Corresponding Author: The Key Laboratory of Fiber Optic Sensing Technology and Information Processing, Ministry of Education, Wuhan University of Technology, Wuhan, China. (jieyang509@163.com).
Yadong, Sun
The Key Laboratory of Fiber Optic Sensing Technology and Information Processing, Ministry of Education, Wuhan University of Technology, Wuhan, China (shunhm_baby@sohu.com).
Liangjun, Zhang
The Key Laboratory of Fiber Optic Sensing Technology and Information Processing, Ministry of Education, Wuhan University of Technology, Wuhan, China (shunhm_baby@sohu.com).
Qingnian, Zhang
School of Transportation, Wuhan University of Technology, Wuhan, China. (616024597@qq.com).
Although digit character recognition has got a significant improvement in recent years, it is still challenging to achieve satisfied result if the data contains an amount of distracting factors. This paper proposes a novel digit character recognition approach using a multi-layer hierarchical model, Hybrid Restricted Boltzmann Machines (HRBMs), which allows the learning architecture to be robust to background distracting factors. The insight behind the proposed model is that useful high-level features appear more frequently than distracting factors during learning, thus the high-level features can be decompose into hybrid hierarchical structures by using only small label information. In order to extract robust and compact features, a stochastic 0-1 layer is employed, which enables the model’s hidden nodes to independently capture the useful character features during training. Experiments on the variations of Mixed National Institute of Standards and Technology (MNIST) dataset show that improvements of the multi-layer hierarchical model can be achieved by the proposed method. Finally, the paper shows the proposed technique which is used in a real-world application, where it is able to identify digit characters under various complex background images.
Digit character recognition is an important research field in computer vision, and it also has been used as a test case for theories of machine learning and pattern recognition algorithm in recent years. Devising model of real-world digit character especially handwritten digit is challenging because characters usually have distortion, variations, and various cluttered backgrounds. One fundamental difficulty in learning the model is to deal with significant noise and clutter background factors. Learning meaningful features of digit character is a crucial step towards building general system that can be easily employed in higher level tasks such as identity verification [1], digital signature [2], and converting subtitle data into text format [3].Many researches have been concerned with the recognition of digit characters and some high accuracy algorithms have been proposed. Choi et al. [4] presented a novel 3D stroke reconstruction algorithm based on a magnetometeraided inertial measurement unit, which is able to estimate the orientation under both static and dynamic conditions for character recognition. Akhtar et al. [5] used a wavelet analysis technique for handwritten digit recognition. Entropy feature was computed in the method. Deselaers et al. [6] proposed latent log-linear models which was an extension of log-linear models incorporating latent variables. Sobel features were extracted in this algorithm. These algorithms used low level representation of raw data for digit character recognition. Low level feature representations have great success in many visual recognition problems, yet there has been a growing body of work suggesting that the approach of using only low level feature representations may be insufficient to represent more high-dimensional, complex data [7]. Instead, some researches focused on training deep, multi-layered networks and proposed the algorithms using not only low level feature representation, but also high level feature representation from raw data.Cecotti et al. [8] proposed a radial neural convolutional architecture to extract higher level features for multioriented character recognition. The classifier of this method included the Fast Fourier Transform for extracting shift invariant features at the neural network level. Phan et al. [9] proposed hierarchical sparse auto-encoder architecture and used linear regression-based features in clustering for handwritten digit recognition. Their algorithm achieved 1.87% error rates on the Mixed National Institute of Standards and Technology (MNIST) handwritten character recognition dataset. Lee et al. [10] presented a convolutional deep belief network model and trained with unlabeled data. Another contribution of the paper was probabilistic max-pooling, a novel technique which shrinked the representations of higher layers in a probabilistically sound way. The recognition error rate of the model was 0.82% on the MNIST handwritten digits dataset. Ciresan