SlideShare a Scribd company logo
2
Most read
6
Most read
18
Most read
Final Year Defense
Presented by Supervised by
CNN-Based Bangla Handwritten
Character Recognition: Exploring Ekush
Dataset for Performance Enhancement
Marcel David Baroi
ID: 201-15-3421
Department of CSE
Daffodil International
University
Tasnim Tabassum
Lecturer
Department of CSE
Daffodil International
University
Final Year Defense
Overview
Exploring the Ekush dataset to recognize Bengali handwritten characters
Three CNN models, along with 13 ML models, are explored for comparative
analysis.
2
Final Year Defense
3
Motivation
Contribute to the BHR's (Bangla Handwritten Recognition System)
improvement, as it is an enormous task that is almost impossible for one
person to complete alone.
In an attempt to make a tiny contribution, I have attempted to apply various
models to an already-existing dataset, since I found it extremely challenging
to gather sufficient data for a very successful final study of my own.
Final Year Defense
4
Objective
 To explore the Ekush dataset, a dataset of Bangla handwritten characters, and
analyze its suitability for training and evaluating CNN models for character
recognition.
 To implement CNN architectures specifically suited for recognizing Bangla
handwritten characters, taking into account the unique characteristics of the
Bangla script, such as complex ligatures and conjuncts.
 To achieve high accuracy and performance in recognizing Bangla handwritten
characters using the developed CNN model.
 To compare the performance of the proposed CNN model with existing approaches
for Bangla handwritten character recognition.
 To contribute to the development of robust and efficient Bangla handwritten
character recognition systems for various applications, such as document image
analysis, online education, and assistive technologies.
Final Year Defense
5
Related works (1)
Year Dataset Recognition Used Models Height Accuracy
and Model
(2017) CMATERdb Numeral CNN 98.78% CNN
(2018) NumtaDB Numeral LeNet-5, ResNet-18,
Proposed Method,
Ensemble (K-Fold)
96.79% Proposed
Method
(2022) Ekush Digit KNeighborsClassifier, SVC,
NuSVC, AdaBoostClassifier,
GradientBoostingClassifier,
CNN
96.707% CNN
Final Year Defense
6
Related works (2)
Year Dataset Recognition Used Models Height Accuracy
and Model
(2005) database of 6000
samples
Digit Dempster-Shafer (DS)
technique
95.1%
(2018) CMATERdb digits,
alphabets,
and special
character
CNN, VGG16,NiN, ResNet,
FractalNet, DenseNet
99.13% DenseNet
(2018) Austrian Research
Institute for Artificial
Intelligence, Austria
Numeral MPL, SVM, J48, Random
Forest, Naive Bayes, Bayes
Ne, Random Tree,
90.37% MLP
Final Year Defense
7
Related works (3)
Year Dataset Recognition Used Models Height Accuracy
and Model
(2017) collected more than
16,000
Bengali
sentiment
classification
word2vec model 75.5% word2vec
(2012) Numeral GA, SA and HC 97% GA
(2009) ISI Bangla numerals,
CENPARMI Farsi
numerals, and
IFHCDB Farsi
numerals
Numeral MQDF, PNC, CFPC, SVM,
DLQDF
99.73% DLQDF
Final Year Defense
8
Contribution
 Analyzed the character section of the Ekush dataset
 Experimented with more than 16 different models
 Concluded the best possible algorithm for the dataset
Final Year Defense
9
Methodology
Final Year Defense
10
Dataset Description
Type Number of classes Amount of train data for each
class
Amount of test data for each
class
Vowel 11 1000 600
Total Vowel 11 11000 6600
Consonant 39 1000 600
Total Consonant 39 39000 23400
Final Year Defense
11
Custom CNN
Final Year Defense
12
DenseNet-121
Final Year Defense
13
LeNet
Final Year Defense
14
Experimental Result
Random
Forest
KNN
SVM
Logistic Regression
AdaBoost
Naive
Bayes
Extra
Trees
Bagging
Classifier
Decision
Tree
Stochastic Gradient Descent
Nearest Centroid
Linear SVM
M
ultinom
ial Naive
Bayes
Custom
CNN
DenseNet
LeNet
0
20
40
60
80
100
120
Model Accuracy
Vowel Consonant
Final Year Defense
15
Experimental Result
Model Accuracy (%)
Vowel Consonant
Random Forest 83.64 71.60
KNN 82.00 69.41
SVM 88.14 78.77
Logistic Regression 75.86 59.42
AdaBoost 54.23 28.48
Naive Bayes 66.73 43.53
Extra Trees 85.05 72.15
Bagging Classifier 75.18 56.29
Decision Tree 60.59 41.99
Stochastic Gradient Descent 68.64 42.85
Nearest Centroid 71.11 50.00
Linear SVM 87.75 40.60
Multinomial Naive Bayes 71.00 48.12
CustomCNN 92.96 87.72
DenseNet 97.93 95.99
LeNet 91.63 85.35
Final Year Defense
16
Conclusion
During my exploration of the Ekush dataset, I trained more than sixteen models, all of
which were expertly constructed and modified by me. Of them, DenseNet was the
clear winner, achieving remarkable accuracy in both vowel and consonant recognition
(97.93% for vowels and 95.99% for consonants).
