SlideShare a Scribd company logo
1 of 8
Download to read offline
David C. Wyld et al. (Eds) : CSEN, AISO, NCWC, SIPR - 2015
pp. 69–76, 2015. © CS & IT-CSCP 2015 DOI : 10.5121/csit.2015.51407
IMAGE TYPE WATER METER CHARACTER
RECOGNITION BASED ON EMBEDDED
DSP
LIU Ying1
, HAN Yan-bin2
and ZHANG Yu-lin3
School of Information Science and Engineering,
University of Jinan, Jinan 250022, PR China
75587050@qq.com1
87685630@qq.com2
ise_zhangyl@ujn.edu.cn3
ABSTRACT
In the paper, we combined DSP processor with image processing algorithm and studied the
method of water meter character recognition. We collected water meter image through camera
at a fixed angle, and the projection method is used to recognize those digital images. The
experiment results show that the method can recognize the meter characters accurately and
artificial meter reading is replaced by automatic digital recognition, which improves working
efficiency.
KEYWORDS
DSP, water meter recognition, image processing & projection method
1. INTRODUCTION
In recent years, with the progress of society and science technology, it is quite common that
manual work had been replaced by machines. In our daily life, water consumption statistics were
mostly gotten in the form of artificial meter reading. This method not only increased the
workload and difficulty of work, but also had some obvious drawbacks. The use of automatic
meter reading systems not only overcome the insufficiency of manual meter reading, but also
reduced the practical resources and save time.
Based on DSP chip, this study collected water meter image through the camera on hardware
system. Firstly, we achieved the purpose of automatic identification through a series of image
processing technology. Lastly, the designed algorithm was transplanted into hardware devices
and tested. (As shown in figure 1) The advantages of the study are simply structure with high
recognition rate and low cost. The identification process is mainly divided into two parts: image
processing and water meter characters recognition.
70 Computer Science & Information Technology (CS & IT)
Figure 1 hardware test
2. RELATED WORK
Image processing is an important task, and it directly affects the recognition of the digital image.
In the techniques of image processing, the main techniques that related to this study include
image filtering, image enhancement, edge detection, image segmentation and image binarization,
etc.
For example, based on the quality of image, image segmentation is divided into many concrete
methods. In literature 1, it segmented digital image of water meter through counting the number
of pixels in each row and column. In literature 2, it segmented digital image of water meter
through vertical projection and horizontal projection. As for the image binarization, it is divided
into fixed threshold method and adaptive threshold method. The literature [2-4] adopted adaptive
threshold method. The literature 2 used cv adaptive threshold that was included in Opencv. The
literature 3 used OTSU algorithm. And the literature 4 adopted three adaptive threshold methods.
In the method of digital recognition, the literature [5, 6] adopted neural network recognition
method [7, 8]. The literature 9 adopted template matching method to recognition. And the
literature 10 improved template matching and used it to recognize.
In this paper, the methods that we used in image processing included image segmentation, image
binarization, and image filtering. In the process of digital meter identification, we adopted the
method of projection. Specific implementation process is shown in figure 2.
3. WATER METER IMAGE PRE-TREATMENT
Water meter image pre-processing is important to the character recognition. Image pre-treatment
can significantly improve the quality of image and reduce noise. It is helpful for the extraction of
image characteristics
3.1. Image segmentation
Because the images that were used in this study were collected through the installed cameras, the
size of the image was relatively fixed. The collected water meter images had obvious border
(shown in figure 3), so we segmented those pictures at a fixed point, and extracted the effective
area (shown in figure 4).
Computer Science & Information Technology (CS & IT) 71
Figure 2 digital meter processing
Figure 3 camera collections of pictures
Figure 4 image segmentation
3.2. Image binarization
The role of image binarization is to make the image black and white obviously. Binarization
method is divided into fixed threshold method and adaptive threshold method. It is because the
adaptability of fixed threshold method is poor that we generally use the adaptive threshold
method.
72 Computer Science & Information Technology (CS & IT)
In the study, the OTSU algorithm had simple calculation and it was not affected by the image
brightness and contrast, so we used OTSU algorithm. After segmenting, the image was divided
into five areas. We used the OTSU algorithm in the five areas separately for local binarization.
The result is shown in figure 5.
Figure 5 the effect after binarization
3.3. Image filtering
Filtering can eliminate the noise points in the image. For binary image, we eliminate the image
boundary, and then remove the small area into the isolated pixels. The result is shown in figure 6.
Figure 6 after filtering
4. DIGITAL SYMBOL RECOGNITION
There are many methods of digital symbol recognition, such as template matching, neural
network recognition, statistical method and fuzzy theory method, etc.
In the research, digital symbol recognition is divided into full-word recognition, half-word
recognition and logic recognition. Projection method was used in this paper. This method makes
the digital project, and then, matches the projection curve with template curve. Finally, it outputs
the number which has the minimum error. Because numbers 5, 6, 8 and 9 have higher similarity
in this method, connected domain method was used in the two - times recognition. The connected
domain method uses the number of connected domain and the location of connected domain to
recognition.
Figure 7 is the projection curve of 0-9. As for every number, I selected four samples. From figure
