In the present scenario most of the importance is given for the “paperless office” there by more and more communication and storage of documents is performed digitally. Documents and files which are present in Hindi and Marathi languages that were once stored physically on paper are now being converted into electronic form in order to facilitate quicker additions, searches, and modifications, as well as to prolong the life of such records. Because of this, there is a great demand of such software, which automatically extracts, analyze, recognize and store information from physical documents for later retrieval. Skew detection is used for text line position determination in Digitized documents, automated page orientation, and skew angle detection for binary document images, skew detection in handwritten scripts, in compensation for Internet audio applications and in the correction of scanned documents.
Handwritten character recognition is one of the most challenging and ongoing areas of research in the
field of pattern recognition. HCR research is matured for foreign languages like Chinese and Japanese but
the problem is much more complex for Indian languages. The problem becomes even more complicated for
South Indian languages due to its large character set and the presence of vowels modifiers and compound
characters. This paper provides an overview of important contributions and advances in offline as well as
online handwritten character recognition of Malayalam scripts.
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...ijaia
Handwritten signature is the most accepted and economical means of personnel authentication. It can be
verified using online or offline schemes. This paper proposes a signature verification model by combining
Zernike moments feature with circularity and aspect ratio. Unlike characters, signatures vary each time
because of its behavioural biometric property. Signatures can be identified based on their shape. Moments
are the good translational and scale invariant shape descriptors. The amplitude and the phase of Zernike
moments, circularity and aspect ratio of the signature are the features that are extracted and combined for
the verification purpose and are fed to the Feedforward Backpropagation Neural Network. This Neural
Network classifies the signature into genuine or forged. Experimental results reveal that this methodology
of combining zernike moments along with the two mentioned geometrical properties give higher accuracy
than using them individually. The combination of these feature vector yields a mean accuracy of 95.83%.
When this approach is compared with the literature, it proves to be more effective.
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Hybrid Procreative –Discriminative Based Hashing Methodrahulmonikasharma
Hashing method is the one of the main method for searching same and different images based on hash code.For capturing similarities between textual, visual and cross media information; a hashing approaches have been proven. To address these challenges, in this paper we propose semantic level cross media hashing (SCMH) and deep belief network (DBN) is for a co-relation between different modalities.
Segmentation and recognition of handwritten gurmukhi scriptRAJENDRA VERMA
To Segment handwritten cursive words into individual predefined strokes. I had design a algorithm which is calculated angle between two coordinate points in the basic of angle and segment the handwritten cursive word. It improve the accuracy of handwriting recognition system.
Handwritten character recognition is one of the most challenging and ongoing areas of research in the
field of pattern recognition. HCR research is matured for foreign languages like Chinese and Japanese but
the problem is much more complex for Indian languages. The problem becomes even more complicated for
South Indian languages due to its large character set and the presence of vowels modifiers and compound
characters. This paper provides an overview of important contributions and advances in offline as well as
online handwritten character recognition of Malayalam scripts.
OFFLINE SIGNATURE VERIFICATION SYSTEM FOR BANK CHEQUES USING ZERNIKE MOMENTS,...ijaia
Handwritten signature is the most accepted and economical means of personnel authentication. It can be
verified using online or offline schemes. This paper proposes a signature verification model by combining
Zernike moments feature with circularity and aspect ratio. Unlike characters, signatures vary each time
because of its behavioural biometric property. Signatures can be identified based on their shape. Moments
are the good translational and scale invariant shape descriptors. The amplitude and the phase of Zernike
moments, circularity and aspect ratio of the signature are the features that are extracted and combined for
the verification purpose and are fed to the Feedforward Backpropagation Neural Network. This Neural
Network classifies the signature into genuine or forged. Experimental results reveal that this methodology
of combining zernike moments along with the two mentioned geometrical properties give higher accuracy
than using them individually. The combination of these feature vector yields a mean accuracy of 95.83%.
When this approach is compared with the literature, it proves to be more effective.
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Hybrid Procreative –Discriminative Based Hashing Methodrahulmonikasharma
Hashing method is the one of the main method for searching same and different images based on hash code.For capturing similarities between textual, visual and cross media information; a hashing approaches have been proven. To address these challenges, in this paper we propose semantic level cross media hashing (SCMH) and deep belief network (DBN) is for a co-relation between different modalities.
Segmentation and recognition of handwritten gurmukhi scriptRAJENDRA VERMA
To Segment handwritten cursive words into individual predefined strokes. I had design a algorithm which is calculated angle between two coordinate points in the basic of angle and segment the handwritten cursive word. It improve the accuracy of handwriting recognition system.
Fragmentation of handwritten touching characters in devanagari scriptZac Darcy
Character Segmentation of handwritten words is a difficult task because of different writing styles and
complex structural features. Segmentation of handwritten text in Devanagari script is an uphill task. The
occurrence of header line, overlapped characters in middle zone & half characters make the segmentation
process more difficultt. Sometimes, interline space and noise makes line fragmentation a difficult task.
Sometimes, interline space and noise makes line fragmentation a difficult task. Without separating the
touching characters, it will be difficult to identify the characters, hence fragmentation is necessary of the
touching characters in a word. So, we devised a technique, according to that first step will be
preprocessing of a word, than identify the joint points, form the bounding boxes around all vertical &
horizontal lines and finally fragment the touching characters on the basis of their height and width.
Text content dependent writer identificationeSAT Journals
Abstract
Text content based personal Identification system is vital in resolving problem of identifying unknown document’s writer using a
set of handwritten samples from alleged known writers. Text written on paper document is usually captured as image by scanner
or camera for computer processing. The most challenging problem encounter in text image processing is extraction of robust
feature vector from a set of inconstant handwritten text images obtained from the same writer at different time. In this work new
feature extraction method is engaged to produce active text features for developing an effective personal identification system.