et al. [11] proposed convolutional neural network committees for handwritten character recognition. Their algorithm simply adopted average individual committee member outputs and obtained 0.27% error rate on the MNIST dataset. Lately, they proposed multi-column deep neural networks and trained using standard gradient descent method for handwritten digit classification [12]. The recognition error rate record dropped to 0.23% on the MNIST handwriting digit dataset. These algorithms used neural networks model and achieved good performance on the Standard MNIST digit dataset.Currently, neural networks are among the most suitable architectures for digit recognition which seem to benefit unsupervised learning algorithms applied to the input data. Yet, it is still challenging to correctly recognize digit characters when the data contains an amount of distracting factors.In this paper, a multi-layer hierarchical model based on neural network is proposed by using Hybrid Restricted Boltzmann Machines (HRBMs) for digit character recognition. The model combines double Restricted Boltzmann Machine (RBM) to learn character features and background clutter and finds robust latent features of both that lead to improvement in recognition performance. The families of Restricted Boltzmann Machine (RBM) model [13] have been shown good results on the speech recognition [14], learning movement patterns [15] and facial expression tasks [16].In the proposed model, the HRBMs’ hidden layer is decomposed into an inheritance hierarchy of two classes based on the scores of each node’s activation values and times. By the hierarchical structure, the model can successfully learn the statistical structure of the character’s features with the label data. Furthermore, the multiplicative interaction and 0-1 layer are used to induce HRBMs’ parameters over the input layer. HRBMs can be seen as an extended RBM. Training the model means adjusting model’s parameters such that the probability distribution of the machine representing fits the training data as well as possible. It differs from the existing neural network methods. The model uses a small amount of labeled data and transfers the label information to the data features and 0-1 nodes information through the hierarchical hidden layer, which makes the learned features more compact and efficient to recognize. Finally, the proposed method is evaluated on the Variations of MNIST dataset [17] which contains various cluttered backgrounds in the digit images.
2. Model Description
In this section, the HRBMs model is presented. Specifically, Section 2.1 supplies the general idea of the model, Section 2.2 indicates the pre-training process, and Section 2.3 provides how the proposed model works.
- 2.1 Overview of the model
The existing models have been concerned with the recognition of digit characters. For example, Nair et al. [18] proposed implicit mixtures of Restricted Boltzmann Machine, which employed a single component to describe the input data. The key insight of the proposed method is that the mixture model can be cast as a third-order Boltzmann machine. However, it sensitive to the noise in the complex input data.Vincent et al. [19] proposed a denoising autoencoders model, which based on the idea of making the learned representations robust to partial corruption of the input data. The modeling idea means that the proposed model is only robust to small irrelevant changes for input data.In this paper, the proposed model can be formulated as a generative digit character feature learning model, called HRBMs. Firstly, a standard RBM is trained in an unsupervised learning way, which creates an initial set of hidden nodes. With the pre-training process, these hidden nodes can be seen as hybrid layer, which contains useful character features and background clutter features. Secondly, based on the scores of each hidden node’s activation values and times, the hidden nodes are decomposed in hierarchical structures with feature nodes and clutter nodes, which provides an initialization of the HRBMs model. Thirdly, the pixel-wise HRBMs will be trained by using label information and stochastic 0-1 nodes through multiplicative interaction.The proposed model can be represented in Fig. 1. The structure of the HRBMs can be seen as hybrid graphical model with two combined RBMs for robust feature learning. The model is a multi-layer hierarchical model, which includes 0-1 layer, input layer, hidden layer, and label layer. More specifically, the 0-1 layer is used to induce the HRBMs’ parameters over the input data; the input layer is used to input the digit character data, which contains amounts of distracting factors; the hidden layer is used to extract features from the input layer, which includes the feature nodes and clutter nodes; the label layer is used to input the label digit character data, which can be used for supervised training.
