SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1380
Recognition of Handwritten Mathematical Equations
Prachi Gupta1 , Neelam Pal2, Lavanya Agrawal3
1,2,3 B tech, IMS Engineering college, Uttar Pradesh, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract–The aim of this project is to developanassistance
system that analyses thehandwritten mathematicalequations
based on handwriting recognition algorithms. Thesystemwill
be able to recognize images of handwritten equations and
output the corresponding characters in LATEX.
Being able to change handwritten equations into LATEX has
applications for consumers and academics. While large
number of researches have beendonefor digitsandcharacters
recognition, much less progress has been made surrounding
handwritten equation recognition. Whiletyping ismuchfaster
than writing by hand, math equations have the opposite
property: writing mathematical equations by hand is more
efficient than typesetting them. Furthermore, whereas
handwritten equations are human readable, the “code” of
typesetting languages are often highly nested and difficult to
edit. These problems of typesetting present an opportunityfor
improving the workflow of writing math equations digitally.
Handwritten character or symbol recognition is one of the
application in pattern classification. It is generally easy for
anyone to recognize handwritten or characters and symbols
but it is difficult for a computer to recognize them. This
difficulty can be overcome by adopting machine learning
approach by designing a system that recognizes the patterns.
Pattern classification involves features extraction, concept
behind the observation and classifier. For this purpose,
character geometry as feature extraction technique and two
classifiers Support Vector Machines (SVM) and K-nearest
neighbor (KNN) are used. Two classifiers are used for the
comparative analysis.
Key words: SVM, KNN, Character geometry, Machine
learning
1. INTRODUCTION
Pattern recognition forms the basisoflearningfor everyone.
It is generally easy for a person to differentiate a
handwritten number "7" from an "9"; However, it is difficult
for a programmable device(computer) to solve this kind of
emotive problem. The problem is difficult because each
pattern usually contains a large amount of processed data,
and the recognition problems typically have an indistinct,
high-dimensional, structure. Pattern recognition is the
science of making conclusion from perceptual data, using
tools from statistics, probability, computational geometry,
machine learning, and algorithm design. Pattern
classification involves features extraction and classification.
Pattern is defined as combination of features that are
characteristic of an individual. In classification, a patternisa
pair of variables {x, w} where x isa collectionofobservations
or features (feature vector) and w is the concept behind the
observation (label). The quality of a feature vector is related
to its ability to bias examples from different classes.
Examples from the same class should have similar feature
values and while examples from different classes having
different feature values. Feature can be defined as any
distinctive aspect, quality or characteristic which, may be
symbols or numerals . The combination of d features is
represented as a d-dimensional column vector called a
feature vector. The dimensional space defined bythefeature
vector is called feature space. Objects are represented as
points in feature space. The goal of a classifier is to separate
feature space into class-labeled decision regions.
2. ALGORITHMS
2.1 K-Nearest Neighbour
neighbor. KNN is a type of instance-based learning, or lazy
learning, where the function is only nearly local and all
computation is delayed In pattern recognition,thek-nearest
neighbor algorithm (KNN) is the input consists of the k
closest training examples in the feature space. In k-NN
classification, the output is a class membership. An object is
classified by a majority vote of its neighbors, with the object
being assigned to the class most common among its k
nearest neighbors (k is a positive integer, generallysmall).If
k = 1, then the object is simply assigned to the class of that
single nearest until classification. The KNN algorithm is
among the easiest of all machine learning algorithms. Both
for classification and regression, can be useful to assign
weight to the contributions of the neighbors, so that the
nearer neighbors contribute more to the average than the
more far ones. For example, a common weighting scheme
consists in giving each neighbor a weight of 1/d, where d is
the distance to the neighbor. The neighbors are takenfroma