The feature formed feature vector which is fed as input data into classification algorithm based on Support Vector Machine
(SVM). Experiment was conducted to identify writers of query handwritten texts. Result show satisfactory performance of the
proposed system, it was able to identify writers of query handwritten texts.
Keywords: Handwritten Text, Feature Vector, Identification and Support Vector Machine.
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Devnagari handwritten numeral recognition using geometric features and statis...Vikas Dongre
This paper presents a Devnagari Numerical recognition method based on statistical
discriminant functions. 17 geometric features based on pixel connectivity, lines, line directions, holes,
image area, perimeter, eccentricity, solidity, orientation etc. are used for representing the numerals. Five
discriminant functions viz. Linear, Quadratic, Diaglinear, Diagquadratic and Mahalanobis distance are
used for classification. 1500 handwritten numerals are used for training. Another 1500 handwritten
numerals are used for testing. Experimental results show that Linear, Quadratic and Mahalanobis
discriminant functions provide better results. Results of these three Discriminants are fed to a majority
voting type Combination classifier. It is found that Combination classifier offers better results over
individual classifiers.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This paper presents an approach to recognize off-line Bangla numeral. Today there are many OCR used to recognize
Bangla numeral. The recognition of handwritten character is still a challenging work in the field of pattern recognition. Numeral
recognition in pattern recognition is the process to identify the given character according to the predefined character set. The difficulties
of recognition of handwritten Bangla numeral are that they are different in shapes and sizes which are much curved in nature. . We try
to establish a process to recognize such handwritten Bangla numerals having different shape and size. The input scanned image is first
to be binarized. Then we have segmented all the ten digits of Bangla numerals to identify each and individual digit from a scanned
image. We have used line segmentation to extract the feature from each numeral based on templates. A high correlation coefficient
method provides a successful match between the test data and training data.
Optical character recognition (OCR) is process of classification of optical patterns contained in a digital image. The process of OCR Recognition involves several steps including pre-processing, segmentation, feature extraction, classification. Pre-processing is for done the basic operation on input image like noise reduction which remove the noisy signal from image. Segmentation stage for segment the given image into line by line and segment each character from segmented line. Future extraction calculates the characteristics of character. A Radial Basis Function Neural Network (RBFNN) is used to classification contains the database and does the comparison.
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...Editor IJMTER
Handwriting recognition has been one of the active and challenging research areas in the
field of pattern recognition. It has numerous applications which include, reading aid for blind, bank
cheques and conversion of any hand written document into structural text form[1]. As there are no
sufficient number of works on Indian language character recognition especially Kannada script
among 15 major scripts in India[2].In this paper an attempt is made to recognize handwritten
Kannada characters using Feed Forward neural networks. A handwritten kannada character is resized
into 60x40 pixel.The resized character is used for training the neural network. Once the training
process is completed the same character is given as input to the neural network with different set of
neurons in hidden layer and their recognition accuracy rate for different kannada characters has been
calculated and compared. The results show that the proposed system yields good recognition
accuracy rates comparable to that of other handwritten character recognition systems.
Handwriting character recognition (HCR) is the ability of a computer to receive and interpret handwritten input. Handwritten Character Recognition is one of the active and challenging research areas in the field of Pattern Recognition. Pattern recognition is a process that taking in raw data and making an action based on the category of the pattern. HCR is one of the well-known applications of pattern recognition. Handwriting recognition especially for Indian languages is still in infant stage because not much work has been done it. This paper discuss about an idea to recognize Kannada vowels using chain code features. Kannada is a South Indian language. For any recognition system, an important part is feature extraction. A proper feature extraction method can increase the recognition ratio. In this paper, a chain code based feature extraction method is investigated for developing HCR system. Chain code is working based on 4-neighborhood or 8–neighborhood methods. Chain code is a sequence of code directions of a character and connection to a starting point which is often used in image processing. In this paper, 8–neighborhood method has been implemented which allows generation of eight different codes for each character. These codes have been used as features of the character image, which have been later on used for training and testing for K-Nearest Neighbor (KNN) classifiers. The level of accuracy reached to 100%.
Fragmentation of handwritten touching characters in devanagari scriptZac Darcy
Character Segmentation of handwritten words is a difficult task because of different writing styles and
complex structural features. Segmentation of handwritten text in Devanagari script is an uphill task. The
occurrence of header line, overlapped characters in middle zone & half characters make the segmentation
process more difficultt. Sometimes, interline space and noise makes line fragmentation a difficult task.
Sometimes, interline space and noise makes line fragmentation a difficult task. Without separating the
touching characters, it will be difficult to identify the characters, hence fragmentation is necessary of the
touching characters in a word. So, we devised a technique, according to that first step will be
preprocessing of a word, than identify the joint points, form the bounding boxes around all vertical &
horizontal lines and finally fragment the touching characters on the basis of their height and width.
Text content dependent writer identificationeSAT Journals
Abstract
Text content based personal Identification system is vital in resolving problem of identifying unknown document’s writer using a
set of handwritten samples from alleged known writers. Text written on paper document is usually captured as image by scanner
or camera for computer processing. The most challenging problem encounter in text image processing is extraction of robust
feature vector from a set of inconstant handwritten text images obtained from the same writer at different time. In this work new
feature extraction method is engaged to produce active text features for developing an effective personal identification system.
The feature formed feature vector which is fed as input data into classification algorithm based on Support Vector Machine
(SVM). Experiment was conducted to identify writers of query handwritten texts. Result show satisfactory performance of the
proposed system, it was able to identify writers of query handwritten texts.
Keywords: Handwritten Text, Feature Vector, Identification and Support Vector Machine.
