Computer Science ›› 2022, Vol. 49 ›› Issue (11): 148-155.doi: 10.11896/jsjkx.211200265

• Computer Graphics & Multimedia • Previous Articles     Next Articles

Handwritten Character Recognition Based on Decomposition Extreme Learning Machine

HE Yu-lin1,2, LI Xu1,2, JIN Yi3, HUANG Zhe-xue1,2   

  1. 1 College of Computer Science & Software Engineering,Shenzhen University,Shenzhen,Guangdong 518060,China
    2 Guangdong Laboratory of Artificial Intelligence and Digital Economy(SZ),Shenzhen,Guangdong 518107,China
    3 Department of Criminal Science and Technology,Criminal Investigation Police University of China,Shenyang 110854,China
  • Received:2021-12-23 Revised:2022-05-09 Online:2022-11-15 Published:2022-11-03
  • About author:HE Yu-lin,born in 1982,Ph.D,research associate,is a member of China Compu-ter Federation.His main research in-terests include big data approximate computing technologies,multi-sample statistics theories and methods,data mining and machine algorithms and applications.
  • Supported by:
    National Natural Science Foundation of China(61972261) and Basic Research Foundation of Shenzhen(JCYJ20210324093609026).

Abstract: Handwritten character recognition(HCR) is an important branch of image recognition,which recognizes the handwritten characters with the data mining and machine learning technologies.Currently,the HCR methods mainly focus on the improvements of different deep learning models,where the multiple-layer extreme learning machine(ML-ELM) has attracted the wide attention from the academia and industry due to its faster training speed and better recognition performance than deep belief net(DBN) and deep Boltzmann machine(DBM).However,the recognition performance of ML-ELM is severely influenced by the random weights when determining the input weights for each hidden-layer.This paper first proposes a decomposition ELM(DE-ELM) which is a shallow ELM training scheme based on the hidden-layer output matrix decomposition and then applies DE-ELM to deal with HCR problems,i.e.,handwritten digits in MNIST,handwritten digits and English letters in EMNIST,handwritten Japanese characters in KMNIST and K49-MNIST.In comparison with ML-ELM,DE-ELM reduces the randomness of ELM-based HCR model.Meanwhile,DE-ELM can obtain higher recognition accuracy than ML-ELM with the same training time and faster training speed than ML-ELM with the equal recognition accuracy.Experimental results demonstrate the feasibility and effectiveness of the proposed DE-ELM when dealing with HCR problems.

Key words: Handwritten character recognition, Extreme learning machine, Multiple layer extreme learning machine, Deep lear-ning, Feature extraction

CLC Number: 

