A SYSTEMATIC APPROACH TO DEVNAGARI CHARACTER RECOGNITION METHOD
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 2015, Vol 4, Issue 12
Abstract
This paper provides a systematic study of segmentation methods for recognition of Devnagari characters. In this digital world, most of the documents are required in digitized manner. With the rapid growth of camera-based applications readily available on smart phones and portable devices, understanding the pictures taken by these devices semantically has gained increasing attention from the computer vision community in recent years. Among all the information contained in the image, text, which carries semantic information, could provide valuable cues about the content of the image and thus is very important for human as well as computer to understand the scenes. Text recognition is very important for humans to understand the scenes. In fact, text recognition is indispensable for a lot of applications such as automatic sign reading, language translation, navigation, and so on.
Authors and Affiliations
Mr. Kuldeep P. Pawar
COST MANAGEMENT OF PROJECTS USING A STANDARD PMBOK IN ENGINEERING PROJECTS
Management method of cost project always is a key and effective agent on the success or defeat of a project. PMBOK describes all sciences related to project management cycle that contains some conventional styles...
A REVIEW PAPER ON PARALLELED BIG DATA ALGORITHM WITH MAPREDUCE FRAMEWORK FOR MINING TWITTER DATA
Communication is a key factor in today’s human life, due to time constraints physical interaction between people is not possible. This gap is filled by the technology through ‘social networking’ sites it’s very easy to...
A REVIEW OF GENETIC ALGORITHMS AND ITS APPLICATIONS IN CHEMICAL ENGINEERING RESEARCH
This paper presents a review of Genetic Algorithms (GAs) and its applications within the field of Chemical Engineering. The primary applications of GAs in Chemical Engineering date back to the 1970s, and within th...
Total Survey of Data Security Issues in Cloud Computing.
In today’s IT era cloud computing is the most preferable research topic. In cloud computing data storage, data transfer can be possible. So that, data security is the main aspect of cloud computing and also for an...
STUDY ON PROTECTION OF ENTRUST KEY MANAGEMENT IN 4G LTE NETWORKS
To minimize a security gap in the networks which a single compromised or malicious device can expose an entire mobile network because of the open nature of these networks. The attacker can launch a variety of active...