SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
David C. Wyld et al. (Eds) : CCSIT, SIPP, AISC, NLP - 2015
pp. 53–62, 2015. © CS & IT-CSCP 2015 DOI : 10.5121/csit.2015.50405
A CASE STUDY IN COMPUTER
UNDERSTANDING OF PRINTED-FORMS
Davood Falahati 1
, Hojat Cheraghi 2
and Kazem Ghalamchi3
1
Department of Electrical Engineering,
Isfahan University of Technology, Isfahan-Iran
d.falahati.1987@ieee.org
2
Tehran Science and Research University, Tehran-Iran
hojat.ch@gmail.com
3
Ghalamchi Foundation,Tehran, Iran.
kazemglmchi@yahoo.com
ABSTRACT
Data entry is a time consuming and erroneous procedure in its nature. In addition, validity
check of submitted information is not easier than retyping it. In a mega-corporation like Kanoon
Farhangi Amoozesh, there are almost no way to control the authenticity of students' educational
background. By the virtue of fast computer architectures, optical character recognition, a.k.a.
OCR, systems have become viable. Unfortunately, general-purpose OCR systems like Google's
Tesseract are not handful because they don't have any a-priori information about what they are
reading. In this paper the authors have taken a in-depth look on what has done in the field of
OCR in the last 60 years. Then, a custom-made system adapted to the problem is presented
which is way more accurate than general purpose OCRs. The developed system reads more than
60 digits per second. As shown in the Results section, the accuracy of the devised method is
reasonable enough to be exposed in public use.
KEYWORDS
Optical character recognition, tesseract, neural networks, row finding, segmentation.
1. INTRODUCTION
Data-entry phase, is by far the most time-consuming and the deadliest line of work in data
acquisition process. A remarkable portion of a company's human resource should be devoted to
collect printed information in the forms. Computer-assisted data-entry process has been a human
ancient dream. In the latest sixty years, there have been exerted massive efforts to implement an
automatic character recognition system [1]. Template-Matching was one of the earliest methods
for character recognition in which an unknown character should be compared to all of the
possible candidates. Optical imaging techniques were the backbone of identification systems
before 70s. Hongo and Nitta devised an optical system that processed a video signal using
template matching [2].
54 Computer Science & Information Technology (CS & IT)
Fig. 1. Chain codes grid. (a) 4-connected gird (b) 8-connected grid. (c) a sample of coded sequence using 8-
connected grid.
Fig. 2. Basic graphs of LAG method. Node A is a junction and nodes B,C and D are paths.
Digital computers deviated the way of template matching from optical to logical ones. Peephole
method was one of the earliest logical approaches to digital template matching. Template
matching technique evolved and offered using moments [1] and Fourier series later [3]. The
former method made an invaluable translation-rotation-scale invariant a.k.a TRS, a tool for
template matching [4]. Another set of commonplace TRS moments in the vicinity of pattern
recognition are Zernike [5] and Fourier-Mellin moments that implemented in character
recognition as well [6, 7].
Sakoe offered using dynamic programming (DP) technique to template matching problem [8].
Dynamic time warping (DTW) used to find the minimum distance between a given template and
Computer Science & Information Technology (CS & IT) 55
its corresponding candidate [8, 9]. DP-based template matching techniques make the comparison
of two non-equal length vectors possible. Therefore, character matching would be possible while
aspect ratio remains intact through DP.
Template matching practice, however, remained limited to printed character recognition systems
[10]. To cover handwritten characters, another useful recognition method called structural
analysis, introduced [1]. Freeman introduced a novel method on encoding curvatures in [11]. The
proposed method, currently called "chain codes", was proposed in order to be used in image
compression however, later it found practice in character recognition efforts [10]. Chain codes
were developed in encoding efforts and a more sophisticated one is presented in [12]. Chain
codes are founded on quantization process and decode a curvature to a line with a certain slope.
As depicted in figure 1, 4-connected and 8-connected grids are two types of commonplace chain
codes being used. The higher slopes in a grid, the lower quantization error in the coded curvature.
Pavlidis at Bell laboratories proposed a thinning method suited for multi-font document
recognition system [13]. The before said method uses line adjacency graphs (LAGs) which tries
to stack semi-linear group of segments. Pavlidis addresses two types of graph nodes as junction
and paths as shown in figure 2.
Structure analysis method alleviated template matching defects in handwritten character
recognition systems. The candidate with the lowest distance with the template considers to be the
best match. Since characters are not connected, registration problem, however, is straightforward
to deal with.
In a wider sense, trainable scoring techniques are amazingly suited to human activities like speech
and handwriting recognition [14]. Hidden markov models a.k.a HMMs have long been used in
speech recognition systems. Due to probabilistic features of human writing systems, HMM has
also been used to serve character recognition purposes [15]. Neural networks are another useful
matching asset in character recognition systems [16,17,18,19]. Neural networks are trainable and
their usage is less complicated as HMMs while multi layer perceptrons (MLPs) need more
training data compared with HMMs [20]. Despite HMMs' more accurate performance in [20],
MLPs show a better performance in speech recognition activities [21].
Right-to-left, cursive and connected scripts, however, are the most challenging scripts in
recognition systems [22]. Arabic and Farsi scripts are two well-known cursive scripts widely
using. Reading these scripts requires an excessive segmentation process, say, word segmentation
[23, 24]. Technically speaking, a Farsi and/or Arabic word consists of connected characters (see
figure 3). Therefore, a vital step in reading Farsi/Arabic characters is to rightly segment all of the
characters.
Fig. 3. Two samples of Farsi word “Sample”. This word consists of 5 characters N-M-U-N-H. It is
noteworthy that unlike Arabic, vowels are not being written in formal Farsi handwriting.
56 Computer Science & Information Technology (CS & IT)
This paper is organized as follows. In the section 2 the proposed framework is shortly introduced.
In section 3, the preprocessing methods are discussed. Section 4 is devoted to segmentation
procedures. Section 5 pays attention to training process and scoring. Finally, section 6 reveals the
results of our proposed method.
2. DISCUSSING THE PROBLEM
Reading and checking printed score sheets for a massive number students is a cumbersome task
which is not achievable by human resources. Kanoon Farhangi Amoozesh is a test-conducting
foundation in Iran holds weekly exams among 400,000 students. In order to analyze students'
educational background, one needs to certify the student claimed GPA according to printed
documents. An Iranian high-school score-sheet issued by ministry of education is shown in figure
4.
Fig. 4. A standard Iranian high-school score-sheet
3. PREPROCESSING
The devised system works along with a web-server in which server sends uploaded score-sheets
to character recognition system and its output is fed back to the web-server (see figure 5).
Fig. 5. Topology of the devised system
Computer Science & Information Technology (CS & IT) 57
Fig. 6. Representation of a line in polar coordinates
Fig.7. Sinusoid curves intersect on points located on a line. Curves are intersecting in two distinct points. It
means that all of the points are located on a line.
A major problem with this case is image acquisition phase. As long as images are taken by
clients, there is no control over the scanning procedure. The input images to the character
recognition system are prone to rotation, scale manipulation and translation. Therefore, a
preprocessing step is strictly required.
The most annoying scanning-mismatch is rotation. To remove rotation effects on reading
characters, the perpendicular lines of the table are used. Hough line transform is used to extract
lines and their angles [25]. As shown in figure [6], the Hough line transform first expresses a line
in the polar system as below.
Each point P=(x0,y0) identifies a Sinusoidal curve. Points located on a straight line result in
Sinusoidal curves that intersect in polar coordinates (see figure 7). In a real case, there are many
points and many Sinusoidal curves in result. The points with the majority of intersections identify
straight lines. In this venue one looks for the longest lines and computes their angle. After that,
the input image will be rotated in inverse direction. Figure 8 depicts an instance of recovered lines
using Hough method.
58 Computer Science & Information Technology (CS & IT)
Fig. 8. A sample of rotation correction by Hough line transform. The rotation is removed by computing the
rotation angle and inversely applying it to the image. In this method the horizontal lines are removed by
filtering.
4. SEGMENTATION
A top-to-bottom raster scanning is required to find the position of lines whole the score-sheet.
Before that, a canny edge detector should be applied to the image to remove redundant image
