Professional Documents
Culture Documents
Textbook Hybrid Intelligent Techniques For Pattern Analysis and Understanding 1St Edition Siddhartha Bhattacharyya Ebook All Chapter PDF
Textbook Hybrid Intelligent Techniques For Pattern Analysis and Understanding 1St Edition Siddhartha Bhattacharyya Ebook All Chapter PDF
https://textbookfull.com/product/hybrid-intelligence-for-image-
analysis-and-understanding-1st-edition-siddhartha-bhattacharyya/
https://textbookfull.com/product/intelligence-enabled-research-
dosier-2020-siddhartha-bhattacharyya/
https://textbookfull.com/product/hybrid-intelligent-systems-
ajith-abraham/
https://textbookfull.com/product/remote-compositional-analysis-
techniques-for-understanding-spectroscopy-mineralogy-and-
geochemistry-of-planetary-surfaces-1st-edition-janice-l-bishop/
Hybrid Intelligent Systems 15th International
Conference HIS 2015 on Hybrid Intelligent Systems Seoul
South Korea November 16 18 2015 1st Edition Ajith
Abraham
https://textbookfull.com/product/hybrid-intelligent-systems-15th-
international-conference-his-2015-on-hybrid-intelligent-systems-
seoul-south-korea-november-16-18-2015-1st-edition-ajith-abraham/
https://textbookfull.com/product/nature-inspired-design-of-
hybrid-intelligent-systems-1st-edition-patricia-melin/
https://textbookfull.com/product/pattern-recognition-in-
computational-molecular-biology-techniques-and-approaches-1st-
edition-mourad-elloumi/
https://textbookfull.com/product/e-learning-systems-intelligent-
techniques-for-personalization-1st-edition-aleksandra-klasnja-
milicevic/
https://textbookfull.com/product/intelligent-techniques-in-
signal-processing-for-multimedia-security-1st-edition-nilanjan-
dey/
Hybrid Intelligent Techniques for
Pattern Analysis and
Understanding
Hybrid Intelligent Techniques for
Pattern Analysis and
Understanding
Edited by
Siddhartha Bhattacharyya, Anirban Mukherjee,
Indrajit Pan, Paramartha Dutta,
and Arup Kumar Bhaumik
MATLABr is a trademark of The MathWorks, Inc. and is used with permission. The MathWorks does not warrant the
accuracy of the text or exercises in this book. This book’s use or discussion of MATLABr software or related products does
not constitute endorsement or sponsorship by The MathWorks of a particular pedagogical approach or particular use of the
MATLABr software.
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
c 2018 by Taylor & Francis Group, LLC
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to
publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials
or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material
reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If
any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any
form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming,
and recording, or in any information storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://
www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923,
978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organi-
zations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identifica-
tion and explanation without intent to infringe.
Library of Congress Cataloging-in-Publication Data
LoC Data here
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the CRC Press Web site at
http://www.crcpress.com
Contents
Foreword vii
Preface ix
Contributors xiii
v
vi Contents
Index 365
Foreword
Many real-life problems suffer from uncertainty, imprecision, and vagueness; and because of
this, conventional computing paradigms often fall short of a solution. Even the latest intelli-
gent computing paradigms are frequently insufficiently robust. Hybrid intelligent computing
is an alternative paradigm which addresses these issues upfront.
An intelligent machine is called so because of the various methodologies offered by the
soft computing paradigm, including fuzzy and rough set theory, artificial neurocomputing,
evolutionary computing, and approximate reasoning. At times, none of these techniques
meet the demands of the real situation, but an effective symbiosis of more than one can offer
a formidable and/or robust solution. This is because all of these soft computing techniques
suffer from limitations. Thus the impetus is for hybrid methodologies, the spirit of which is
to exploit the strengths of one technique to supplement the limitations of another. Of late,
there is enormous growth of research exploration of injecting elements of intelligence using
efficient hybrid techniques. All these initiatives indicate that the individual soft computing
techniques do not conflict but rather complement one another. Hybrid intelligent systems
stem from the synergistic integration of the different soft computing tools and techniques.
