SlideShare a Scribd company logo
1 of 4
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 140
HANDWRITTEN CHARACTER RECOGNITION USING METHOD
FILTERS
Nikita Sarkar1
, Harsh Kishore2
1
Department of Computer Science, Manipal University Jaipur, Jaipur, India
2
Department of Electronics and Communication, Manipal University Jaipur, Jaipur, India
Abstract
Handwritten character recognition is an emerging and a very challenging field of research as the handwritings vary from person
to person. In this paper we have focused on some of the existing methodologies of character recognition and come up with some
new methodologies. A system which encompasses different character recognition methods as filters is proposed in this paper. The
methods are prioritized based on their result efficiencies and applied on the input. As we pass through the process, the number of
possible results in the solution set keeps decreasing steeply. Using a combination of methods as a filter for recognition yields
more accurate results than using a single method and also decreases the space and time complexity of the algorithm. Finally,
further scope of development of this model is discussed.
Keywords –Glyph, Character recognition, handwriting recognition, space time complexity, filter process.
--------------------------------------------------------------------***------------------------------------------------------------------
1. INTRODUCTION AND CURRENT SCENARIO
Today, handwritten character recognition has achieved some
success but awaits major research to witness 100% practical
application in various fields.
Various approaches currently used for character recognition
are briefly described below.
1.1 Matrix Matching
Every character is converted into a pattern within a matrix
and then compared with a pattern in an index. Its recognition
is strongest on monotype and uniform single column pages.
[1]
1.2 Feature Extraction
Each character is defined by the presence or absence of key
features like height, width, density and number of loops etc.
It is a perfect approach for OCR of magazines, laser print and
high quality images. [2], [3]
1.3 Neural Networks
The working of neural networks is a replica of human neural
system. It samples the pixels in each character and matches
them to a known index of character pixel patterns. The ability
to recognize characters by abstraction is great for damaged
text. [4], [5]
Though these methodologies have succeeded partially but
their individual application leads to very complex and
inefficient computations resulting in greater time and space
complexity and lesser accuracy in results, since applying any
one methodology on an input handwritten character leads to
its comparison with the rest of twenty six English alphabets.
2. PROPOSED MODEL
Along with the Matrix Matching method being used
currently, three new character recognition methods namely
intersection count method, shape enclosed method and
centroid based method are proposed to work together as
layered filters in this system.
2.1 Intersection Count Method
This is a very simple yet an effective method of character
recognition, in this method we count the number of
intersection points made by intersecting edges in a character.
Though handwriting varies from person to person, the basic
way of writing an alphabet remains the same as in shown in
figure 1.
Fig 1
In all the above glyphs of letter A, though the way they are
written varies, yet the intersection count remains almost the
same. It is three for letter A. For convenience we give a
relaxation of ±1 for the number of intersections. A table
giving details of intersection count for all the twenty six
English alphabets is given in table 1.
Table 1
Alphabet No. of
intersections
Alphabet No. of
intersections
A 3 N 2
B 4 O 0
C 0 P 2
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 141
D 2 Q 1
E 3 R 3
F 2 S 0
G 1 T 1
H 2 U 0
I 0 V 1
J 0 W 3
K 2 X 1
L 1 Y 1
M 3 Z 2
Case – We assume the handwritten input character to be very
similar to an ideal C. The intersection count method is
applied and the count comes as zero. So, from table 1 it can
be C, I, J, O, S or U . Thus, the comparison is reduced from
twenty six to only six. This result is then passed through the
next method called Shape enclosed method described next.
2.1 Shape-Enclosed Method
The isolated end point of a character is joined with another
adjacent isolated end point with dotted straight lines. Then,
we consider all the shapes enclosed within the alphabet and
make a list of encountered shapes.
The following geometric shapes are considered in this
method.
Table 2
Name of shape Shape
Circle
Semi-circle
Triangle
Rectangle
Trapezium
The shapes enclosed by all the twenty six English are given
in table 3.
Table 3
Alphabet Shapes
enclosed
Alphabet Shapes
enclosed
A 1 triangle
1 trapezium
N 2 triangles
B 2 semi-
circles
O 1 circle
C 1 circle P 1 semi-circle
D 1 semi-circle Q 1 circle
E 2 rectangles R 1 semi-circle
1 trapezium
F 1 triangle
1 trapezium
S 2 semi
circles
G 2 semi-
circles
T 2 triangles
H 2 rectangles U 1 semi-circle
I None V 1 triangle
J 1 triangle W 3 triangles
K 2 triangles
1 trapezium
X 4 triangles
L 1 triangle Y 3 triangles
M 3 triangles Z 2 triangles
Case – The input handwritten character is A in this case. The
isolated end points are joined at the base of the character so
two enclosed areas are extracted namely, a triangle and a
trapezium which is recorded.
2.3 Centroid Based Method
The glyph is divided into grids. The grids are taken as points.