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Devnagari handwritten numeral recognition using geometric features and statis...Vikas Dongre
This paper presents a Devnagari Numerical recognition method based on statistical
discriminant functions. 17 geometric features based on pixel connectivity, lines, line directions, holes,
image area, perimeter, eccentricity, solidity, orientation etc. are used for representing the numerals. Five
discriminant functions viz. Linear, Quadratic, Diaglinear, Diagquadratic and Mahalanobis distance are
used for classification. 1500 handwritten numerals are used for training. Another 1500 handwritten
numerals are used for testing. Experimental results show that Linear, Quadratic and Mahalanobis
discriminant functions provide better results. Results of these three Discriminants are fed to a majority
voting type Combination classifier. It is found that Combination classifier offers better results over
individual classifiers.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This paper presents an approach to recognize off-line Bangla numeral. Today there are many OCR used to recognize
Bangla numeral. The recognition of handwritten character is still a challenging work in the field of pattern recognition. Numeral
recognition in pattern recognition is the process to identify the given character according to the predefined character set. The difficulties
of recognition of handwritten Bangla numeral are that they are different in shapes and sizes which are much curved in nature. . We try
to establish a process to recognize such handwritten Bangla numerals having different shape and size. The input scanned image is first
to be binarized. Then we have segmented all the ten digits of Bangla numerals to identify each and individual digit from a scanned
image. We have used line segmentation to extract the feature from each numeral based on templates. A high correlation coefficient
method provides a successful match between the test data and training data.
Optical character recognition (OCR) is process of classification of optical patterns contained in a digital image. The process of OCR Recognition involves several steps including pre-processing, segmentation, feature extraction, classification. Pre-processing is for done the basic operation on input image like noise reduction which remove the noisy signal from image. Segmentation stage for segment the given image into line by line and segment each character from segmented line. Future extraction calculates the characteristics of character. A Radial Basis Function Neural Network (RBFNN) is used to classification contains the database and does the comparison.
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...Editor IJMTER
Handwriting recognition has been one of the active and challenging research areas in the
field of pattern recognition. It has numerous applications which include, reading aid for blind, bank
cheques and conversion of any hand written document into structural text form[1]. As there are no
sufficient number of works on Indian language character recognition especially Kannada script
among 15 major scripts in India[2].In this paper an attempt is made to recognize handwritten
Kannada characters using Feed Forward neural networks. A handwritten kannada character is resized
into 60x40 pixel.The resized character is used for training the neural network. Once the training
process is completed the same character is given as input to the neural network with different set of
neurons in hidden layer and their recognition accuracy rate for different kannada characters has been
calculated and compared. The results show that the proposed system yields good recognition
accuracy rates comparable to that of other handwritten character recognition systems.
Handwriting character recognition (HCR) is the ability of a computer to receive and interpret handwritten input. Handwritten Character Recognition is one of the active and challenging research areas in the field of Pattern Recognition. Pattern recognition is a process that taking in raw data and making an action based on the category of the pattern. HCR is one of the well-known applications of pattern recognition. Handwriting recognition especially for Indian languages is still in infant stage because not much work has been done it. This paper discuss about an idea to recognize Kannada vowels using chain code features. Kannada is a South Indian language. For any recognition system, an important part is feature extraction. A proper feature extraction method can increase the recognition ratio. In this paper, a chain code based feature extraction method is investigated for developing HCR system. Chain code is working based on 4-neighborhood or 8–neighborhood methods. Chain code is a sequence of code directions of a character and connection to a starting point which is often used in image processing. In this paper, 8–neighborhood method has been implemented which allows generation of eight different codes for each character. These codes have been used as features of the character image, which have been later on used for training and testing for K-Nearest Neighbor (KNN) classifiers. The level of accuracy reached to 100%.
Character recognition of kannada text in scene images using neuralIAEME Publication
Character recognition in scene images is one of the most fascinating and challenging
areas of pattern recognition with various practical application potentials. It can contribute
immensely to the advancement of an automation process and can improve the interface
between man and machine in many applications. Some practical application potentials of
character recognition system are: reading aid for the blind, traffic guidance systems, tour
guide systems, location aware systems and many more. In this work, a novel method for
recognizing basic Kannada characters in natural scene images is proposed. The proposed
method uses zone wise horizontal and vertical profile based features of character images. The
method works in two phases. During training, zone wise vertical and horizontal profile based
features are extracted from training samples and neural network is trained. During testing, the
test image is processed to obtain features and recognized using neural network classifier. The
method has been evaluated on 490 Kannada character images captured from 2 Mega Pixels
cameras on mobile phones at various sizes 240x320, 600x800 and 900x1200, which contains
samples of different sizes, styles and with different degradations, and achieves an average
recognition accuracy of 92%. The system is efficient and insensitive to the variations in size
and font, noise, blur and other degradations.
Because of the rapid growth in technology breakthroughs, including
multimedia and cell phones, Telugu character recognition (TCR) has recently
become a popular study area. It is still necessary to construct automated and
intelligent online TCR models, even if many studies have focused on offline
TCR models. The Telugu character dataset construction and validation using
an Inception and ResNet-based model are presented. The collection of 645
letters in the dataset includes 18 Achus, 38 Hallus, 35 Othulu, 34×16
Guninthamulu, and 10 Ankelu. The proposed technique aims to efficiently
recognize and identify distinctive Telugu characters online. This model's main
pre-processing steps to achieve its goals include normalization, smoothing,
and interpolation. Improved recognition performance can be attained by using
stochastic gradient descent (SGD) to optimize the model's hyperparameters.