7, we can see that the numbers 5, 6, 8 and 9 have similar characteristics. Other digital have
obvious characteristics and the projection curve at the same digital has good consistency.
Therefore, projection method has good ability to recognize. As for the problem that the projection
method is not applicable in the numbers 5, 6, 8 and 9, we put forward the connected domain
method. The method can solve the problem.
Computer Science & Information Technology (CS & IT) 73
Figure 7 projection graph of 0-9
5. HALF-WORD RECOGNITION
In the above recognition method, the accuracy of full-word recognition is close to 100%. As for
the half-word recognition, it was always the difficulty of the study. The common methods are
template matching method, and neural network recognition method, etc. Literature 11 was
studied specifically for half-word recognition. The half-word is composed of one long and one
short, the algorithm is just calculated the longer half-word, and the shorter one was not
considered.
74 Computer Science & Information Technology (CS & IT)
In my paper, I improved the template matching method based on the projection method of full-
word recognition. (The image of half-word is shown in figure 8) I reserved the long part and the
short pat, and then, I used the method of projection on them respectively. Finally, I analysed the
matching result and recognized the digital according to the logical continuity.
Figure 8 half-word image
Table 1 is the matched data of the half-word in figure 8. In matched data in the above part, the
number 3 has the minimum error. In matched data of the below part, the number 4 has the
minimum error. Because of the number 3 and the number 4 have continuity in logic, they can
recognize correctly.
Table 1 the matched data of the half-word in figure 8
match object 0 1 2 3 4 5 6 7 8 9
error (above) 3.5 5.8 4.4 1.6 4.9 4.0 3.0 5.4 3.6 4.1
error (below) 7.2 6.4 6.2 5.3 1.5 6.6 6.3 5.7 5.7 6.5
6. LOGIC IDENTIFY
Aiming at several half-word in figure 9, there is needed to adopt logical identification. When the
image appears more than one half-word, if we only recognize the longer half-word, there will be
a cross recognition (as shown in figure 9, those images may be recognized to 310 and 300) and
cause errors. So we need to combine the continuity of digital to recognize. The method not only
saves the calculation time, but also improves the recognition accuracy.
Figure 9 several half-words
The recognition results of some typical half-word are shown in figure 10. The above of the image
is original image, the lower left corner is the processed image, and the lower right is recognition
results.
Computer Science & Information Technology (CS & IT) 75
Figure 10 recognition results
7. CONCLUSIONS
This study used the projection method as the main means of digital recognition. In addition, we
put forward the connected domain method and logical identification method in half-word. In this
paper, the scheme of automatic recognition of digital water meter has good results, especially for
the difficulty recognition of half-word. What is more, this study adopts the DSP chip. Through
combination with embedded technology, making this study has practical application value.
Through testing, the method that mentioned in this paper obtained a good accuracy. The
recognition accuracy can reach above 95%. The method is simple and effective, and can be used
to replace artificial meter reading. It overcomes the disadvantages of manual meter reading and
has good practical value.
ACKNOWLEDGEMENTS
This article is completed under the guidance of professor ZHANG and professor HAN. In
addition, my classmates also gave me a lot of help. What is more, University of Jinan provided a
good learning environment for us.
REFERENCES
[1] LI Yun-dong & SUN Chang-qing, (2013) “Research on Real-Time Water Meter Recognition System
Based on BF Neural Network”, Computer Measurement & Control, Vol. 21, No. 5, pp1330-1332.
[2] GAO Ju & YE Hua,(2013)”An effective two-times recognition algorithm of meter digital image”,
JOURNAL OF SOUTHEAST UNIVERSITY(Natural Science Edition), Vol. 7, No.1, pp153-157.
[3] XI Run-ping, ZHAO Rong-chun, YUE Si-cong & YI Fei, (2007) “An Automatic Reading and
Recognition System for Water Meter Based on DSP and Image Processing”, Measurement & Control
Technology, Vol. 26, No. 5, pp21-25.
[4] YANG Xin-yi, LV Wei-tao, YANG Jun, ZHANG Ke, MA Ying, YAO Wen & LI Qing-yong (2014),
“Three kinds of threshold methods in the application of lightning channel image recognition”,
JOURNAL OF APPLIED METEORLOLGICAL SCIENCE, Vol. 25, No. 4, pp427-435.
[5] FAN Chong-qing, (2004) “Using the BP neural network to identify digital image”, Journal of Higher
Correspondence Education (Natural Sciences), Vol. 17, No. 6, pp46-49.
76 Computer Science & Information Technology (CS & IT)
[6] ZHANG Yi-cheng, CHEN Xin, YANG Hong-jun, ZHANG Yu-jian (2013), “Neural Network Digital
Characters Recognition Based on the Combined Feature”, Computer System & Applications, Vol. 22,
No. 3, pp113-116.
[7] ZHOU Yu, ZHU An-fu, ZHOU Lin & QIAN Xu,(2012) “Sample data selection method for neural
network classifiers”, J.Huazhong Univ. of Sci. & Tech. (Natural Science Edition), Vol. 40, No. 6,
pp39-43.
[8] WANG Ting, JIANG Wen-hui & XIAO Nan-feng (2011), “Numerical recognition based on
improved BP neural network”, Electronic Design Engineering, Vol.19, No.3, pp108-112.
[9] LI Zhi-rong, YANG Dan & ZHOU Qi (2009), “Digital recognition based on template matching”,
NATURAL SCIENCES JOURNAL OF HARBIN NORMAL UNIVERSITY, Vol.25, No.4, pp86-95.
[10] ZOU Ming-ming & LU Di,(2010) “Recognition algorithm of car license plate characters based on
modified template match”, Foreign Electronic Measurement Technology, Vol. 29, No.1, pp59-80.
[11] JIN Jing-xiao & XIN Kun-lun,(2015) “Application of improved half-word recognition method in
automatic meter reading system”, WATER TECHNOLOGY, Vol.9 No.1, pp43-45.
AUTHORS
LIU Ying (1991-), female, master, research in switched reluctance motor, pattern recognition, image
processing.
HAN Yan-bin (1979- ), male, associate professor, research in pattern recognition, image processing.
ZHANG Yu-lin (1972-), corresponding author, male, professor, the research direction for embedded
system, computer architecture.