The fusion of these techniques toward achieving enhanced performance and more robust
solutions can be achieved through proper hybridization. In fact, recent reports reveal the
inherent strength of such hybridization of computational methods.
Pattern analysis and understanding have been daunting tasks in the computer vision
research community given the vast amount of uncertainty involved. Proper analysis of pat-
terns plays a key role in many real-life applications. Traditional applications include pat-
tern recognition, image processing, image mining, object recognition, video surveillance, and
intelligent transportation systems. As an example, wrinkles due to aging can often be used
for the estimation of age progression in face images. This can be an enormous help in tracing
unknown or missing persons. Images exhibit varied uncertainty and ambiguity of information
and hence understanding an image scene is far from being a general procedure. The situation
becomes even more difficult when the images become corrupted with noise artifacts.
Chapters 1, 2, and 3 all deal with handwriting recognition, in Bangla characters, digits,
and signatures, respectively. Handwriting recognition is a very important application for
identity verification and for any kind of machine input such as with PDAs, postal addresses,
or data entry. As integration of the Web and computing in general becomes more and more
common, these problems of interface will only become more important. The authors use a
number of different hybrid methodologies, and, in general, show that hybrid approaches can
enhance distinction accuracy and effectiveness when compared to current state-of-the-art
approaches.
Chapter 4 presents a new strategy for the detection of simple parametric objects in
images, called estimation of distribution algorithms (EDAs). The authors show that EDA
compares favorably with two variants of the Hough transform method in terms of compu-
tational time necessary.
Chapters 5 and 6 both deal with medical applications of machine learning. In Chapter 5,
the different phases involved in detection of the malarial parasite in blood smears are dealt
with using appropriate methods tailored to the challenges of each stage. In Chapter 6, the
vii
viii Foreword
Elizabeth Behrman
Kansan, USA
April, 2017
Preface
With the extensive research in the intelligent computing paradigm applied to various prob-
lems over a few decades, the shortcomings of every component of this paradigm have gradu-
ally become prominent. It is an undeniable fact that each individual ingredient of intelligent
computing, be it fuzzy mathematics or evolutionary computation, if not an artificial neural
network, has its own points in its favor. However, with the passage of time, human civiliza-
tion starts appreciating the drawbacks of individual components, thereby necessitating the
need of up-gradation into the next-generation computational platforms. Hybrid intelligent
computing appears as the natural extrapolation of the field of computational intelligence.
Through the process of hybridization, the limitation of one ingredient is supplemented by
the strength of the other. Because of this collaborative performance, a surge of research
initiatives is observed nowadays. Researchers have put in all their efforts to explore and
exploit the power of hybrid intelligence as an alternative paradigm altogether. In other
words, there has been a paradigm shift in the effort of research in the relevant field. In the
present scope, the editors are trying to bring some recent findings of researchers engaged
in hybrid intelligence research by identifying pattern recognition and related issues as the
application domain. The spectrum is kept balanced. It is not too broad, with an aim to
encourage contribution focused in and around pattern recognition. On the other hand, it
has been meticulously maintained that the spectrum must not be too limited, so that a
researcher engaged in research in a relevant field may enjoy every scope to ventilate his/her
ideas in the form of tangible contribution. It is indeed encouraging for the editors to come
across fourteen chapters, which have been thoroughly peer reviewed and accommodated in
the present treatise.
In Chapter 1, the authors verify a writer from his/her handwritten text with adequate
empirical justification by using an efficient combination of the dual tree complex wavelet
transform (DTCWT) and gray level co-occurrence matrix (GLCM) to enhance the relevant
texture feature.
A similar problem of handwritten digit recognition is the domain of investigation of the
authors of Chapter 2. They offer an effective hybridization to meet this goal. Elaboration in
the form of discussion on other techniques for the said problem is an added point of interest
of this chapter.