Enhancement and Segmentation of Historical Recordscsandit
Document Analysis and Recognition (DAR) aims to extract automatically the information in the document and also addresses to human comprehension. The automatic processing of degraded
historical documents are applications of document image analysis field which is confronted with many difficulties due to the storage condition and the complexity of the script. The main interest
of enhancement of historical documents is to remove undesirable statistics that appear in the
background and highlight the foreground, so as to enable automatic recognition of documents
with high accuracy. This paper addresses pre-processing and segmentation of ancient scripts, as an initial step to automate the task of an epigraphist in reading and deciphering inscriptions.
Pre-processing involves, enhancement of degraded ancient document images which is achieved through four different Spatial filtering methods for smoothing or sharpening namely Median,
Gaussian blur, Mean and Bilateral filter, with different mask sizes. This is followed by
binarization of the enhanced image to highlight the foreground information, using Otsu
thresholding algorithm. In the second phase Segmentation is carried out using Drop Fall and
WaterReservoir approaches, to obtain sampled characters, which can be used in later stages of
OCR. The system showed good results when tested on the nearly 150 samples of varying
degraded epigraphic images and works well giving better enhanced output for, 4x4 mask size
for Median filter, 2x2 mask size for Gaussian blur, 4x4 mask size for Mean and Bilateral filter.
The system can effectively sample characters from enhanced images, giving a segmentation rate of 85%-90% for Drop Fall and 85%-90% for Water Reservoir techniques respectively
Smart Assistant for Blind Humans using Rashberry PIijtsrd
An OCR (Optical Character Recognition) system which is a branch of computer vision and in turn a sub-class of Artificial Intelligence. Optical character recognition is the translation of optically scanned bitmaps of printed or hand-written text into audio output by using of Raspberry pi. OCRs developed for many world languages are already under efficient use. This method extracts moving object region by a mixture-of-Gaussians-based background subtraction method. A text localization and recognition are conducted to acquire text information. To automatically localize the text regions from the object, a text localization and Tesseract algorithm by learning gradient features of stroke orientations and distributions of edge pixels in an Adaboost model. Text characters in the localized text regions are then binaries and recognized by off-the-shelf optical character recognition software. The recognized text codes are output to blind users in speech. Performance of the proposed text localization algorithm. As the recognition process is completed, the character codes in the text file are processed using Raspberry pi device on which recognize character using Tesseract algorithm and python programming, the audio output is listed. Abish Raj. M. S | Manoj Kumar. A. S | Murali. V"Smart Assistant for Blind Humans using Rashberry PI" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11498.pdf http://www.ijtsrd.com/computer-science/embedded-system/11498/smart-assistant-for-blind-humans-using-rashberry-pi/abish-raj-m-s
Data Mining is a significant field in today’s data-driven world. Understanding and implementing its concepts can lead to discovery of useful insights. This paper discusses the main concepts of data mining, focusing on two main concepts namely Association Rule Mining and Time Series Analysis
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...rahulmonikasharma
We are describes the technique for real time human face detection and counting the number of passengers in vehicle and also gender of the passengers.The Image processing technology is very popular,now at present all are going to use it for various purpose. It can be applied to various applications for detecting and processing the digital images. Face detection is a part of image processing. It is used for finding the face of human in a given area. Face detection is used in many applications such as face recognition, people tracking, or photography. In this paper,The webcam is installed in public vehicle and connected with Raspberry Pi model. We use face detection technique for detecting and counting the number of passengers in public vehicle via webcam with the help of image processing and Raspberry Pi.
Considering Two Sides of One Review Using Stanford NLP Frameworkrahulmonikasharma
Sentiment analysis is a type of natural language processing for tracking the mood of the public about a particular product or a topic and is useful in several ways. Polarity shift is the most classical task which aims at classifying the reviews either positive or negative. But in many cases, in addition to the positive and negative reviews, there still many neutral reviews exist. However, the performance sometimes limited due to the fundamental deficiencies in handling the polarity shift problem. We propose an Improvised Dual Sentiment Analysis (IDSA) model to address this problem for sentiment classification. We first propose a novel data expansion technique by creating sentiment-reversed review for each training and test review. We develop a corpus based method to construct a pseudo-antonym dictionary. It removes DSA’s dependency on an external antonym dictionary for review reversion. We conduct a range of experiments and the results demonstrates the effectiveness of DSA in addressing the polarity shift in sentiment classification. .
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systemsrahulmonikasharma
The requirements of fifth generation new radio (5G- NR) access networks are very high capacity and ultra-reliability. In this paper, we proposed a V-BLAST2 × N_r MIMO system that is analyzed, improved, and expected to achieve both very high throughput and ultra- reliability simultaneously.A new detection technique called parallel detection algorithm is proposed. The performance of the proposed algorithm compared with existing linear detection algorithms. It was seen that the proposed technique increases the speed of signal transmission and prevents error propagation which may be present in serial decoding techniques. The new algorithm reduces the bit error probability and increases the capacity simultaneouslywithout using a standard STC technique. However, it was seen that the BER of systems using the proposed algorithm is slightly higher than a similar system using only STC technique. Simulation results show the advantages of using the proposed technique.
Broadcasting Scenario under Different Protocols in MANET: A Surveyrahulmonikasharma
A wireless network enables people to communicate and access applications and information without wires. This provides freedom of movement and the ability to extend applications to different parts of a building, city, or nearly anywhere in the world. Wireless networks allow people to interact with e-mail or browse the Internet from a location that they prefer. Adhoc Networks are self-organizing wireless networks, absent any fixed infrastructure. broadcasting of data through proper channel is essential. Various protocols are designed to avoid the loss of data. In this paper an overview of different broadcast protocols are discussed.
Sybil Attack Analysis and Detection Techniques in MANETrahulmonikasharma
Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node Illegitimately claims multiple identities.Mobility cause a main problem when we talk about security in Mobile Ad-hoc networks. It doesn’t depend on fixed architecture, the nodes are continuously moving in a random fashion. In this article we will focus on identifying the Sybil attack in MANET. It uses air medium for communication so it is more prone to the attack. Sybil attack is one in which single node present multiple fake identities to other nodes, which cause destruction.
