<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Hitesh K. Sharma</string-name>
          <email>hkshitesh@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rohini A</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Richa Choudhary</string-name>
          <email>richachoudhary.86@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tanupriya Choudhury</string-name>
          <email>tanupriya1986@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sachi N. Mohanty</string-name>
          <email>sachinandan09@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Anil Neerukonda Institute of Technology and Sciences</institution>
          ,
          <addr-line>Vishakapatnam, AndhraPradesh,531162</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Handwritten Recognition</institution>
          ,
          <addr-line>Bayesian Network Theory, Digits recognition, Bayes Probability</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Singidunum University, Serbia and VIT-AP University</institution>
          ,
          <addr-line>Amaravati, Andhra Pradesh</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>University of Petroleum and Energy Studies (UPES)</institution>
          ,
          <addr-line>Dehradun, 248007,Uttarakhand</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
      </contrib-group>
      <fpage>203</fpage>
      <lpage>209</lpage>
      <abstract>
        <p>With machine learning, the characters in the digits data set can be recognized. It is a growing concern in pattern recognition. This study analyzes the behaviors of handwritten characters by using the quality of features in handwritten such as font, size, styles of writing, and symbols to make patterns. A process for identifying characters using algorithms. It is difficult to learn algorithms for traditional human writing recognition. The proposed approach extracts the spatial information and applies the bilinear fusion to the flow of patterns. In binary image processing, the Bayesian network is used for classifying the contents and mathematical methods are used to determine patterns in terms of digits. This approach yielded good results.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>It is a traditional approach in machine learning techniques to recognize images and detect them. The
research draws the groups from the digits dataset. Images of scanned documents were normalized in size
after they were scanned and taken from scanned documents. Using deep learning and machine learning,
handwritten character recognition has been used to analyze reading bank check forms, reading postal
addresses, and so forth. The handwritten digit recognition has been recognized by the human hand-written
digits in the topic of the boundless area of research in the emerging field of deep learning techniques. It’s
taken from papers, images, and touch screens, etc. The feasibility of digits has been treated as supervised
learning types of machine learning and significant sources have been retrieved by user digits to understand
and analyze the image recognition. The Quality of lines, space between the words, consistency of sizes,
Connectivity of strokes, Pen pressure, are to improve and identify the recognition of handwritten digits.
The collected data in terms of user attributes and typed characters. The diversities of writing types which
are space between the characters, diminish of letters are challenges to identify the digits in the dataset. The
co-occurrence of the digits has the evidential datasets of the image structure. Strokes are inherently strong
connections for dealing or inferring data to join the digits in the data set. The complexity of data to
recognize the images has more difficult to identify the target node. A large enormous of data has been
taken from the MNIST database to predict the digits given an image. The recognition of image is carried
out three steps. (a) Input of the segmentation into hypothetical symbols. It has been recognized by the
symbol classifier and determined the structural expressions. It takes into different forms of neural .Behind
States
EMAIL:
(A.</p>
      <p>1);
(A. 3);</p>
      <p>2020 Copyright for this paper by its authors.
the recognization of patterns image processing has carry over to analyses the strokes and strings. The study
has been elaborated the approximation of mathematical equations for recognizing the strokes in the
handwritten digits. The digit has increased in the image; it's become more complicated to identify the
input stroke to symbols. That symbols are said to be hypothetical symbols. It has been recognized by the
classifier. The symbol structures are recognized by the expression of structures and it has been analyzed by
the parsing algorithm. It provides the tool for analyzing the structure and coherent approaches are used for
recognition and identifying the images by using a mathematical equation. The pattern recognition tool is
used to analyze the information from raw handwritten images or digits. There are different styles of
handwriting in different communities. Images are not in sharp the redundancy of images were removed.