Fig 2
These points are located in the x-y Cartesian coordinate
system. The grid blocks with black pixels are considered
points.
Fig 3
Since the x-y coordinates of the points are known, the
centroid of the black points is obtained. The coordinates of
the black points are (x1, y1), (x2, y2), (x3, y3) and so on
The centroid will be obtained by the expression.
𝑥𝑐, 𝑦𝑐 = [
𝑥1+𝑥2+𝑥3+⋯
𝑘
,
(𝑦1+𝑦2+𝑦3+⋯ )
𝑘
] (1)
Here,
x1 , x2, x3… are the X coordinates of the black points and,
y1, y2, y3… are the Y coordinates of the black points.
k is the number of black points obtained.
Once the centroids are obtained, they are compared to the
values of centroids for standard alphabets from the database.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 142
If the obtained centroid of an input character is (x, y) then all
the standard characters with centroid [(x±2),(y±2)] are
selected. The two point relaxation is given to compensate the
errors and irregularities which handwritten characters
possess.
Case – Let the input be X then the input handwritten
character will be divided into grids, 11*11 in this case. The
centroid will be calculated. Next, the centroids of the output
characters of the previous filters are calculated. One of the
outputs from the previous methods will be X. Both the results
are matched. Clearly, the centroid will be in the middle i.e.,
(5, 5).
3. WORKING: METHOD FILTERING
This paper has introduced three new methodologies of
handwritten character recognition. These are in turn
combined with the matrix matching method. All the methods
are used sequentially and as the process continues, the
number of possible matches keeps decreasing steeply and this
makes the process fast and efficient.
The process to be used first is relatively less efficient than the
next ones. Hence, the priority table is given by table 4.
Table 4
Priority Method
1 Intersection
count
2 Shape enclosed
3 Centroid based
4 Matrix matching
If only Matrix matching method were to be used, a given
input would have been matched to all the other twenty six
stores parameters. But in this process, the number of
comparisons decreases when the next method is used and the
combination of four different methods acts as a filter.
The working of the model can be easily understood by
considering the following case.
Fig 4: Flow of the process
Case – Handwritten input character is P.
First, number of intersection points is obtained by using the
intersection count method which is two for this case.
According to the results of intersection count test and using
the table 1, the following possible input characters are
obtained. D, F, H, N, K, P and Z. As we go into the next
filter, only seven possible characters remain in the solution
set.
Second, the enclosed shapes from the handwritten input
character are obtained using the shape enclosed method. For
P, one semi-circle is obtained from table 3. The enclosed
shapes for output characters of intersection count method are
extracted using table 3. The solution set is modified
accordingly and contains only P and D.
Third, the centroid based method is applied on the
handwritten input character as well as on the output of the
shape enclosed method, i.e. P and D. The result i.e. centroid
for the handwritten character is matched with the centroids of
output characters and the solution set is modified
accordingly.
If the solution set has more than one element remaining then
the matrix matching method is applied. And if only one
element remains after applying the three methods then matrix
matching method is not applied and the process ends
recognizing the character.
Step 1
• Take input handwritten character.
Step 2
• Apply intersection count method and find number of intersections
in the input character.
• Based on the result make a list of possible characters.
Step 3
• Extract enclosed shapes from input character.
• Extract enclosed shapes from output characters of the previous
method.
• Match both results obtained and modify the solution set.
Step 4
• Apply centroid based method on the input character.
• Apply centroid based method on output characters of previous
method.
• Match both the results obtained and modify the solution set.
Step 5
• If solution set has more than one character then proceed for
matrix matching method or else end the process.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 143
4. FUTURE SCOPE
This paper focuses on these character recognition techniques
for Majuscule form of the English alphabet.
It can be extended for Minuscule forms and also other
languages and scripts with mere modifications.
5. CONCLUSIONS
It is described and justified that applying a filter based
process that encapsulates different simple methodologies is
much efficient both with respect to time as well as space and
leads to greater accuracy than applying just one complex
method.
Also, the filter is stopped as soon as the number of possible
character is reduced to only one thus saving resources.
REFERENCES
[1]. Badawy, W.”Automatic licence recognition(ALPR): A
state of the art review.”
[2]. Shrey Dutta, Navven Sankaran, Pramod Sankar K, C.V.
Jawahar, “Robust recognition of degraded documents using
character N-Grams”, IEEE, 2012.
[3]. Amrita Hirwani, Sandeep Gonnade “Handwritten
Character Recognition System Using Neural Network”.
[4]. Sukhpreet Singh, “Optical character recognition
techniques: A survey”.
[5]. Reetika Verma, Rupinder Kaur, “An Efficient
Technique for CHARACTER RECOGNITION Using
Neural Network & Surf Feature Extraction”.