More Related Content

What's hot

An interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’sAn interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’seSAT Publishing House
 
AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGES
AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGESAN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGES
AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGESijait
 
A Novel Mathematical Based Method for Generating Virtual Samples from a Front...
A Novel Mathematical Based Method for Generating Virtual Samples from a Front...A Novel Mathematical Based Method for Generating Virtual Samples from a Front...
A Novel Mathematical Based Method for Generating Virtual Samples from a Front...CSCJournals
 
Signature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiSignature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiDr. Vinayak Bharadi
 
IRJET - Deep Learning Approach to Inpainting and Outpainting System
IRJET -  	  Deep Learning Approach to Inpainting and Outpainting SystemIRJET -  	  Deep Learning Approach to Inpainting and Outpainting System
IRJET - Deep Learning Approach to Inpainting and Outpainting SystemIRJET Journal
 
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsA Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsIRJET Journal
 
An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...IJCI JOURNAL
 
Multimodal Approach for Face Recognition using 3D-2D Face Feature Fusion
Multimodal Approach for Face Recognition using 3D-2D Face Feature FusionMultimodal Approach for Face Recognition using 3D-2D Face Feature Fusion
Multimodal Approach for Face Recognition using 3D-2D Face Feature FusionCSCJournals
 
Recognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic OperationsRecognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic OperationsTELKOMNIKA JOURNAL
 
Utilization of Super Pixel Based Microarray Image Segmentation
Utilization of Super Pixel Based Microarray Image SegmentationUtilization of Super Pixel Based Microarray Image Segmentation
Utilization of Super Pixel Based Microarray Image Segmentationijtsrd
 
19 9742 the application paper id 0016(edit ty)
19 9742 the application paper id 0016(edit ty)19 9742 the application paper id 0016(edit ty)
19 9742 the application paper id 0016(edit ty)IAESIJEECS
 
Sample Paper Techscribe
Sample  Paper TechscribeSample  Paper Techscribe
Sample Paper Techscribeguest533af374
 
Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419IJRAT
 
Performance and analysis of improved unsharp masking algorithm for image
Performance and analysis of improved unsharp masking algorithm for imagePerformance and analysis of improved unsharp masking algorithm for image
Performance and analysis of improved unsharp masking algorithm for imageIAEME Publication
 
Implementing Tumor Detection and Area Calculation in Mri Image of Human Brain...
Implementing Tumor Detection and Area Calculation in Mri Image of Human Brain...Implementing Tumor Detection and Area Calculation in Mri Image of Human Brain...
Implementing Tumor Detection and Area Calculation in Mri Image of Human Brain...IJERA Editor
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 

What's hot (17)

An interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’sAn interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’s
 
AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGES
AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGESAN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGES
AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGES
 
A Novel Mathematical Based Method for Generating Virtual Samples from a Front...
A Novel Mathematical Based Method for Generating Virtual Samples from a Front...A Novel Mathematical Based Method for Generating Virtual Samples from a Front...
A Novel Mathematical Based Method for Generating Virtual Samples from a Front...
 
Signature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiSignature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertati
 
IRJET - Deep Learning Approach to Inpainting and Outpainting System
IRJET -  	  Deep Learning Approach to Inpainting and Outpainting SystemIRJET -  	  Deep Learning Approach to Inpainting and Outpainting System
IRJET - Deep Learning Approach to Inpainting and Outpainting System
 
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsA Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching Algorithms
 
An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...
 
Multimodal Approach for Face Recognition using 3D-2D Face Feature Fusion
Multimodal Approach for Face Recognition using 3D-2D Face Feature FusionMultimodal Approach for Face Recognition using 3D-2D Face Feature Fusion
Multimodal Approach for Face Recognition using 3D-2D Face Feature Fusion
 
Recognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic OperationsRecognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic Operations
 
Utilization of Super Pixel Based Microarray Image Segmentation
Utilization of Super Pixel Based Microarray Image SegmentationUtilization of Super Pixel Based Microarray Image Segmentation
Utilization of Super Pixel Based Microarray Image Segmentation
 
J017426467
J017426467J017426467
J017426467
 
19 9742 the application paper id 0016(edit ty)
19 9742 the application paper id 0016(edit ty)19 9742 the application paper id 0016(edit ty)
19 9742 the application paper id 0016(edit ty)
 
Sample Paper Techscribe
Sample  Paper TechscribeSample  Paper Techscribe
Sample Paper Techscribe
 
Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419
 
Performance and analysis of improved unsharp masking algorithm for image
Performance and analysis of improved unsharp masking algorithm for imagePerformance and analysis of improved unsharp masking algorithm for image
Performance and analysis of improved unsharp masking algorithm for image
 
Implementing Tumor Detection and Area Calculation in Mri Image of Human Brain...
Implementing Tumor Detection and Area Calculation in Mri Image of Human Brain...Implementing Tumor Detection and Area Calculation in Mri Image of Human Brain...
Implementing Tumor Detection and Area Calculation in Mri Image of Human Brain...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 