It truly demonstrated the mastery of neural networks! However, SVM—the brave
seasoned pro in machine learning—remained the top performer in the traditional
model class, with accuracy of 88.14% and 78.77%, respectively.
But a strange pattern became apparent: all other models, in spite of their best
attempts, appeared to prefer the dataset's vowel section, finding it more difficult to
handle the consonant world's subtle complexities. This intriguing observation invites
more research and opens up possibilities.
Final Year Defense
17
Future Scope
 Data Augmentation and Exploration
 Architecture and Algorithm Exploration
 Algorithm-Specific Explorations
 Addressing Challenges and Real-World Applications
Final Year Defense
18
Reference
 Basu, Subhadip, et al. "Handwritten Bangla digit recognition using classifier combination through DS technique." Pattern Recognition
and Machine Intelligence: First International Conference, PReMI 2005, Kolkata, India, December 20-22, 2005. Proceedings 1. Springer
Berlin Heidelberg, 2005.
 Alom, Md Zahangir, et al. "Handwritten bangla character recognition using the state-of-the-art deep convolutional neural
networks." Computational intelligence and neuroscience 2018 (2018).
 DeFries, R. S., and Jonathan Cheung-Wai Chan. "Multiple criteria for evaluating machine learning algorithms for land cover classification
from satellite data." Remote Sensing of Environment 74.3 (2000): 503-515.
 Kamavisdar, Pooja, Sonam Saluja, and Sonu Agrawal. "A survey on image classification approaches and techniques." International
Journal of Advanced Research in Computer and Communication Engineering 2.1 (2013): 1005-1009.
 Sharma, Arun, and Vidushi Sharma. "An Empirical Study of Supervised Learning Techniques on Multispectral Dataset."
 Shamim, S. M., et al. "Handwritten digit recognition using machine learning algorithms." Global Journal Of Computer Science And
Technology 18.1 (2018): 17-23.
 Al-Amin, Md, Md Saiful Islam, and Shapan Das Uzzal. "Sentiment analysis of Bengali comments with Word2Vec and sentiment
information of words." 2017 international conference on electrical, computer and communication engineering (ECCE). IEEE, 2017.
Final Year Defense
19
Reference
 Das, Nibaran, et al. "A genetic algorithm based region sampling for selection of local features in handwritten digit recognition
application." Applied Soft Computing 12.5 (2012): 1592-1606.
 Surinta, Olarik, et al. "Recognition of handwritten characters using local gradient feature descriptors." Engineering Applications of
Artificial Intelligence 45 (2015): 405-414.
 Das, Nibaran, et al. "Recognition of handwritten Bangla basic characters and digits using convex hull based feature set." arXiv preprint
arXiv:1410.0478 (2014).
 Liu, Cheng-Lin, and Ching Y. Suen. "A new benchmark on the recognition of handwritten Bangla and Farsi numeral characters." Pattern
Recognition 42.12 (2009): 3287-3295.
 Alom, Md Zahangir, et al. "Handwritten bangla digit recognition using deep learning." arXiv preprint arXiv:1705.02680 (2017).
 Noor, Rouhan, Kazi Mejbaul Islam, and Md Jakaria Rahimi. "Handwritten Bangla numeral recognition using ensembling of convolutional
neural network." 2018 21st international conference of computer and information technology (ICCIT). IEEE, 2018.