More Related Content

What's hot

A New Approach for Ranking Shadowed Fuzzy Numbers and its Application
A New Approach for Ranking Shadowed Fuzzy Numbers and its ApplicationA New Approach for Ranking Shadowed Fuzzy Numbers and its Application
A New Approach for Ranking Shadowed Fuzzy Numbers and its ApplicationAIRCC Publishing Corporation
 
Comparative Analysis of Different Numerical Methods of Solving First Order Di...
Comparative Analysis of Different Numerical Methods of Solving First Order Di...Comparative Analysis of Different Numerical Methods of Solving First Order Di...
Comparative Analysis of Different Numerical Methods of Solving First Order Di...ijtsrd
 
A Class of Continuous Implicit Seventh-eight method for solving y’ = f(x, y) ...
A Class of Continuous Implicit Seventh-eight method for solving y’ = f(x, y) ...A Class of Continuous Implicit Seventh-eight method for solving y’ = f(x, y) ...
A Class of Continuous Implicit Seventh-eight method for solving y’ = f(x, y) ...AI Publications
 
On the construction and comparison of an explicit iterative
On the construction and comparison of an explicit iterativeOn the construction and comparison of an explicit iterative
On the construction and comparison of an explicit iterativeAlexander Decker
 
Texture classification based on overlapped texton co occurrence matrix (otcom...
Texture classification based on overlapped texton co occurrence matrix (otcom...Texture classification based on overlapped texton co occurrence matrix (otcom...
Texture classification based on overlapped texton co occurrence matrix (otcom...eSAT Journals
 
Studying the scientific state of students using the adjusted residuals
 Studying the scientific state of students using the adjusted residuals Studying the scientific state of students using the adjusted residuals
Studying the scientific state of students using the adjusted residualsAlexander Decker
 
A modified ode solver for autonomous initial value problems
A modified ode solver for autonomous initial value problemsA modified ode solver for autonomous initial value problems
A modified ode solver for autonomous initial value problemsAlexander Decker
 
A NEW STUDY TO FIND OUT THE BEST COMPUTATIONAL METHOD FOR SOLVING THE NONLINE...
A NEW STUDY TO FIND OUT THE BEST COMPUTATIONAL METHOD FOR SOLVING THE NONLINE...A NEW STUDY TO FIND OUT THE BEST COMPUTATIONAL METHOD FOR SOLVING THE NONLINE...
A NEW STUDY TO FIND OUT THE BEST COMPUTATIONAL METHOD FOR SOLVING THE NONLINE...mathsjournal
 
Integrating Fuzzy Dematel and SMAA-2 for Maintenance Expenses
Integrating Fuzzy Dematel and SMAA-2 for Maintenance ExpensesIntegrating Fuzzy Dematel and SMAA-2 for Maintenance Expenses
Integrating Fuzzy Dematel and SMAA-2 for Maintenance Expensesinventionjournals
 
SJUT/Mat210/Interpolation/Lagrangian 2013-14S2
SJUT/Mat210/Interpolation/Lagrangian 2013-14S2SJUT/Mat210/Interpolation/Lagrangian 2013-14S2
SJUT/Mat210/Interpolation/Lagrangian 2013-14S2John Ham
 
Grds international conference on pure and applied science (9)
Grds international conference on pure and applied science (9)Grds international conference on pure and applied science (9)
Grds international conference on pure and applied science (9)Global R & D Services
 
G03405049058
G03405049058G03405049058
G03405049058theijes
 

What's hot (14)

A New Approach for Ranking Shadowed Fuzzy Numbers and its Application
A New Approach for Ranking Shadowed Fuzzy Numbers and its ApplicationA New Approach for Ranking Shadowed Fuzzy Numbers and its Application
A New Approach for Ranking Shadowed Fuzzy Numbers and its Application
 
Comparative Analysis of Different Numerical Methods of Solving First Order Di...
Comparative Analysis of Different Numerical Methods of Solving First Order Di...Comparative Analysis of Different Numerical Methods of Solving First Order Di...
Comparative Analysis of Different Numerical Methods of Solving First Order Di...
 
A Class of Continuous Implicit Seventh-eight method for solving y’ = f(x, y) ...
A Class of Continuous Implicit Seventh-eight method for solving y’ = f(x, y) ...A Class of Continuous Implicit Seventh-eight method for solving y’ = f(x, y) ...
A Class of Continuous Implicit Seventh-eight method for solving y’ = f(x, y) ...
 
On the construction and comparison of an explicit iterative
On the construction and comparison of an explicit iterativeOn the construction and comparison of an explicit iterative
On the construction and comparison of an explicit iterative
 
Ijetcas14 507
Ijetcas14 507Ijetcas14 507
Ijetcas14 507
 
Ijetcas14 608
Ijetcas14 608Ijetcas14 608
Ijetcas14 608
 
Texture classification based on overlapped texton co occurrence matrix (otcom...
Texture classification based on overlapped texton co occurrence matrix (otcom...Texture classification based on overlapped texton co occurrence matrix (otcom...
Texture classification based on overlapped texton co occurrence matrix (otcom...
 