This approach has to be implementing with the SVM recognition system to perform by the NIST SD19
data set (https://www.nist.gov/srd/nist-special-database-19). Patterns are represented mathematically to
understand the dynamics tools for communication and information. For instance, a handwritten character
set drives the different styles of writing. Hence, if topological properties of the handwritten dataset are
connected, which signifies the redundancy of data, and sharp recognition. The structural dimension
provides to benefit the terms of accessing the large structured images.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Materials and Methods</title>
      <p>The efforts are carried out by pattern expressions and recognition of characters. The images were
extracted from the user interaction data along with the properties of communication. The Extracted
data has been analyzed and tested by R-Programming for statistical analysis. It is used to provide
functions and data types for identifying the patterns. A supervised Learning algorithm has easy to
identify the strokes and structure, size, and intensity of images in the data set. Handwritten
mathematical equations have been tested in the proposed study and compared with the existing
algorithms. The dataset consists of 5000 training sets and 1000 for testing data set which helps find
the patterns of recognition. Images were accommodate and tested the Machine Learning algorithms
of Support Vector Machine, K-Nearest Neighbor and Convolution Neural Network.</p>
      <p>Image Acquisition: The image has been captured from the scanner. It has numbers, symbols,
characters and a special set of characters has been collected and put into the sequential form of a
database.</p>
      <p>Preprocessing: Given image has converted into a greyscale image with a threshold value of 0.5. It
removes blur spots from images and it inverts and reshapes the images.</p>
      <p>Step 1</p>
      <sec id="sec-2-1">
        <title>Step 2</title>
      </sec>
      <sec id="sec-2-2">
        <title>Step 3</title>
        <p>multiple touches of strings.
pixels towards the training data.</p>
        <p>In the handwritten recognition to improve the features has been computed by the input images.
The process of detection and correlation is the challenging problem in the preprocessing images.
Generally categorized the process into removal of noise, normalization, and smoothing the images in
the input images.</p>
        <p>The input image has been formatted up to the saturation level of gray scale image. Then it has been
turned into binary format. By the two categories binarization method has taken place. (1) Global
threshold (2) Local Threshold.</p>
        <p>In the algorithm of Global Threshold: The study has taken a single threshold value for the overall
images based on the uniformity and measuring the shapes in the image.</p>
        <p>Local Threshold: the angle has been determined by the threshold values for pixel using their
spatial information. After binarization pixel densities and angle of the text is chosen in the text image
to realize the actual angle.</p>
        <p>Segmentation: The recognition of the process has been analyzed by the segmentation. The size of
each digit and gap between the digits are unknown. To fill the gap by the digit segmentation algorithm
to remove the noisy images and connect the components in the hand written digit. The aim of the
paper is to crop the correct segmentation for handwritten recognition by using single touch and
Functional Analysis is used to separate the features of digits.Input images are resized into 5*7
Feature Extraction: By the structural extraction the morphological features of edges, regions, and
curves has been analyzed for indexing and labeling the data to help the classification of handwritten
digits. It extracts the information from the input image. The parametric features were area, centroid,
density, line segment also extracted to find the weight and center of location in the box area.</p>
        <p>Classification: By using soft computing techniques of multilayer perceptron is arranged in layers
which are input layer, hidden layer, and outer layer of the node. It gives the classification performance
of extracting the features. Step 1,2,3 describes how from the input images , the binarization and
features and testing’s are processed.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Bayesian Network Approach</title>
      <p>BN is a system to minimize the classification error and plays a role in the prior probability of
information. It is a statical approach to quantify the various decision.</p>
      <p>The conditional probability and prior probability has been computed as:</p>
      <sec id="sec-3-1">
        <title>Outliers of the decision probability</title>
        <p>(
⁄ ) =</p>
        <p>P(m1 /x) if we choose m1,
--Where  ( ) = ∑ =1  ( ⁄  ) ∗  (  )
 ( ⁄  ) ∗  (  )
 ( )</p>
      </sec>
      <sec id="sec-3-2">
        <title>Likelihood event</title>
      </sec>
      <sec id="sec-3-3">
        <title>Probability of Evidence (1) (2)</title>
        <p>Observe x and action αi, the true nature of state is αi. Incur the λ (αi |mn).</p>
        <p>R (αi |x) = Conditional Risk.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Simulation Results</title>
      <p>The implementation results were shown below, the mapping of the model has been implemented in
Graphical User Interface components of Java programming by the eclipse tool.</p>
      <p>Fig. 1, Shows the Handwritten character has converted into binary, removal, and segmentation.