A Landmark Based Shortest Path Detection by Using A* and Haversine Formularahulmonikasharma
In 1900, less than 20 percent of the world populace lived in cities, in 2007, fair more than 50 percent of the world populace lived in cities. In 2050, it has been anticipated that more than 70 percent of the worldwide population (about 6.4 billion individuals) will be city tenants. There's more weight being set on cities through this increment in population [1]. With approach of keen cities, data and communication technology is progressively transforming the way city regions and city inhabitants organize and work in reaction to urban development. In this paper, we create a nonspecific plot for navigating a route throughout city A asked route is given by utilizing combination of A* Algorithm and Haversine equation. Haversine Equation gives least distance between any two focuses on spherical body by utilizing latitude and longitude. This least distance is at that point given to A* calculation to calculate minimum distance. The method for identifying the shortest path is specify in this paper.
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...rahulmonikasharma
Internet of Things (IoT) is the developing technologies that would be the biggest agents to modify the current world. Machine-to-machine communications perform with virtual, mobile and instantaneous connections. In IoT system, it consists of data-gathering sensors various other household devices. Intended for protecting IoT system, the end-to-end secure communication is a necessary measure to protect against unauthorized entities (e.g., modification attacks and eavesdropping,) and the data unprotected on the Cloud. The most important concern hereby is how to preserve the insightful information and to provide the privacy of user data. In IoT, the encrypted data computing is based on techniques appear to be promising approaches. In this paper, we discuss about the recent secure database systems, which are capable to execute SQL queries over encrypted data.
Quality Determination and Grading of Tomatoes using Raspberry Pirahulmonikasharma
In India cultivation of tomatoes is carried out by traditional methods and techniques. Today tremendous improvement in field of agriculture technologies and products can be seen. The tomatoes affect the overall production drastically. Image processing technique can be key technique for finding good qualities of tomatoes and grading. This work aimed to study different types of algorithms used for quality grading and sorting of fruit from the acquire image. In previous years several types of techniques are applied to analyses the good quality fruits. A simple system can be implemented using Raspberry pi with computer vision technology and image processing algorithms.
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...rahulmonikasharma
Network management and Routing is supportively done by performing with the nodes, due to infrastructure-less nature of the network in Ad hoc networks or MANET. The nodes are maintained itself from the functioning of the network, for that reason the MANET security challenges several defects. Routing process and Scheduling is a significant idea to enhance the security in MANET. Other than, scheduling has been recognized to be a key issue for implementing throughput/capacity optimization in Ad hoc networks. Designed underneath conventional (LT) light tailed assumptions, traffic fundamentally faces Heavy-tailed (HT) assumption of the validity of scheduling algorithms. Scheduling policies are utilized for communication networks such as Max-Weight, backpressure and ACO, which are provably throughput optimality and the Pareto frontier of the feasible throughput region under maximal throughput vector. In wireless ad-hoc network, the issue of routing and optimal scheduling performs with time varying channel reliability and multiple traffic streams. Depending upon the security issues within MANETs in this paper presents a comparative analysis of existing scheduling policies based on their performance to progress the delay performance in most scenarios. The security issues of MANETs considered from this paper presents a relative analysis of existing scheduling policies depend on their performance to progress the delay performance in most developments.
DC Conductivity Study of Cadmium Sulfide Nanoparticlesrahulmonikasharma
The dc conductivity of consolidated nanoparticle of CdS has been studied over the temperature range from 303 K to 523 K and the conductivity has been found to be much larger than that of single crystals.
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMrahulmonikasharma
OFDM (Orthogonal Frequency Division Multiplexing) is generally preferred for high data rate transmission in digital communication. The Long-Term Evolution (LTE) standards for the fourth generation (4G) wireless communication systems. Orthogonal Frequency Division Multiple Access (OFDMA) and Single Carrier Frequency Division Multiple Access (SC-FDMA) are the two multiple access techniques which are generally used in LTE.OFDM system has a major shortcoming of high peak to average power ratio (PAPR) value. This paper explains different PAPR reduction techniques and presents a comparison of the various techniques based on theoretical results. It also presents a survey of the various PAPR reduction techniques and the state of the art in this area.
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoringrahulmonikasharma
Home automation has been a dream of sciences for so many years. It could wind up conceivable in twentieth century simply after power all family units and web administrations were begun being utilized on across the board level. The point of home robotization is to give enhanced accommodation, comfort, vitality effectiveness and security. Vitality checking and protection holds prime significance in this day and age in view of the irregularity between control age and request observing frameworks accessible in the market. Ordinarily, customers are disappointed with the power charge as it doesn't demonstrate the power devoured at the gadget level. This paper shows the outline and execution of a vitality meter utilizing Arduino microcontroller which can be utilized to gauge the power devoured by any individual electrical apparatus. The primary expectation of the proposed vitality meter is to screen the power utilization at the gadget level, transfer it to the server and build up remote control of any apparatus. So we can screen the power utilization remotely and close down gadgets if vital. The car segment is additionally one of the application spaces where vehicle can be made keen by utilizing "IOT". So a vehicle following framework is additionally executed to screen development of vehicles remotely.
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...rahulmonikasharma
An anticipated outcome that is intended chapter is to investigate effects of magnetic field on an oscillatory flow of a viscoelastic fluid with thermal radiation, viscous dissipation with Ohmic heating which bounded by a vertical plane surface, have been studied. Analytical solutions for the quasi – linear hyperbolic partial differential equations are obtained by perturbation technique. Solutions for velocity and temperature distributions are discussed for various values of physical parameters involving in the problem. The effects of cooling and heating of a viscoelastic fluid compared to the Newtonian fluid have been discussed.