Studying the scientific state of students using the adjusted residuals
 Studying the scientific state of students using the adjusted residuals Studying the scientific state of students using the adjusted residuals
Studying the scientific state of students using the adjusted residuals
 
A modified ode solver for autonomous initial value problems
A modified ode solver for autonomous initial value problemsA modified ode solver for autonomous initial value problems
A modified ode solver for autonomous initial value problems
 
A NEW STUDY TO FIND OUT THE BEST COMPUTATIONAL METHOD FOR SOLVING THE NONLINE...
A NEW STUDY TO FIND OUT THE BEST COMPUTATIONAL METHOD FOR SOLVING THE NONLINE...A NEW STUDY TO FIND OUT THE BEST COMPUTATIONAL METHOD FOR SOLVING THE NONLINE...
A NEW STUDY TO FIND OUT THE BEST COMPUTATIONAL METHOD FOR SOLVING THE NONLINE...
 
Integrating Fuzzy Dematel and SMAA-2 for Maintenance Expenses
Integrating Fuzzy Dematel and SMAA-2 for Maintenance ExpensesIntegrating Fuzzy Dematel and SMAA-2 for Maintenance Expenses
Integrating Fuzzy Dematel and SMAA-2 for Maintenance Expenses
 
SJUT/Mat210/Interpolation/Lagrangian 2013-14S2
SJUT/Mat210/Interpolation/Lagrangian 2013-14S2SJUT/Mat210/Interpolation/Lagrangian 2013-14S2
SJUT/Mat210/Interpolation/Lagrangian 2013-14S2
 
Grds international conference on pure and applied science (9)
Grds international conference on pure and applied science (9)Grds international conference on pure and applied science (9)
Grds international conference on pure and applied science (9)
 
G03405049058
G03405049058G03405049058
G03405049058
 

Viewers also liked

A Comprehensive Study On Handwritten Character Recognition System
A Comprehensive Study On Handwritten Character Recognition SystemA Comprehensive Study On Handwritten Character Recognition System
A Comprehensive Study On Handwritten Character Recognition Systemiosrjce
 
Rule based algorithm for handwritten characters recognition
Rule based algorithm for handwritten characters recognitionRule based algorithm for handwritten characters recognition
Rule based algorithm for handwritten characters recognitionRanda Elanwar
 
11.development of a writer independent online handwritten character recogniti...
11.development of a writer independent online handwritten character recogniti...11.development of a writer independent online handwritten character recogniti...
11.development of a writer independent online handwritten character recogniti...Alexander Decker
 
Recognition of Farsi Handwritten Numbers Using the Fuzzy Method
Recognition of Farsi Handwritten Numbers Using the Fuzzy MethodRecognition of Farsi Handwritten Numbers Using the Fuzzy Method
Recognition of Farsi Handwritten Numbers Using the Fuzzy MethodCSCJournals
 
Fuzzy rule based classification and recognition of handwritten hindi
Fuzzy rule based classification and recognition of handwritten hindiFuzzy rule based classification and recognition of handwritten hindi
Fuzzy rule based classification and recognition of handwritten hindiIAEME Publication
 
Activity Recognition From IR Images Using Fuzzy Clustering Techniques
Activity Recognition From IR Images Using Fuzzy Clustering TechniquesActivity Recognition From IR Images Using Fuzzy Clustering Techniques
Activity Recognition From IR Images Using Fuzzy Clustering TechniquesIJTET Journal
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...iosrjce
 
Recognition of Offline Handwritten Hindi Text Using SVM
Recognition of Offline Handwritten Hindi Text Using SVMRecognition of Offline Handwritten Hindi Text Using SVM
Recognition of Offline Handwritten Hindi Text Using SVMCSCJournals
 
A Comparison of Fuzzy ARTMAP
A Comparison of Fuzzy ARTMAPA Comparison of Fuzzy ARTMAP
A Comparison of Fuzzy ARTMAPESCOM
 
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...Editor IJMTER
 
Design and implementation of optical character recognition using template mat...
Design and implementation of optical character recognition using template mat...Design and implementation of optical character recognition using template mat...
Design and implementation of optical character recognition using template mat...eSAT Journals
 
Optical character recognition an encompassing review
Optical character recognition   an encompassing reviewOptical character recognition   an encompassing review
Optical character recognition an encompassing revieweSAT Journals
 
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIERHANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIERvineet raj
 
Dynamic clustering algorithm using fuzzy c means
Dynamic clustering algorithm using fuzzy c meansDynamic clustering algorithm using fuzzy c means
Dynamic clustering algorithm using fuzzy c meansWrishin Bhattacharya
 
Handwritten digit recognition using image processing
Handwritten digit recognition using image processing Handwritten digit recognition using image processing
Handwritten digit recognition using image processing anita maharjan
 
Handwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHandwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHarshana Madusanka Jayamaha
 
Application of fuzzy logic
Application of fuzzy logicApplication of fuzzy logic
Application of fuzzy logicViraj Patel
 

Viewers also liked (20)

A Comprehensive Study On Handwritten Character Recognition System
A Comprehensive Study On Handwritten Character Recognition SystemA Comprehensive Study On Handwritten Character Recognition System
A Comprehensive Study On Handwritten Character Recognition System
 
Rule based algorithm for handwritten characters recognition
Rule based algorithm for handwritten characters recognitionRule based algorithm for handwritten characters recognition
Rule based algorithm for handwritten characters recognition
 
11.development of a writer independent online handwritten character recogniti...
11.development of a writer independent online handwritten character recogniti...11.development of a writer independent online handwritten character recogniti...
11.development of a writer independent online handwritten character recogniti...
 
Recognition of Farsi Handwritten Numbers Using the Fuzzy Method
Recognition of Farsi Handwritten Numbers Using the Fuzzy MethodRecognition of Farsi Handwritten Numbers Using the Fuzzy Method
Recognition of Farsi Handwritten Numbers Using the Fuzzy Method
 
Fuzzy rule based classification and recognition of handwritten hindi
Fuzzy rule based classification and recognition of handwritten hindiFuzzy rule based classification and recognition of handwritten hindi
Fuzzy rule based classification and recognition of handwritten hindi
 
Activity Recognition From IR Images Using Fuzzy Clustering Techniques
Activity Recognition From IR Images Using Fuzzy Clustering TechniquesActivity Recognition From IR Images Using Fuzzy Clustering Techniques
Activity Recognition From IR Images Using Fuzzy Clustering Techniques
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
 
Recognition of Offline Handwritten Hindi Text Using SVM
Recognition of Offline Handwritten Hindi Text Using SVMRecognition of Offline Handwritten Hindi Text Using SVM
Recognition of Offline Handwritten Hindi Text Using SVM
 
A Comparison of Fuzzy ARTMAP
A Comparison of Fuzzy ARTMAPA Comparison of Fuzzy ARTMAP
A Comparison of Fuzzy ARTMAP
 
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
 
Design and implementation of optical character recognition using template mat...
Design and implementation of optical character recognition using template mat...Design and implementation of optical character recognition using template mat...
Design and implementation of optical character recognition using template mat...
 
Optical character recognition an encompassing review
Optical character recognition   an encompassing reviewOptical character recognition   an encompassing review
Optical character recognition an encompassing review
 
Seminar5
Seminar5Seminar5
Seminar5
 
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIERHANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
 
Dynamic clustering algorithm using fuzzy c means
Dynamic clustering algorithm using fuzzy c meansDynamic clustering algorithm using fuzzy c means
Dynamic clustering algorithm using fuzzy c means
 
OCR
OCROCR
OCR
 
Handwritten Character Recognition
Handwritten Character RecognitionHandwritten Character Recognition
Handwritten Character Recognition
 
Handwritten digit recognition using image processing
Handwritten digit recognition using image processing Handwritten digit recognition using image processing
Handwritten digit recognition using image processing
 
Handwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHandwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural network
 
Application of fuzzy logic
Application of fuzzy logicApplication of fuzzy logic
Application of fuzzy logic
 

Similar to Handwritten character recognition using method filters

Sparse representation based classification of mr images of brain for alzheime...
Sparse representation based classification of mr images of brain for alzheime...Sparse representation based classification of mr images of brain for alzheime...
Sparse representation based classification of mr images of brain for alzheime...eSAT Publishing House
 
A Novel Approach to Recognize Handwritten Gujarati Digits.pdf
A Novel Approach to Recognize Handwritten Gujarati Digits.pdfA Novel Approach to Recognize Handwritten Gujarati Digits.pdf
A Novel Approach to Recognize Handwritten Gujarati Digits.pdfSamantha Martinez
 
A reduced complexity and an efficient channel
A reduced complexity and an efficient channelA reduced complexity and an efficient channel
A reduced complexity and an efficient channeleSAT Publishing House
 
Application of normalized cross correlation to image registration
Application of normalized cross correlation to image registrationApplication of normalized cross correlation to image registration
Application of normalized cross correlation to image registrationeSAT Publishing House
 
Time of arrival based localization in wireless sensor networks a non linear ...
Time of arrival based localization in wireless sensor networks  a non linear ...Time of arrival based localization in wireless sensor networks  a non linear ...
Time of arrival based localization in wireless sensor networks a non linear ...sipij
 
Undetermined Mixing Matrix Estimation Base on Classification and Counting
Undetermined Mixing Matrix Estimation Base on Classification and CountingUndetermined Mixing Matrix Estimation Base on Classification and Counting
Undetermined Mixing Matrix Estimation Base on Classification and CountingIJRESJOURNAL
 