set of objects for which the class (for KNN classification) or
the object property value (for KNN regression) is known.
This can be thought of as the training set for the algorithm,
though no obvious training step is required.
2.2 Support Vector Machine
(SVMs, also support vector networks) are supervised
learning models with associated learning. In machine
learning, support vector machines algorithms that inspect
the data used for classificationand regressionanalysis.Given
a set of training examples, each related to one or the other of
two categories, an SVM training algorithm builds a model
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1381
that assigns new examples to one category or the other,
making it a non-probabilistic binary linear classifier
(although methods such as Platt scaling exist to use SVMin a
probabilistic classification setting). An SVM model is a
representation of the examples as points in space, mapped
so that the examples of distinct categories are divided by a
clear gap that is as broad as possible. New examplesarethen
mapped into that same space and forecast to belong to a
category based on which side of the gap they fall.
3 CHARACTER GEOMETRY FEATURE
EXTRACTION TECHNIQUE
Character geometry technique follows the steps described
below Universe of Discourse: At first, the universe of
discourse is selected because thefeatures extractedfromthe
character image include the positions of different line in the
character image.
Zoning: The image is divided intowindowsof equal sizeand
feature extraction is applied to each individual zone rather
than the whole image. In our work, the image was divided
into 9 equal sized windows. Starters, Intersections and
Minor Starters: To extract different line segments in a
particular zone, the whole skeleton in that zone should be
extended across. For the above reason, particular pixels in
the character skeleton are treated as starters, intersections
and few starters.
Character traversal:Charactertraversal startsafterzoning
by which line in each zone are extracted. The first step is the
starters and intersections in a zone are identified and then
filled in a list. Then the algorithm starts by considering the
starter list. Once all the starters are processed, minor
starters find along the course of traversal areprocessed.The
positions of pixels in each of the line segment obtained
during the process are stored. After traversing all the pixels
in the image, the algorithm ends.
Distinguishing the line segments: After all the line
segments in the image are extracted, they are classified into
any one of the following lines – Horizontal line, Vertical line,
Right diagonal line, or Left-diagonal line.
Feature Extraction: After the line type of each segment is
resolved, feature vector is formed based on this processed
data.
3.1Architecture of the Proposed System
Input image: Input picture can be a picture comprising of
either a character, image or expressions. The information
picture ought to be in a .png augmentation necessarily.
Preprocessing of input image: Picture pre-dealing is
compulsory for any photo based applications. The precision
and consolidating rate of such frameworksmustbeona very
basic level high in order to ensure the achievement of the
resulting steps. In any case, more often than not, the
noteworthiness of these systems stay ignored which brings
about second rate results. The objective of the pre-handling
step is to construct necessary information.
Feature extraction: This is a sort of dimensionality
decreasing that successfully addresses interesting parts ofa
photo as a little component vector. This approach is useful
when picture sizes are huge and a reduced segment
depiction is required to quickly complete assignments, for
instance, picture organizing and recovery. Character
Geometry Feature Extraction Technique is used for the
component extraction since it is one which support the
component extraction strategies which does not have any
mistakes.
Performing SVM and KNN classification: KNN count is a
flexible and clear estimation which arranges the given get
ready cases in perspective of its neighbors.Forcollectingthe
new case this count figures the Euclidian division with the
new representation and recognizes itsneighborsafterthatit
consigns the class in light of the k regard .k regard will be
customer portrayed. This estimation reconstruct the class
that addresses the most outrageous of the k cases. SVMs
(Support Vector Machines) are an important technique for
data classification. A classification task generally
incorporates disengaging data into get ready and testing
sets. Each event in the planning set contains one "target
