Handwritten Character Recognition Based on Zoning Using Euler Number for English Alphabets and Numerals
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract: Handwritten Character Recognition has been a challenging research domain due to its diverse applicable environment. Handwriting has always been and will possibly continue to be a means of communication. There is a need to convert these handwritten documents into an editable format which can be achieved by Handwritten Character Recognition systems. This considerably reduces the storage space required. In this paper focus is on offline handwritten English alphabets and numerals. Feature extraction is performed using zoning method together with the concept of euler number. This increases accuracy and speed of recognition as the search space can be reduced by dividing the character set into three groups
Authors and Affiliations
Rachana R. Herekar , Prof. S. R. Dhotre
DCT based Steganographic Evaluation parameter analysis inFrequency domain by using modified JPEG luminanceQuantization Table
Abstract : Steganography is the process of hiding one file inside another such that others can neither identifythe meaning of the embedded object, nor even recognize its existence. In this paper we want to increase...
Data mining Algorithm’s Variant Analysis
Abstract: The Data Mining is extricating or mining information from extensive volume of information.Information mining frequently includes the examination of information put away in an information distributioncente...
A Testing On Secure Key Policy Attribute-Based Encryption Policy For Data Sharing Among Dynamic Groups In The Cloud
Performance testing is based on the assertion that language and culture study are best brought together when the teacher is effective in the affective as well as cognitive and skills domains, teaching strategies and acti...
A Practical and Comparative Study of Call Graph Construction Algorithms
A number of Call Graph construction algorithms have been designed for construction of Call Graphs for object-oriented languages. Each of the Call Graph contraction algorithms were proposed to keep in mind the imp...
Prospective Utilization of Elliptic Curve Cryptography for Security: Authentication, Encryption and Decryption
Abstract : Public key cryptography is typically used in the field of mathematical, which consist of factors decomposition problem of huge numbers and discrete logarithm problem in finite field. For huge numbers in...