 Shawon, Md Tanvir Rouf, Raihan Tanvir, and Md Golam Rabiul Alam. "Bengali Handwritten Digit Recognition using CNN with Explainable
AI." 2022 4th International Conference on Sustainable Technologies for Industry 4.0 (STI). IEEE, 2022.
Final Year Defense
20
THANK YOU

More Related Content

PDF
Design and Development of a 2D-Convolution CNN model for Recognition of Handw...
PPTX
Comparative Analysis of RMSE and MAP Metrices for Evaluating CNN and LSTM Mod...
PDF
Survey On Broken and Joint Devanagari Handwritten Characters Recognition Usin...
PDF
Off-line English Character Recognition: A Comparative Survey
PDF
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
PDF
Efficient feature descriptor selection for improved Arabic handwritten words ...
PPTX
Author Identification of Source Code Segments Written by Multiple Authors Usi...
PPTX
Humangenderidentificationusingmachinelearning.pptx
Design and Development of a 2D-Convolution CNN model for Recognition of Handw...
Comparative Analysis of RMSE and MAP Metrices for Evaluating CNN and LSTM Mod...
Survey On Broken and Joint Devanagari Handwritten Characters Recognition Usin...
Off-line English Character Recognition: A Comparative Survey
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
Efficient feature descriptor selection for improved Arabic handwritten words ...
Author Identification of Source Code Segments Written by Multiple Authors Usi...
Humangenderidentificationusingmachinelearning.pptx

Similar to CNN-Based Bangla Handwritten Character Recognition: Exploring Ekush Dataset for Performance Enhancement | DIU | Thesis Presentation (20)

PDF
A NOVEL FEATURE SET FOR RECOGNITION OF SIMILAR SHAPED HANDWRITTEN HINDI CHARA...
PPTX
[SDP-2024] Group-H18 End-Term Evaluation PPT.pptx
PDF
SANN: Programming Code Representation Using Attention Neural Network with Opt...
PPTX
major project ppt final (SignLanguage Detection)
PDF
Static-gesture word recognition in Bangla sign language using convolutional n...
PDF
Investigating the Effect of BD-CRAFT to Text Detection Algorithms
PDF
INVESTIGATING THE EFFECT OF BD-CRAFT TO TEXT DETECTION ALGORITHMS
PDF
Detecting cyberbullying text using the approaches with machine learning model...
PPTX
deeplearningpresentation-180625071236.pptx
PPTX
Deep learning presentation
PDF
Bangla handwritten character recognition using MobileNet V1 architecture
PDF
TUNING DARI SPEECH CLASSIFICATION EMPLOYING DEEP NEURAL NETWORKS
PPTX
Introduction of deep learning in cse.pptx
PDF
Hybrid convolutional neural networks-support vector machine classifier with d...
PPTX
Sign Language Recognition based on Hands symbols Classification
PDF
Telugu letters dataset and parallel deep convolutional neural network with a...
PDF
HANDWRITTEN DIGIT RECOGNITION
PDF
HANDWRITTEN DIGIT RECOGNITION
PPTX
Character Recognition using Data Mining Technique (Artificial Neural Network)
PDF
08 8879 10060-1-sm (ijict sj) edit iqbal
A NOVEL FEATURE SET FOR RECOGNITION OF SIMILAR SHAPED HANDWRITTEN HINDI CHARA...
[SDP-2024] Group-H18 End-Term Evaluation PPT.pptx
SANN: Programming Code Representation Using Attention Neural Network with Opt...
major project ppt final (SignLanguage Detection)
Static-gesture word recognition in Bangla sign language using convolutional n...
Investigating the Effect of BD-CRAFT to Text Detection Algorithms
INVESTIGATING THE EFFECT OF BD-CRAFT TO TEXT DETECTION ALGORITHMS
Detecting cyberbullying text using the approaches with machine learning model...
deeplearningpresentation-180625071236.pptx
Deep learning presentation
Bangla handwritten character recognition using MobileNet V1 architecture
TUNING DARI SPEECH CLASSIFICATION EMPLOYING DEEP NEURAL NETWORKS
Introduction of deep learning in cse.pptx
Hybrid convolutional neural networks-support vector machine classifier with d...
Sign Language Recognition based on Hands symbols Classification
Telugu letters dataset and parallel deep convolutional neural network with a...