regard" (i.e. the class names) and a set of "attributes" (i.e.the
components or watched factors). The goal of SVM is to
explain a model (in light of the arrangement data) which
predicts the target estimations of the test data givenonly the
test data properties. SVM requires that each data case is
addressed as a vector of real numbers. Scaling before
applying SVM is tough. The rule of SVM depends upon a
straight separation in a high estimation feature spacewhere
data are mapped to consider thepossiblenon-linearityof the
issue.
Printing the recognized symbol as Output: The
expression, symbol or character given as the input picture is
behold and imprinted in the command window. Recognized
image as bestow is a consequence of the considerable
number of procedures clarified . The perceivedimagewill be
the form which can be behold by the PC, human and
machines.
4. EXPERIMENTAL RESULTS
Here we have used MATLABasourPClanguage,heredataset
contains both printed and handwritten images.
Mathematical Symbol dataset not only contains different
symbols but also contains alphabets of different languages.
For the handwritten mathematical symbol/character
recognition system, a private dataset is used. This own
dataset is prepared for Mathematical Symbols by
considering all possible constraints such as variations in
writing styles, representatives consisting with some noise,
etc.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1382
5. CONCLUSIONS
Among different feature extraction techniques and
strategies, Character geometry is selected as the feature
extraction technique. Character geometryfeature extraction
technique is one which supports other different feature
extraction techniques. SVM and KNN classifiers are used for
the classification. After numerous executions it has been
found that classifier has great correctness comparedtoSVM
as classifier. The efficiency of KNN decreases with the
increase in dataset.
S.NO INPUT IMAGE SVM KNN
1 1 0 1 2 3 4 5 6 7 8 9 100% 100%
2 A B C D E 100% 100%
3 F G H I J 100% 100%
4 K L M N O 100% 100%
5 P Q R S T 100% 100%
6 U V W X Y Z 100% 100%
7 a b c d e 40% 60%
8 f g h i j 100% 100%
9 k l m n o 100% 100%
10 p q r s t 100% 100%
11 u v w x y z 100% 100%
12 ᵦ ᵤ * λ - 100% 100%
13 ( ) + ^ γ 100% 100%
14 σ → ⃝~ , 100% 100%
15 ∏ ᶯ ∫ ∞ ∆ 100% 100%
16 . ↔ Θ X √ 80% 80%
17 A + B * C 100% 100%
18 < k (ᶯ ) 100% 100%
19 u Ε { 1, . . , n – 3 } 100% 100%
20 a + b * c 100% 100%
21 2 n – 1 100% 100%
22 t a n Θ 75% 75%
23 a + c 100% 100%
24 ! @ # ; : = 33% 33%
Table (a)- Classification of input images for printed images
Table (b)- Classification of input images for handwritten
images dataset
6. FUTURE WORK
In future, this above technique can be attempted against
standard databases. Likewise more tests could be directed
with extra benchmark datasets. By using efficient
segmentation technique, offline handwritten mathematical
equations with respect to superscriptandsubscriptcouldbe
recognized efficiently.
7. ACKNOWLEDGEMENT
We are earnestly grateful to our mentor Dr. UPASANA
PANDEY ma’am, Associate Professor Department of
computer science and engineering, IMS Engineering College
for guiding us at each and every step to make this project a
successful one. Finally we will like to express heartiest
gratefulness to almighty and to our parents for supporting
us.
8. REFERENCES
[1]Richard Zanibbi & Dorothea Blostein, “Recognition and
retrieval of mathematical expressions”, IJDAR,
SpringerVerlag, 2011.
[2] Zhao Xuejun, Liu Xinyul, Zheng Shenglingl,PanBaochang
and Yuan Y.Tang, “On-line Recognition Handwritten Mat
hematical Symbols”, IEEE, 1997.
[3] Dorothea Blostein & Ann Grbavec, “ Handbook onOptical
Character Recognition and Document Image Analysis”,
(Chapter22)-“Recognition of Mathematical Notation”, World
Scientific Publishing Company, 1996
[4] J. S. Raikwal & Kanak Saxena ,”PerformanceEvaluation of
SVM and K-Nearest Neighbor Algorithm over Medical Data
set “ In International Journal of Computer Applications
(0975 – 8887) Volume 50 – No.14, July 2012M.
[5] http://www.inftyproject.org
24 ! @ # ; : = 33% 33%
23 a + c 100% 100%
22 t a n Θ 25% 100%
21 2 n – 1 25% 100%
20 a + b * c 100% 100%
19 u Ε { 1, . . , n – 3 } 100% 100%
18 < k (ᶯ ) 60% 60%
17 A + B * C 100% 100%
16 . ↔ Θ X √ 80% 80%
15 ∏ ᶯ ∫ ∞ ∆ 100% 100%
14 σ → ⃝~ , 100% 100%
13 ( ) + ^ γ 100% 100%
12 ᵦ ᵤ * λ - 100% 100%
11 u v w x y z 100% 100%
10 p q r s t 100% 100%
9 k l m n o 100% 100%
8 f g h i j 100% 100%
7 a b c d e 40% 60%
6 U V W X Y Z 100% 100%
5 P Q R S T 100% 100%
4 K L M N O 100% 100%
3 F G H I J 100% 100%
2 A B C D E 100% 100%
1 1 0 1 2 3 4 5 6 7 8 9 100% 100%
S.NO INPUT IMAGE SVM KNN
dataset