The graphical framework of HRBMs with the multi-layer hierarchical structure
- 2.2 Preprocessing with RBM
The RBM is an undirected probabilistic graphical model, i.e., a particular form of log-linear Markov Random Field. The nodes of an RBM are usually Bernoulli distributed [20], but if the mean field approximation is employed, the nodes may follow any exponential family distribution. The structure of an RBM is a fully connected bipartite graph and no connections between nodes in the same layer. Thus, one group of nodes (input nodes v) models the data and the other group of nodes (hidden nodes h) models the latent structure of the data.Since an RBM is a special case of a Markov Random Field, the joint distribution over all nodes is given by a Boltzmann distribution that is specified by the energy function E(v, h; θ_{R}). The most common choice for the energy function is a linear function of the states of the input and hidden nodes. The energy function is given by:
PPT Slide
Lager Image
where θ_{R} = {W, b, c} are the model parameters, and v_{i} ∈{0,1} , h_{j} ∈{0,1} . The probability distribution of the configuration P(v,h ;θ )_{R} is defined as:
PPT Slide
Lager Image
PPT Slide
Lager Image
where Z(θ)_{R} is the partition function which ensures that the distribution is valid. Noting that the states of the input nodes are conditionally independent given the states of the hidden nodes and vice versa, it can easily be seen that the linear energy function leads to conditional probabilities P(v_{i} =1|h) and P(h_{j} =1| v) that are given by the sigmoid function of the input into a node:
PPT Slide
Lager Image
PPT Slide
Lager Image
The detail process of the derivation can be found in the reference [13]. The basic idea underlying RBM architecture is that the hidden nodes of a trained RBM can be viewed as learned features of the input nodes. From this perspective, posterior P(h_{j} =1| v) is interpreted as a relevant representation for the input nodes. To avoid computing these distributions, Gibbs operator is employed to sample from the posterior. Fig. 2 shows the activations of 100 samples data on 1500 RBM hidden nodes. In general, when training RBM, data visualization is needed to show what the nodes compute in a layer space. The goal of data visualization is to have an efficient way of adjusting model’s parameters, and to make the model as intuitive as possible.
In order to effectively deal with complex cluttered backgrounds, it is desirable for a digit recognition algorithm to extract the useful digit characters information from the background clutter. To address this problem, the HRBMs’ hidden layer is decomposed with two classes of RBM’s hidden layer, where each class can extract the corresponding character or clutter feature.The main process can be described as:
1) The hidden nodes are divided into the feature nodes (h1) and clutter nodes (h2), and each RBM defines a distinct distribution over the input nodes
2) The 0-1 nodes are determined by the input nodes and the two RBMs’ hidden nodes.
3) The type of input pixel information (character or clutter) is determined by the 0-1 nodes.
The HRBMs’ hidden layer is decomposed into two classes based on the scores of each node’s activation values and times after a standard RBM is trained. The score functions of HRBMs hidden nodes are defined as:
PPT Slide
Lager Image
PPT Slide
Lager Image
PPT Slide
Lager Image
where W_{ij} is the HRBMs weights, y_{k} is label information. Eq. (6) is used to compute the activation values for each hidden node. Eq. (7) is used to determine the node whether it is activated. In (7), Wj records each hidden node’s activated (w) and non-activated (
PPT Slide
Lager Image
) state information, which includes the respective means (
PPT Slide
Lager Image
,
PPT Slide
Lager Image
) and standard deviations ( σ_{1} , σ_{2} ) corresponding to the activated and non-activated state. Eq. (8) is used to compute the score for each hidden node according to the activated and nonactivated values and times. Thus, according to the score of each hidden node, the HRBMs hidden layer is initialized by the feature nodes and clutter nodes.For each input node v_{i} , HRBMs contain a binary 0-1 node, denoted s_{i} ∈{0,1}. Furthermore, HRBMs use pixelwise multiplicative interaction between the 0-1 nodes and input nodes during training. In this case, the energy function and the joint distribution of the HRBMs are defined as:
PPT Slide
Lager Image
PPT Slide
Lager Image
Since the model can be interpreted as a stochastic neural network, the input nodes, hybrid hidden nodes, and 0-1 nodes are conditionally independent given the other two types of nodes. The hidden layer conditional probability distributions can be independently taken the form:
PPT Slide
Lager Image
PPT Slide
Lager Image
The conditional probability distribution over the 0-1 nodes can be determined as:
PPT Slide
Lager Image
Eq. (13) means that s_{i} is achieved by the alternating competition between the two hybrid RBMs’ hidden nodes based on the matching between input nodes and the reconstructed input nodes. The reconstructed input nodes can be computed as:
PPT Slide
Lager Image
For classification, a non-linear classifier is trained by using the two RBMs’ hidden nodes and label information as inputs. Since the computation of (11) to (14) is intractable, the alternating Gibbs sampling is employed to the above conditional distributions, due to the alternating Gibbs sampling is much more efficient than standard Gibbs sampling. The detail process of the algorithm can be described as follows.In positive learning phase, the model iterates over (11) to (13) and samples h^{1} , h^{2} , and s . In the negative learning phase, it iterates over (11) to (14) and samples reconstruction
PPT Slide
Lager Image
,
PPT Slide
Lager Image
,
PPT Slide
Lager Image
and s′ . When computing the gradient of the log-likelihood of training data, the contrastive divergence approximation is used to approximate the gradient. The algorithm for HRBMs is outlined in Algorithm 1.