Viewers also liked

The determinants of cloud computing adoption in saudi arabia
The determinants of cloud computing adoption in saudi arabiaThe determinants of cloud computing adoption in saudi arabia
The determinants of cloud computing adoption in saudi arabiacsandit
 
Detection of oriented number plate in vehicle using autocorrection feature fr...
Detection of oriented number plate in vehicle using autocorrection feature fr...Detection of oriented number plate in vehicle using autocorrection feature fr...
Detection of oriented number plate in vehicle using autocorrection feature fr...csandit
 
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...csandit
 
Sensitivity analysis in a lidar camera calibration
Sensitivity analysis in a lidar camera calibrationSensitivity analysis in a lidar camera calibration
Sensitivity analysis in a lidar camera calibrationcsandit
 
Using Mutation in Fault Localization
Using Mutation in Fault Localization Using Mutation in Fault Localization
Using Mutation in Fault Localization csandit
 
Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...
Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...
Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...csandit
 
Smart as a Cryptographic Processor
Smart as a Cryptographic Processor Smart as a Cryptographic Processor
Smart as a Cryptographic Processor csandit
 
Analysis of lexico syntactic patterns for antonym pair extraction from a turk...
Analysis of lexico syntactic patterns for antonym pair extraction from a turk...Analysis of lexico syntactic patterns for antonym pair extraction from a turk...
Analysis of lexico syntactic patterns for antonym pair extraction from a turk...csandit
 
Modified Vortex Search Algorithm for Real Parameter Optimization
Modified Vortex Search Algorithm for Real Parameter Optimization Modified Vortex Search Algorithm for Real Parameter Optimization
Modified Vortex Search Algorithm for Real Parameter Optimization csandit
 
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...csandit
 
Exploring Peer-To-Peer Data Mining
Exploring Peer-To-Peer Data MiningExploring Peer-To-Peer Data Mining
Exploring Peer-To-Peer Data Miningcsandit
 
COQUEL: A CONCEPTUAL QUERY LANGUAGE BASED ON THE ENTITYRELATIONSHIP MODEL
COQUEL: A CONCEPTUAL QUERY LANGUAGE BASED ON THE ENTITYRELATIONSHIP MODELCOQUEL: A CONCEPTUAL QUERY LANGUAGE BASED ON THE ENTITYRELATIONSHIP MODEL
COQUEL: A CONCEPTUAL QUERY LANGUAGE BASED ON THE ENTITYRELATIONSHIP MODELcsandit
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...csandit
 
Associative Regressive Decision Rule Mining for Predicting Customer Satisfact...
Associative Regressive Decision Rule Mining for Predicting Customer Satisfact...Associative Regressive Decision Rule Mining for Predicting Customer Satisfact...
Associative Regressive Decision Rule Mining for Predicting Customer Satisfact...csandit
 
Mobile-Based Video Caching Architecture Based on Billboard Manager
Mobile-Based Video Caching Architecture Based on Billboard Manager Mobile-Based Video Caching Architecture Based on Billboard Manager
Mobile-Based Video Caching Architecture Based on Billboard Manager csandit
 
Authentication and Key Agreement in 3GPP Networks
Authentication and Key Agreement in 3GPP Networks Authentication and Key Agreement in 3GPP Networks
Authentication and Key Agreement in 3GPP Networks csandit
 
Single Image Fog Removal Based on Fusion Strategy
Single Image Fog Removal Based on Fusion Strategy Single Image Fog Removal Based on Fusion Strategy
Single Image Fog Removal Based on Fusion Strategy csandit
 
SENSOR SELECTION SCHEME IN WIRELESS SENSOR NETWORKS: A NEW ROUTING APPROACH
SENSOR SELECTION SCHEME IN WIRELESS SENSOR NETWORKS: A NEW ROUTING APPROACHSENSOR SELECTION SCHEME IN WIRELESS SENSOR NETWORKS: A NEW ROUTING APPROACH
SENSOR SELECTION SCHEME IN WIRELESS SENSOR NETWORKS: A NEW ROUTING APPROACHcsandit
 
MEDICAL IMAGING MUTIFRACTAL ANALYSIS IN PREDICTION OF EFFICIENCY OF CANCER TH...
MEDICAL IMAGING MUTIFRACTAL ANALYSIS IN PREDICTION OF EFFICIENCY OF CANCER TH...MEDICAL IMAGING MUTIFRACTAL ANALYSIS IN PREDICTION OF EFFICIENCY OF CANCER TH...
MEDICAL IMAGING MUTIFRACTAL ANALYSIS IN PREDICTION OF EFFICIENCY OF CANCER TH...csandit
 
Oportunidades alianza del pacífico para perú, agroindustria, cali, 01 de octu...
Oportunidades alianza del pacífico para perú, agroindustria, cali, 01 de octu...Oportunidades alianza del pacífico para perú, agroindustria, cali, 01 de octu...
Oportunidades alianza del pacífico para perú, agroindustria, cali, 01 de octu...ProColombia
 

Viewers also liked (20)

The determinants of cloud computing adoption in saudi arabia
The determinants of cloud computing adoption in saudi arabiaThe determinants of cloud computing adoption in saudi arabia
The determinants of cloud computing adoption in saudi arabia
 
Detection of oriented number plate in vehicle using autocorrection feature fr...
Detection of oriented number plate in vehicle using autocorrection feature fr...Detection of oriented number plate in vehicle using autocorrection feature fr...
Detection of oriented number plate in vehicle using autocorrection feature fr...
 