More Related Content

What's hot

Kernal based speaker specific feature extraction and its applications in iTau...
Kernal based speaker specific feature extraction and its applications in iTau...Kernal based speaker specific feature extraction and its applications in iTau...
Kernal based speaker specific feature extraction and its applications in iTau...
TELKOMNIKA JOURNAL
 
A Novel Algorithm for Design Tree Classification with PCA
A Novel Algorithm for Design Tree Classification with PCAA Novel Algorithm for Design Tree Classification with PCA
A Novel Algorithm for Design Tree Classification with PCA
Editor Jacotech
 
8.clustering algorithm.k means.em algorithm
8.clustering algorithm.k means.em algorithm8.clustering algorithm.k means.em algorithm
8.clustering algorithm.k means.em algorithm
Laura Petrosanu
 
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
CSCJournals
 

What's hot (17)

The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...
 
Lda
LdaLda
Lda
 
Kernal based speaker specific feature extraction and its applications in iTau...
Kernal based speaker specific feature extraction and its applications in iTau...Kernal based speaker specific feature extraction and its applications in iTau...
Kernal based speaker specific feature extraction and its applications in iTau...
 
Beginners Guide to Non-Negative Matrix Factorization
Beginners Guide to Non-Negative Matrix FactorizationBeginners Guide to Non-Negative Matrix Factorization
Beginners Guide to Non-Negative Matrix Factorization
 
A BI-OBJECTIVE MODEL FOR SVM WITH AN INTERACTIVE PROCEDURE TO IDENTIFY THE BE...
A BI-OBJECTIVE MODEL FOR SVM WITH AN INTERACTIVE PROCEDURE TO IDENTIFY THE BE...A BI-OBJECTIVE MODEL FOR SVM WITH AN INTERACTIVE PROCEDURE TO IDENTIFY THE BE...
A BI-OBJECTIVE MODEL FOR SVM WITH AN INTERACTIVE PROCEDURE TO IDENTIFY THE BE...
 
A Novel Algorithm for Design Tree Classification with PCA
A Novel Algorithm for Design Tree Classification with PCAA Novel Algorithm for Design Tree Classification with PCA
A Novel Algorithm for Design Tree Classification with PCA
 
11 construction productivity and cost estimation using artificial
11 construction productivity and cost estimation using artificial 11 construction productivity and cost estimation using artificial
11 construction productivity and cost estimation using artificial
 
K means report
K means reportK means report
K means report
 
8.clustering algorithm.k means.em algorithm
8.clustering algorithm.k means.em algorithm8.clustering algorithm.k means.em algorithm
8.clustering algorithm.k means.em algorithm
 
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
 
An Application of Assignment Problem in Laptop Selection Problem Using MATLAB
An Application of Assignment Problem in Laptop Selection Problem Using MATLAB An Application of Assignment Problem in Laptop Selection Problem Using MATLAB
An Application of Assignment Problem in Laptop Selection Problem Using MATLAB
 
Unsupervised learning clustering
Unsupervised learning clusteringUnsupervised learning clustering
Unsupervised learning clustering
 
PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...
PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...
PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...
 
The Pyramid Match Kernel: Discriminative Classification with Sets of Image Fe...
The Pyramid Match Kernel: Discriminative Classification with Sets of Image Fe...The Pyramid Match Kernel: Discriminative Classification with Sets of Image Fe...
The Pyramid Match Kernel: Discriminative Classification with Sets of Image Fe...
 
