Bounded Box-Zoning Integrated Approach For Children Handwriting Recognition
This study focuses on recognizing handwritten character datasets of children through the integration of image processing and machine learning. The bounding box, one of the best structural feature extraction methods, has demonstrated high performance in the optical character recognition (OCR) pipelin...
| Main Author: | Qausbee, Nik Nur Adlin Nik |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2024
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/62282/ |
| Abstract | Abstract here |
Similar Items
Enhanced and automated approaches for fish recognition and classification system
by: Samma, Ali Salem Ali
Published: (2011)
by: Samma, Ali Salem Ali
Published: (2011)
Similarity Segmentation Approach For Sensor-Based Human Activity Recognition
by: Baraka, Abdulrahman M. A.
Published: (2024)
by: Baraka, Abdulrahman M. A.
Published: (2024)
Static Hand Gesture Recognition Using Haar-Like Features
by: Wong, Kai Sin
Published: (2015)
by: Wong, Kai Sin
Published: (2015)
Smart Child Portal: User Requirements For Children‟S Portal
by: Basim Obaid N, Althagfi
Published: (2010)
by: Basim Obaid N, Althagfi
Published: (2010)
Improvement Of Facial Recognition Accuracy Using Eye-Lids Movement And Tensorflow Model
by: Sukri, Syazwan Syafiqah
Published: (2021)
by: Sukri, Syazwan Syafiqah
Published: (2021)
Enhanced Conditional Generative Adversarial Network For Handling Subject Variability In Human Activity Recognition
by: Jimale, Ali Olow
Published: (2023)
by: Jimale, Ali Olow
Published: (2023)
Fusion Of Global Shape And Local Features Using Multi Classifier Framework For Object Class Recognition
by: Manshor, Noridayu
Published: (2013)
by: Manshor, Noridayu
Published: (2013)
A Framework For Automatic Code Switching Speech Recognition With Multilingual Acoustic And Pronunciation Models Adaptation
by: Ahmed, Basem H. A.
Published: (2014)
by: Ahmed, Basem H. A.
Published: (2014)
An Approach For Detection Of Logical Inconsistency
by: Yadav, Rinki
Published: (2012)
by: Yadav, Rinki
Published: (2012)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
A Visual Approach For Requirement Traceability
by: Madaki, Abdulkadir Ahmad
Published: (2022)
by: Madaki, Abdulkadir Ahmad
Published: (2022)
Keyword Competition Approach In
Ranked Document Retrieval
by: Sihombing, Poltak
Published: (2010)
by: Sihombing, Poltak
Published: (2010)
Integrated Framework For Secure Distributed Management Of
Duplicated Ipv6 Address Detection
by: Ul Rehman, Shafiq
Published: (2017)
by: Ul Rehman, Shafiq
Published: (2017)
Enhancing Efficientnet-Yolov4 For Integrated Circuit Detection On Printed Circuit Boards
by: Tay, Shiek Chi
Published: (2024)
by: Tay, Shiek Chi
Published: (2024)
An Ontology And Constraint-based Approach For Dynamic Personalised Planning In Healthcare
by: Mahiddin , Normadiah
Published: (2009)
by: Mahiddin , Normadiah
Published: (2009)
Multimodal Semantics Integration Using Ontologies Enhanced By Ontology Extraction And Cross Modality Disambiguation
by: Shareha, Ahmad Adel Ahmad Abu
Published: (2012)
by: Shareha, Ahmad Adel Ahmad Abu
Published: (2012)
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
Feature Selection Method Based On Hybrid Filter-Metaheuristic Wrapper Approach
by: Jothi, Neesha
Published: (2020)
by: Jothi, Neesha
Published: (2020)
An expansionary approach for the allocation of next generation ipv6 internet addresses.
by: Murugesan, Raja Kumar
Published: (2011)
by: Murugesan, Raja Kumar
Published: (2011)
Multimodal Sentiment Analysis Of Social Media Through Deep Learning Approach
by: An, Jieyu
Published: (2024)
by: An, Jieyu
Published: (2024)
Genogram Visualization Using Social Network Approach For Medical Family Tree
by: Bokhare, Siti Fatimah
Published: (2018)
by: Bokhare, Siti Fatimah
Published: (2018)
Medical Image Modality Classification using Feature Weighted Clustering Approach.
by: Chandra, Bhavik Anil
Published: (2010)
by: Chandra, Bhavik Anil
Published: (2010)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013)
by: Anbar, Mohammed F.R.