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
 
Sensitivity analysis in a lidar camera calibration
Sensitivity analysis in a lidar camera calibrationSensitivity analysis in a lidar camera calibration
Sensitivity analysis in a lidar camera calibration
 
Using Mutation in Fault Localization
Using Mutation in Fault Localization Using Mutation in Fault Localization
Using Mutation in Fault Localization
 
Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...
Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...
Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Tech...
 
Smart as a Cryptographic Processor
Smart as a Cryptographic Processor Smart as a Cryptographic Processor
Smart as a Cryptographic Processor
 
Analysis of lexico syntactic patterns for antonym pair extraction from a turk...
Analysis of lexico syntactic patterns for antonym pair extraction from a turk...Analysis of lexico syntactic patterns for antonym pair extraction from a turk...
Analysis of lexico syntactic patterns for antonym pair extraction from a turk...
 
Modified Vortex Search Algorithm for Real Parameter Optimization
Modified Vortex Search Algorithm for Real Parameter Optimization Modified Vortex Search Algorithm for Real Parameter Optimization
Modified Vortex Search Algorithm for Real Parameter Optimization
 
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...
 
Exploring Peer-To-Peer Data Mining
Exploring Peer-To-Peer Data MiningExploring Peer-To-Peer Data Mining
Exploring Peer-To-Peer Data Mining
 
COQUEL: A CONCEPTUAL QUERY LANGUAGE BASED ON THE ENTITYRELATIONSHIP MODEL
COQUEL: A CONCEPTUAL QUERY LANGUAGE BASED ON THE ENTITYRELATIONSHIP MODELCOQUEL: A CONCEPTUAL QUERY LANGUAGE BASED ON THE ENTITYRELATIONSHIP MODEL
COQUEL: A CONCEPTUAL QUERY LANGUAGE BASED ON THE ENTITYRELATIONSHIP MODEL
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
 
Associative Regressive Decision Rule Mining for Predicting Customer Satisfact...
Associative Regressive Decision Rule Mining for Predicting Customer Satisfact...Associative Regressive Decision Rule Mining for Predicting Customer Satisfact...
Associative Regressive Decision Rule Mining for Predicting Customer Satisfact...
 
Mobile-Based Video Caching Architecture Based on Billboard Manager
Mobile-Based Video Caching Architecture Based on Billboard Manager Mobile-Based Video Caching Architecture Based on Billboard Manager
Mobile-Based Video Caching Architecture Based on Billboard Manager
 
Authentication and Key Agreement in 3GPP Networks
Authentication and Key Agreement in 3GPP Networks Authentication and Key Agreement in 3GPP Networks
Authentication and Key Agreement in 3GPP Networks
 
Single Image Fog Removal Based on Fusion Strategy
Single Image Fog Removal Based on Fusion Strategy Single Image Fog Removal Based on Fusion Strategy
Single Image Fog Removal Based on Fusion Strategy
 
SENSOR SELECTION SCHEME IN WIRELESS SENSOR NETWORKS: A NEW ROUTING APPROACH
SENSOR SELECTION SCHEME IN WIRELESS SENSOR NETWORKS: A NEW ROUTING APPROACHSENSOR SELECTION SCHEME IN WIRELESS SENSOR NETWORKS: A NEW ROUTING APPROACH
SENSOR SELECTION SCHEME IN WIRELESS SENSOR NETWORKS: A NEW ROUTING APPROACH
 
MEDICAL IMAGING MUTIFRACTAL ANALYSIS IN PREDICTION OF EFFICIENCY OF CANCER TH...
MEDICAL IMAGING MUTIFRACTAL ANALYSIS IN PREDICTION OF EFFICIENCY OF CANCER TH...MEDICAL IMAGING MUTIFRACTAL ANALYSIS IN PREDICTION OF EFFICIENCY OF CANCER TH...
MEDICAL IMAGING MUTIFRACTAL ANALYSIS IN PREDICTION OF EFFICIENCY OF CANCER TH...
 
Oportunidades alianza del pacífico para perú, agroindustria, cali, 01 de octu...
Oportunidades alianza del pacífico para perú, agroindustria, cali, 01 de octu...Oportunidades alianza del pacífico para perú, agroindustria, cali, 01 de octu...
Oportunidades alianza del pacífico para perú, agroindustria, cali, 01 de octu...
 

Similar to Image type water meter character recognition based on embedded dsp

A Flexible Scheme for Transmission Line Fault Identification Using Image Proc...
A Flexible Scheme for Transmission Line Fault Identification Using Image Proc...A Flexible Scheme for Transmission Line Fault Identification Using Image Proc...
A Flexible Scheme for Transmission Line Fault Identification Using Image Proc...IJEEE
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
 
Shape and Level Bottles Detection Using Local Standard Deviation and Hough Tr...
Shape and Level Bottles Detection Using Local Standard Deviation and Hough Tr...Shape and Level Bottles Detection Using Local Standard Deviation and Hough Tr...
Shape and Level Bottles Detection Using Local Standard Deviation and Hough Tr...IJECEIAES
 
IRJET- An Improvised Multi Focus Image Fusion Algorithm through Quadtree
IRJET- An Improvised Multi Focus Image Fusion Algorithm through QuadtreeIRJET- An Improvised Multi Focus Image Fusion Algorithm through Quadtree
IRJET- An Improvised Multi Focus Image Fusion Algorithm through QuadtreeIRJET Journal
 