Fault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms andFault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms andeSAT Publishing House
 
KNN and ARL Based Imputation to Estimate Missing Values
KNN and ARL Based Imputation to Estimate Missing ValuesKNN and ARL Based Imputation to Estimate Missing Values
KNN and ARL Based Imputation to Estimate Missing Valuesijeei-iaes
 
Extract the ancient letters from decorated
Extract the ancient letters from decoratedExtract the ancient letters from decorated
Extract the ancient letters from decoratedIJERA Editor
 
Extract the ancient letters from decorated
Extract the ancient letters from decoratedExtract the ancient letters from decorated
Extract the ancient letters from decoratedIJERA Editor
 
Fault diagnosis using genetic algorithms and principal curves
Fault diagnosis using genetic algorithms and principal curvesFault diagnosis using genetic algorithms and principal curves
Fault diagnosis using genetic algorithms and principal curveseSAT Journals
 
Paper id 24201433
Paper id 24201433Paper id 24201433
Paper id 24201433IJRAT
 
Design of optimized Interval Arithmetic Multiplier
Design of optimized Interval Arithmetic MultiplierDesign of optimized Interval Arithmetic Multiplier
Design of optimized Interval Arithmetic MultiplierVLSICS Design
 
A Thresholding Method to Estimate Quantities of Each Class
A Thresholding Method to Estimate Quantities of Each ClassA Thresholding Method to Estimate Quantities of Each Class
A Thresholding Method to Estimate Quantities of Each ClassWaqas Tariq
 
Demosaicing of images for bayer cfa using projection algorithm
Demosaicing of images for bayer cfa using projection algorithmDemosaicing of images for bayer cfa using projection algorithm
Demosaicing of images for bayer cfa using projection algorithmeSAT Publishing House
 
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...IJCI JOURNAL
 

Similar to Handwritten character recognition using method filters (20)

Sparse representation based classification of mr images of brain for alzheime...
Sparse representation based classification of mr images of brain for alzheime...Sparse representation based classification of mr images of brain for alzheime...
Sparse representation based classification of mr images of brain for alzheime...
 
Bf4102414417
Bf4102414417Bf4102414417
Bf4102414417
 
A Novel Approach to Recognize Handwritten Gujarati Digits.pdf
A Novel Approach to Recognize Handwritten Gujarati Digits.pdfA Novel Approach to Recognize Handwritten Gujarati Digits.pdf
A Novel Approach to Recognize Handwritten Gujarati Digits.pdf
 
A reduced complexity and an efficient channel
A reduced complexity and an efficient channelA reduced complexity and an efficient channel
A reduced complexity and an efficient channel
 
Application of normalized cross correlation to image registration
Application of normalized cross correlation to image registrationApplication of normalized cross correlation to image registration
Application of normalized cross correlation to image registration
 
Time of arrival based localization in wireless sensor networks a non linear ...
Time of arrival based localization in wireless sensor networks  a non linear ...Time of arrival based localization in wireless sensor networks  a non linear ...
Time of arrival based localization in wireless sensor networks a non linear ...
 
Undetermined Mixing Matrix Estimation Base on Classification and Counting
Undetermined Mixing Matrix Estimation Base on Classification and CountingUndetermined Mixing Matrix Estimation Base on Classification and Counting
Undetermined Mixing Matrix Estimation Base on Classification and Counting
 
Fault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms andFault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms and
 
Ijetcas14 399
Ijetcas14 399Ijetcas14 399
Ijetcas14 399
 
KNN and ARL Based Imputation to Estimate Missing Values
KNN and ARL Based Imputation to Estimate Missing ValuesKNN and ARL Based Imputation to Estimate Missing Values
KNN and ARL Based Imputation to Estimate Missing Values
 
Classification with Random Forest Based on Local Tangent Space Alignment and ...
Classification with Random Forest Based on Local Tangent Space Alignment and ...Classification with Random Forest Based on Local Tangent Space Alignment and ...
Classification with Random Forest Based on Local Tangent Space Alignment and ...
 
Extract the ancient letters from decorated
Extract the ancient letters from decoratedExtract the ancient letters from decorated
Extract the ancient letters from decorated
 
Extract the ancient letters from decorated
Extract the ancient letters from decoratedExtract the ancient letters from decorated
Extract the ancient letters from decorated
 
Fault diagnosis using genetic algorithms and principal curves
Fault diagnosis using genetic algorithms and principal curvesFault diagnosis using genetic algorithms and principal curves
Fault diagnosis using genetic algorithms and principal curves
 
Paper id 24201433
Paper id 24201433Paper id 24201433
Paper id 24201433
 
Design of optimized Interval Arithmetic Multiplier
Design of optimized Interval Arithmetic MultiplierDesign of optimized Interval Arithmetic Multiplier
Design of optimized Interval Arithmetic Multiplier
 