Principal Component Analysis (PCA) and LDA PPT Slides
Principal Component Analysis (PCA) and LDA PPT SlidesPrincipal Component Analysis (PCA) and LDA PPT Slides
Principal Component Analysis (PCA) and LDA PPT Slides
 
Pca ppt
Pca pptPca ppt
Pca ppt
 
A FUZZY INTERACTIVE BI-OBJECTIVE MODEL FOR SVM TO IDENTIFY THE BEST COMPROMIS...
A FUZZY INTERACTIVE BI-OBJECTIVE MODEL FOR SVM TO IDENTIFY THE BEST COMPROMIS...A FUZZY INTERACTIVE BI-OBJECTIVE MODEL FOR SVM TO IDENTIFY THE BEST COMPROMIS...
A FUZZY INTERACTIVE BI-OBJECTIVE MODEL FOR SVM TO IDENTIFY THE BEST COMPROMIS...
 

Similar to Recognition of Handwritten Mathematical Equations

EE660_Report_YaxinLiu_8448347171
EE660_Report_YaxinLiu_8448347171EE660_Report_YaxinLiu_8448347171
EE660_Report_YaxinLiu_8448347171
Yaxin Liu
 

Similar to Recognition of Handwritten Mathematical Equations (20)

AMAZON STOCK PRICE PREDICTION BY USING SMLT
AMAZON STOCK PRICE PREDICTION BY USING SMLTAMAZON STOCK PRICE PREDICTION BY USING SMLT
AMAZON STOCK PRICE PREDICTION BY USING SMLT
 
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
 
IRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for CybersecurityIRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for Cybersecurity
 
Text Detection and Recognition in Natural Images
Text Detection and Recognition in Natural ImagesText Detection and Recognition in Natural Images
Text Detection and Recognition in Natural Images
 
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
 
Parallel KNN for Big Data using Adaptive Indexing
Parallel KNN for Big Data using Adaptive IndexingParallel KNN for Big Data using Adaptive Indexing
Parallel KNN for Big Data using Adaptive Indexing
 
Density Based Clustering Approach for Solving the Software Component Restruct...
Density Based Clustering Approach for Solving the Software Component Restruct...Density Based Clustering Approach for Solving the Software Component Restruct...
Density Based Clustering Approach for Solving the Software Component Restruct...
 
image_classification.pptx
image_classification.pptximage_classification.pptx
image_classification.pptx
 
IRJET- Performance Evaluation of Various Classification Algorithms
IRJET- Performance Evaluation of Various Classification AlgorithmsIRJET- Performance Evaluation of Various Classification Algorithms
IRJET- Performance Evaluation of Various Classification Algorithms
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
Deep Learning for Natural Language Processing
Deep Learning for Natural Language ProcessingDeep Learning for Natural Language Processing
Deep Learning for Natural Language Processing
 
Support Vector Machine Optimal Kernel Selection
Support Vector Machine Optimal Kernel SelectionSupport Vector Machine Optimal Kernel Selection
Support Vector Machine Optimal Kernel Selection
 
Stock Market Prediction Using ANN
Stock Market Prediction Using ANNStock Market Prediction Using ANN
Stock Market Prediction Using ANN
 
Generalization of linear and non-linear support vector machine in multiple fi...
Generalization of linear and non-linear support vector machine in multiple fi...Generalization of linear and non-linear support vector machine in multiple fi...
Generalization of linear and non-linear support vector machine in multiple fi...
 
Brain Tumor Classification using Support Vector Machine
Brain Tumor Classification using Support Vector MachineBrain Tumor Classification using Support Vector Machine
Brain Tumor Classification using Support Vector Machine
 
Comparative Study of Object Detection Algorithms
Comparative Study of Object Detection AlgorithmsComparative Study of Object Detection Algorithms
Comparative Study of Object Detection Algorithms
 
IRJET- Study and Evaluation of Classification Algorithms in Data Mining
IRJET- Study and Evaluation of Classification Algorithms in Data MiningIRJET- Study and Evaluation of Classification Algorithms in Data Mining
IRJET- Study and Evaluation of Classification Algorithms in Data Mining
 
EE660_Report_YaxinLiu_8448347171
EE660_Report_YaxinLiu_8448347171EE660_Report_YaxinLiu_8448347171
EE660_Report_YaxinLiu_8448347171
 
Gesture recognition system
Gesture recognition systemGesture recognition system
Gesture recognition system
 