PPT Slide
Lager Image
The proposed model has several key advantages:
1) The model optimizes both characters’ features and clutter property simultaneously by decomposing the hidden layer nodes, which makes the learned features better discriminative ability.
2) Stochastic 0-1 nodes allow the HRBMs’ hidden nodes to independently extract the important features which are observed within the corresponding feature type, leading to the learned features more compact.
These advantages benefit from the hierarchical structure and make the model having a good adaptive ability to robustly extract useful features from significant noise and clutter background factors.
3. Experiments and Results
The effectiveness of the HRBMs is evaluated on the Variations of MNIST dataset. The dataset includes 3 types of images. More specifically, the first one is mnist-backrand dataset, in which a random background was inserted in the digit image; the second one is mnist-back-image dataset, in which a patch from a black and white image was used as the background for the digit image; and the last one is mnist-rot-back-image dataset, in which the perturbations used in mnist-rot and mnist-back-image were combined. Each dataset has 10000 training images, 2000 validation images, and 50000 testing images. Fig. 4(a), Fig. 5(a), and Fig. 6(a) show the three types noisy images, respectively.
HRBMs are trained with two groups of 750 hidden nodes, and initialized with the pre-trained Standard RBM using 1500 hidden nodes. The alternating Gibbs sampling and contrastive divergence are used for posterior inference and approximate gradient respectively in all experiments.Fig. 3 shows the original input digit images containing the three type cluttered backgrounds and the reconstructed input data performed by HRBMs. More specifically, Fig. 3(a) shows the original data images. Fig. 3(b)-(e) show the reconstructed results for the input digit images with sampling 500, 1000, 5000, and 10000, respectively. It can be seen that the proposed method allows the model to be robust to significant noise and clutter background factors
The original digit images and the reconstructed input data performed by the proposed model: (a) Original images; (b)-(e) Reconstructed input data with sampling 500, 1000, 5000, and 10000.
Fig. 4(b)-(c), Fig. 5(b)-(c), and Fig. 6(b)-(c) demonstrate the visualization of trained weights of RBM and HRBMs on the Variations of MNIST dataset. More specifically, Fig. 4(b)-(c) show the trained weights from the mnist-back-rand dataset. It can be seen that the RBM extract features not only including meaningful pen stroke features but also having random clutter features. While the HRBMs’ hidden nodes extract the features which are mostly can be seen as useful pen stroke features. Obviously, the trained weights of HRBMs are more compact and correlated with each other than RBM. The similar pattern appears in Fig. 5(b)- (c) and Fig. 6(b)-(c). In Fig. 5(b), RBM extracts the features not only including useful pen stroke features but also having patch features. These patch features will reduce the recognition performance. It is worth noting that Fig. 6(b)-(c) visualize the trained weights from the mnist-rotback- image dataset. Although the digits are rotated by an angle generated uniformly between 0 and 2π radians, HRBMs capture the pen stroke features still maintaining compact which consistent with the features of Fig. 4(c) and Fig. 5(c). Particularly, the visualization of trained weights seems curve strokes. This helps higher representations extracted from HRBMs are better than RBM.These suggest that the HRBMs model can effectively separate the useful character features from the noisy or distracting backgrounds. For comparison, test recognition error is introduced to evaluate the model quantitatively. Table 1 summarizes the performances of different methods. Our proposed method achieves 4.45%, 10.19%, and 40.33% errors rate on the three types of dataset, respectively. It can be seen that the proposed method obtains the best score in 2 and the second best in 1 out of the 3 type cluttered background datasets. These results show that the proposed HRBMs model is more effective for cluttered background digit character recognition compared to other methods.