IRJET- Face Recognition of Criminals for Security using Principal Component A...
IRJET- Face Recognition of Criminals for Security using Principal Component A...IRJET- Face Recognition of Criminals for Security using Principal Component A...
IRJET- Face Recognition of Criminals for Security using Principal Component A...IRJET Journal
 
A novel tool for stereo matching of images
A novel tool for stereo matching of imagesA novel tool for stereo matching of images
A novel tool for stereo matching of imageseSAT Publishing House
 
A novel tool for stereo matching of images
A novel tool for stereo matching of imagesA novel tool for stereo matching of images
A novel tool for stereo matching of imageseSAT Journals
 
A novel tool for stereo matching of images
A novel tool for stereo matching of imagesA novel tool for stereo matching of images
A novel tool for stereo matching of imageseSAT Publishing House
 
Dataset Pre-Processing and Artificial Augmentation, Network Architecture and ...
Dataset Pre-Processing and Artificial Augmentation, Network Architecture and ...Dataset Pre-Processing and Artificial Augmentation, Network Architecture and ...
Dataset Pre-Processing and Artificial Augmentation, Network Architecture and ...INFOGAIN PUBLICATION
 
Image Features Matching and Classification Using Machine Learning
Image Features Matching and Classification Using Machine LearningImage Features Matching and Classification Using Machine Learning
Image Features Matching and Classification Using Machine LearningIRJET Journal
 
IRJET - Facial Recognition based Attendance System with LBPH
IRJET -  	  Facial Recognition based Attendance System with LBPHIRJET -  	  Facial Recognition based Attendance System with LBPH
IRJET - Facial Recognition based Attendance System with LBPHIRJET Journal
 
IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...
IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...
IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...cscpconf
 
Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...csandit
 
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...CSCJournals
 
IMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSET
IMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSETIMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSET
IMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSETIJCSEA Journal
 
Face Recognition Technique using ICA and LBPH
Face Recognition Technique using ICA and LBPHFace Recognition Technique using ICA and LBPH
Face Recognition Technique using ICA and LBPHIRJET Journal
 
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning AlgorithmIRJET Journal
 
Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...IJMER
 

Similar to Image type water meter character recognition based on embedded dsp (20)

A Flexible Scheme for Transmission Line Fault Identification Using Image Proc...
A Flexible Scheme for Transmission Line Fault Identification Using Image Proc...A Flexible Scheme for Transmission Line Fault Identification Using Image Proc...
A Flexible Scheme for Transmission Line Fault Identification Using Image Proc...
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
 
Shape and Level Bottles Detection Using Local Standard Deviation and Hough Tr...
Shape and Level Bottles Detection Using Local Standard Deviation and Hough Tr...Shape and Level Bottles Detection Using Local Standard Deviation and Hough Tr...
Shape and Level Bottles Detection Using Local Standard Deviation and Hough Tr...
 
IRJET- An Improvised Multi Focus Image Fusion Algorithm through Quadtree
IRJET- An Improvised Multi Focus Image Fusion Algorithm through QuadtreeIRJET- An Improvised Multi Focus Image Fusion Algorithm through Quadtree
IRJET- An Improvised Multi Focus Image Fusion Algorithm through Quadtree
 
Project Poster
Project PosterProject Poster
Project Poster
 
IRJET- Face Recognition of Criminals for Security using Principal Component A...
IRJET- Face Recognition of Criminals for Security using Principal Component A...IRJET- Face Recognition of Criminals for Security using Principal Component A...
IRJET- Face Recognition of Criminals for Security using Principal Component A...
 
A novel tool for stereo matching of images
A novel tool for stereo matching of imagesA novel tool for stereo matching of images
A novel tool for stereo matching of images
 
A novel tool for stereo matching of images
A novel tool for stereo matching of imagesA novel tool for stereo matching of images
A novel tool for stereo matching of images
 
A novel tool for stereo matching of images
A novel tool for stereo matching of imagesA novel tool for stereo matching of images
A novel tool for stereo matching of images
 
Dataset Pre-Processing and Artificial Augmentation, Network Architecture and ...
Dataset Pre-Processing and Artificial Augmentation, Network Architecture and ...Dataset Pre-Processing and Artificial Augmentation, Network Architecture and ...
Dataset Pre-Processing and Artificial Augmentation, Network Architecture and ...
 
Image Features Matching and Classification Using Machine Learning
Image Features Matching and Classification Using Machine LearningImage Features Matching and Classification Using Machine Learning
Image Features Matching and Classification Using Machine Learning
 
IRJET - Facial Recognition based Attendance System with LBPH
IRJET -  	  Facial Recognition based Attendance System with LBPHIRJET -  	  Facial Recognition based Attendance System with LBPH
IRJET - Facial Recognition based Attendance System with LBPH
 
IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...
IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...
IMPROVING IMAGE RESOLUTION THROUGH THE CRA ALGORITHM INVOLVED RECYCLING PROCE...
 
Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...
 
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
 
Aw03402840286
Aw03402840286Aw03402840286
Aw03402840286
 
IMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSET
IMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSETIMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSET
IMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSET
 
Face Recognition Technique using ICA and LBPH
Face Recognition Technique using ICA and LBPHFace Recognition Technique using ICA and LBPH
Face Recognition Technique using ICA and LBPH
 
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning Algorithm
 
Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...
 