Modeling the dynamics of molecular concentration during the diffusion procedure
Modeling the dynamics of molecular concentration during the  diffusion procedureModeling the dynamics of molecular concentration during the  diffusion procedure
Modeling the dynamics of molecular concentration during the diffusion procedure
 
A Thresholding Method to Estimate Quantities of Each Class
A Thresholding Method to Estimate Quantities of Each ClassA Thresholding Method to Estimate Quantities of Each Class
A Thresholding Method to Estimate Quantities of Each Class
 
Demosaicing of images for bayer cfa using projection algorithm
Demosaicing of images for bayer cfa using projection algorithmDemosaicing of images for bayer cfa using projection algorithm
Demosaicing of images for bayer cfa using projection algorithm
 
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 

Handwritten character recognition using method filters

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 140 HANDWRITTEN CHARACTER RECOGNITION USING METHOD FILTERS Nikita Sarkar1 , Harsh Kishore2 1 Department of Computer Science, Manipal University Jaipur, Jaipur, India 2 Department of Electronics and Communication, Manipal University Jaipur, Jaipur, India Abstract Handwritten character recognition is an emerging and a very challenging field of research as the handwritings vary from person to person. In this paper we have focused on some of the existing methodologies of character recognition and come up with some new methodologies. A system which encompasses different character recognition methods as filters is proposed in this paper. The methods are prioritized based on their result efficiencies and applied on the input. As we pass through the process, the number of possible results in the solution set keeps decreasing steeply. Using a combination of methods as a filter for recognition yields more accurate results than using a single method and also decreases the space and time complexity of the algorithm. Finally, further scope of development of this model is discussed. Keywords –Glyph, Character recognition, handwriting recognition, space time complexity, filter process. --------------------------------------------------------------------***------------------------------------------------------------------ 1. INTRODUCTION AND CURRENT SCENARIO Today, handwritten character recognition has achieved some success but awaits major research to witness 100% practical application in various fields. Various approaches currently used for character recognition are briefly described below. 1.1 Matrix Matching Every character is converted into a pattern within a matrix and then compared with a pattern in an index. Its recognition is strongest on monotype and uniform single column pages. [1] 1.2 Feature Extraction Each character is defined by the presence or absence of key features like height, width, density and number of loops etc. It is a perfect approach for OCR of magazines, laser print and high quality images. [2], [3] 1.3 Neural Networks The working of neural networks is a replica of human neural system. It samples the pixels in each character and matches them to a known index of character pixel patterns. The ability to recognize characters by abstraction is great for damaged text. [4], [5] Though these methodologies have succeeded partially but their individual application leads to very complex and inefficient computations resulting in greater time and space complexity and lesser accuracy in results, since applying any one methodology on an input handwritten character leads to its comparison with the rest of twenty six English alphabets. 2. PROPOSED MODEL Along with the Matrix Matching method being used currently, three new character recognition methods namely intersection count method, shape enclosed method and centroid based method are proposed to work together as layered filters in this system. 2.1 Intersection Count Method This is a very simple yet an effective method of character recognition, in this method we count the number of intersection points made by intersecting edges in a character. Though handwriting varies from person to person, the basic way of writing an alphabet remains the same as in shown in figure 1. Fig 1 In all the above glyphs of letter A, though the way they are written varies, yet the intersection count remains almost the same. It is three for letter A. For convenience we give a relaxation of ±1 for the number of intersections. A table giving details of intersection count for all the twenty six English alphabets is given in table 1. Table 1 Alphabet No. of intersections Alphabet No. of intersections A 3 N 2 B 4 O 0 C 0 P 2
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 141 D 2 Q 1 E 3 R 3 F 2 S 0 G 1 T 1 H 2 U 0 I 0 V 1 J 0 W 3 K 2 X 1 L 1 Y 1 M 3 Z 2 Case – We assume the handwritten input character to be very similar to an ideal C. The intersection count method is applied and the count comes as zero. So, from table 1 it can be C, I, J, O, S or U . Thus, the comparison is reduced from twenty six to only six. This result is then passed through the next method called Shape enclosed method described next. 2.1 Shape-Enclosed Method The isolated end point of a character is joined with another adjacent isolated end point with dotted straight lines. Then, we consider all the shapes enclosed within the alphabet and make a list of encountered shapes. The following geometric shapes are considered in this method. Table 2 Name of shape Shape Circle Semi-circle Triangle Rectangle Trapezium The shapes enclosed by all the twenty six English are given in table 3. Table 3 Alphabet Shapes enclosed Alphabet Shapes enclosed A 1 triangle 1 trapezium N 2 triangles B 2 semi- circles O 1 circle C 1 circle P 1 semi-circle D 1 semi-circle Q 1 circle E 2 rectangles R 1 semi-circle 1 trapezium F 1 triangle 1 trapezium S 2 semi circles G 2 semi- circles T 2 triangles H 2 rectangles U 1 semi-circle I None V 1 triangle J 1 triangle W 3 triangles K 2 triangles 1 trapezium X 4 triangles L 1 triangle Y 3 triangles M 3 triangles Z 2 triangles Case – The input handwritten character is A in this case. The isolated end points are joined at the base of the character so two enclosed areas are extracted namely, a triangle and a trapezium which is recorded. 