Fig. 2, shows the performance of feature extraction using Bayesian Decision theory.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Result and Discussion</title>
      <p>Word recognition is the number of words in transcription. we combined the online and offline
mode of the system have recognized and measured the rate has compared with four existing
algorithms shown in Fig.3. which are KNN, SVM, CNN, and BN, BN has incrementally recognized
the rate of recognition as 75.20% and the accuracy as 66.10%. Each output position of KNN
recognition rate as 65.90% and the accuracy as 61.4%. SVM as 73.4% and accuracy as 65%when
compared to KNN, SVM has a high accuracy rate. Eventually, the CNN recognition rate has 73.8%
and accuracy was 65.3%.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>By using the appropriate parameter parameters of feature and quality of recognition, the proposed
work of handwritten character recognition fits into the input image of the meta-database. Based on the
Bayesian network approach, we have classified effectively, decreased errors, and increased accuracy
in character recognition.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Future Work</title>
      <p>To propose new classification models to improve the performance of segmentation and reduce the
complexity of algorithm to enhance faster computation.</p>
    </sec>
    <sec id="sec-8">
      <title>8. References</title>
      <p>
        [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] approached the content-based classification used by the techniques of K-Nearest Neighbour,
Decision tree, and Support Vector Machine for analyzing the classification techniques and compared
the results. SVM has not been supported and many outliers are identified in the dataset. It becomes a
core problem identifying the image classification and clustering the data. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]proposed the
dimensionality reduction techniques used for handwritten recognition with different images in the
document and it has been analyzed by the parameters of extending the radius of complex background
with high intensities of detersive images. The pre-processing has included in the stretches of images,
normalization, binarization, segmentation, and morphological techniques. When compared the
accuracy of an image has very less and up to the mark has been identified. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]analyzed the
performance of the neural network with geometric and gradient features. It has been efficiently
observed through the Levenberg algorithm. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] proposed the nearest neighbor method to classify the
images with different wavelets. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] compared the efficiency with the existing algorithms of
Hierarchical, Anamoly detection, Apriori Algorithm, and Principal Component Analysis(PCA). PCA
has yielded a good classification and efficiency of data. [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ][
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] implemented the character recognition
using deep learning and machine learning techniques. It has been used by the Random Forest, Neural
network, and Support Vector Machine.
[12] Malla V, S., Sharma, H.K., Choudhury, T. (2022). Handwritten Digit Recognition with Neural
Network. In: Sharma, D.K., Peng, SL., Sharma, R., Zaitsev, D.A. (eds) Micro-Electronics and
Telecommunication Engineering . Lecture Notes in Networks and Systems, vol 373. Springer,
Singapore. https://doi.org/10.1007/978-981-16-8721-1_51.
[13] M. Mishra, T. Choudhury and T. Sarkar, "Devanagari Handwritten Character Recognition," 2021
IEEE India Council International Subsections Conference (INDISCON), 2021, pp. 1-6, doi:
10.1109/INDISCON53343.2021.9582192.
[14] Chakraborty, P., Jahanapi, S.S., Choudhury, T. (2022). Bangla Handwritten Digit Recognition.