data. In the case of characters, canny preserves the contours of the characters. Moreover, line
height is obtainable in this way. Extracted lines are depicted in figure 9. This method is scale,
translation and rotation invariant since it just attempts to find pixels concentration regions.
Fig. 9. Finding the rows of the score-sheets. The centers of the rows are emphasized by solid horizontal
lines. The image is cropped to safeguard student’s personal information.
In a similar manner, the table columns can be resolved easily. In the case the rows are not
detectable, the input image would be rejected.
The last step to be paved is character segmentation. The output of row detection is fed to
character parser. Character parser extracts a block containing the character. Fortunately,
numerical digits are not connected in Farsi handwriting system. However, the character "point" or
Computer Science & Information Technology (CS & IT) 59
"." is troublesome in Farsi. The mentioned character prints like "slash" or "/" in both Farsi and
Arabic writing systems. The mentioned character sometimes connects two numerical digits
specifically when scanning resolution is not fair enough. Figure 10 shows the output of character
parser. To deal with the problem of parsing connected characters like figure 10.b, the authors
proposed the average character width method in which the width of characters obtains for every
row and the blocks wider than twice the width of average width considered as connected blocks.
Average width method is life-savor in the case of ink spattering as well.
5. SCORING
The proposed multi-font character recognition system should be flexible about font change.
Moreover, it should cover handwritten numerical digits. To cover this wide range of formation
changes, artificial neural networks have been utilized [26]. In the proposed method multilayer
perceptrons are used and back-propagation (BP) training method adjusts the weights of the
perceptrons. Figure 11 illustrates an example of neural network with 4 hidden layers. Hidden
layers are not accessible and their weight cannot be easily changed. Back-propagation method
tries to minimize the distance between the real output, yk, and the desired output, dk. This distance
can be formulated as below:
Where N is the number of neurons. The effect of neurons' weights on the output error is
represented by gradient of ɛk.
Using the steepest descent gradient algorithm [27] it leads to:
and wkj is as below:
$eta$ is coined as learning rate. The output of each perceptron, yk, is the weighted sum of
previous layer perceptrons. In other words:
zk applies to sigmiod function :
Wherein:
Exploiting the sigmoid function results in:
Then using (6) and the fact that yj(p - 1)=xj(p) leads to:
60 Computer Science & Information Technology (CS & IT)
where p is the output layer. Let define a new parameter ɸ as follows:
Using this new parameter and obtain:
Doing some math and to get:
Invoking the chain rule in equation (10) results in:
The latter equation is used for the output layer. Differentiating from (2) results in:
Exploiting the sigmoid property which is
Therefore
Invoking (5) and (6) to obtain ∆wkj as below:
The ∆wji for the hidden layers are being computed as follows.
In order to update ɸj for the hidden layers, the following equation is being used.
Back-propagation method converges more quickly than Adaline and Madaline methods [26].
In order to train the neural network, the segmented digit obtained from the segmentation process
feeds to neural network as a 20x20 binary image. The training set consists of 42 classes without
rejection class. Each class consists of 300 samples of 300 Farsi/Arabic fonts.
Computer Science & Information Technology (CS & IT) 61
6. RESULTS
The proposed character recognition approach is implemented using C language along with
openCV library. It is able to read score-sheets and report the results in both plain text and HTML
format. The utilization is as simple as follows:
Wherein "-h" comes if the HTML report is needed. The system reads every 1200x800 pixel score-
sheet in less than 2 seconds on a core i5 2.4GHz personal computer. The devised system brings a
high degree of precision. In average, the presented system correctly reads every numerical
characters in 0.015 seconds with an error rate less than 2%. The accuracy of the Google's
Tesseract is less than 40% for similar tests.
ACKNOWLEDGEMENTS
Writing and editing this paper was not possible without invaluable help of Omid Sefat, Ali
Golestan and Farhad Baybordi in Kanoon Farhangi Amoozesh. Moreover, the obstacles we
jumped over were shortened by Kazem Ghalamchi.
REFERENCES
[1] S.Mori, C.Suen, and K. Yamamoto, “Historical review of ocr research and development,”
Proceedings of the IEEE, vol. 80, pp. 1029–1058, Jul 1992.
[2] Y.Hongo and Y.Nitta, “Pattern recognition apparatus,” Dec. 9 1986. US Patent 4,628,533.
[3] C.T.Zahn and R.Z. Roskies, “Fourier descriptors for plane closed curves,” Computers, IEEE
Transactions on, vol. C-21, pp. 269–281, March 1972.
[4] M.-K. Hu, “Visual pattern recognition by moment invariants,” Information Theory, IRE Transactions
on, vol. 8, pp. 179–187, February 1962.
[5] D.Xiao and L.Yang, “Gait recognition using zernike moments and bp neural network,” in
Networking, Sensing and Control, 2008. ICNSC 2008. IEEE International Conference on, pp. 418–
423, April 2008.
[6] C.Kan and M.D.Srinath, “Invariant character recognition with zernike and orthogonal fouriermellin
moments,” Pattern Recognition, vol. 35, no. 1, pp. 143 – 154, 2002. Shape representation and
similarity for image databases.
[7] L.Torres-Mendez, J.Ruiz-Suarez, L.Sucar, and G.Gomez, “Translation, rotation, and scale-invariant
object recognition,” Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE
Transactions on, vol. 30, pp. 125–130, Feb 2000.
[8] H.Sakoe and S.Chiba, “Dynamic programming algorithm optimization for spoken word recognition,”
Acoustics, Speech and Signal Processing, IEEE Transactions on, vol. 26, pp. 43–49, Feb 1978.
[9] D.Falahati, M.Helforoush, H.Danyali, and M.Rashidpour, “Static signature verification for farsi and
arabic signatures using dynamic time warping,” in Electrical Engineering (ICEE), 2011 19th Iranian
Conference on, pp. 1–1, May 2011.
[10] A.Sinha, “An improved recognition module for the identification of handwritten digits,” 1999.
[11] H.Freeman, “On the encoding of arbitrary geometric configurations,” Electronic Computers, IRE
Transactions on, vol. EC-10, pp. 260–268, June 1961.
[12] G.Schuster and A.Katsaggelos, “An optimal polygonal boundary encoding scheme in the rate
distortion sense,” Image Processing, IEEE Transactions on, vol. 7, pp. 13–26, Jan 1998.
[13] T.Pavlidis, “A vectorizer and feature extractor for document recognition,” Computer. Vision Graph.
Image Process., vol. 35, pp. 111–127, July 1986.
[14] L.Rabiner, “A tutorial on hidden markov models and selected applications in speech recognition,”
Proceedings of the IEEE, vol. 77, pp. 257–286, Feb 1989.
[15] O.E. Agazzi and S. shiaw Kuo, “Hidden markov model based optical character recognition in the
presence of deterministic transformations,” Pattern Recognition, vol. 26, no. 12, pp. 1813 – 1826,
1993.
62 Computer Science & Information Technology (CS & IT)
[16] E.Alpaydin, “Optical character recognition using artificial neural networks,” in Artificial Neural
Networks, 1989., First IEE International Conference on (Conf. Publ. No. 313), pp. 191–195, Oct
1989.
[17] R.Arnold and P.Miklos, “Character recognition using neural networks,” in Computational Intelligence
and Informatics (CINTI), 2010 11th International Symposium on, pp. 311–314, Nov 2010.
[18] F.Yang and F.Yang, “Character recognition using parallel bp neural network,” in Audio, Language
and Image Processing, 2008. ICALIP 2008. International Conference on, pp. 1595–1599, July 2008.
[19] A.Gupta, M.Srivastava, and C.Mahanta, “Offline handwritten character recognition using neural
network,” in Computer Applications and Industrial Electronics (ICCAIE), 2011 IEEE International
Conference on, pp. 102–107, Dec 2011.
[20] E.Hatzipantelis, A.Murray, and J.Penman, “Comparing hidden markov models with artificial neural
network architectures for condition monitoring applications,” in Artificial Neural Networks, 1995.,
Fourth International Conference on, pp. 369–374, Jun 1995.
[21] A.Waibel, T.Hanazawa, G.Hinton, K.Shikano, and K. Lang, “Phoneme recognition: neural networks
vs. hidden markov models vs. hidden markov models,” in Acoustics, Speech, and Signal Processing,
1988. ICASSP-88., 1988 International Conference on, pp. 107–110 vol.1, Apr 1988.
[22] A.Cheung, M.Bennamoun, and N. Bergmann, “A recognition-based arabic optical character
recognition system,” in Systems, Man, and Cybernetics, 1998. 1998 IEEE International Conference
on, vol. 5, pp. 4189–4194 vol.5, Oct 1998.
[23] V.Margner and M.Pechwitz, “Synthetic data for arabic ocr system development,” in Document
Analysis and Recognition, 2001. Proceedings. Sixth International Conference on, pp. 1159–1163,
2001.
[24] R.Prasad, S.Saleem, M.Kamali, R.Meermeier, and P.Natarajan, “Improvements in hidden markov
model based arabic ocr,” in Pattern Recognition, 2008. ICPR 2008. 19th International Conference on,
pp. 1–4, Dec 2008.
[25] G.Stockman and L.G.Shapiro, Computer Vision. Upper Saddle River, NJ, USA: Prentice Hall PTR,
1st ed., 2001.
[26] D.Graupe, Principles of Artificial Neural Networks. River Edge, NJ, USA: World Scientific
Publishing Co., Inc., 1997.
[27] Z.Tian-liang, “Solving non-linear equation based on steepest descent method,” in Information and
Computing (ICIC).