  • TP391
[1]全国科学技术名词审定委员会术语在线 [EB/OL].[2020-12-20].https://www.termonline.cn/search?k=手写字符识别&r=1608 471572108.
[2]MUHAMMAND’ARIFMOHAMAD D N,HASSAN H,HA-RON H.A review on feature extraction and feature selection for handwritten character recognition [J].International Journal of Advanced Computer Science and Applications,2015,6(2):204-212.
[3]KUMAR M,JINDAL M K,SHARMA R K.k-nearest neighbor based offline handwritten Gurmukhi character recognition [C]//Proceedings of International Conference on Image Information Processing.IEEE,2011:1-4.
[4]SHANTHI N,DURAISWAMY K.A novel SVM-based handwritten Tamil character recognition system [J].Pattern Analysis and Applications,2010,13(2):173-180.
[5]PATEL C I,PATEL R,PATEL P.Handwritten character reco-gnition using neural network [J].International Journal of Scientific & Engineering Research,2011,2(5):1-6.
[6]SHRIDHAR M,BADRELDIN A.A high-accuracy syntacticrecognition algorithm for handwritten numerals [J].IEEE Transactions on Systems,Man,and Cybernetics,1985,1:152-158.
[7]LECUN Y,BOSER B,DENKER J S,et al.Backpropagation applied to handwritten zip code recognition [J].Neural Computation,1989,1(4):541-551.
[8]LECUN Y,BOTTOU L,BENGIO Y,et al.Gradient-basedlearning applied to document recognition [J].Proceedings of the IEEE,1998,86(11):2278-2324.
[9]HINTON G E,OSINDERO S,TEH Y W.A fast learning algorithm for deep belief nets [J].Neural Computation,2006,18(7):1527-1554.
[10]SALAKHUTDINOV R,LAROCHELLE H.Efficient learningof deep Boltzmann machines [C]//In Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics.2010:693-700.
[11]HUANG G B,ZHU Q Y,SIEW C K.Extreme learning ma-chine:theory and applications [J].Neurocomputing,2006,70(1/2/3):489-501.
[12]HUANG G B,ZHOU H,DING X,et al.Extreme learning machine for regression and multiclass classification [J].IEEE Transactions on Systems,Man,and Cybernetics,Part B(Cybernetics),2011,42(2):513-529.
[13]HUANG G B,CHEN L,SIEW C K.Universal approximationusing incremental constructive feedforward networks with random hidden nodes [J].IEEE Transactions on Neural Networks,2006,17(4):879-892.
[14]HUANG G B,DING X,ZHOU H.Optimization method based extreme learning machine for classification [J].Neurocompu-ting,2010,74(1/2/3):155-163.
[15]LEKAMALAGE C K,LIU T,YANG Y,et al.Extreme learning machine for clustering [C]//Proceedings of ELM-2014.Sprin-ger,2015:435-444.
[16]HUANG G,SONG S,GUPTA J N,et al.Semi-supervised and unsupervised extreme learning machines [J].IEEE Transactions on Cybernetics,2014,44(12):2405-2417.
[17]PAN J,WANG X,CHENG Y,et al.Reinforcement learningbased on extreme learning machine [C]//Proceedings of International Conference on Intelligent Computing.Springer,2012:80-86.
[18]CAO F,LIU B,PARK D S.Image classification based on effective extreme learning machine [J/OL].Neurocomputing.2013,102:90-97.https://doi.org/10.1016/j.neucom.2012.02.042.
[19]SCHMIDT W F,KRAAIJVELD M A,DUIN R P.Feed forwardneural networks with random weights [C]//Proceedings of In-
ternational Conference on Pattern Recognition.IEEE,1992:1-4.
[20]IGELNIK B,PAO Y H.Stochastic choice of basis functions inadaptive function approximation and the functional-link net [J].IEEE transactions on Neural Networks,1995,6(6):1320-1329.
[21]HUANG G,HUANG G B,SONG S,et al.Trends in extreme learning machines:A review [J].Neural Networks,2015,61(1):32-48.
[22]DING S,ZHAO H,ZHANG Y,et al.Extreme learning ma-chine:algorithm,theory and applications [J].Artificial Intelligence Review,2015,44(1):103-115.
[23]CAO W,WANG X,MING Z,et al.A review on neural networks with random weights [J/OL].Neurocomputing,2018,275:278-287.https://doi.org/10.1016/j.neucom.2017.08.040.
[24]KASUN L L,ZHOU H,HUANG G B,et al.Representational learning with extreme learning machine for big data [J].IEEE Intelligent Systems,2013,28(6):31-34.
