期刊文献+

基于BP神经网络的手写体数字的识别方法研究 被引量:2

Research of Handwritten Number Recognition Method Based on Neural Network Algorithm
原文传递
导出
摘要 对手写体数字的识别问题进行了讨论,提出一种基于BP神经网络的识别方法.从而提高了识别效率.主要就在识别时,数字在图片上的位置和数字本身大小方面做了改进,发现数字在图片上的大小和其在图片上的位置直接影响识别效果.具体做的是,首先提取了图片的轮廓,然后归一化成28×28的图像.这样做,不仅使得图像数字区域大小相同,而且都在图像中心上,使得识别结果变的更加理想化,达到了高识别的目的.另外,选择了容错性较好的BP网络,以200组手写体数字图像作为输入向量,以其他的110组进行识别,效率达到了90%. In this paper, we talk about the issue of handwritten numeral recognition, and proposes an identification method based on BP neural network. What we do is to change the location and size in the picture. We found that, they both directly affect picture reeognition effect. This paper is, firstly extracted the contour of the number, and then normalize them into the picture of. To do so, not only makes the image region the same size, but also in the image center. This makes the recognition more ideal, to achieve high identification purposes. In addition, we choose BP network with better tolerance, and 200 groups of handwritten digital image as the input vector, 110 groups of of the other as recognition, the efficiency reached more than 90%.
机构地区 中北大学理学院
出处 《数学的实践与认识》 CSCD 北大核心 2014年第7期112-116,共5页 Mathematics in Practice and Theory
基金 2013年国家自然科学研究基金(61275120)
关键词 手写体数字 BP神经网络 字符识别 Handwritten number BP neural network character recognition
  • 相关文献

参考文献5

二级参考文献12

  • 1林昭文,王鲲鹏,马严.IPv6入侵检测系统性能优化的研究与实现[J].通信学报,2006,27(z1):68-71. 被引量:2
  • 2[1]Mark Crosbie,Eugene Spafford.Defending a computer system using autonomous agents[C]//Proceedings of the 18th National Information System Security Conference.USA:[s.n.],1995:549-558.
  • 3[2]Stefan Savage,David Wetherall,Anna Karlin,et al.Practical network support for IP traceback[C]//Proceedings of ACM SIGCO-MM' 00.Sweden:[s.n.],2000.
  • 4[3]Bishop M.A standard audit trail format[C]//Proceedings of the 18th National Information Systems Security Conference.USA:[s.n.],1995:136-145.
  • 5[4]FIPA.ACL message structure specification[EB/OL].2001.http://www.fipa.org/specs/fipa00061.
  • 6[5]Peddireddy T D,Vidal J M.Multiagent network security system using FIPA-OS[C] //Proceedings of the second international joint conference on autonomous agents and multiagent systems.Melbourne:[s.n.],2003.
  • 7[6]Du Ye,Wang Huiqiang,Pang Yonggang.A useful system prototype for intrusion detection-Architecture and experiments[C]//Proceedings of Discovery Science 2004.Padova:[s.n.],2004:388-395.
  • 8[7]Du Ye,Wang Huiqiang,Pang Yonggang.IADIDF:A framework for intrusion detection[C] // Proceedings of Grid and Cooperative Computing.Wuhan:[s.n.],2004:895-898.
  • 9[8]Undy M.TCPReplay manual[EB/OL].2002.http://packetstorm.widexs.nl/UNIX/IDS/nidsbench/tcpreplay.html.
  • 10Cheekiralla S, Engels D W. An IPv6-Based Identification Scheme[C]//}roc. of IEEE International Conference on Communications. [S. l.]: IEEE Press, 2006: 281-286.

共引文献8

同被引文献8

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部