2.3 Centroid Based Method The glyph is divided into grids. The grids are taken as points. Fig 2 These points are located in the x-y Cartesian coordinate system. The grid blocks with black pixels are considered points. Fig 3 Since the x-y coordinates of the points are known, the centroid of the black points is obtained. The coordinates of the black points are (x1, y1), (x2, y2), (x3, y3) and so on The centroid will be obtained by the expression. 𝑥𝑐, 𝑦𝑐 = [ 𝑥1+𝑥2+𝑥3+⋯ 𝑘 , (𝑦1+𝑦2+𝑦3+⋯ ) 𝑘 ] (1) Here, x1 , x2, x3… are the X coordinates of the black points and, y1, y2, y3… are the Y coordinates of the black points. k is the number of black points obtained. Once the centroids are obtained, they are compared to the values of centroids for standard alphabets from the database.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 142 If the obtained centroid of an input character is (x, y) then all the standard characters with centroid [(x±2),(y±2)] are selected. The two point relaxation is given to compensate the errors and irregularities which handwritten characters possess. Case – Let the input be X then the input handwritten character will be divided into grids, 11*11 in this case. The centroid will be calculated. Next, the centroids of the output characters of the previous filters are calculated. One of the outputs from the previous methods will be X. Both the results are matched. Clearly, the centroid will be in the middle i.e., (5, 5). 3. WORKING: METHOD FILTERING This paper has introduced three new methodologies of handwritten character recognition. These are in turn combined with the matrix matching method. All the methods are used sequentially and as the process continues, the number of possible matches keeps decreasing steeply and this makes the process fast and efficient. The process to be used first is relatively less efficient than the next ones. Hence, the priority table is given by table 4. Table 4 Priority Method 1 Intersection count 2 Shape enclosed 3 Centroid based 4 Matrix matching If only Matrix matching method were to be used, a given input would have been matched to all the other twenty six stores parameters. But in this process, the number of comparisons decreases when the next method is used and the combination of four different methods acts as a filter. The working of the model can be easily understood by considering the following case. Fig 4: Flow of the process Case – Handwritten input character is P. First, number of intersection points is obtained by using the intersection count method which is two for this case. According to the results of intersection count test and using the table 1, the following possible input characters are obtained. D, F, H, N, K, P and Z. As we go into the next filter, only seven possible characters remain in the solution set. Second, the enclosed shapes from the handwritten input character are obtained using the shape enclosed method. For P, one semi-circle is obtained from table 3. The enclosed shapes for output characters of intersection count method are extracted using table 3. The solution set is modified accordingly and contains only P and D. Third, the centroid based method is applied on the handwritten input character as well as on the output of the shape enclosed method, i.e. P and D. The result i.e. centroid for the handwritten character is matched with the centroids of output characters and the solution set is modified accordingly. If the solution set has more than one element remaining then the matrix matching method is applied. And if only one element remains after applying the three methods then matrix matching method is not applied and the process ends recognizing the character. Step 1 • Take input handwritten character. Step 2 • Apply intersection count method and find number of intersections in the input character. • Based on the result make a list of possible characters. Step 3 • Extract enclosed shapes from input character. • Extract enclosed shapes from output characters of the previous method. • Match both results obtained and modify the solution set. Step 4 • Apply centroid based method on the input character. • Apply centroid based method on output characters of previous method. • Match both the results obtained and modify the solution set. Step 5 • If solution set has more than one character then proceed for matrix matching method or else end the process.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 143 4. FUTURE SCOPE This paper focuses on these character recognition techniques for Majuscule form of the English alphabet. It can be extended for Minuscule forms and also other languages and scripts with mere modifications. 5. CONCLUSIONS It is described and justified that applying a filter based process that encapsulates different simple methodologies is much efficient both with respect to time as well as space and leads to greater accuracy than applying just one complex method. Also, the filter is stopped as soon as the number of possible character is reduced to only one thus saving resources. REFERENCES [1]. Badawy, W.”Automatic licence recognition(ALPR): A state of the art review.” [2]. Shrey Dutta, Navven Sankaran, Pramod Sankar K, C.V. Jawahar, “Robust recognition of degraded documents using character N-Grams”, IEEE, 2012. [3]. Amrita Hirwani, Sandeep Gonnade “Handwritten Character Recognition System Using Neural Network”. [4]. Sukhpreet Singh, “Optical character recognition techniques: A survey”. [5]. Reetika Verma, Rupinder Kaur, “An Efficient Technique for CHARACTER RECOGNITION Using Neural Network & Surf Feature Extraction”.