Sharma. (2020). A Proposed Methodology to Detect a Ransomware Attack using Deception Technique. International Journal of Advanced Science and Technology, 29(3), 10532 -. Retrieved from http://sersc.org/journals/index.php/IJAST/article/view/27134
Telshinge, M. P. R., & Salunke, M. M. D. Un-Compromised Credibility: Social Media based Multi-Class Hate Speech Classification for Text: A Review.
Deshpande, P., Joshi, P., Madekar, D., Pawar, P., & Salunke, M. (2020). A Survey On: Classification of Twitter data Using Sentiment Analysis. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 5(3), 34-37. Retrieved from https://asianssr.org/index.php/ajct/article/view/911
Rathod, S. ., Salunke, M. D. ., Yashwante , M. ., Bhende , M. ., Rangari, S. R. ., & Rewaskar, V. D. . (2023). Ensuring Optimized Storage with Data Confidentiality and Privacy-Preserving for Secure Data Sharing Model Over Cloud. International Journal of Intelligent Systems and Applications in Engineering, 11(3), 35–44. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/3140
Rathod, S. G., Salunke, M. D., Jadhav, H. B., Ajalkar, D. A., Banurao, D., & Satre, D. B. Role Based Secure Data Access Control for Cost Optimized Cloud Storage Using Data Fragmentation While Maintaining Data Confidentiality. computing, 4(5), 38.
Sonawane, P., Kardile, A., Lagad, K., Pati, V., & Salunke, M. D. (2021). A Survey on Machine Learning Approach for Classification of Breast Cancer. INTERNATIONAL JOURNAL, 5(12).
Deshapnde, P., Joshi, P., Pawar, P., Madekar, D., & Salunke, M. D. (2019). A Survey On: Sentiment Analysis framework of Twitter data Using Classification. Asian Journal For Convergence In Technology (AJCT) ISSN-2350-1146, 5(3), 118-122.
Rathod, S., Khobragade, R. N., Thakare, V. M., Walse, K. H., & Pawar, S. (2022, September). Model for Efficient Data Storage on Public Cloud. In 2022 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS) (pp. 1-5). IEEE.
S. Rathod, R. N. Khobragade, V. M. Thakare, K. H. Walse and S. Pawar, "Lightweight Auditable Secure Cloud Storage With Privacy Enabled Data Storage Optimization," 2022 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS), Pune, India, 2022, pp. 1-6, doi: 10.1109/ICBDS53701.2022.9935980.
Rathod, S., Bagal, P., Gujar, R., Hannure, A., & Waghulde, D. (2021). Smart Helmet for Detection of Unsafe Events in Mining Industy Based on IoT (No. 5799). EasyChair.
Pawar, M. S., & Rathod, S. (2020). Text summarization using cosine similarity and clustering approach. Int J Curr Eng Technol, 8, 669-673.
Rathod, S., Khobragade, R. N., Thakare, V. M., Walse, K. H., & Pawar, S. (2022, September). Model for Efficient Data Storage on Public Cloud. In 2022 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS) (pp. 1-5). IEEE.
Rathod, S. G. (2022). Security for Shared Data Over Public Cloud for Maintaining Privacy. Mathematical Statistician and Engineering Applications, 71(4), 7167-7173.
Rana, P. ., Sharma, V. ., & Kumar Gupta, P. . (2023). Lung Disease Classification using Dense Alex Net Framework with Contrast Normalisation and Five-Fold Geometric Transformation. International Journal on Recent and Innovation Trends in Computing and Communication, 11(2), 94–105. https://doi.org/10.17762/ijritcc.v11i2.6133
María, K., Järvinen, M., Dijk, A. van, Huber, K., & Weber, S. Machine Learning Approaches for Curriculum Design in Engineering Education. Kuwait Journal of Machine Learning, 1(1). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/111
Mehraj, H., Jayadevappa, D., Haleem, S. L. A., Parveen, R., Madduri, A., Ayyagari, M. R., & Dhabliya, D. (2021). Protection motivation theory using multi-factor authentication for providing security over social networking sites. Pattern Recognition Letters, 152, 218-224. doi:10.1016/j.patrec.2021.10.002
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.