Weitere ähnliche Inhalte

Was ist angesagt?

Text Extraction from Image using Python
Text Extraction from Image using PythonText Extraction from Image using Python
Text Extraction from Image using Pythonijtsrd
 
IRJET- Malayalam Text Detection from Natural-Scene Images
IRJET- Malayalam Text Detection from Natural-Scene ImagesIRJET- Malayalam Text Detection from Natural-Scene Images
IRJET- Malayalam Text Detection from Natural-Scene ImagesIRJET Journal
 
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...csandit
 
Two Methods for Recognition of Hand Written Farsi Characters
Two Methods for Recognition of Hand Written Farsi CharactersTwo Methods for Recognition of Hand Written Farsi Characters
Two Methods for Recognition of Hand Written Farsi CharactersCSCJournals
 
SEGMENTATION OF CHARACTERS WITHOUT MODIFIERS FROM A PRINTED BANGLA TEXT
SEGMENTATION OF CHARACTERS WITHOUT MODIFIERS FROM A PRINTED BANGLA TEXTSEGMENTATION OF CHARACTERS WITHOUT MODIFIERS FROM A PRINTED BANGLA TEXT
SEGMENTATION OF CHARACTERS WITHOUT MODIFIERS FROM A PRINTED BANGLA TEXTcscpconf
 
Isolated Arabic Handwritten Character Recognition Using Linear Correlation
Isolated Arabic Handwritten Character Recognition Using Linear CorrelationIsolated Arabic Handwritten Character Recognition Using Linear Correlation
Isolated Arabic Handwritten Character Recognition Using Linear CorrelationEditor IJCATR
 
V.karthikeyan published article
V.karthikeyan published articleV.karthikeyan published article
V.karthikeyan published articleKARTHIKEYAN V
 
Recognition of Words in Tamil Script Using Neural Network
Recognition of Words in Tamil Script Using Neural NetworkRecognition of Words in Tamil Script Using Neural Network
Recognition of Words in Tamil Script Using Neural NetworkIJERA Editor
 
A Survey On Thresholding Operators of Text Extraction In Videos
A Survey On Thresholding Operators of Text Extraction In VideosA Survey On Thresholding Operators of Text Extraction In Videos
A Survey On Thresholding Operators of Text Extraction In VideosCSCJournals
 
IRJET- Real-Time Text Reader for English Language
IRJET- Real-Time Text Reader for English LanguageIRJET- Real-Time Text Reader for English Language
IRJET- Real-Time Text Reader for English LanguageIRJET Journal
 