[25]DING S,ZHANG N,XU X,et al.Deep extreme learning ma-chine and its application in EEG classification [J/OL].Mathematical Problems in Engineering,2015,2015(129021).https://www.hindawi.com/journals/mpe/2015/129021.
[26]TANG J X,DENG C,HUANG G B.Extreme learning machine for multilayer perceptron [J].IEEE Transactions on Neural Networks and Learning Systems,2015,27(4):809-821.
[27]KUSSUL E,BAIDYK T.Improved method of handwritten digit recognition tested on MNIST database [J].Image and Vision Computing,2004,22(12):971-981.
[28]COHEN G,AFSHAR S,TAPSON J,et al.EMNIST:Extending MNIST to handwritten letters [C]//Proceedings of Interna-tional Joint Conference on Neural Networks.IEEE,2017:2921-2926.
[29]CLANUWAT T,BOBER-IRIZAR M,KITAMOTO A,et al.Deep learning for classical Japanese literature [J].arXiv:1812.01718,2018.
[30]ZHAO Z T,ZHENG X D.Feature Incremental Extreme Lear-ning Machine[J].Computer Science,2019,46(11A):112-116.
[31]XU R,LIANG X,MA R F,et al.Adaptive Orthogonal Search for Network Structure Learning of ELM[J].Chinese Journal of Computer,2021,44(9):1888-1906.
[32]HE Y L,LIU J N,WANG X Z,et al.Optimal bandwidth selection for re-substitution entropy estimation [J].Applied Mathematics and Computation,2012,219(8):3425-3260.
[1] ZENG Zhi-xian, CAO Jian-jun, WENG Nian-feng, JIANG Guo-quan, XU Bin. Fine-grained Semantic Association Video-Text Cross-modal Entity Resolution Based on Attention Mechanism [J]. Computer Science, 2022, 49(7): 106-112.
[2] CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126.
[3] ZHANG Yuan, KANG Le, GONG Zhao-hui, ZHANG Zhi-hong. Related Transaction Behavior Detection in Futures Market Based on Bi-LSTM [J]. Computer Science, 2022, 49(7): 31-39.
[4] QING Chao-jin, DU Yan-hong, YE Qing, YANG Na, ZHANG Min-tao. Enhanced ELM-based Superimposed CSI Feedback Method with CSI Estimation Errors [J]. Computer Science, 2022, 49(6A): 632-638.
[5] LIU Wei-ye, LU Hui-min, LI Yu-peng, MA Ning. Survey on Finger Vein Recognition Research [J]. Computer Science, 2022, 49(6A): 1-11.
[6] GAO Yuan-hao, LUO Xiao-qing, ZHANG Zhan-cheng. Infrared and Visible Image Fusion Based on Feature Separation [J]. Computer Science, 2022, 49(5): 58-63.
[7] ZUO Jie-ge, LIU Xiao-ming, CAI Bing. Outdoor Image Weather Recognition Based on Image Blocks and Feature Fusion [J]. Computer Science, 2022, 49(3): 197-203.
[8] REN Shou-peng, LI Jin, WANG Jing-ru, YUE Kun. Ensemble Regression Decision Trees-based lncRNA-disease Association Prediction [J]. Computer Science, 2022, 49(2): 265-271.
[9] MIAO Lan-xin, LEI Yu, ZENG Peng-peng, LI Xiao-yu, SONG Jing-kuan. Granularity-aware and Semantic Aggregation Based Image-Text Retrieval Network [J]. Computer Science, 2022, 49(11): 134-140.
[10] XU Si-qin, HUANG Xiang-qian, YANG Kun, ZHANG Zhan-long, GAN Peng-fei. Prediction of Insulation Deterioration Degree of Cable Joints Based on Temperature and Operation Data [J]. Computer Science, 2022, 49(10): 132-137.
[11] ZHANG Min, YU Zeng, HAN Yun-xing, LI Tian-rui. Overview of Person Re-identification for Complex Scenes [J]. Computer Science, 2022, 49(10): 138-150.
[12] JIANG Zong-li, FAN Ke, ZHANG Jin-li. Generative Adversarial Network and Meta-path Based Heterogeneous Network Representation Learning [J]. Computer Science, 2022, 49(1): 133-139.
[13] ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351.
[14] FENG Xia, HU Zhi-yi, LIU Cai-hua. Survey of Research Progress on Cross-modal Retrieval [J]. Computer Science, 2021, 48(8): 13-23.
[15] ZHANG Li-qian, LI Meng-hang, GAO Shan-shan, ZHANG Cai-ming. Summary of Computer-assisted Tongue Diagnosis Solutions for Key Problems [J]. Computer Science, 2021, 48(7): 256-269.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!