SVM-KNN Hybrid Method for MR Image
SVM-KNN Hybrid Method for MR ImageSVM-KNN Hybrid Method for MR Image
SVM-KNN Hybrid Method for MR Image
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 

Recently uploaded (20)

NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 

Recognition of Handwritten Mathematical Equations

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1380 Recognition of Handwritten Mathematical Equations Prachi Gupta1 , Neelam Pal2, Lavanya Agrawal3 1,2,3 B tech, IMS Engineering college, Uttar Pradesh, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract–The aim of this project is to developanassistance system that analyses thehandwritten mathematicalequations based on handwriting recognition algorithms. Thesystemwill be able to recognize images of handwritten equations and output the corresponding characters in LATEX. Being able to change handwritten equations into LATEX has applications for consumers and academics. While large number of researches have beendonefor digitsandcharacters recognition, much less progress has been made surrounding handwritten equation recognition. Whiletyping ismuchfaster than writing by hand, math equations have the opposite property: writing mathematical equations by hand is more efficient than typesetting them. Furthermore, whereas handwritten equations are human readable, the “code” of typesetting languages are often highly nested and difficult to edit. These problems of typesetting present an opportunityfor improving the workflow of writing math equations digitally. Handwritten character or symbol recognition is one of the application in pattern classification. It is generally easy for anyone to recognize handwritten or characters and symbols but it is difficult for a computer to recognize them. This difficulty can be overcome by adopting machine learning approach by designing a system that recognizes the patterns. Pattern classification involves features extraction, concept behind the observation and classifier. For this purpose, character geometry as feature extraction technique and two classifiers Support Vector Machines (SVM) and K-nearest neighbor (KNN) are used. Two classifiers are used for the comparative analysis. Key words: SVM, KNN, Character geometry, Machine learning 1. INTRODUCTION Pattern recognition forms the basisoflearningfor everyone. It is generally easy for a person to differentiate a handwritten number "7" from an "9"; However, it is difficult for a programmable device(computer) to solve this kind of emotive problem. The problem is difficult because each pattern usually contains a large amount of processed data, and the recognition problems typically have an indistinct, high-dimensional, structure. Pattern recognition is the science of making conclusion from perceptual data, using tools from statistics, probability, computational geometry, machine learning, and algorithm design. Pattern classification involves features extraction and classification. Pattern is defined as combination of features that are characteristic of an individual. In classification, a patternisa pair of variables {x, w} where x isa collectionofobservations or features (feature vector) and w is the concept behind the observation (label). The quality of a feature vector is related to its ability to bias examples from different classes. Examples from the same class should have similar feature values and while examples from different classes having different feature values. Feature can be defined as any distinctive aspect, quality or characteristic which, may be symbols or numerals . The combination of d features is represented as a d-dimensional column vector called a feature vector. The dimensional space defined bythefeature vector is called feature space. Objects are represented as points in feature space. The goal of a classifier is to separate feature space into class-labeled decision regions. 2. ALGORITHMS 2.1 K-Nearest Neighbour neighbor. KNN is a type of instance-based learning, or lazy learning, where the function is only nearly local and all computation is delayed In pattern recognition,thek-nearest neighbor algorithm (KNN) is the input consists of the k closest training examples in the feature space. In k-NN classification, the output is a class membership. An object is classified by a majority vote of its neighbors, with the object being assigned to the class most common among its k nearest neighbors (k is a positive integer, generallysmall).If k = 1, then the object is simply assigned to the class of that single nearest until classification. The KNN algorithm is among the easiest of all machine learning algorithms. Both for classification and regression, can be useful to assign weight to the contributions of the neighbors, so that the nearer neighbors contribute more to the average than the more far ones. For example, a common weighting scheme consists in giving each neighbor a weight of 1/d, where d is the distance to the neighbor. The neighbors are takenfroma set of objects for which the class (for KNN classification) or the object property value (for KNN regression) is known. This can be thought of as the training set for the algorithm, though no obvious training step is required. 