Fig. 7 shows the results of digit character recognition performed by the proposed method on the digit images with various complex cluttered backgrounds. These cluttered backgrounds include rand background, patch background, and rot digit with patch background. It can be seen that all the digit characters are correctly recognized by the proposed method.
Digit recognition results based on various background images
4. Conclusion
In this paper, a new digit character recognition method is proposed, which can effectively extract useful features from data containing complex distracting factors. In the preprocessing, HRBMs’ hidden layer is decomposed with two classes to build a hybrid hierarchical structure, which can induce independently stroke features and clutter property from the input data. Furthermore, HRBMs employ the pixel-wise multiplicative interaction between the 0-1 nodes and input nodes during training, which can be useful in improving the recognition performance. The proposed model is evaluated on the Variations of MNIST dataset and shows superior performance compared to other methods. Results on the digit recognition experiments with three types cluttered backgrounds showed that the efficiency of HRBMs. It is believed that the proposed method will be appealing in building a robust algorithm that can learn from complex data. In the future, the authors will plan to extend HRBMs to deep network, where the stack neutral network on the top of HRBMs will be applied. The authors also plan to explore HRBMs for other tasks, such as segmentation and large image recognition.
This is an Open-Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/3.0/)which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
Acknowledgements
The authors are grateful for the support from the National Science Foundation of China (51479159) and the Soft Science Project of China’s Ministry of Transport (2013-322-811-470).
BIO
Jie Yang was born in Wuhan, China, in 1960. She received her BS degree in Communication Engineering from XiDian University, China, in 1982 and MS degree in Computer and Automation from Wuhan Transportation University, China, in 1988. She received Ph.D. degree in Electronic Engineering from the Shanghai Jiao Tong University, China, in 1999. She has been a Professor of School of Electronics and Information at Wuhan University of Technology since 1999. Her current research interests include computer vision and pattern recognition, information transmission theory and application.
Yadong Sun was born in Shandong, China, in 1977. He received his BS degree in Electronic Information Engineering from Air Force Engineering University, China, in 2000 and MS degree in Signal and Information Processing from Wuhan University of Technology, China, in 2007. He is currently a PHD candidate in Information and Communication Engineering in Wuhan University of Technology, Wuhan, China. His current research includes signal processing on image and computer vision.
Liangjun Zhang was born in Jiangsu, China, in 1987. He received his BS degree in Electronic Information Engineering from Wuhan University of Technology, China, in 2009 and MS degree in Signal and Information Processing in 2012. He is currently a PHD candidate in Information and Communication Engineering in Wuhan University of Technology, Wuhan, China. His current research includes signal processing on image and passive radar, and blind signal processing.
Qingnian Zhang received his BS degree in Design and manufacture of port machinery from Wuhan Institute of Water Transportation Engineering, China, in 1982 and MS degree in Transportation management engineering from Wuhan Transportation University, China, in 1988. He received Ph.D. degree in Machinery design and theories from the Wuhan University of Technology, China, in 2002. He has been a Professor of School of Transportation at Wuhan University of Technology since 2002. His current research interests include Traffic and transportation planning, Optimization and decision making of transportation system, Transportation safety management etc.
Wijnhoven R. G. J.
,
de With P. H. N.
2011
“Identity Verification Using Computer Vision for Automatic Garage Door Opening,”
IEEE Transactions Consumer Electron.