A Hybrid method of face detection based on Feature Extraction using PIFR and ...
A Hybrid method of face detection based on Feature Extraction using PIFR and ...A Hybrid method of face detection based on Feature Extraction using PIFR and ...
A Hybrid method of face detection based on Feature Extraction using PIFR and ...IJERA Editor
 
A MODEL TO CONVERT WAVE–FORM-TEXT TO LINEAR-FORM-TEXT FOR BETTER READABILITY ...
A MODEL TO CONVERT WAVE–FORM-TEXT TO LINEAR-FORM-TEXT FOR BETTER READABILITY ...A MODEL TO CONVERT WAVE–FORM-TEXT TO LINEAR-FORM-TEXT FOR BETTER READABILITY ...
A MODEL TO CONVERT WAVE–FORM-TEXT TO LINEAR-FORM-TEXT FOR BETTER READABILITY ...ijma
 
Text detection and recognition from natural scenes
Text detection and recognition from natural scenesText detection and recognition from natural scenes
Text detection and recognition from natural sceneshemanthmcqueen
 

Was ist angesagt? (16)

50120130406021
5012013040602150120130406021
50120130406021
 
Text Extraction from Image using Python
Text Extraction from Image using PythonText Extraction from Image using Python
Text Extraction from Image using Python
 
IRJET- Malayalam Text Detection from Natural-Scene Images
IRJET- Malayalam Text Detection from Natural-Scene ImagesIRJET- Malayalam Text Detection from Natural-Scene Images
IRJET- Malayalam Text Detection from Natural-Scene Images
 
Bi4103375380
Bi4103375380Bi4103375380
Bi4103375380
 
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...
 
Two Methods for Recognition of Hand Written Farsi Characters
Two Methods for Recognition of Hand Written Farsi CharactersTwo Methods for Recognition of Hand Written Farsi Characters
Two Methods for Recognition of Hand Written Farsi Characters
 
SEGMENTATION OF CHARACTERS WITHOUT MODIFIERS FROM A PRINTED BANGLA TEXT
SEGMENTATION OF CHARACTERS WITHOUT MODIFIERS FROM A PRINTED BANGLA TEXTSEGMENTATION OF CHARACTERS WITHOUT MODIFIERS FROM A PRINTED BANGLA TEXT
SEGMENTATION OF CHARACTERS WITHOUT MODIFIERS FROM A PRINTED BANGLA TEXT
 
Isolated Arabic Handwritten Character Recognition Using Linear Correlation
Isolated Arabic Handwritten Character Recognition Using Linear CorrelationIsolated Arabic Handwritten Character Recognition Using Linear Correlation
Isolated Arabic Handwritten Character Recognition Using Linear Correlation
 
V.karthikeyan published article
V.karthikeyan published articleV.karthikeyan published article
V.karthikeyan published article
 
Recognition of Words in Tamil Script Using Neural Network
Recognition of Words in Tamil Script Using Neural NetworkRecognition of Words in Tamil Script Using Neural Network
Recognition of Words in Tamil Script Using Neural Network
 
Ay32333339
Ay32333339Ay32333339
Ay32333339
 
A Survey On Thresholding Operators of Text Extraction In Videos
A Survey On Thresholding Operators of Text Extraction In VideosA Survey On Thresholding Operators of Text Extraction In Videos
A Survey On Thresholding Operators of Text Extraction In Videos
 
IRJET- Real-Time Text Reader for English Language
IRJET- Real-Time Text Reader for English LanguageIRJET- Real-Time Text Reader for English Language
IRJET- Real-Time Text Reader for English Language
 
A Hybrid method of face detection based on Feature Extraction using PIFR and ...
A Hybrid method of face detection based on Feature Extraction using PIFR and ...A Hybrid method of face detection based on Feature Extraction using PIFR and ...
A Hybrid method of face detection based on Feature Extraction using PIFR and ...
 
A MODEL TO CONVERT WAVE–FORM-TEXT TO LINEAR-FORM-TEXT FOR BETTER READABILITY ...
A MODEL TO CONVERT WAVE–FORM-TEXT TO LINEAR-FORM-TEXT FOR BETTER READABILITY ...A MODEL TO CONVERT WAVE–FORM-TEXT TO LINEAR-FORM-TEXT FOR BETTER READABILITY ...
A MODEL TO CONVERT WAVE–FORM-TEXT TO LINEAR-FORM-TEXT FOR BETTER READABILITY ...
 
Text detection and recognition from natural scenes
Text detection and recognition from natural scenesText detection and recognition from natural scenes
Text detection and recognition from natural scenes
 

Andere mochten auch

Towards enhancing resource
Towards enhancing resourceTowards enhancing resource
Towards enhancing resourcecsandit
 
A decision tree based pedometer
A decision tree based pedometerA decision tree based pedometer
A decision tree based pedometercsandit
 
Unsupervised region of interest
Unsupervised region of interestUnsupervised region of interest
Unsupervised region of interestcsandit
 
E learning scenarios using
E learning scenarios usingE learning scenarios using
E learning scenarios usingcsandit
 
A new approach based on the detection of opinion by sentiwordnet for automati...
A new approach based on the detection of opinion by sentiwordnet for automati...A new approach based on the detection of opinion by sentiwordnet for automati...
A new approach based on the detection of opinion by sentiwordnet for automati...csandit
 
Fitting the log skew normal to
Fitting the log skew normal toFitting the log skew normal to
Fitting the log skew normal tocsandit
 
Glitch Analysis and Reduction in Combinational Circuits
Glitch Analysis and Reduction in Combinational CircuitsGlitch Analysis and Reduction in Combinational Circuits
Glitch Analysis and Reduction in Combinational Circuitscsandit
 
Mc cdma performance on single
Mc cdma performance on singleMc cdma performance on single
Mc cdma performance on singlecsandit
 
Selective image encryption using
Selective image encryption usingSelective image encryption using
Selective image encryption usingcsandit
 
Analysing attrition in outsourced
Analysing attrition in outsourcedAnalysing attrition in outsourced
Analysing attrition in outsourcedcsandit
 
A new hybrid metric for verifying
A new hybrid metric for verifyingA new hybrid metric for verifying
A new hybrid metric for verifyingcsandit
 
Recognizing named entities in
Recognizing named entities inRecognizing named entities in
Recognizing named entities incsandit
 
Multiple user interfaces and crossplatform
Multiple user interfaces and crossplatformMultiple user interfaces and crossplatform
Multiple user interfaces and crossplatformcsandit
 
A framework for plagiarism
A framework for plagiarismA framework for plagiarism
A framework for plagiarismcsandit
 
Application of rhetorical
Application of rhetoricalApplication of rhetorical
Application of rhetoricalcsandit
 
Real time clustering of time series
Real time clustering of time seriesReal time clustering of time series
Real time clustering of time seriescsandit
 
Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backupcsandit
 
Feature Selection : A Novel Approach for the Prediction of Learning Disabilit...
Feature Selection : A Novel Approach for the Prediction of Learning Disabilit...Feature Selection : A Novel Approach for the Prediction of Learning Disabilit...
Feature Selection : A Novel Approach for the Prediction of Learning Disabilit...csandit
 
On Diagnosis of Longwall Systems
On Diagnosis of Longwall SystemsOn Diagnosis of Longwall Systems
On Diagnosis of Longwall Systemscsandit
 
Gyg碳排放交易之外的替代方案6
Gyg碳排放交易之外的替代方案6Gyg碳排放交易之外的替代方案6
Gyg碳排放交易之外的替代方案6Huck Lin
 

Andere mochten auch (20)

Towards enhancing resource
Towards enhancing resourceTowards enhancing resource
Towards enhancing resource
 
A decision tree based pedometer
A decision tree based pedometerA decision tree based pedometer
A decision tree based pedometer
 
Unsupervised region of interest
Unsupervised region of interestUnsupervised region of interest
Unsupervised region of interest
 
E learning scenarios using
E learning scenarios usingE learning scenarios using
E learning scenarios using
 
A new approach based on the detection of opinion by sentiwordnet for automati...
A new approach based on the detection of opinion by sentiwordnet for automati...A new approach based on the detection of opinion by sentiwordnet for automati...
A new approach based on the detection of opinion by sentiwordnet for automati...
 
Fitting the log skew normal to
Fitting the log skew normal toFitting the log skew normal to
Fitting the log skew normal to
 
Glitch Analysis and Reduction in Combinational Circuits
Glitch Analysis and Reduction in Combinational CircuitsGlitch Analysis and Reduction in Combinational Circuits
Glitch Analysis and Reduction in Combinational Circuits
 
Mc cdma performance on single
Mc cdma performance on singleMc cdma performance on single
Mc cdma performance on single
 
Selective image encryption using
Selective image encryption usingSelective image encryption using
Selective image encryption using
 
Analysing attrition in outsourced
Analysing attrition in outsourcedAnalysing attrition in outsourced
Analysing attrition in outsourced
 
A new hybrid metric for verifying
A new hybrid metric for verifyingA new hybrid metric for verifying
A new hybrid metric for verifying
 
Recognizing named entities in
Recognizing named entities inRecognizing named entities in
Recognizing named entities in
 
Multiple user interfaces and crossplatform
Multiple user interfaces and crossplatformMultiple user interfaces and crossplatform
Multiple user interfaces and crossplatform
 
A framework for plagiarism
A framework for plagiarismA framework for plagiarism
A framework for plagiarism
 
Application of rhetorical
Application of rhetoricalApplication of rhetorical
Application of rhetorical
 
Real time clustering of time series
Real time clustering of time seriesReal time clustering of time series
Real time clustering of time series
 
Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backup
 
Feature Selection : A Novel Approach for the Prediction of Learning Disabilit...
Feature Selection : A Novel Approach for the Prediction of Learning Disabilit...Feature Selection : A Novel Approach for the Prediction of Learning Disabilit...
Feature Selection : A Novel Approach for the Prediction of Learning Disabilit...
 
On Diagnosis of Longwall Systems
On Diagnosis of Longwall SystemsOn Diagnosis of Longwall Systems
On Diagnosis of Longwall Systems
 
Gyg碳排放交易之外的替代方案6
Gyg碳排放交易之外的替代方案6Gyg碳排放交易之外的替代方案6
Gyg碳排放交易之外的替代方案6
 

Ähnlich wie A case study in computer

A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...IJERD Editor
 
Efficient feature descriptor selection for improved Arabic handwritten words ...
Efficient feature descriptor selection for improved Arabic handwritten words ...Efficient feature descriptor selection for improved Arabic handwritten words ...
Efficient feature descriptor selection for improved Arabic handwritten words ...IJECEIAES
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSijcsit
 
IRJET - Object Detection using Hausdorff Distance
IRJET -  	  Object Detection using Hausdorff DistanceIRJET -  	  Object Detection using Hausdorff Distance
IRJET - Object Detection using Hausdorff DistanceIRJET Journal
 
IRJET- Object Detection using Hausdorff Distance
IRJET-  	  Object Detection using Hausdorff DistanceIRJET-  	  Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff DistanceIRJET Journal
 
Off-line English Character Recognition: A Comparative Survey
Off-line English Character Recognition: A Comparative SurveyOff-line English Character Recognition: A Comparative Survey
Off-line English Character Recognition: A Comparative Surveyidescitation
 
Concept drift and machine learning model for detecting fraudulent transaction...
Concept drift and machine learning model for detecting fraudulent transaction...Concept drift and machine learning model for detecting fraudulent transaction...
Concept drift and machine learning model for detecting fraudulent transaction...IJECEIAES
 
An application of Vietnamese handwriting text recognition for information ext...
An application of Vietnamese handwriting text recognition for information ext...An application of Vietnamese handwriting text recognition for information ext...
An application of Vietnamese handwriting text recognition for information ext...IAESIJAI
 
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face RecognitionIRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face RecognitionIRJET Journal
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System iosrjce
 
A Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net AlgorithmA Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net AlgorithmIRJET Journal
 
Using optimized features for modified optical backpropagation
Using optimized features for modified optical backpropagationUsing optimized features for modified optical backpropagation
Using optimized features for modified optical backpropagationAlexander Decker
 
Implementation of Automated Attendance System using Deep Learning
Implementation of Automated Attendance System using Deep LearningImplementation of Automated Attendance System using Deep Learning
Implementation of Automated Attendance System using Deep LearningMd. Mahfujur Rahman
 
Offline Character Recognition Using Monte Carlo Method and Neural Network
Offline Character Recognition Using Monte Carlo Method and Neural NetworkOffline Character Recognition Using Monte Carlo Method and Neural Network
Offline Character Recognition Using Monte Carlo Method and Neural Networkijaia
 
PROJECTION PROFILE BASED NUMBER PLATE LOCALIZATION AND RECOGNITION
PROJECTION PROFILE BASED NUMBER PLATE LOCALIZATION AND RECOGNITIONPROJECTION PROFILE BASED NUMBER PLATE LOCALIZATION AND RECOGNITION
PROJECTION PROFILE BASED NUMBER PLATE LOCALIZATION AND RECOGNITIONcscpconf
 
Intelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIntelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIJERA Editor
 
Study of Distance Measurement Techniques in Context to Prediction Model of We...
Study of Distance Measurement Techniques in Context to Prediction Model of We...Study of Distance Measurement Techniques in Context to Prediction Model of We...
Study of Distance Measurement Techniques in Context to Prediction Model of We...IJSCAI Journal
 

Ähnlich wie A case study in computer (20)