2.2 Support Vector Machine (SVMs, also support vector networks) are supervised learning models with associated learning. In machine learning, support vector machines algorithms that inspect the data used for classificationand regressionanalysis.Given a set of training examples, each related to one or the other of two categories, an SVM training algorithm builds a model
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1381 that assigns new examples to one category or the other, making it a non-probabilistic binary linear classifier (although methods such as Platt scaling exist to use SVMin a probabilistic classification setting). An SVM model is a representation of the examples as points in space, mapped so that the examples of distinct categories are divided by a clear gap that is as broad as possible. New examplesarethen mapped into that same space and forecast to belong to a category based on which side of the gap they fall. 3 CHARACTER GEOMETRY FEATURE EXTRACTION TECHNIQUE Character geometry technique follows the steps described below Universe of Discourse: At first, the universe of discourse is selected because thefeatures extractedfromthe character image include the positions of different line in the character image. Zoning: The image is divided intowindowsof equal sizeand feature extraction is applied to each individual zone rather than the whole image. In our work, the image was divided into 9 equal sized windows. Starters, Intersections and Minor Starters: To extract different line segments in a particular zone, the whole skeleton in that zone should be extended across. For the above reason, particular pixels in the character skeleton are treated as starters, intersections and few starters. Character traversal:Charactertraversal startsafterzoning by which line in each zone are extracted. The first step is the starters and intersections in a zone are identified and then filled in a list. Then the algorithm starts by considering the starter list. Once all the starters are processed, minor starters find along the course of traversal areprocessed.The positions of pixels in each of the line segment obtained during the process are stored. After traversing all the pixels in the image, the algorithm ends. Distinguishing the line segments: After all the line segments in the image are extracted, they are classified into any one of the following lines – Horizontal line, Vertical line, Right diagonal line, or Left-diagonal line. Feature Extraction: After the line type of each segment is resolved, feature vector is formed based on this processed data. 3.1Architecture of the Proposed System Input image: Input picture can be a picture comprising of either a character, image or expressions. The information picture ought to be in a .png augmentation necessarily. Preprocessing of input image: Picture pre-dealing is compulsory for any photo based applications. The precision and consolidating rate of such frameworksmustbeona very basic level high in order to ensure the achievement of the resulting steps. In any case, more often than not, the noteworthiness of these systems stay ignored which brings about second rate results. The objective of the pre-handling step is to construct necessary information. Feature extraction: This is a sort of dimensionality decreasing that successfully addresses interesting parts ofa photo as a little component vector. This approach is useful when picture sizes are huge and a reduced segment depiction is required to quickly complete assignments, for instance, picture organizing and recovery. Character Geometry Feature Extraction Technique is used for the component extraction since it is one which support the component extraction strategies which does not have any mistakes. Performing SVM and KNN classification: KNN count is a flexible and clear estimation which arranges the given get ready cases in perspective of its neighbors.Forcollectingthe new case this count figures the Euclidian division with the new representation and recognizes itsneighborsafterthatit consigns the class in light of the k regard .k regard will be customer portrayed. This estimation reconstruct the class that addresses the most outrageous of the k cases. SVMs (Support Vector Machines) are an important technique for data classification. A