Recently uploaded

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Image type water meter character recognition based on embedded dsp

  • 1. David C. Wyld et al. (Eds) : CSEN, AISO, NCWC, SIPR - 2015 pp. 69–76, 2015. © CS & IT-CSCP 2015 DOI : 10.5121/csit.2015.51407 IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP LIU Ying1 , HAN Yan-bin2 and ZHANG Yu-lin3 School of Information Science and Engineering, University of Jinan, Jinan 250022, PR China 75587050@qq.com1 87685630@qq.com2 ise_zhangyl@ujn.edu.cn3 ABSTRACT In the paper, we combined DSP processor with image processing algorithm and studied the method of water meter character recognition. We collected water meter image through camera at a fixed angle, and the projection method is used to recognize those digital images. The experiment results show that the method can recognize the meter characters accurately and artificial meter reading is replaced by automatic digital recognition, which improves working efficiency. KEYWORDS DSP, water meter recognition, image processing & projection method 1. INTRODUCTION In recent years, with the progress of society and science technology, it is quite common that manual work had been replaced by machines. In our daily life, water consumption statistics were mostly gotten in the form of artificial meter reading. This method not only increased the workload and difficulty of work, but also had some obvious drawbacks. The use of automatic meter reading systems not only overcome the insufficiency of manual meter reading, but also reduced the practical resources and save time. Based on DSP chip, this study collected water meter image through the camera on hardware system. Firstly, we achieved the purpose of automatic identification through a series of image processing technology. Lastly, the designed algorithm was transplanted into hardware devices and tested. (As shown in figure 1) The advantages of the study are simply structure with high recognition rate and low cost. The identification process is mainly divided into two parts: image processing and water meter characters recognition.
  • 2. 70 Computer Science & Information Technology (CS & IT) Figure 1 hardware test 2. RELATED WORK Image processing is an important task, and it directly affects the recognition of the digital image. In the techniques of image processing, the main techniques that related to this study include image filtering, image enhancement, edge detection, image segmentation and image binarization, etc. For example, based on the quality of image, image segmentation is divided into many concrete methods. In literature 1, it segmented digital image of water meter through counting the number of pixels in each row and column. In literature 2, it segmented digital image of water meter through vertical projection and horizontal projection. As for the image binarization, it is divided into fixed threshold method and adaptive threshold method. The literature [2-4] adopted adaptive threshold method. The literature 2 used cv adaptive threshold that was included in Opencv. The literature 3 used OTSU algorithm. And the literature 4 adopted three adaptive threshold methods. In the method of digital recognition, the literature [5, 6] adopted neural network recognition method [7, 8]. The literature 9 adopted template matching method to recognition. And the literature 10 improved template matching and used it to recognize. In this paper, the methods that we used in image processing included image segmentation, image binarization, and image filtering. In the process of digital meter identification, we adopted the method of projection. Specific implementation process is shown in figure 2. 3. WATER METER IMAGE PRE-TREATMENT Water meter image pre-processing is important to the character recognition. Image pre-treatment can significantly improve the quality of image and reduce noise. It is helpful for the extraction of image characteristics 3.1. Image segmentation Because the images that were used in this study were collected through the installed cameras, the size of the image was relatively fixed. The collected water meter images had obvious border (shown in figure 3), so we segmented those pictures at a fixed point, and extracted the effective area (shown in figure 4).
  • 3. Computer Science & Information Technology (CS & IT) 71 Figure 2 digital meter processing Figure 3 camera collections of pictures Figure 4 image segmentation 3.2. Image binarization The role of image binarization is to make the image black and white obviously. Binarization method is divided into fixed threshold method and adaptive threshold method. It is because the adaptability of fixed threshold method is poor that we generally use the adaptive threshold method.
  • 4. 72 Computer Science & Information Technology (CS & IT) In the study, the OTSU algorithm had simple calculation and it was not affected by the image brightness and contrast, so we used OTSU algorithm. After segmenting, the image was divided into five areas. We used the OTSU algorithm in the five areas separately for local binarization. The result is shown in figure 5. Figure 5 the effect after binarization 3.3. Image filtering Filtering can eliminate the noise points in the image. For binary image, we eliminate the image boundary, and then remove the small area into the isolated pixels. The result is shown in figure 6. Figure 6 after filtering 4. DIGITAL SYMBOL RECOGNITION There are many methods of digital symbol recognition, such as template matching, neural network recognition, statistical method and fuzzy theory method, etc. In the research, digital symbol recognition is divided into full-word recognition, half-word recognition and logic recognition. Projection method was used in this paper. This method makes the digital project, and then, matches the projection curve with template curve. Finally, it outputs the number which has the minimum error. Because numbers 5, 6, 8 and 9 have higher similarity in this method, connected domain method was used in the two - times recognition. The connected domain method uses the number of connected domain and the location of connected domain to recognition. Figure 7 is the projection curve of 0-9. As for every number, I selected four samples. From figure 7, we can see that the numbers 5, 6, 8 and 9 have similar characteristics. Other digital have obvious characteristics and the projection curve at the same digital has good consistency. Therefore, projection method has good ability to recognize. As for the problem that the projection method is not applicable in the numbers 5, 6, 8 and 9, we put forward the connected domain method. The method can solve the problem.
