Recognizing Check Magnetic Code Based on Peak-Valley Location and Amplitude

2012 ◽  
Vol 249-250 ◽  
pp. 241-246
Author(s):  
Di Fan ◽  
Zhe Chen ◽  
Chang Cun Bu ◽  
Zhun Sheng Yang ◽  
Jia Li

Magnetic code is widely used in check, securities, tax invoice, etc. However, the traditional recognizing and reading method of magnetic code is mostly based on correlation coefficient and it takes significant time and cost. After analyzing the characteristics of magnetic code signals in E-13B standard, this paper has proposed a new algorithm based on the peak-valley location and amplitude (PVLA) to simplify the calculation and system design. Firstly, the magnetic code signal is separated into magnetic ink character signals by the thresholds of peak and valley. Secondly, the features of the peak-valley location (PVL) and peak-valley amplitude(PVA) of each magnetic ink character signal are extracted and normalized, then the nearest neighbor recognition algorithm based on the vectors of peak-valley location and amplitude is utilized to recognize the magnetic code. The recognition results and statistical parameters from a large number of experiments show that the new method has higher recognition rate and better robustness. In addition, the new algorithm only involves additions and subtractions, so it has a lower computation cost.

2011 ◽  
Vol 145 ◽  
pp. 588-592
Author(s):  
Di Fan ◽  
Jia Li ◽  
Mao Yong Cao ◽  
Nong Liang Sun ◽  
Hong Yu

The check is a popular form for the non-cash payment and accounts for more than 50% of the non-cash transactions. Magnetic ink character recognition system can recognize the check magnetic code automatically and get the information of the bank and account. In magnetic ink character recognition system, the recognizing algorithm is mostly based on correlation coefficient. The computational cost of this algorithm is very high. This paper has proposed a new algorithm based on the peak-valley code and peak-valley distance after analyzing the characteristics of magnetic code signals in E-13B standards to simplify the calculations and system design. Firstly, the magnetic code signal is normalized and separated into magnetic character signals by the thresholds of peak and valley. Secondly, the features of the peak-valley code and peak-valley distance of each magnetic character signal are extracted, then the recognition based on peak-valley code and the nearest neighbor recognition algorithm based on peak-valley distance are utilized to recognize the magnetic code. The recognition results and statistical parameters from a large number of experiments show that the new method has high recognition rate, good robustness and low computational cost.


2014 ◽  
Vol 687-691 ◽  
pp. 3861-3868
Author(s):  
Zheng Hong Deng ◽  
Li Tao Jiao ◽  
Li Yan Liu ◽  
Shan Shan Zhao

According to the trend of the intelligent monitoring system, on the basis of the study of gait recognition algorithm, the intelligent monitoring system is designed based on FPGA and DSP; On the one hand, FPGA’s flexibility and fast parallel processing algorithms when designing can be both used to avoid that circuit can not be modified after designed; On the other hand, the advantage of processing the digital signal of DSP is fully taken. In the feature extraction and recognition, Zernike moment is selected, at the same time the system uses the nearest neighbor classification method which is more mature and has good real-time performance. Experiments show that the system has high recognition rate.


2013 ◽  
Vol 18 (2-3) ◽  
pp. 49-60 ◽  
Author(s):  
Damian Dudzńiski ◽  
Tomasz Kryjak ◽  
Zbigniew Mikrut

Abstract In this paper a human action recognition algorithm, which uses background generation with shadow elimination, silhouette description based on simple geometrical features and a finite state machine for recognizing particular actions is described. The performed tests indicate that this approach obtains a 81 % correct recognition rate allowing real-time image processing of a 360 X 288 video stream.


2014 ◽  
Vol 608-609 ◽  
pp. 459-467 ◽  
Author(s):  
Xiao Yu Gu

The paper researches a recognition algorithm of modulation signal and modulation modes. The modulation modes to be recognized include 2ASK, 2FSK, 2PSK, 4ASK, 4FSK and 4PSK modulation. There are two methods recognizing modulation modes of digital signal, method based on decision theory and pattern-recognition method based on feature extraction. The method based on decision theory is not suitable for recognition with multiple modulation modes. The core of pattern recognition based on feature extraction is selection of feature parameters. So the paper uses the feature parameters with simple calculation, easy to be implemented and high recognition rate as the core. The extraction of feature parameters is based on instant feature of modulation signal after Hilbert transformation.