HANDWRITTEN DIGIT RECOGNITION
HANDWRITTEN DIGIT RECOGNITION
Character Recognition using Data Mining Technique (Artificial Neural Network)
08 8879 10060-1-sm (ijict sj) edit iqbal
Ad

More from Marcel David (20)

PDF
Mastering OOP: Understanding the Four Core Pillars
PDF
Learn the Basics of Agile Development: Your Step-by-Step Guide
PPTX
Computer Crime: An Exploration of Cybersecurity Threats and Solutions
PPTX
Beef: Nutritional Value, Processing, and Its Role in Food Engineering
PPTX
Chemotherapy: Mechanism, Applications, and Side Effects
PPTX
Algorithms for Rendering Depth of Field Effects in Computer Graphics
PPTX
Recognizing Handwritten Bangla Text Using Explainable AI: Techniques & Applic...
PPTX
Machine Learning Approach to Detect Brain Tumors: Techniques and Applications
PPTX
Japan International Cooperation Agency (JICA) and Its Impact on the Nursing S...
PPTX
Train to Pakistan: Summary, Themes, and Analysis
PPTX
Gothic Architecture: History, Features, and Influences
PPTX
Tree Data Structure: Concepts, Types, and Algorithms
PPTX
Exploring Tangail: Porabari Sweets, 201 Gombuj Mosque & Tangail Saree
PPTX
Introduction to Binary Search Trees (BST): Concepts, Implementation, and Appl...
PPTX
Types of Graphs in Computer Engineering: Visualization for Data and Algorithms
PPTX
QuickBooks Accounting Software: Streamlining Financial Management
PPTX
6LoWPAN: Enabling IPv6 for Low-Power Wireless Networks
PPTX
WiMAX: Wireless Broadband Technology for High-Speed Connectivity
PPTX
Long Term Evolution (LTE): High-Speed Wireless Communication Explained
PPTX
Understanding Probability: Fundamentals, Applications, and Real-World Examples
Mastering OOP: Understanding the Four Core Pillars
Learn the Basics of Agile Development: Your Step-by-Step Guide
Computer Crime: An Exploration of Cybersecurity Threats and Solutions
Beef: Nutritional Value, Processing, and Its Role in Food Engineering
Chemotherapy: Mechanism, Applications, and Side Effects
Algorithms for Rendering Depth of Field Effects in Computer Graphics
Recognizing Handwritten Bangla Text Using Explainable AI: Techniques & Applic...
Machine Learning Approach to Detect Brain Tumors: Techniques and Applications
Japan International Cooperation Agency (JICA) and Its Impact on the Nursing S...
Train to Pakistan: Summary, Themes, and Analysis
Gothic Architecture: History, Features, and Influences
Tree Data Structure: Concepts, Types, and Algorithms
Exploring Tangail: Porabari Sweets, 201 Gombuj Mosque & Tangail Saree
Introduction to Binary Search Trees (BST): Concepts, Implementation, and Appl...
Types of Graphs in Computer Engineering: Visualization for Data and Algorithms
QuickBooks Accounting Software: Streamlining Financial Management
6LoWPAN: Enabling IPv6 for Low-Power Wireless Networks
WiMAX: Wireless Broadband Technology for High-Speed Connectivity
Long Term Evolution (LTE): High-Speed Wireless Communication Explained
Understanding Probability: Fundamentals, Applications, and Real-World Examples
Ad

Recently uploaded (20)

PDF
Insiders guide to clinical Medicine.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Computing-Curriculum for Schools in Ghana
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
RMMM.pdf make it easy to upload and study
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Institutional Correction lecture only . . .
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Complications of Minimal Access Surgery at WLH
PDF
Basic Mud Logging Guide for educational purpose
Insiders guide to clinical Medicine.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Computing-Curriculum for Schools in Ghana
O7-L3 Supply Chain Operations - ICLT Program
Microbial diseases, their pathogenesis and prophylaxis
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
RMMM.pdf make it easy to upload and study
human mycosis Human fungal infections are called human mycosis..pptx
Institutional Correction lecture only . . .
