{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T07:28:16Z","timestamp":1762673296240},"reference-count":15,"publisher":"Elsevier BV","issue":"5","license":[{"start":{"date-parts":[[1989,1,1]],"date-time":"1989-01-01T00:00:00Z","timestamp":599616000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Neural Networks"],"published-print":{"date-parts":[[1989,1]]},"DOI":"10.1016\/0893-6080(89)90023-3","type":"journal-article","created":{"date-parts":[[2003,4,25]],"date-time":"2003-04-25T05:05:53Z","timestamp":1051247153000},"page":"387-393","source":"Crossref","is-referenced-by-count":94,"title":["A neural network approach to character recognition"],"prefix":"10.1016","volume":"2","author":[{"given":"A.","family":"Rajavelu","sequence":"first","affiliation":[]},{"given":"M.T.","family":"Musavi","sequence":"additional","affiliation":[]},{"given":"M.V.","family":"Shirvaikar","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0893-6080(89)90023-3_BIB1","first-page":"171","article-title":"Walsh Functions and their applications","author":"Beauchamp","year":"1975"},{"key":"10.1016\/0893-6080(89)90023-3_BIB2","first-page":"67","article-title":"Scientific and engineering problem solving with the computer","author":"Bennett","year":"1976"},{"key":"10.1016\/0893-6080(89)90023-3_BIB3","series-title":"Proceedings of IEEE International Conference on Systems","first-page":"1621","article-title":"A neural network digit recognizer","volume":"Vol. 1","author":"Burr","year":"1986"},{"key":"10.1016\/0893-6080(89)90023-3_BIB4","series-title":"Application of Walsh Functions and sequency theory","first-page":"9","article-title":"On the use of Walsh Functions in man-made and biological pattern recognition systems","author":"Carl","year":"1974"},{"key":"10.1016\/0893-6080(89)90023-3_BIB5","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/S0734-189X(87)80183-4","article-title":"Optical character recognition by the method of moments","volume":"39","author":"Cash","year":"1987","journal-title":"Computer Vision, Graphics and Image Processing"},{"key":"10.1016\/0893-6080(89)90023-3_BIB6","series-title":"A system for automatic recognition of patterns","first-page":"210","volume":"Vol. 106B","year":"1958"},{"key":"10.1016\/0893-6080(89)90023-3_BIB7","first-page":"155","article-title":"Back propagation: A generalized learning rule","volume":"12","author":"Jones","year":"1987","journal-title":"Byte"},{"key":"10.1016\/0893-6080(89)90023-3_BIB8","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1109\/TPAMI.1987.4767901","article-title":"On recognition of printed characters of any font and size","volume":"PAMI-9","author":"Kahan","year":"1987","journal-title":"IEEE Transactions on Pattern Recognition and Machine Intelligence"},{"key":"10.1016\/0893-6080(89)90023-3_BIB9","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/0031-3203(88)90068-4","article-title":"Structural classification and relaxation matching of totally unconstrained handwritten zipcode numbers","volume":"21","author":"Lam","year":"1988","journal-title":"Pattern Recognition"},{"key":"10.1016\/0893-6080(89)90023-3_BIB10","first-page":"771","article-title":"Neural net application to optical character recognition","volume":"4","author":"Mehr","year":"1987"},{"key":"10.1016\/0893-6080(89)90023-3_BIB11","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/0734-189X(86)90128-3","article-title":"A vectorizer and feature extractor for document recognition","volume":"35","author":"Pavlidis","year":"1986","journal-title":"Computer Vision, Graphics and Image Processing"},{"key":"10.1016\/0893-6080(89)90023-3_BIB12","first-page":"318","article-title":"Learning internal representations by error propagation","volume":"Vol. 1","author":"Rumelhart","year":"1988"},{"key":"10.1016\/0893-6080(89)90023-3_BIB13","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1038\/323533a0","article-title":"Learning representations by back propagating errors","volume":"323","author":"Rumelhart","year":"1986","journal-title":"Nature"},{"key":"10.1016\/0893-6080(89)90023-3_BIB14","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1109\/TPAMI.1985.4767665","article-title":"Automatic feature design for optical character recognition using evolutionary search procedure","volume":"PAMI-7","author":"Stentiford","year":"1985","journal-title":"IEEE Transactions on Pattern Recognition and Machine Intelligence"},{"key":"10.1016\/0893-6080(89)90023-3_BIB15","doi-asserted-by":"crossref","first-page":"5","DOI":"10.2307\/2387224","article-title":"A closed set of normal orthogonal functions","volume":"45","author":"Walsh","year":"1923","journal-title":"American Journal of Mathematics"}],"container-title":["Neural Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0893608089900233?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0893608089900233?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T18:58:49Z","timestamp":1553281129000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0893608089900233"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1989,1]]},"references-count":15,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1989,1]]}},"alternative-id":["0893608089900233"],"URL":"https:\/\/doi.org\/10.1016\/0893-6080(89)90023-3","relation":{},"ISSN":["0893-6080"],"issn-type":[{"value":"0893-6080","type":"print"}],"subject":[],"published":{"date-parts":[[1989,1]]}}}