57
(2)
906 -
914
DOI : 10.1109/TCE.2011.5955239
Lee N. Y.
,
Ho P. H.
2003
“Digital Signature with a Threshold Subliminal Channel,”
IEEE Transactions Consumer Electron.
49
(4)
1240 -
1242
DOI : 10.1109/TCE.2003.1261223
Yildirim K. S.
,
Ugur A.
,
Kinaci A. C.
2007
“Design and Implementation of a Software Presenting Information in DVB Subtitles in Various Forms,”
IEEE Transactions Consumer Electron.
53
(4)
1656 -
1660
DOI : 10.1109/TCE.2007.4429266
Choi S. D.
,
Lee S. Y.
2012
“3D Stroke Reconstruction and Cursive Script Recognition with Magnetometeraided Inertial Measurement Unit”
IEEE Transactions Consumer Electron.
58
(2)
661 -
669
DOI : 10.1109/TCE.2012.6227474
Akhtar Muhammad Suhail
,
Qureshi Hammad A.
2013
“Handwritten Digit Recognition through Wavelet Decomposition and Wavelet Packet Decomposition,”
Proc. IEEE International Conference on Digital Information Management
Islamabad, Pakistan
143 -
148
Mittelman R.
,
Lee H.
,
Kuipers B.
,
Savarese S.
2013
“Weakly Supervised Learning of Mid-level Features with Beta-Bernoulli Process Restricted Boltzmann Machines”
Proc. IEEE International Conference Computer Vision and Pattern Recognition
Portland, OR, USA
476 -
483
Cecotti H.
,
Vajda S.
2013
“A Radial Neural Convolutional Layer for Multi-oriented Character Recognition,”
Proc. IEEE International Conference on Document Analysis and Recognition
Washington DC, USA
668 -
672
Phan H. T.
,
Duong A. T.
,
Le N. D. H.
,
Tran S. T.
2013
“Hierarchical Sparse Autoencoder Using Linear Regression-based Features in Clustering for Handwritten Digit Recognition,”
Proc. International Symposium on Image and Signal Processing and Analysis
Trieste, Italy
183 -
188
Lee H.
,
Grosse R.
,
Ranganath R.
,
Ng A. Y.
2009
“Convolutional Deep Belief Networks for Scalable Unsupervised Learning of Hierarchical Representations,”
Proc. International Conference on Machine Learning
Montreal, Canada
609 -
616
Ciresan D. C.
,
Meier U.
,
Gambardella L. M.
,
Schmidhuber J.
2011
“Convolutional Neural Network Committees for Handwritten Character Classification,”
Proc. IEEE International Conference on Document Analysis and Recognition
Beijing, China
1135 -
1139
Ciresan D. C.
,
Meier U.
,
Schmidhuber J.
2012
“Multicolumn Deep Neural Networks for Image Classification,”
Proc. IEEE Conference on Computer Vision and Pattern Recognition, Providence
RI, USA
3642 -
3649
Fischer A.
,
Igel C.
2012
“An introduction to restricted Boltzmann machines,”
Springer Berlin Heidelberg
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
14 -
36
Mohamed A. R.
,
Dahl G. E.
,
Hinton G.
2012
“Acoustic Modeling Using Deep Belief Networks,”
IEEE Trans. Audio, Speech, and Language Processing
20
(1)
14 -
22
DOI : 10.1109/TASL.2011.2109382
Taylor G. W.
,
Hinton G. E.
2009
“Factored Conditional Restricted Boltzmann Machines for Modeling Motion Style,”
Proceedings of the 26th Annual International Conference on Machine Learning
Montreal, Canada
1025 -
1032
Ranzato M.
,
Susskind J.
,
Mnih V.
,
Hinton G.
2011
“On Deep Generative Models with Applications to Recognition,”
Proc. IEEE Conference on Computer Vision and Pattern Recognition
Colorado Springs, USA
2857 -
2864
Vincent P.
,
Larochelle H.