A very close application of handwritten signature recognition comes under the purview
of Chapter 3, where the authors offer an offline classification algorithm based on bio-inspired
ingredients and justify its efficacy on available benchmark datasets.
Effectiveness of estimation of distribution algorithms (EDAs) for detection of geometric
objects such as line, circle, parabola, etc. as well as retinal fundus images, is substantiated
with ample experimentations by the authors of Chapter 4. They have worked on two variants
for this purpose, justifying impressive performance primarily with respect to computational
time.
A comprehensive machine learning approach is offered by the authors of Chapter 5.
They have shown the significance of their approach by dint of their thorough empirical
experiments in the context of detection of the malaria parasite in blood smear.
Noise classification is very sensitive and crucial in medical image processing mainly be-
cause of the associated medical implication. The result of a wrong classification at times may
ix
x Preface
be catastrophic in certain contexts. The authors address this important issue in Chapter 6
with respect to different medical imaging modalities and share some of their impressive
findings in this regard.
Chapter 7 handles how faces recognition may offer an avenue in respect to biometric
authentication. The authors elaborate the problem pertaining to face recognition for this
purpose, duly addressing the sensitivity associated therein.
The hand motion recognition system (HMRS), an indispensable component of gesture
recognition comprising multiple steps to achieve its goal, needs effective optimization of the
Markov state sequence obtained in some intermediate step in order to ensure subsequent
operative performance of the system. In Chapter 8, authors offer the artificial bee colony
approach to achieve this goal.
A very timely and important challenge of developing a smart visual surveillance method-
ology aiming at effective crime management is the contribution of the authors in Chapter 9.
The authors in Chapter 10 exhibit the effectiveness of hybridization in watershed image
analysis. They justify it by means of extensive experimentations which also indicate the
performance supremacy of such a hybrid technique over prior arts.
Medical imaging plays a crucial role in diagnosis and treatment of diseases. Magnetic
resonance imaging (MRI) nowadays, is an indispensable tool used for medical purposes. The
authors take up the sensitive issue of segmentation of such images in Chapter 11, which
also supplements relevant information as an effective compilation.
An important task of classification of renal ultrasound images is taken up by the au-
thors in Chapter 12. They use Haralick’s texture descriptors to achieve this purpose, whose
effectiveness is further justified by the extensive experimentation.
Effective application of the Self-organizing map (SOM) using Laplacian spectra of a
graph to achieve clustering of large non-categorical datasets is what is contributed by the
authors in Chapter 13.
In the final chapter, the authors deal with the problem of clustering in the big data
paradigm by using quantum K-means clustering applied on big data sequences represented
in terms of quantum states with the help of quantum RAM (QRAM).
The editors of this volume leave no stone unturned to make a meaningful compilation
of recent research trends. The treatise contains fourteen chapters encompassing various
application domains. The authors of different contributing chapters share some of their
latest findings in the present scope. It is needless to mention that such an effort on the
part of the editors to come out with an edited volume is possible only because of the
efforts rendered by the authors. The editors also want to avail this opportunity to express
their thanks to CRC Press/Taylor & Francis Group as an international publishing house of
eminence to provide the scope to make the efforts of the present editors to bring out such
a compilation. The editors would also like to take this opportunity to render their heartfelt
thanks to Ms. Aastha Sharma for her continuous guidance during the project tenure. But
for their active cooperation, this would not have met such a success. Last but not the least,
the editors earnestly feel like expressing their gratitude to those whose names may not figure
here but who have helped in converting the present initiative into a fruitful one.
