Segmentation of Touching Arabic Characters in Handwritten Documents by Overlapping Set Theory and Contour Tracing
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 5
Abstract
Segmentation of handwritten words into characters is one of the challenging problem in the field of OCR. In presence of touching characters, make this problem more difficult and challenging. There are many obstacles/challenges in segmentation of touching Arabic handwritten text. Although researches are busy in solving the problem of segmentation of these touching characters but still there exist unsolved problems of segmentation of touching offline Arabic handwritten characters. This is due to large variety of characters and their shapes. So in this research, a new method for segmentation of touching Arabic Handwritten character has been developed. The main idea of the proposed method is to segment the touching characters by identifying the touching point by overlapping set theory and ending points of the Arabic word by applying some standard morphology operation methods. After identifying all the points, segmentation method is applied to trace the boundaries of characters to separate these touching characters. Experiments were conducted on touching characters taken from different data sets. The results show the accuracy of the proposed method.
Authors and Affiliations
Inam Ullah, Mohd Sanusi Azmi, Mohamad Ishak Desa, Yazan M. Alomari
Detection and Isolation of Packet Dropping Attacker in MANETs
Several approaches have been proposed for Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs). Due to lack of MANETs infrastructure and well defined perimeter MANETs are susceptible to a variety of attac...
Design and Application of a Smart Diagnostic System for Parkinson’s Patients using Machine Learning
For analysis of Parkinson illness gait disabilities de-tection is essential. The only motivation behind this examination is to equitably and consequently differentiate among sound subjects and the one who is forbearing t...
Computerized Steganographic Technique using Fuzzy Logic
Steganography is the method of providing Computer security in which hiding the required information is done by inserting messages within other messages, which is a string of characters containing the useful information,...
Design, Release, Update, Repeat: The Basic Process of a Security Protocol’s Evolution
Companies, businesses, colleges, etc. throughout the world use computer networks and telecommunications to run their operations. The convenience, information-gathering, and organizational abilities provided by computer n...
Prioritization of Software Functional Requirements: Spanning Tree based Approach
Requirements prioritization shows significant role during effective implementation of requirements. Prioritization of requirements is not easy process particularly when requirements are large in size. The current methods...