2011 ◽  
Vol 189-193 ◽  
pp. 2042-2045 ◽  
Author(s):  
Shang Jen Chuang ◽  
Chiung Hsing Chen ◽  
Chien Chih Kao ◽  
Fang Tsung Liu

English letters cannot be recognized by the Hopfield Neural Network if it contains noise over 50%. This paper proposes a new method to improve recognition rate of the Hopfield Neural Network. To advance it, we add the Gaussian distribution feature to the Hopfield Neural Network. The Gaussian filter was added to eliminate noise and improve Hopfield Neural Network’s recognition rate. We use English letters from ‘A’ to ‘Z’ as training data. The noises from 0% to 100% were generated randomly for testing data. Initially, we use the Gaussian filter to eliminate noise and then to recognize test pattern by Hopfield Neural Network. The results are we found that if letters contain noise between 50% and 53% will become reverse phenomenon or unable recognition [6]. In this paper, we propose to uses multiple filters to improve recognition rate when letters contain noise between 50% and 53%.


2018 ◽  
Vol 30 (03) ◽  
pp. 1850019
Author(s):  
Fatemeh Alimardani ◽  
Reza Boostani

Fingerprint verification systems have attracted much attention in secure organizations; however, conventional methods still suffer from unconvincing recognition rate for noisy fingerprint images. To design a robust verification system, in this paper, wavelet and contourlet transforms (CTS) were suggested as efficient feature extraction techniques to elicit a coverall set of descriptive features to characterize fingerprint images. Contourlet coefficients capture the smooth contours of fingerprints while wavelet coefficients reveal its rough details. Due to the high dimensionality of the elicited features, across group variance (AGV), greedy overall relevancy (GOR) and Davis–Bouldin fast feature reduction (DB-FFR) methods were adopted to remove the redundant features. These features were applied to three different classifiers including Boosting Direct Linear Discriminant Analysis (BDLDA), Support Vector Machine (SVM) and Modified Nearest Neighbor (MNN). The proposed method along with state-of-the-art methods were evaluated, over the FVC2004 dataset, in terms of genuine acceptance rate (GAR), false acceptance rate (FAR) and equal error rate (EER). The features selected by AGV were the most significant ones and provided 95.12% GAR. Applying the selected features, by the GOR method, to the modified nearest neighbor, resulted in average EER of [Formula: see text]%, which outperformed the compared methods. The comparative results imply the statistical superiority ([Formula: see text]) of the proposed approach compared to the counterparts.


2007 ◽  
Vol 2007 ◽  
pp. 1-7
Author(s):  
Chaofeng Shi

The system of nonlinear variational inequalities (SNVI) is a useful generalization of variational inequalities. Verma (2001) suggested and analyzed an iterative method for solving SNVI. In this paper, we present a new self-adaptive method, whose computation cost is less than that of Verma's method. The convergence of the new method is proved under the same assumptions as Verma's method. Some preliminary computational results are given to illustrate the efficiency of the proposed method.


2015 ◽  
Vol 13 (2) ◽  
pp. 50-58
Author(s):  
R. Khadim ◽  
R. El Ayachi ◽  
Mohamed Fakir

This paper focuses on the recognition of 3D objects using 2D attributes. In order to increase the recognition rate, the present an hybridization of three approaches to calculate the attributes of color image, this hybridization based on the combination of Zernike moments, Gist descriptors and color descriptor (statistical moments). In the classification phase, three methods are adopted: Neural Network (NN), Support Vector Machine (SVM), and k-nearest neighbor (KNN). The database COIL-100 is used in the experimental results.


2019 ◽  
Vol 9 (19) ◽  
pp. 4178 ◽  
Author(s):  
Wei Nie ◽  
Bob Zhang ◽  
Shuping Zhao

Image acutance or edge contrast in an image plays a crucial role in hyperspectral hand biometrics, especially in the local feature representation phase. However, the study of acutance in this application has not received a lot of attention. Therefore, in this paper we propose that there is an optimal range of image acutance in hyperspectral hand biometrics. To locate this optimal range, a thresholded pixel-wise acutance value (TPAV) is firstly proposed to assess image acutance. Then, through convolving with Gaussian filters, a hyperspectral hand image was preprocessed to obtain different TPAVs. Afterwards, based on local feature representation, the nearest neighbor method was used for matching. The experiments were conducted on hyperspectral dorsal hand vein (HDHV) and hyperspectral palm vein (HPV) databases containing 53 bands. The results that achieved the best performance were those where image acutance was adjusted to the optimal range. On average, the samples with adjusted acutance compared to the original improved by a recognition rate (RR) of 29.5% and 45.7% for the HDHV and HPV datasets, respectively. Furthermore, our method was validated on the PolyU multispectral palm print database producing similar results to that of the hyperspectral. From this we can conclude that image acutance plays an important role in hyperspectral hand biometrics.


Sign in / Sign up

Export Citation Format

Share Document