Subhasish Das
Nabanita Basu
School of Water Resources Engineering
Department of Computer Science &
Jadavpur University
Engineering
Kolkata, India
University of Calcutta
Kolkata, India Jesus Guerrero-Turrubiates
División de Ingenierı́as Campus
Arit Kumar Bishwas Irapuato-Salamanca
Department of Information Universidad de Guanajuato
Technology Guanajuato, Mexico
Amity University
Noida, India Chayan Halder
Department of Computer Science
Ranjit Biswas West Bengal State University
Department of Computer Science and Barasat, India
Engineering
Assam University D. Jude Hemanth
Silchar, India Department of Electronics and
Communication Engineering
Indu Chhabra Karunya University
Coimbatore, India
Department of Computer Science and
Applications Hemant Jain
Panjab University Division of Software Systems
Chandigarh, India VIT University
Vellore, India
Youcef Chibani
Department of Electronic and Computer Kalyan Mahata
Sciences Information Technology Department
University of Sciences Government College of Engineering and
and Technology Houari Boumediene Leather Technology
Algiers, Algeria Kolkata, India
xiii
xiv Contributors
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Literature Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2.1 Offline and pseudo-dynamic approaches . . . . . . . . . . . . . . . . 2
1.2.2 Approaches of writer-dependent and writer-independent
methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2.3 Writer identification (many to one) . . . . . . . . . . . . . . . . . . . . . 3
1.2.4 Writer verification (one-to-one matching) . . . . . . . . . . . . . . . 3
1.2.5 Biometric property . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2.6 Handwriting as biometric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2.7 Types of writers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2.8 Genuine writer or original writer . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2.9 Forged writer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2.10 Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3 Introduction to Bangla . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.3.1 Bangla script . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.4 Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.5 Data Collection and PreProcessing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.6 Feature Extraction Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.6.1 Feature extraction based on dual-tree complex wavelet
transformation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.6.2 Feature extraction based on GLCM . . . . . . . . . . . . . . . . . . . . . 10
1.6.3 Edge direction information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.7 Dissimilarity Measure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.8 Classification Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.8.1 Multi-layer perceptrons networks . . . . . . . . . . . . . . . . . . . . . . . 11
1.8.2 Simple logistic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.8.3 Radial basis function networks . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.9 Experimental Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.9.1 Performance evaluation criteria . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.9.2 Dissimilarity vector calculation . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.10 Verification Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.11 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
1
2 Hybrid Intelligent Techniques for Pattern Analysis and Understanding
1.1 Introduction
Writer verification has been magnetizing the attraction of the researchers as a most im-
portant role play for writer authentication. The last few years, many algorithms and systems
with high authentication rates have been introduced. Various approaches for handwritten
character authentication problem have been developed [1–4]. Some approaches are worked
in Bangla characters [5]. In one of the relevant early works, the likelihood ratio is used
in forensic document identification [6]. The statistical model [7,8] is used for writer verifi-
cation and also includes a mathematical formula for calculating the strength of evidence
of same/different writer. The approaches are classified into two categories, namely online
systems and offline systems. The handwritten shape and stock information are available in
online verification system [9], but this information is unavailable for the offline method. The
offline system is more complex than the online system. There has not been much work on
the verification of handwritten Bangla characters [9,10]. Therefore, there is a pressing need
for such a system. The present paper deals with writer verification based on handwritten
Bangla characters.
science studies [24,25] report the usefulness estimate of dynamic information from static
handwriting.
To enhance the performance of the writer verification system, we have proposed a new
approach to extract texture information from the handwriting sample [18,20]. The sur-
vey [19,20] show texture descriptors, texture based features and dissimilarity. Local binary
patterns and phase quantization have been used in [19] writer identification. In [20] the
scientists achieve the performance of 96.1%. Some examples of this scheme can be found
in Marti et al. [26], Srihari et al. [27], Bulacu et al. [28], Bensefia et al. [29], Siddiqi and
Vincent [30].
of the ways which is used with many different methods of classification as reported in
the survey, namely distance measures [1,37], dissimilarity [38], hidden Markov models [39],
Bayesian classifiers [40], and grapheme clustering [29].
The manual process of document examination is a tedious job and is also very time-
consuming. Srihari et al. [41] introduce a handwriting examination system, which is known
as CEDAR-FOX. This system can be used in writer verification as well as in signature
verification.
Biometric database
FIGURE 1.2: Examples of biometric characteristics: (a) voice, (b) fingerprint, (c) hand
geometry, (d) sclera, (e) face, (f) iris, (g) keystroke, (h) handwriting.