classification task generally incorporates disengaging data into get ready and testing sets. Each event in the planning set contains one "target regard" (i.e. the class names) and a set of "attributes" (i.e.the components or watched factors). The goal of SVM is to explain a model (in light of the arrangement data) which predicts the target estimations of the test data givenonly the test data properties. SVM requires that each data case is addressed as a vector of real numbers. Scaling before applying SVM is tough. The rule of SVM depends upon a straight separation in a high estimation feature spacewhere data are mapped to consider thepossiblenon-linearityof the issue. Printing the recognized symbol as Output: The expression, symbol or character given as the input picture is behold and imprinted in the command window. Recognized image as bestow is a consequence of the considerable number of procedures clarified . The perceivedimagewill be the form which can be behold by the PC, human and machines. 4. EXPERIMENTAL RESULTS Here we have used MATLABasourPClanguage,heredataset contains both printed and handwritten images. Mathematical Symbol dataset not only contains different symbols but also contains alphabets of different languages. For the handwritten mathematical symbol/character recognition system, a private dataset is used. This own dataset is prepared for Mathematical Symbols by considering all possible constraints such as variations in writing styles, representatives consisting with some noise, etc.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1382 5. CONCLUSIONS Among different feature extraction techniques and strategies, Character geometry is selected as the feature extraction technique. Character geometryfeature extraction technique is one which supports other different feature extraction techniques. SVM and KNN classifiers are used for the classification. After numerous executions it has been found that classifier has great correctness comparedtoSVM as classifier. The efficiency of KNN decreases with the increase in dataset. S.NO INPUT IMAGE SVM KNN 1 1 0 1 2 3 4 5 6 7 8 9 100% 100% 2 A B C D E 100% 100% 3 F G H I J 100% 100% 4 K L M N O 100% 100% 5 P Q R S T 100% 100% 6 U V W X Y Z 100% 100% 7 a b c d e 40% 60% 8 f g h i j 100% 100% 9 k l m n o 100% 100% 10 p q r s t 100% 100% 11 u v w x y z 100% 100% 12 ᵦ ᵤ * λ - 100% 100% 13 ( ) + ^ γ 100% 100% 14 σ → ⃝~ , 100% 100% 15 ∏ ᶯ ∫ ∞ ∆ 100% 100% 16 . ↔ Θ X √ 80% 80% 17 A + B * C 100% 100% 18 < k (ᶯ ) 100% 100% 19 u Ε { 1, . . , n – 3 } 100% 100% 20 a + b * c 100% 100% 21 2 n – 1 100% 100% 22 t a n Θ 75% 75% 23 a + c 100% 100% 24 ! @ # ; : = 33% 33% Table (a)- Classification of input images for printed images Table (b)- Classification of input images for handwritten images dataset 6. FUTURE WORK In future, this above technique can be attempted against standard databases. Likewise more tests could be directed with extra benchmark datasets. By using efficient segmentation technique, offline handwritten mathematical equations with respect to superscriptandsubscriptcouldbe recognized efficiently. 7. ACKNOWLEDGEMENT We are earnestly grateful to our mentor Dr. UPASANA PANDEY ma’am, Associate Professor Department of computer science and engineering, IMS Engineering College for guiding us at each and every step to make this project a successful one. Finally we will like to express heartiest gratefulness to almighty and to our parents for supporting us. 8. REFERENCES [1]Richard Zanibbi & Dorothea Blostein, “Recognition and retrieval of mathematical expressions”, IJDAR, SpringerVerlag, 2011. [2] Zhao Xuejun, Liu Xinyul, Zheng Shenglingl,PanBaochang and Yuan Y.Tang, “On-line Recognition Handwritten Mat hematical Symbols”, IEEE, 1997. [3] Dorothea Blostein & Ann Grbavec, “ Handbook onOptical Character Recognition and Document Image Analysis”, (Chapter22)-“Recognition of Mathematical Notation”, World Scientific Publishing Company, 1996 [4] J. S. Raikwal & Kanak Saxena ,”PerformanceEvaluation of SVM and K-Nearest Neighbor Algorithm over Medical Data set “ In International Journal of Computer Applications (0975 – 8887) Volume 50 – No.14, July 2012M. [5] http://www.inftyproject.org 24 ! @ # ; : = 33% 33% 23 a + c 100% 100% 22 t a n Θ 25% 100% 21 2 n – 1 25% 100% 20 a + b * c 100% 100% 19 u Ε { 1, . . , n – 3 } 100% 100% 18 < k (ᶯ ) 60% 60% 17 A + B * C 100% 100% 16 . ↔ Θ X √ 80% 80% 15 ∏ ᶯ ∫ ∞ ∆ 100% 100% 14 σ → ⃝~ , 100% 100% 13 ( ) + ^ γ 100% 100% 12 ᵦ ᵤ * λ - 100% 100% 11 u v w x y z 100% 100% 10 p q r s t 100% 100% 9 k l m n o 100% 100% 8 f g h i j 100% 100% 7 a b c d e 40% 60% 6 U V W X Y Z 100% 100% 5 P Q R S T 100% 100% 4 K L M N O 100% 100% 3 F G H I J 100% 100% 2 A B C D E 100% 100% 1 1 0 1 2 3 4 5 6 7 8 9 100% 100% S.NO INPUT IMAGE SVM KNN dataset