A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
 
Efficient feature descriptor selection for improved Arabic handwritten words ...
Efficient feature descriptor selection for improved Arabic handwritten words ...Efficient feature descriptor selection for improved Arabic handwritten words ...
Efficient feature descriptor selection for improved Arabic handwritten words ...
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
 
IRJET - Object Detection using Hausdorff Distance
IRJET -  	  Object Detection using Hausdorff DistanceIRJET -  	  Object Detection using Hausdorff Distance
IRJET - Object Detection using Hausdorff Distance
 
IRJET- Object Detection using Hausdorff Distance
IRJET-  	  Object Detection using Hausdorff DistanceIRJET-  	  Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff Distance
 
Off-line English Character Recognition: A Comparative Survey
Off-line English Character Recognition: A Comparative SurveyOff-line English Character Recognition: A Comparative Survey
Off-line English Character Recognition: A Comparative Survey
 
Concept drift and machine learning model for detecting fraudulent transaction...
Concept drift and machine learning model for detecting fraudulent transaction...Concept drift and machine learning model for detecting fraudulent transaction...
Concept drift and machine learning model for detecting fraudulent transaction...
 
An application of Vietnamese handwriting text recognition for information ext...
An application of Vietnamese handwriting text recognition for information ext...An application of Vietnamese handwriting text recognition for information ext...
An application of Vietnamese handwriting text recognition for information ext...
 
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face RecognitionIRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
 
K044065257
K044065257K044065257
K044065257
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
 
K012647982
K012647982K012647982
K012647982
 
K012647982
K012647982K012647982
K012647982
 
A Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net AlgorithmA Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net Algorithm
 
Using optimized features for modified optical backpropagation
Using optimized features for modified optical backpropagationUsing optimized features for modified optical backpropagation
Using optimized features for modified optical backpropagation
 
Implementation of Automated Attendance System using Deep Learning
Implementation of Automated Attendance System using Deep LearningImplementation of Automated Attendance System using Deep Learning
Implementation of Automated Attendance System using Deep Learning
 
Offline Character Recognition Using Monte Carlo Method and Neural Network
Offline Character Recognition Using Monte Carlo Method and Neural NetworkOffline Character Recognition Using Monte Carlo Method and Neural Network
Offline Character Recognition Using Monte Carlo Method and Neural Network
 
PROJECTION PROFILE BASED NUMBER PLATE LOCALIZATION AND RECOGNITION
PROJECTION PROFILE BASED NUMBER PLATE LOCALIZATION AND RECOGNITIONPROJECTION PROFILE BASED NUMBER PLATE LOCALIZATION AND RECOGNITION
PROJECTION PROFILE BASED NUMBER PLATE LOCALIZATION AND RECOGNITION
 
Intelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIntelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural Network
 
Study of Distance Measurement Techniques in Context to Prediction Model of We...
Study of Distance Measurement Techniques in Context to Prediction Model of We...Study of Distance Measurement Techniques in Context to Prediction Model of We...
Study of Distance Measurement Techniques in Context to Prediction Model of We...
 

Kürzlich hochgeladen

Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stageAbc194748
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 

Kürzlich hochgeladen (20)

Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 

A case study in computer

  • 1. David C. Wyld et al. (Eds) : CCSIT, SIPP, AISC, NLP - 2015 pp. 53–62, 2015. © CS & IT-CSCP 2015 DOI : 10.5121/csit.2015.50405 A CASE STUDY IN COMPUTER UNDERSTANDING OF PRINTED-FORMS Davood Falahati 1 , Hojat Cheraghi 2 and Kazem Ghalamchi3 1 Department of Electrical Engineering, Isfahan University of Technology, Isfahan-Iran d.falahati.1987@ieee.org 2 Tehran Science and Research University, Tehran-Iran hojat.ch@gmail.com 3 Ghalamchi Foundation,Tehran, Iran. kazemglmchi@yahoo.com ABSTRACT Data entry is a time consuming and erroneous procedure in its nature. In addition, validity check of submitted information is not easier than retyping it. In a mega-corporation like Kanoon Farhangi Amoozesh, there are almost no way to control the authenticity of students' educational background. By the virtue of fast computer architectures, optical character recognition, a.k.a. OCR, systems have become viable. Unfortunately, general-purpose OCR systems like Google's Tesseract are not handful because they don't have any a-priori information about what they are reading. In this paper the authors have taken a in-depth look on what has done in the field of OCR in the last 60 years. Then, a custom-made system adapted to the problem is presented which is way more accurate than general purpose OCRs. The developed system reads more than 60 digits per second. As shown in the Results section, the accuracy of the devised method is reasonable enough to be exposed in public use. KEYWORDS Optical character recognition, tesseract, neural networks, row finding, segmentation. 1. INTRODUCTION Data-entry phase, is by far the most time-consuming and the deadliest line of work in data acquisition process. A remarkable portion of a company's human resource should be devoted to collect printed information in the forms. Computer-assisted data-entry process has been a human ancient dream. In the latest sixty years, there have been exerted massive efforts to implement an automatic character recognition system [1]. Template-Matching was one of the earliest methods for character recognition in which an unknown character should be compared to all of the possible candidates. Optical imaging techniques were the backbone of identification systems before 70s. Hongo and Nitta devised an optical system that processed a video signal using template matching [2].
  • 2. 54 Computer Science & Information Technology (CS & IT) Fig. 1. Chain codes grid. (a) 4-connected gird (b) 8-connected grid. (c) a sample of coded sequence using 8- connected grid. Fig. 2. Basic graphs of LAG method. Node A is a junction and nodes B,C and D are paths. Digital computers deviated the way of template matching from optical to logical ones. Peephole method was one of the earliest logical approaches to digital template matching. Template matching technique evolved and offered using moments [1] and Fourier series later [3]. The former method made an invaluable translation-rotation-scale invariant a.k.a TRS, a tool for template matching [4]. Another set of commonplace TRS moments in the vicinity of pattern recognition are Zernike [5] and Fourier-Mellin moments that implemented in character recognition as well [6, 7]. Sakoe offered using dynamic programming (DP) technique to template matching problem [8]. Dynamic time warping (DTW) used to find the minimum distance between a given template and
  • 3. Computer Science & Information Technology (CS & IT) 55 its corresponding candidate [8, 9]. DP-based template matching techniques make the comparison of two non-equal length vectors possible. Therefore, character matching would be possible while aspect ratio remains intact through DP. Template matching practice, however, remained limited to printed character recognition systems [10]. To cover handwritten characters, another useful recognition method called structural analysis, introduced [1]. Freeman introduced a novel method on encoding curvatures in [11]. The proposed method, currently called "chain codes", was proposed in order to be used in image compression however, later it found practice in character recognition efforts [10]. Chain codes were developed in encoding efforts and a more sophisticated one is presented in [12]. Chain codes are founded on quantization process and decode a curvature to a line with a certain slope. As depicted in figure 1, 4-connected and 8-connected grids are two types of commonplace chain codes being used. The higher slopes in a grid, the lower quantization error in the coded curvature. Pavlidis at Bell laboratories proposed a thinning method suited for multi-font document recognition system [13]. The before said method uses line adjacency graphs (LAGs) which tries to stack semi-linear group of segments. Pavlidis addresses two types of graph nodes as junction and paths as shown in figure 2. Structure analysis method alleviated template matching defects in handwritten character recognition systems. The candidate with the lowest distance with the template considers to be the best match. Since characters are not connected, registration problem, however, is straightforward to deal with. In a wider sense, trainable scoring techniques are amazingly suited to human activities like speech and handwriting recognition [14]. Hidden markov models a.k.a HMMs have long been used in speech recognition systems. Due to probabilistic features of human writing systems, HMM has also been used to serve character recognition purposes [15]. Neural networks are another useful matching asset in character recognition systems [16,17,18,19]. Neural networks are trainable and their usage is less complicated as HMMs while multi layer perceptrons (MLPs) need more training data compared with HMMs [20]. Despite HMMs' more accurate performance in [20], MLPs show a better performance in speech recognition activities [21]. Right-to-left, cursive and connected scripts, however, are the most challenging scripts in recognition systems [22]. Arabic and Farsi scripts are two well-known cursive scripts widely using. Reading these scripts requires an excessive segmentation process, say, word segmentation [23, 24]. Technically speaking, a Farsi and/or Arabic word consists of connected characters (see figure 3). Therefore, a vital step in reading Farsi/Arabic characters is to rightly segment all of the characters. Fig. 3. Two samples of Farsi word “Sample”. This word consists of 5 characters N-M-U-N-H. It is noteworthy that unlike Arabic, vowels are not being written in formal Farsi handwriting.
  • 4. 56 Computer Science & Information Technology (CS & IT) This paper is organized as follows. In the section 2 the proposed framework is shortly introduced. In section 3, the preprocessing methods are discussed. Section 4 is devoted to segmentation procedures. Section 5 pays attention to training process and scoring. Finally, section 6 reveals the results of our proposed method. 2. DISCUSSING THE PROBLEM Reading and checking printed score sheets for a massive number students is a cumbersome task which is not achievable by human resources. Kanoon Farhangi Amoozesh is a test-conducting foundation in Iran holds weekly exams among 400,000 students. In order to analyze students' educational background, one needs to certify the student claimed GPA according to printed documents. An Iranian high-school score-sheet issued by ministry of education is shown in figure 4. Fig. 4. A standard Iranian high-school score-sheet 3. PREPROCESSING The devised system works along with a web-server in which server sends uploaded score-sheets to character recognition system and its output is fed back to the web-server (see figure 5). Fig. 5. Topology of the devised system
  • 5. Computer Science & Information Technology (CS & IT) 57 Fig. 6. Representation of a line in polar coordinates Fig.7. Sinusoid curves intersect on points located on a line. Curves are intersecting in two distinct points. It means that all of the points are located on a line. A major problem with this case is image acquisition phase. As long as images are taken by clients, there is no control over the scanning procedure. The input images to the character recognition system are prone to rotation, scale manipulation and translation. Therefore, a preprocessing step is strictly required. The most annoying scanning-mismatch is rotation. To remove rotation effects on reading characters, the perpendicular lines of the table are used. Hough line transform is used to extract lines and their angles [25]. As shown in figure [6], the Hough line transform first expresses a line in the polar system as below. Each point P=(x0,y0) identifies a Sinusoidal curve. Points located on a straight line result in Sinusoidal curves that intersect in polar coordinates (see figure 7). In a real case, there are many points and many Sinusoidal curves in result. The points with the majority of intersections identify straight lines. In this venue one looks for the longest lines and computes their angle. After that, the input image will be rotated in inverse direction. Figure 8 depicts an instance of recovered lines using Hough method.