,
Bengio Y.
,
Manzagol P. A.
2008
“Extracting and Composing Robust Features with Denoising Autoencoders,”
Proc. International Conference on Machine learning
Helsinki, Finland
1096 -
1103
Hinton G. E.
2002
“Training Products of Experts by Minimizing Contrastive Divergence,”
Neural Computation
14
(8)
1771 -
1800
DOI : 10.1162/089976602760128018
Rifai S.
,
Vincent P.
,
Muller X.
,
Glorot X.
,
Bengio Y.
2011
“Contractive Auto-encoders: Explicit Invariance During Feature Extraction,”
Proc. International Conference on Machine Learning
Bellevue, Washington, USA
833 -
840
Cheung B.
,
Sable C.
2011
“Hybrid Evolution of Convolutional Networks,”
Proc. IEEE International Conference Machine Learning and Applications and Workshops
Hawaii, USA
1
293 -
297
Citing 'Robust Multi-Layer Hierarchical Model for Digit Character Recognition
'
@article{ E1EEFQ_2015_v10n2_699}
,title={Robust Multi-Layer Hierarchical Model for Digit Character Recognition}
,volume={2}
, url={http://dx.doi.org/10.5370/JEET.2015.10.2.699}, DOI={10.5370/JEET.2015.10.2.699}
, number= {2}
, journal={Journal of Electrical Engineering and Technology}
, publisher={The Korean Institute of Electrical Engineers}
, author={Yang, Jie
and
Sun, Yadong
and
Zhang, Liangjun
and
Zhang, Qingnian}
, year={2015}
, month={Mar}
TY - JOUR
T2 - Journal of Electrical Engineering and Technology
AU - Yang, Jie
AU - Sun, Yadong
AU - Zhang, Liangjun
AU - Zhang, Qingnian
SN - 1975-0102
TI - Robust Multi-Layer Hierarchical Model for Digit Character Recognition
VL - 10
PB - The Korean Institute of Electrical Engineers
DO - 10.5370/JEET.2015.10.2.699
PY - 2015
UR - http://dx.doi.org/10.5370/JEET.2015.10.2.699
ER -
Yang, J.
,
Sun, Y.
,
Zhang, L.
,
&
Zhang, Q.
( 2015).
Robust Multi-Layer Hierarchical Model for Digit Character Recognition.
Journal of Electrical Engineering and Technology,
10
(2)
The Korean Institute of Electrical Engineers.
doi:10.5370/JEET.2015.10.2.699
Yang, J
,
Sun, Y
,
Zhang, L
,
&
Zhang, Q
2015,
Robust Multi-Layer Hierarchical Model for Digit Character Recognition,
Journal of Electrical Engineering and Technology,
vol. 2,
no. 2,
Retrieved from http://dx.doi.org/10.5370/JEET.2015.10.2.699
[1]
J Yang
,
Y Sun
,
L Zhang
,
and
Q Zhang
,
“Robust Multi-Layer Hierarchical Model for Digit Character Recognition”,
Journal of Electrical Engineering and Technology,
vol. 2,
no. 2,
Mar
2015.
Yang, Jie
Sun, Yadong
Zhang, Liangjun
et al.
“Robust Multi-Layer Hierarchical Model for Digit Character Recognition”
Journal of Electrical Engineering and Technology,
2.
2
2015:
Yang, J
,
Sun, Y
,
Zhang, L
,
Zhang, Q
Robust Multi-Layer Hierarchical Model for Digit Character Recognition.
Journal of Electrical Engineering and Technology
[Internet].
2015.
Mar ;
2
(2)
Available from http://dx.doi.org/10.5370/JEET.2015.10.2.699
Yang, Jie
,
Sun, Yadong
,
Zhang, Liangjun
,
and
Zhang, Qingnian
,
“Robust Multi-Layer Hierarchical Model for Digit Character Recognition.”
Journal of Electrical Engineering and Technology
2
no.2
()
Mar,
2015):
http://dx.doi.org/10.5370/JEET.2015.10.2.699