2.FourierTransform-ShortQuestionswithAnswers.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
VCE English Exam - Section C Student Revision Booklet
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Complications of Minimal Access Surgery at WLH
Basic Mud Logging Guide for educational purpose

CNN-Based Bangla Handwritten Character Recognition: Exploring Ekush Dataset for Performance Enhancement | DIU | Thesis Presentation

  • 1. Final Year Defense Presented by Supervised by CNN-Based Bangla Handwritten Character Recognition: Exploring Ekush Dataset for Performance Enhancement Marcel David Baroi ID: 201-15-3421 Department of CSE Daffodil International University Tasnim Tabassum Lecturer Department of CSE Daffodil International University
  • 2. Final Year Defense Overview Exploring the Ekush dataset to recognize Bengali handwritten characters Three CNN models, along with 13 ML models, are explored for comparative analysis. 2
  • 3. Final Year Defense 3 Motivation Contribute to the BHR's (Bangla Handwritten Recognition System) improvement, as it is an enormous task that is almost impossible for one person to complete alone. In an attempt to make a tiny contribution, I have attempted to apply various models to an already-existing dataset, since I found it extremely challenging to gather sufficient data for a very successful final study of my own.
  • 4. Final Year Defense 4 Objective  To explore the Ekush dataset, a dataset of Bangla handwritten characters, and analyze its suitability for training and evaluating CNN models for character recognition.  To implement CNN architectures specifically suited for recognizing Bangla handwritten characters, taking into account the unique characteristics of the Bangla script, such as complex ligatures and conjuncts.  To achieve high accuracy and performance in recognizing Bangla handwritten characters using the developed CNN model.  To compare the performance of the proposed CNN model with existing approaches for Bangla handwritten character recognition.  To contribute to the development of robust and efficient Bangla handwritten character recognition systems for various applications, such as document image analysis, online education, and assistive technologies.
  • 5. Final Year Defense 5 Related works (1) Year Dataset Recognition Used Models Height Accuracy and Model (2017) CMATERdb Numeral CNN 98.78% CNN (2018) NumtaDB Numeral LeNet-5, ResNet-18, Proposed Method, Ensemble (K-Fold) 96.79% Proposed Method (2022) Ekush Digit KNeighborsClassifier, SVC, NuSVC, AdaBoostClassifier, GradientBoostingClassifier, CNN 96.707% CNN
  • 6. Final Year Defense 6 Related works (2) Year Dataset Recognition Used Models Height Accuracy and Model (2005) database of 6000 samples Digit Dempster-Shafer (DS) technique 95.1% (2018) CMATERdb digits, alphabets, and special character CNN, VGG16,NiN, ResNet, FractalNet, DenseNet 99.13% DenseNet (2018) Austrian Research Institute for Artificial Intelligence, Austria Numeral MPL, SVM, J48, Random Forest, Naive Bayes, Bayes Ne, Random Tree, 90.37% MLP
  • 7. Final Year Defense 7 Related works (3) Year Dataset Recognition Used Models Height Accuracy and Model (2017) collected more than 16,000 Bengali sentiment classification word2vec model 75.5% word2vec (2012) Numeral GA, SA and HC 97% GA (2009) ISI Bangla numerals, CENPARMI Farsi numerals, and IFHCDB Farsi numerals Numeral MQDF, PNC, CFPC, SVM, DLQDF 99.73% DLQDF
  • 8. Final Year Defense 8 Contribution  Analyzed the character section of the Ekush dataset  Experimented with more than 16 different models  Concluded the best possible algorithm for the dataset
  • 10. Final Year Defense 10 Dataset Description Type Number of classes Amount of train data for each class Amount of test data for each class Vowel 11 1000 600 Total Vowel 11 11000 6600 Consonant 39 1000 600 Total Consonant 39 39000 23400
  • 14. Final Year Defense 14 Experimental Result Random Forest KNN SVM Logistic Regression AdaBoost Naive Bayes Extra Trees Bagging Classifier Decision Tree Stochastic Gradient Descent Nearest Centroid Linear SVM M ultinom ial Naive Bayes Custom CNN DenseNet LeNet 0 20 40 60 80 100 120 Model Accuracy Vowel Consonant
  • 15. Final Year Defense 15 Experimental Result Model Accuracy (%) Vowel Consonant Random Forest 83.64 71.60 KNN 82.00 69.41 SVM 88.14 78.77 Logistic Regression 75.86 59.42 AdaBoost 54.23 28.48 Naive Bayes 66.73 43.53 Extra Trees 85.05 72.15 Bagging Classifier 75.18 56.29 Decision Tree 60.59 41.99 Stochastic Gradient Descent 68.64 42.85 Nearest Centroid 71.11 50.00 Linear SVM 87.75 40.60 Multinomial Naive Bayes 71.00 48.12 CustomCNN 92.96 87.72 DenseNet 97.93 95.99 LeNet 91.63 85.35
  • 16. Final Year Defense 16 Conclusion During my exploration of the Ekush dataset, I trained more than sixteen models, all of which were expertly constructed and modified by me. Of them, DenseNet was the clear winner, achieving remarkable accuracy in both vowel and consonant recognition (97.93% for vowels and 95.99% for consonants). It truly demonstrated the mastery of neural networks! However, SVM—the brave seasoned pro in machine learning—remained the top performer in the traditional model class, with accuracy of 88.14% and 78.77%, respectively. But a strange pattern became apparent: all other models, in spite of their best attempts, appeared to prefer the dataset's vowel section, finding it more difficult to handle the consonant world's subtle complexities. This intriguing observation invites more research and opens up possibilities.