1.2.10 Database
A handwriting database has great importance in our study of writer verification area. All
the research works into the writer verification field as they have been conducted for several
years, there have some different languages of standard offline databases are created. Bulacu
et al. [38] created a system on writer verification and identification on Roman databases
like the IAM database [56], Unipen database [57], and Firemaker set [58]. They propose
to combine allographic and textural features for text-independent writer identification with
Arabic script. But due to the lack of availability of a Bangla script database, the development
of a Bengali writer verification system has been negatively affected. Only Halder and Roy
6 Hybrid Intelligent Techniques for Pattern Analysis and Understanding
[10] used Bangla characters (covering all alphabets, vowel modifiers, vowel modifiers) and
Bangla numerals in [58] for writer identification in their research works.
(a) Bangla
consonants
FIGURE 1.3: Examples of (a) Bangla consonants and (b) Bangla vowels.
Offline Writer Verification Based on Bangla Handwritten Characters 7
sometimes absent for certain characters. In Bangla script, a vowel following a consonant
takes a modified shape. This modified shape is placed at the left, right, and bottom of
the consonant, or both at left and right. These modified shapes are called the modified
characters.
The handwritten character verification system which is proposed in this article con-
sists of four major phases: preprocessing phase, feature extraction techniques, dissimilarity
measurement in the process calculating Kullback–Leibler (KL) divergence distances on the
questioned document examinations between same-writer and different-writer samples, and
finally, the classification phase.
In order to construct a more precise verification system, the following four methods are
combined in this work:
1. DT-CWT feature extraction.
1.4 Method
In this section, the overall idea of the proposed method has been described. For
the present work, we have contemplated a sample database of 150 writers, consisting of
different Bangla Isolated characters: consonants, vowels, numericals, and vowel modifiers
are collected. The different- and same-writer variations can be seen in the distance value
(dissimilarity measure) among handwriting from different writers. The experts analyze
and verify the writers on the basis of these distance values. We can see the difference
in Figure 1.4. In this work, we have used combined textural features of DT-CWT and
GLCM to obtain that difference for writer verification. To verify unknown writers com-
paring a database of known writers, first textural features are calculated, then the dis-
similarity feature vector is calculated and finally using them, the verification result is
obtained.
Figure 1.5 depicts the proposed diagram of the writer verification process. At first,
the collected data are preprocessed and the textural feature extraction methods of
FIGURE 1.4: Sample of four different isolated Bangla characters from three different
writers.
8 Hybrid Intelligent Techniques for Pattern Analysis and Understanding
Handwritten samples
Preprocessing
Dissimilarity measure
Classification
Result
DT-CWT and GLCM are applied separately and then as a combined feature extraction
method on the chosen dataset. The classifiers are then applied on the computed distances
to calculate the dissimilarity measures between the questioned and the reference handwrit-
ing.
Here Ψc (t) is the complex wavelet filter, Ψr eal(t) is the real part, and Ψi mg(t) is the
imaginary part of the wavelet. DT-CWT functions h(p, q) have the following equation:
where h(p, q) is the DT-CWT functions, d(p, q)is a Gaussian function centered at (0, 0) and
the center frequency is (wp , wq ) of the corresponding subband. The complex coefficients of
the k-th subband of the l-th level are as follows:
L1
Level 2
2 H1
Level 1
L1
Tree A L1 2
2 H1
H1
2 L2
Isolated Bangla
characters L2
2 H2
L2 2 H2
2
H2
2
Tree B
FIGURE 1.7: The schematic diagram of n level dual tree complex wavelet transforms
(DT-CWT).
The magnitude is inconsiderate because d(p, q) is slowly varying. At each level, complex
coefficients angles are ±15◦ , ±45◦ , ±75◦ . These two properties are very useful for writer
verification.
Figure 1.7 shows a DT-CWT feature extraction diagram for the verification system.