      </p>
      <p>In: Tavares, J.M.R.S., Dutta, P., Dutta, S., Samanta, D. (eds) Cyber Intelligence and Information
Retrieval. Lecture Notes in Networks and Systems, vol 291. Springer, Singapore.
https://doi.org/10.1007/978-981-16-4284-5_14.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Mahmoud</surname>
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Abu Ghosh</surname>
          </string-name>
          ; Ashraf Y. Maghari, “
          <article-title>A Comparative Study on Handwriting Digit Recognition Using Neural Networks”</article-title>
          , IEEE,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>H.</given-names>
            <surname>Du</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Gong</surname>
          </string-name>
          , G. Luo, and
          <string-name>
            <given-names>P.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <article-title>"WordRecorder: Accurate Acoustic-based Handwriting Recognition Using Deep Learning, "</article-title>
          <source>IEEE INFOCOM 2018 - IEEE Conference on Computer Communications</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>1448</fpage>
          -
          <lpage>1456</lpage>
          , DOI: 10.1109/INFOCOM.
          <year>2018</year>
          .
          <volume>8486285</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Mainkar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Katkar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. B.</given-names>
            <surname>Udate</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P. R.</given-names>
            <surname>Pednekar</surname>
          </string-name>
          ,
          <article-title>"Handwritten Character Recognition to Obtain Editable Text,"</article-title>
          <source>2020 International Conference on Electronics and Sustainable Communication Systems (ICESC)</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>599</fpage>
          -
          <lpage>602</lpage>
          , DOI: 10.1109/ICESC48915.
          <year>2020</year>
          .
          <volume>9155786</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>J.</given-names>
            <surname>Dalal</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Daiya</surname>
          </string-name>
          ,
          <article-title>"Image processing based optical character recognition using Matlab"</article-title>
          ,
          <source>International journal of engineering sciences &amp; research technology</source>
          , vol.
          <volume>7</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>406</fpage>
          -
          <lpage>411</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Anuj</given-names>
            <surname>Dutt</surname>
          </string-name>
          , AashiDutt,”
          <article-title>Handwritten Digit Recognition Using Deep Learning”</article-title>
          ,
          <source>International Journal of Advanced Research in Computer Engineering &amp; Technology (IJARCET)</source>
          Volume
          <volume>6</volume>
          ,
          <string-name>
            <surname>Issue</surname>
            <given-names>7</given-names>
          </string-name>
          ,
          <string-name>
            <surname>July</surname>
            <given-names>2017</given-names>
          </string-name>
          , ISSN:
          <fpage>2278</fpage>
          -
          <lpage>1323</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Zanoni</surname>
          </string-name>
          , “
          <article-title>Data mining techniques for design pattern detection</article-title>
          ,
          <source>” Ph.D. dissertation, Universita degli Studi di Milano-Bicocca</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Handwritten</given-names>
            <surname>Digit Recognition Using</surname>
          </string-name>
          Machine Learning https://medium.com/@himanshubeniwal/handwritten
          <article-title>-digitrecognition-using-machine-learningad30562a9b64”</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>J.</given-names>
            <surname>Niere</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Schafer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wadsack</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Wendehals</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Welsh</surname>
          </string-name>
          ,
          <article-title>"Towards pattern-based design recovery,"</article-title>
          <source>in Proceedings of The 24th International Conference on Software Engineering</source>
          ,
          <year>2002</year>
          , pp.
          <fpage>338</fpage>
          -
          <lpage>348</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <article-title>[9] Darmatasia and Mohamad Ivan Fanany,” Handwriting Recognition on Form Document Using Convolutional Neural Network and Support Vector Machines (CNN-SVM), Machine Learning</article-title>
          and Computer Vision Laboratory Faculty of Computer Science, University of Indonesia.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Elleuch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Maalej</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Kherallah</surname>
          </string-name>
          , “
          <article-title>A New Design Based - SVM of the CNN Classifier Architecture with Dropout for Offline Arabic Handwritten Recognition,” Procedia - Procedia Comput</article-title>
          . Sci., vol.
          <volume>80</volume>
          , pp.
          <fpage>1712</fpage>
          -
          <lpage>1723</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Tina</surname>
            <given-names>Vaz</given-names>
          </string-name>
          , Nagaraj Vernekar,”A Survey on Evaluating Handwritten Iterative Mathematical Expressions”,
          <source>International Journal for Research in Applied Science &amp; Engineering Technology (IJRASET)</source>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>