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...rahulmonikasharma
In fast growing database repository system, image as data is one of the important concern despite text or numeric. Still we can’t replace test on any cost but for advancement, information may be managed with images. Therefore image processing is a wide area for the researcher. Many stages of processing of image provide researchers with new ideas to keep information safe with better way. Feature extraction, segmentation, recognition are the key areas of the image processing which helps to enhance the quality of working with images. Paper presents the comparison between image formats like .jpg, .png, .bmp, .gif. This paper is focused on the feature extraction and segmentation stages with background removal process. There are two filters, one is integer filter and second one is floating point Filter, which is used for the key feature extraction from image. These filters applied on the different images of different formats and visually compare the results.
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM Systemrahulmonikasharma
The examination on various looks into on MIMO STBC framework in order to accomplish the higher framework execution is standard that the execution of the remote correspondence frameworks can be improved by usage numerous transmit and get radio wires, that is normally gathered on the grounds that the MIMO procedure, and has been incorporated. The Alamouti STBC might be a promising because of notice the pick up inside the remote interchanges framework misuse MIMO. To broaden the code rate and furthermore the yield of the symmetrical zone time square code for more than 4 transmit reception apparatuses is examined. The outlined framework is beated once forced with M-PSK (i.e upto 32-PSK) regulation. The channel estimation examine in these conditions.
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosisrahulmonikasharma
A vibration investigation is about the specialty of searching for changes in the vibration example, and after that relating those progressions back to the machines mechanical outline. The level of vibration and the example of the vibration reveal to us something about the interior state of the turning segment. The vibration example can let us know whether the machine is out of adjust or twisted. Al-so blames with the moving components and coupling issues can be distinguished. This paper shows an approach for equip blame investigation utilizing signal handling plans. The information has been taken from college of ohio, joined states. The investigation has done utilizing MATLAB software.
This paper discusses a new algorithm of a univariate method, which is vitally important to develop a short-term load forecasting module for planning and operation of distribution system. It has many applications including purchasing of energy, generation and infrastructure development etc. We have discussed different time series forecasting approaches in this paper. But ARIMA has proved itself as the most appropriate method in forecasting of the load profile for West Bengal using the historical data of the year of 2017. Auto Regressive Integrated Moving Average model gives more accuracy level of load forecast than any other techniques. Mean Absolute Percentage Error (MAPE) has been calculated for the mentioned forecasted model.
Impact of Coupling Coefficient on Coupled Line Couplerrahulmonikasharma
The coupled line coupler is a type of directional coupler which finds practical utility. It is mainly used for sampling the microwave power. In this paper, 3 couplers A,B & C are designed with different values of coupling coefficient 6dB,10dB & 18dB respectively at a frequency of 2.5GHz using ADS tool. The return loss, isolation loss & transmission loss are determined. The design & simulation is done using microstrip line technology.
Design Evaluation and Temperature Rise Test of Flameproof Induction Motorrahulmonikasharma
The ignition of flammable gases, vapours or dust in presence of oxygen contained in the surrounding atmosphere may lead to explosion. Flameproof three phase induction motors are the most common and frequently used in the process industries such as oil refineries, oil rigs, petrochemicals, fertilizers, etc. The design of flameproof motor is such that it allows and sustain explosion within the enclosure caused by ignition of hazardous gases without transmitting it to the external flammable atmosphere. The enclosure is mechanically strong enough to withstand the explosion pressure developed inside it. To prevent an explosion due to hot spot on the surface of the motor, flameproof induction motors are subjected to heat run test to determine the maximum surface temperature and temperature class with respect to the ignition temperature of the surrounding flammable gas atmosphere. This paper highlights the design features of flameproof motors and their surface temperature classification for different sizes.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Design and Implementation Recognition System for Handwritten Hindi/Marathi Document
1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 369 – 373
_______________________________________________________________________________________________
369
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Design and Implementation Recognition System for Handwritten Hindi/Marathi
Document
Rupal Saoji1
, Prof. S. W. Mohod2
, Prof. M. C. Nikose3
1
M.Tech. Computer Science & Engineering
2
Co-ordinator, Department of Computer Engineering, BDCE Sevagram
3
Prof., Department of Computer Engineering, BDCE Sevagram
1
rupal.saoji@gmail.com ,2
sudhir_mohod@rediffmail.com ,3
monalinikose18@gmail.com
Abstract: In the present scenario most of the importance is given for the “paperless office” there by more and more communication and storage
of documents is performed digitally. Documents and files which are present in Hindi and Marathi languages that were once stored physically on
paper are now being converted into electronic form in order to facilitate quicker additions, searches, and modifications, as well as to prolong the
life of such records. Because of this, there is a great demand of such software, which automatically extracts, analyze, recognize and store
information from physical documents for later retrieval. Skew detection is used for text line position determination in Digitized documents,
automated page orientation, and skew angle detection for binary document images, skew detection in handwritten scripts, in compensation for
Internet audio applications and in the correction of scanned documents.
__________________________________________________*****_________________________________________________
I. Introduction
In the present scenario most of the importance is given for
the “paperless office” there by more and more
communication and storage of documents is performed
digitally. Documents and files that were once stored
physically on paper are now being converted into electronic
form in order to get quicker additions, searches, and
modifications, as well as to prolong the life of such records.
Because of this, there is a great demand for software, which
automatically extracts, analyze, recognize and store
information from physical documents for later retrieval.
In document image processing, skew angle
detection is a very important part in data processing and it’s
the foundation of image analysis and recognition. In image
based digital identification systems, the reliability of
recognition is closely related to the quality of image data.