Published: (2013)
Behavioural Factors Based Crowd
Evacuation Modelling Using
Fuzzy-Neural Approach
by: Zakaria, Wahida
Published: (2020)
by: Zakaria, Wahida
Published: (2020)
Multi-View Retrieval Of Software Design Specifications Using Similarity Assessment Approach
by: Adamu, Alhassan
Published: (2017)
by: Adamu, Alhassan
Published: (2017)
A Machine Learning Approach To Evaluate The Security Of Ultra-lightweight Block Ciphers
by: Lee, Ting Rong
Published: (2021)
by: Lee, Ting Rong
Published: (2021)
Acltshe-Amts: A New Adaptive Brain Tumour Enhancement And Segmentation Approaches
by: Alkhafaji, Ali Fawzi Mohammed Ali
Published: (2024)
by: Alkhafaji, Ali Fawzi Mohammed Ali
Published: (2024)
Software Model Checking For Distributed Applications Using Hybridization Of Centralization And Cache Approaches
by: Hing, Ratana
Published: (2024)
by: Hing, Ratana
Published: (2024)
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: A. Alia, Mohammad Ahmad
Published: (2008)
by: A. Alia, Mohammad Ahmad
Published: (2008)
A new approach based on honeybee guarding system to improve intrusion detection system.
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
Anchor Point Approach For Initial
Population Of Bat Algorithm For
Protein Multiple Sequence Alignment
by: Boraik Ali, Aziz Nasser
Published: (2016)
by: Boraik Ali, Aziz Nasser
Published: (2016)
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
Heuristic Based Planning Approach For
Improving Wireless Network Coverage Of Multi-Storey Building
by: Yeong, Shoa Yei
Published: (2011)
by: Yeong, Shoa Yei
Published: (2011)
White-Matter Lesion Segmentation In Brain Mri Using Adaptive Trimmed Mean Approach
by: Ong , Kok Haur
Published: (2011)
by: Ong , Kok Haur
Published: (2011)
A Hybrid Multi-Tier Approach For Iot Botnet Detection And Enhanced Risk Assessment
by: Ali, Mashaleh Ashraf Sulieman
Published: (2025)
by: Ali, Mashaleh Ashraf Sulieman
Published: (2025)
Integration Of Fit And Viability In Cloud Enterprise Resource Planning Adoption Among Micro Small And Medium Enterprises In Egypt
by: Amer, Salma Mohamed Elsayed Hassan
Published: (2024)
by: Amer, Salma Mohamed Elsayed Hassan
Published: (2024)
New Fuzzy Parametric Linear Programming Approaches For Optimising The Performance Of Crude Oil Companies In Iraq
by: Jasim, Al Saeedi Rafid Abdulmahdi
Published: (2023)
by: Jasim, Al Saeedi Rafid Abdulmahdi
Published: (2023)
Similar Items
-
Enhanced and automated approaches for fish recognition and classification system
by: Samma, Ali Salem Ali
Published: (2011) -
Similarity Segmentation Approach For Sensor-Based Human Activity Recognition
by: Baraka, Abdulrahman M. A.
Published: (2024) -
Static Hand Gesture Recognition Using Haar-Like Features
by: Wong, Kai Sin
Published: (2015) -
Smart Child Portal: User Requirements For Children‟S Portal
by: Basim Obaid N, Althagfi
Published: (2010) -
Improvement Of Facial Recognition Accuracy Using Eye-Lids Movement And Tensorflow Model
by: Sukri, Syazwan Syafiqah
Published: (2021)