DT-CWT can be use as a dual-tree formation [65]. The up sampling and down sampling
before filtering and after filtering are needed to support the shift invariance. Here we use
six levels of the dual-tree complex wavelet. We collected outputs of subband images into
complex wavelet coefficients. Getting more information is referred to in [66].
Here, in Equation 1.5, the offset (∆a, ∆b) parameterization makes the co-occurrence matrix
sensitive to rotation. The offset (∆a, ∆b) is specifying the distance between the pixel-of-
interest and its adjacent pixel. Choosing an offset vector, the rotation of the image is not
equal to 180◦ , will result in a different co-occurrence matrix for the same image. To achieve a
degree of rotational invariance (i.e., 0◦ , 45◦ , 90◦ , 135◦ ) using a set of offsets sweeping through
180 degrees at the same distance parameter ∆ by forming the co-occurrence matrix. In this
approach, GLCM is calculated with Energy, Contrast, Correlation, and Homogeneity in
four directions, considering the pairs like G[s, q] and G[s, p]. Following this approach, we
obtain 22 feature vectors using the modified GLCM feature extraction method over our
chosen dataset. Here, we use a maximum of 22 dimension features. Twenty-two dimensional
feature vectors have been computed using GLCM method in MATLABr , which is different
from the work of Haralick [67]. Then the first-order statistics of standard deviation and
mean are computed over the features.
Offline Writer Verification Based on Bangla Handwritten Characters 11
1 M
(M ean)µ = Σ Ei (1.6)
M (i=1)
s
1
(Standard deviation)S = ΣM |Ei − µ|2 (1.7)
(M − 1) (i=1)
Here, vector Ii is made up of M scalar observations. Therefore, finally 172 feature vectors
are obtained.
In this method, Gaussian distribution is applied on each writer set to find out the KLdist
of same-writer sets. Different writer KLdist distances are calculated between one writer from
each set with different writers from all sets.
x1
x2
Output
Input signal
signal x3
xn
Y(a) Output
w1
wm Linear weights
wj
a1 ai an Input
Canción.
Tan alegres sentimientos
recibo, que no me espanto,
si cuesta dos mil tormentos
un placer que vale tanto.
Canción.
Vuelve agora en otra parte,
zagala, tus ojos bellos;
que si me miras con ellos
es excusado mirarte.
Canción.
Zagal, vuelve sobre ti;
que por excusar dolor
no quiero matar de amor,
ni que Amor me mate á mí.
Canción.
Mal consejo me parescs,
enamorado zagal,
que á ti mismo quieres mal,
por amar quien te
aborresce.
Canción.
Sylvano. Pastor, mal te está
el callar:
canta y dinos tu
alegría.
Sylvano. Si no se viene á
tratar
no se goza una
alegría.
Pregunta.
Junto á un pastor estaba una
doncella,
tan flaca como un palo al sol
secado,
su cuerpo de ojos muchos
rodeado,
con lengua que jamás pudo
movella.
A lo alto y bajo el viento vi
traella,
mas de una parte nunca se
ha mudado,
vino á besarla el triste
enamorado
y ella movió tristíssima
querella.
Cuanto más le atapó el pastor
la boca,
más voces da porque la
gente acuda,
y abriendo está sus ojos y
cerrando.
Ved qué costó forzar zagala
muda,
que al punto que el pastor la
besa ó toca,
él queda enmudecido y ella
hablando.
Pregunta.
Vide un soto levantado
sobre los aires un día,
el cual, con sangre regado,
con gran ansia cultivado
muchas hierbas producía.
De allí un manojo arrancando,
y sólo con él tocando
una sabia y cuerda gente,
la dejé cabe una puente
sin dolores lamentando.
Pregunta.
¿Cuál es el ave ligera
que está siempre en un
lugar,
y anda siempre caminando,
penetra y entra do quiera,
de un vuelo passa la mar,
las nubes sobrepujando?
Ansi vella no podemos,
y quien la está
descubriendo,
sabio queda en sola un
hora;
mas tal vez la conoscemos,
las paredes solas viendo
de la casa donde mora.