Therefore, in most real-time document image processing,
skew angle should be confirmed quickly and accurately to
improve the accuracy of collection and entry for document
information, mean while, to reduce the rejection rate and
improve reliability and adaptability of systems. Most
scanners have the capabilities of automatic de-skew which
can segment the skew document images from the
background, However, skew is often happened due to print
in practice, the result is that the images can’t be de-skewed
correctly. Therefore, the research about de-skew algorithm
content-based of document images could better reflect the
nature of the problem and have a great significance in
document image processing.
The different types of skews within a document
page can fall into these categories:-
Global Skew: - assuming that all page text has the
same skew angle.
Multiple-Skew:-when certain area of the page has
one angle and other have different angle.
Non- Uniform text line skew: - when the skew
angle is fluctuates in the page.
Skew detection is used for text line position
determination in Digitized documents, automated page
orientation, and skew angle detection for binary document
images, skew detection in handwritten scripts and in the
correction of scanned documents. The largest classes of
methods for skew detection are available which based on
projection profile analysis, Hough transform, nearest-
neighbor clustering, Fourier- transformation, histogram
analysis and Neural Network.
In order to improve the readability and the
automatic and quick recognition of handwritten Hindi and
Marathi document images, preprocessing steps are
imperative. These steps in addition to conventional steps of
noise removal and filtering include text normalization such
as baseline correction, slant normalization and skew
correction and detection. These steps make the feature
extraction process more reliable and effective.
II. Related Work
Different methodologies for the text skew estimation in
binary and gray scale images. They have been used widely
for the skew identification of the printed text. Some of
available algorithms provide better accuracy but they are
slow in speed, others have angle limitation drawback. So a
new technique for skew detection in the paper, will reduce
2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 369 – 373
_______________________________________________________________________________________________
370
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
the time and cost. Another method for skew detection and
correction of handwritten Devanagari script using Hough
transformation it works at word level which is applied on
each word for skew detection and rotation transformation is
used for correcting that skew. If skew of the word is in
positive angle then it is corrected by rotating it in clockwise
and in anti-clockwise direction. Skew detection and
correction methods are used to align the handwritten text
document by making the rectangular shape such as
paragraph, text lines and tables. This new technique for
skew detection will reduce the time and cost. Handwritten
recognition has been one of the active and challenging task.
Handwritten characters are written in various curved &
cursive ways with different sizes, orientations, thickness and
dimensions which is most difficult task to recognize such
handwritten characters by any machine. In this paper a novel
technique for Handwritten Hindi Character Recognition
System is implemented using Canny Edge Detection
technique and artificial neural network. The estimation and
correction of skew is a difficult and challenging task in
handwritten word since it has to be independent of the
variations due to handwriting style and writing conditions of
different persons. In this paper, a coarse-to-fine technique
that integrates core-region information is presented. At first,
a rough estimation and correction of the skew is
accomplished by cutting vertically for detecting the center
of mass in each part and calculating the inclination of the
line that connects the two centers of mass of the overlapping
area. To detect the core-region of the word (ascenders and
descenders). The inclination of the line that connects the
updated centers of mass corresponds to a finer estimation of
the word skew. After correcting the detected skew the last
step of core-region detection and skew correction is repeated
iteratively. It have proposed schemes for skew detection and
correction, segmentation of handwritten Kannada document
using bounding box technique, Hough transform and
contour detection respectively. Detecting text line is still a
challenge to segment handwritten text lines in the general
sense given no prior knowledge of script. image
segmentation problem by enhancing text line structures
using a Gaussian window and adopting the level set method
to evolve text line boundaries. Variations in inter-line gaps
and skewed or curled text-lines are some of the challenging
issues in segmentation of handwritten text-lines. Moreover,
overlapping and touching text- lines that frequently appear
in unconstrained handwritten text documents increase
segmentation complexities.
III. Proposed Work
The proposed methodology of the project are includes 5
steps which are input document, pre-processing,
segmentation, skew detection and at last skew correction. So
that we can recognize scanned handwritten text document
accurately.
Fig: 1 Proposed System
A. Input Image
In which we can take that handwritten text document of
Hindi and Marathi languages. Then by scanner or by camera
we can get scanning image of that text documents. An image
is a two-dimensional function f(x,y).
B. Preprocessing
Binarization is simply extract the foreground data from
background data. Digital Document means scanning or
photography of the document. Normally digital document in
the form of RGB format. A colour image can be converted
to gray scale image. Then gray scale can be converted to
binary image. Therefore with binary numbers it is easy
compute and recognizes the characters.. To convert to
Binarization we may use Thresholding.
Improper scanning of document or malfunction of camera or
low quality of the documents , the digital document added
by noise. It disturbance the recognition of the characters and
numerals. . We can use Sauvola’sagorithem to the
Binarization of the gray scale image. The gray level image is
back and white piels. Then classify al the pixels on the basis
Document
Scanning and Binarization
Segmentation
Skew Detection
Skew Correction
Output
3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 369 – 373
_______________________________________________________________________________________________
371
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
of thresholding values. The pixels value above the threshold
is in white and value below the threshold are in black
. The threshold is computing using Sauvola’s
Algorithm.
T=M*[1+K*(S/R-1)]
K- user defined parameter
M, S- mean and local standard derivation computed in
windows size W contered on current pixel(size is
user defined)
R- dynamic range of standard derivation(R=128 with 8-
bit gray level)
C. Segmentation
Segmentation is the process of partitioning a digital text
image into multiple segments. The goal of segmentation is
to simplify or change the representation of an image into
something that is more meaningful and easier to analyze.
Line Segmentation
In handwritten text document line of the text are segmented
form the each other. this process is takes place by using line
segmentation.
Word segmentation
In such type of segmentation the words are get segmented
from the line of the handwritten text document.
Character Segmentation
The singe character is get segmented form the word of the
handwritten text document.