  • 17. Final Year Defense 17 Future Scope  Data Augmentation and Exploration  Architecture and Algorithm Exploration  Algorithm-Specific Explorations  Addressing Challenges and Real-World Applications
  • 18. Final Year Defense 18 Reference  Basu, Subhadip, et al. "Handwritten Bangla digit recognition using classifier combination through DS technique." Pattern Recognition and Machine Intelligence: First International Conference, PReMI 2005, Kolkata, India, December 20-22, 2005. Proceedings 1. Springer Berlin Heidelberg, 2005.  Alom, Md Zahangir, et al. "Handwritten bangla character recognition using the state-of-the-art deep convolutional neural networks." Computational intelligence and neuroscience 2018 (2018).  DeFries, R. S., and Jonathan Cheung-Wai Chan. "Multiple criteria for evaluating machine learning algorithms for land cover classification from satellite data." Remote Sensing of Environment 74.3 (2000): 503-515.  Kamavisdar, Pooja, Sonam Saluja, and Sonu Agrawal. "A survey on image classification approaches and techniques." International Journal of Advanced Research in Computer and Communication Engineering 2.1 (2013): 1005-1009.  Sharma, Arun, and Vidushi Sharma. "An Empirical Study of Supervised Learning Techniques on Multispectral Dataset."  Shamim, S. M., et al. "Handwritten digit recognition using machine learning algorithms." Global Journal Of Computer Science And Technology 18.1 (2018): 17-23.  Al-Amin, Md, Md Saiful Islam, and Shapan Das Uzzal. "Sentiment analysis of Bengali comments with Word2Vec and sentiment information of words." 2017 international conference on electrical, computer and communication engineering (ECCE). IEEE, 2017.
  • 19. Final Year Defense 19 Reference  Das, Nibaran, et al. "A genetic algorithm based region sampling for selection of local features in handwritten digit recognition application." Applied Soft Computing 12.5 (2012): 1592-1606.  Surinta, Olarik, et al. "Recognition of handwritten characters using local gradient feature descriptors." Engineering Applications of Artificial Intelligence 45 (2015): 405-414.  Das, Nibaran, et al. "Recognition of handwritten Bangla basic characters and digits using convex hull based feature set." arXiv preprint arXiv:1410.0478 (2014).  Liu, Cheng-Lin, and Ching Y. Suen. "A new benchmark on the recognition of handwritten Bangla and Farsi numeral characters." Pattern Recognition 42.12 (2009): 3287-3295.  Alom, Md Zahangir, et al. "Handwritten bangla digit recognition using deep learning." arXiv preprint arXiv:1705.02680 (2017).  Noor, Rouhan, Kazi Mejbaul Islam, and Md Jakaria Rahimi. "Handwritten Bangla numeral recognition using ensembling of convolutional neural network." 2018 21st international conference of computer and information technology (ICCIT). IEEE, 2018.  Shawon, Md Tanvir Rouf, Raihan Tanvir, and Md Golam Rabiul Alam. "Bengali Handwritten Digit Recognition using CNN with Explainable AI." 2022 4th International Conference on Sustainable Technologies for Industry 4.0 (STI). IEEE, 2022.