  • 6. 58 Computer Science & Information Technology (CS & IT) Fig. 8. A sample of rotation correction by Hough line transform. The rotation is removed by computing the rotation angle and inversely applying it to the image. In this method the horizontal lines are removed by filtering. 4. SEGMENTATION A top-to-bottom raster scanning is required to find the position of lines whole the score-sheet. Before that, a canny edge detector should be applied to the image to remove redundant image data. In the case of characters, canny preserves the contours of the characters. Moreover, line height is obtainable in this way. Extracted lines are depicted in figure 9. This method is scale, translation and rotation invariant since it just attempts to find pixels concentration regions. Fig. 9. Finding the rows of the score-sheets. The centers of the rows are emphasized by solid horizontal lines. The image is cropped to safeguard student’s personal information. In a similar manner, the table columns can be resolved easily. In the case the rows are not detectable, the input image would be rejected. The last step to be paved is character segmentation. The output of row detection is fed to character parser. Character parser extracts a block containing the character. Fortunately, numerical digits are not connected in Farsi handwriting system. However, the character "point" or
  • 7. Computer Science & Information Technology (CS & IT) 59 "." is troublesome in Farsi. The mentioned character prints like "slash" or "/" in both Farsi and Arabic writing systems. The mentioned character sometimes connects two numerical digits specifically when scanning resolution is not fair enough. Figure 10 shows the output of character parser. To deal with the problem of parsing connected characters like figure 10.b, the authors proposed the average character width method in which the width of characters obtains for every row and the blocks wider than twice the width of average width considered as connected blocks. Average width method is life-savor in the case of ink spattering as well. 5. SCORING The proposed multi-font character recognition system should be flexible about font change. Moreover, it should cover handwritten numerical digits. To cover this wide range of formation changes, artificial neural networks have been utilized [26]. In the proposed method multilayer perceptrons are used and back-propagation (BP) training method adjusts the weights of the perceptrons. Figure 11 illustrates an example of neural network with 4 hidden layers. Hidden layers are not accessible and their weight cannot be easily changed. Back-propagation method tries to minimize the distance between the real output, yk, and the desired output, dk. This distance can be formulated as below: Where N is the number of neurons. The effect of neurons' weights on the output error is represented by gradient of ɛk. Using the steepest descent gradient algorithm [27] it leads to: and wkj is as below: $eta$ is coined as learning rate. The output of each perceptron, yk, is the weighted sum of previous layer perceptrons. In other words: zk applies to sigmiod function : Wherein: Exploiting the sigmoid function results in: Then using (6) and the fact that yj(p - 1)=xj(p) leads to:
  • 8. 60 Computer Science & Information Technology (CS & IT) where p is the output layer. Let define a new parameter ɸ as follows: Using this new parameter and obtain: Doing some math and to get: Invoking the chain rule in equation (10) results in: The latter equation is used for the output layer. Differentiating from (2) results in: Exploiting the sigmoid property which is Therefore Invoking (5) and (6) to obtain ∆wkj as below: The ∆wji for the hidden layers are being computed as follows. In order to update ɸj for the hidden layers, the following equation is being used. Back-propagation method converges more quickly than Adaline and Madaline methods [26]. In order to train the neural network, the segmented digit obtained from the segmentation process feeds to neural network as a 20x20 binary image. The training set consists of 42 classes without rejection class. Each class consists of 300 samples of 300 Farsi/Arabic fonts.
  • 9. Computer Science & Information Technology (CS & IT) 61 6. RESULTS The proposed character recognition approach is implemented using C language along with openCV library. It is able to read score-sheets and report the results in both plain text and HTML format. The utilization is as simple as follows: Wherein "-h" comes if the HTML report is needed. The system reads every 1200x800 pixel score- sheet in less than 2 seconds on a core i5 2.4GHz personal computer. The devised system brings a high degree of precision. In average, the presented system correctly reads every numerical characters in 0.015 seconds with an error rate less than 2%. The accuracy of the Google's Tesseract is less than 40% for similar tests. ACKNOWLEDGEMENTS Writing and editing this paper was not possible without invaluable help of Omid Sefat, Ali Golestan and Farhad Baybordi in Kanoon Farhangi Amoozesh. Moreover, the obstacles we jumped over were shortened by Kazem Ghalamchi. REFERENCES [1] S.Mori, C.Suen, and K. Yamamoto, “Historical review of ocr research and development,” Proceedings of the IEEE, vol. 80, pp. 1029–1058, Jul 1992. [2] Y.Hongo and Y.Nitta, “Pattern recognition apparatus,” Dec. 9 1986. US Patent 4,628,533. [3] C.T.Zahn and R.Z. Roskies, “Fourier descriptors for plane closed curves,” Computers, IEEE Transactions on, vol. C-21, pp. 269–281, March 1972. [4] M.-K. Hu, “Visual pattern recognition by moment invariants,” Information Theory, IRE Transactions on, vol. 8, pp. 179–187, February 1962. [5] D.Xiao and L.Yang, “Gait recognition using zernike moments and bp neural network,” in Networking, Sensing and Control, 2008. ICNSC 2008. IEEE International Conference on, pp. 418– 423, April 2008. [6] C.Kan and M.D.Srinath, “Invariant character recognition with zernike and orthogonal fouriermellin moments,” Pattern Recognition, vol. 35, no. 1, pp. 143 – 154, 2002. Shape representation and similarity for image databases. [7] L.Torres-Mendez, J.Ruiz-Suarez, L.Sucar, and G.Gomez, “Translation, rotation, and scale-invariant object recognition,” Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, vol. 30, pp. 125–130, Feb 2000. [8] H.Sakoe and S.Chiba, “Dynamic programming algorithm optimization for spoken word recognition,” Acoustics, Speech and Signal Processing, IEEE Transactions on, vol. 26, pp. 43–49, Feb 1978. [9] D.Falahati, M.Helforoush, H.Danyali, and M.Rashidpour, “Static signature verification for farsi and arabic signatures using dynamic time warping,” in Electrical Engineering (ICEE), 2011 19th Iranian Conference on, pp. 1–1, May 2011. [10] A.Sinha, “An improved recognition module for the identification of handwritten digits,” 1999. [11] H.Freeman, “On the encoding of arbitrary geometric configurations,” Electronic Computers, IRE Transactions on, vol. EC-10, pp. 260–268, June 1961. [12] G.Schuster and A.Katsaggelos, “An optimal polygonal boundary encoding scheme in the rate distortion sense,” Image Processing, IEEE Transactions on, vol. 7, pp. 13–26, Jan 1998. [13] T.Pavlidis, “A vectorizer and feature extractor for document recognition,” Computer. Vision Graph. Image Process., vol. 35, pp. 111–127, July 1986. [14] L.Rabiner, “A tutorial on hidden markov models and selected applications in speech recognition,” Proceedings of the IEEE, vol. 77, pp. 257–286, Feb 1989. [15] O.E. Agazzi and S. shiaw Kuo, “Hidden markov model based optical character recognition in the presence of deterministic transformations,” Pattern Recognition, vol. 26, no. 12, pp. 1813 – 1826, 1993.
  • 10. 62 Computer Science & Information Technology (CS & IT) [16] E.Alpaydin, “Optical character recognition using artificial neural networks,” in Artificial Neural Networks, 1989., First IEE International Conference on (Conf. Publ. No. 313), pp. 191–195, Oct 1989. [17] R.Arnold and P.Miklos, “Character recognition using neural networks,” in Computational Intelligence and Informatics (CINTI), 2010 11th International Symposium on, pp. 311–314, Nov 2010. [18] F.Yang and F.Yang, “Character recognition using parallel bp neural network,” in Audio, Language and Image Processing, 2008. ICALIP 2008. International Conference on, pp. 1595–1599, July 2008. [19] A.Gupta, M.Srivastava, and C.Mahanta, “Offline handwritten character recognition using neural network,” in Computer Applications and Industrial Electronics (ICCAIE), 2011 IEEE International Conference on, pp. 102–107, Dec 2011. [20] E.Hatzipantelis, A.Murray, and J.Penman, “Comparing hidden markov models with artificial neural network architectures for condition monitoring applications,” in Artificial Neural Networks, 1995., Fourth International Conference on, pp. 369–374, Jun 1995. [21] A.Waibel, T.Hanazawa, G.Hinton, K.Shikano, and K. Lang, “Phoneme recognition: neural networks vs. hidden markov models vs. hidden markov models,” in Acoustics, Speech, and Signal Processing, 1988. ICASSP-88., 1988 International Conference on, pp. 107–110 vol.1, Apr 1988. [22] A.Cheung, M.Bennamoun, and N. Bergmann, “A recognition-based arabic optical character recognition system,” in Systems, Man, and Cybernetics, 1998. 1998 IEEE International Conference on, vol. 5, pp. 4189–4194 vol.5, Oct 1998. [23] V.Margner and M.Pechwitz, “Synthetic data for arabic ocr system development,” in Document Analysis and Recognition, 2001. Proceedings. Sixth International Conference on, pp. 1159–1163, 2001. [24] R.Prasad, S.Saleem, M.Kamali, R.Meermeier, and P.Natarajan, “Improvements in hidden markov model based arabic ocr,” in Pattern Recognition, 2008. ICPR 2008. 19th International Conference on, pp. 1–4, Dec 2008. [25] G.Stockman and L.G.Shapiro, Computer Vision. Upper Saddle River, NJ, USA: Prentice Hall PTR, 1st ed., 2001. [26] D.Graupe, Principles of Artificial Neural Networks. River Edge, NJ, USA: World Scientific Publishing Co., Inc., 1997. [27] Z.Tian-liang, “Solving non-linear equation based on steepest descent method,” in Information and Computing (ICIC).