Bounding Box
Bounding Boxes [4] for connected components are the
properties of the labeled connected component regions. A
bounding box of a labeled region is a rectangle that just
encloses the region completely. When a specific bounding
box is determined for a connected region, the co-ordinates
of the corners of the bounding box and its width and height
are available. A bounding box completely specifies the
boundaries of the corresponding connected component. In
our method, we use filled bounding boxes which completely
cover the corresponding connected components.
Min cut ma flow Algorithm
energy minimization problems can be reduced to instances
of the maximum flow problem in a graph
The maximum value of an s-t flow is equal to the minimum
weight of an s-t cut.
The minimal cut of this graph will cut all the edges
connecting the pixels of different objects with each other.
If f is a flow, then the net flow across the cut (S, T) is
defined to be f (S, T), which is the sum of all edge capacities
from S to T subtracted by the sum of all edge capacities
from T to S
The capacity of the cut (S, T) is c (S, T), which is the sum of
the capacities of all edge from S to T
A minimum cut is a cut whose capacity is the minimum over
all cuts of G.
D. Skew Detection
Detection there are some methods are presents which are
Hough transformation, nearest-neighbor clustering, Fourier-
transformation, neural network. This angle in between 1-3
degree the it get neglected and the angle is above the 5
degree are go to next stage that is skew correction. The skew
angle of each text line has been calculated. But the length of
the text line may be very different. The longer the length of
a text line is, the moretruly reflected the skew angle of the
image is. So it is notgood to simply calculate the skew angle
of each objectiveand average them. Using the length of text
lines objectivesas the weight is a reasonable calculation
method.longer the length of a text line is the greater the
weight willbe.
We can get the skew angle by using formula
cos (s)= l/m
s=1cos(l/m)
where l – x coordinat of the pixel
m- distances of pixel from origin
Using the largest text lines characteristic as the skewangle of
a document image is reasonable. The longer thelength of a
text line is, the higher the accuracy is.
E. Skew Correction
After the detection of skew angle this angle gets corrected
by using the skew correction technique. So, we can use pixel
orientation technique to do the skew correction because, this
technique is concentrated on the pixel.
4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 369 – 373
_______________________________________________________________________________________________
372
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Fig 2:- Skew Correction
This method uses a coarse/refine strategy based on Hough
transformation of connected components in the image.
Speed and accuracy has been achieved as this confine the
region of interest to a small and plausible text area, and
confine the search range of Hough transform to Q, where Q
is a coarse skew angle. considers some selected characters
of the text which may be subjected to thinning and Hough
transform to estimate skew angle accurately.
The method has two stages. In the first stage,
selected characters from the document image are blocked
and thinning is performed over the blocked region. In the
second stage, the thinned coordinates are fed to Hough
transform (HT) to estimate the skew angle accurately. The
block diagram of the proposed methodology
IV. Result
Fig Input Image
Fig 4: Binarized Image
Fig 5: Segmented
Fig 6: Result
V. Conclusion
As you all know that handwritten documents in Marathi and
Hindi or any language are very difficult to maintain an to
5. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 369 – 373
_______________________________________________________________________________________________
373
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
store for life long. So it is more important to convert that
handwritten text document in digitalize form. So that we can
easily perform operation on that handwritten document. To
do digitalization we can use the scanning, binarization,
segmentation, skew detection, skew correction processes. It
gives accuracy and reliability in skew angel detection an
correction process.
References
[1] Ruby singh 1, Ramandeep Kaur 2, “Skew Detection in
Image Processing”, International Journal computer
Technology and Application, Vol 4(3),478-485 IJCTA
May-2013.
[2] Trupti A. Jundale, Ravindra S. Hegadi,” Skew Detection
and Correction of Devanagari Script Using Hough
Transform”, International Conference on Advanced
Computing Technologies and Application, ICACTA 2015.
[3] Ambica Rani, Er. Harinderpal Singh, “ A Review On
Various techniques for Skew Detection And Correction In
Handwritten Text Documents”, IJREAT International
Journal Of Research in Engineering And Advance
technology, Volume 3, Issue 3, June-July 2015.
[4] Tanuja K. , Usha Kumari V. And Sushma T. M. ,”
Handwritten Hindi Character Recognition System Using
Edge detection and Neural Network”, International Journal
of Advanced Technology and Engineering Exploration
ISSN, Volume 2, Issue 6, May 2015.
[5] A. Papandreou and B. Gatos, ”A coarse to Find Skew
Estimation Technique for Handwritten Words”, 2013 12th
international Conference on Document Analysis and
Recognition.
[6] Mamatha Hosalli Ramappal and Shrikantamurthy
Krishamurthy, “Skew Detection, Correction and
Segmentation of Handwritten Kannada Document”,
International Journal of Advanced Science and Technology
vol . 48, Nov 2012.
[7] Panwar, Subhash, and Neeta Nain. "A Novel Approach of
Skew Normalization for Handwritten Text Lines and
Words." Signal Image Technology and Internet Based
Systems (SITIS), 2012 Eighth International Conference on.
IEEE, 2012.
[8] Manjunath , G. Hemantha, and P. Shivakumara.,"Skew
Detection technique for Binary Document Images based on
Hough Transform", 2007.
[9] Li, Yi, Yefeng Zheng, and David Doermann. "Detecting
text lines in handwritten documents." Pattern Recognition,
2006. ICPR 2006. 18th International Conference on. Vol. 2.
IEEE, 2006.
[10] P. Shivakumara, G. H. Kumar, D. S. Guru and P.
Nagabhushan, “A novel technique for estimation of skew in
binary text document images based on linear regression
analysis”, Sadhana, vol. 30, Part 1, (2005) February, pp.
69-85.
[11] V. N. M. Aradhya, “Document Skew Estimation: An
Approach based on Wavelets”, ICCCS’11, (2011), pp. 359-
364.