  • 5. Computer Science & Information Technology (CS & IT) 73 Figure 7 projection graph of 0-9 5. HALF-WORD RECOGNITION In the above recognition method, the accuracy of full-word recognition is close to 100%. As for the half-word recognition, it was always the difficulty of the study. The common methods are template matching method, and neural network recognition method, etc. Literature 11 was studied specifically for half-word recognition. The half-word is composed of one long and one short, the algorithm is just calculated the longer half-word, and the shorter one was not considered.
  • 6. 74 Computer Science & Information Technology (CS & IT) In my paper, I improved the template matching method based on the projection method of full- word recognition. (The image of half-word is shown in figure 8) I reserved the long part and the short pat, and then, I used the method of projection on them respectively. Finally, I analysed the matching result and recognized the digital according to the logical continuity. Figure 8 half-word image Table 1 is the matched data of the half-word in figure 8. In matched data in the above part, the number 3 has the minimum error. In matched data of the below part, the number 4 has the minimum error. Because of the number 3 and the number 4 have continuity in logic, they can recognize correctly. Table 1 the matched data of the half-word in figure 8 match object 0 1 2 3 4 5 6 7 8 9 error (above) 3.5 5.8 4.4 1.6 4.9 4.0 3.0 5.4 3.6 4.1 error (below) 7.2 6.4 6.2 5.3 1.5 6.6 6.3 5.7 5.7 6.5 6. LOGIC IDENTIFY Aiming at several half-word in figure 9, there is needed to adopt logical identification. When the image appears more than one half-word, if we only recognize the longer half-word, there will be a cross recognition (as shown in figure 9, those images may be recognized to 310 and 300) and cause errors. So we need to combine the continuity of digital to recognize. The method not only saves the calculation time, but also improves the recognition accuracy. Figure 9 several half-words The recognition results of some typical half-word are shown in figure 10. The above of the image is original image, the lower left corner is the processed image, and the lower right is recognition results.
  • 7. Computer Science & Information Technology (CS & IT) 75 Figure 10 recognition results 7. CONCLUSIONS This study used the projection method as the main means of digital recognition. In addition, we put forward the connected domain method and logical identification method in half-word. In this paper, the scheme of automatic recognition of digital water meter has good results, especially for the difficulty recognition of half-word. What is more, this study adopts the DSP chip. Through combination with embedded technology, making this study has practical application value. Through testing, the method that mentioned in this paper obtained a good accuracy. The recognition accuracy can reach above 95%. The method is simple and effective, and can be used to replace artificial meter reading. It overcomes the disadvantages of manual meter reading and has good practical value. ACKNOWLEDGEMENTS This article is completed under the guidance of professor ZHANG and professor HAN. In addition, my classmates also gave me a lot of help. What is more, University of Jinan provided a good learning environment for us. REFERENCES [1] LI Yun-dong & SUN Chang-qing, (2013) “Research on Real-Time Water Meter Recognition System Based on BF Neural Network”, Computer Measurement & Control, Vol. 21, No. 5, pp1330-1332. [2] GAO Ju & YE Hua,(2013)”An effective two-times recognition algorithm of meter digital image”, JOURNAL OF SOUTHEAST UNIVERSITY(Natural Science Edition), Vol. 7, No.1, pp153-157. [3] XI Run-ping, ZHAO Rong-chun, YUE Si-cong & YI Fei, (2007) “An Automatic Reading and Recognition System for Water Meter Based on DSP and Image Processing”, Measurement & Control Technology, Vol. 26, No. 5, pp21-25. [4] YANG Xin-yi, LV Wei-tao, YANG Jun, ZHANG Ke, MA Ying, YAO Wen & LI Qing-yong (2014), “Three kinds of threshold methods in the application of lightning channel image recognition”, JOURNAL OF APPLIED METEORLOLGICAL SCIENCE, Vol. 25, No. 4, pp427-435. [5] FAN Chong-qing, (2004) “Using the BP neural network to identify digital image”, Journal of Higher Correspondence Education (Natural Sciences), Vol. 17, No. 6, pp46-49.
  • 8. 76 Computer Science & Information Technology (CS & IT) [6] ZHANG Yi-cheng, CHEN Xin, YANG Hong-jun, ZHANG Yu-jian (2013), “Neural Network Digital Characters Recognition Based on the Combined Feature”, Computer System & Applications, Vol. 22, No. 3, pp113-116. [7] ZHOU Yu, ZHU An-fu, ZHOU Lin & QIAN Xu,(2012) “Sample data selection method for neural network classifiers”, J.Huazhong Univ. of Sci. & Tech. (Natural Science Edition), Vol. 40, No. 6, pp39-43. [8] WANG Ting, JIANG Wen-hui & XIAO Nan-feng (2011), “Numerical recognition based on improved BP neural network”, Electronic Design Engineering, Vol.19, No.3, pp108-112. [9] LI Zhi-rong, YANG Dan & ZHOU Qi (2009), “Digital recognition based on template matching”, NATURAL SCIENCES JOURNAL OF HARBIN NORMAL UNIVERSITY, Vol.25, No.4, pp86-95. [10] ZOU Ming-ming & LU Di,(2010) “Recognition algorithm of car license plate characters based on modified template match”, Foreign Electronic Measurement Technology, Vol. 29, No.1, pp59-80. [11] JIN Jing-xiao & XIN Kun-lun,(2015) “Application of improved half-word recognition method in automatic meter reading system”, WATER TECHNOLOGY, Vol.9 No.1, pp43-45. AUTHORS LIU Ying (1991-), female, master, research in switched reluctance motor, pattern recognition, image processing. HAN Yan-bin (1979- ), male, associate professor, research in pattern recognition, image processing. ZHANG Yu-lin (1972-), corresponding author, male, professor, the research direction for embedded system, computer architecture.