150 research outputs found
The effectiveness of features in pattern recognition
Imperial Users onl
Cognitive Information Processing
Contains reports on three research projects.Joint Services Electronics Program (Contract DAAB07-74-C-0630)National Science Foundation (Grant GK-33736X2
Data display and analysis
Graphical character recognizer and data displa
Chinese information processing
A survey of the field of Chinese information processing is provided. It covers the following areas: the Chinese writing system, several popular Chinese encoding schemes and code conversions, Chinese keyboard entry methods, Chinese fonts, Chinese operating systems, basic Chinese computing techniques and applications
Off-line Thai handwriting recognition in legal amount
Thai handwriting in legal amounts is a challenging problem and a new field in the area of handwriting recognition research. The focus of this thesis is to implement Thai handwriting recognition system. A preliminary data set of Thai handwriting in legal amounts is designed. The samples in the data set are characters and words of the Thai legal amounts and a set of legal amounts phrases collected from a number of native Thai volunteers. At the preprocessing and recognition process, techniques are introduced to improve the characters recognition rates. The characters are divided into two smaller subgroups by their writing levels named body and high groups. The recognition rates of both groups are increased based on their distinguished features. The writing level separation algorithms are implemented using the size and position of characters. Empirical experiments are set to test the best combination of the feature to increase the recognition rates. Traditional recognition systems are modified to give the accumulative top-3 ranked answers to cover the possible character classes. At the postprocessing process level, the lexicon matching algorithms are implemented to match the ranked characters with the legal amount words. These matched words are joined together to form possible choices of amounts. These amounts will have their syntax checked in the last stage. Several syntax violations are caused by consequence faulty character segmentation and recognition resulting from connecting or broken characters. The anomaly in handwriting caused by these characters are mainly detected by their size and shape. During the recovery process, the possible word boundary patterns can be pre-defined and used to segment the hypothesis words. These words are identified by the word recognition and the results are joined with previously matched words to form the full amounts and checked by the syntax rules again. From 154 amounts written by 10 writers, the rejection rate is 14.9 percent with the recovery processes. The recognition rate for the accepted amount is 100 percent
Recommended from our members
NBS monograph
From Introduction: "This report is the first of a series intended to provide a selective overview of research and development efforts and requirements in the somewhat overlapping fields of the computer and information sciences and technologies. The projected series of reports will attempt to outline the probable range of R & D activities in the computer and information sciences and technologies through selective reviews of the literature and to develop a reasonable consensus with respect to the opinions of workers in these and potentially related fields as to areas of continuing R & D concern for research program planning or review in these areas.
Recognition of fiducial marks applied to robotic systems
The objective was to devise a method to determine the position and orientation of the links of a PUMA 560 using fiducial marks. As a result, it is necessary to design fiducial marks and a corresponding feature extraction algorithm. The marks used are composites of three basic shapes, a circle, an equilateral triangle and a square. Once a mark is imaged, it is thresholded and the borders of each shape are extracted. These borders are subsequently used in a feature extraction algorithm. Two feature extraction algorithms are used to determine which one produces the most reliable results. The first algorithm is based on moment invariants and the second is based on the discrete version of the psi-s curve of the boundary. The latter algorithm is clearly superior for this application
On-line recognition of English and numerical characters.
by Cheung Wai-Hung Wellis.Thesis (M.Sc.)--Chinese University of Hong Kong, 1992.Includes bibliographical references (leaves 52-54).ACKNOWLEDGEMENTSABSTRACTChapter 1 --- INTRODUCTION --- p.1Chapter 1.1 --- CLASSIFICATION OF CHARACTER RECOGNITION --- p.1Chapter 1.2 --- HISTORICAL DEVELOPMENT --- p.3Chapter 1.3 --- RECOGNITION METHODOLOGY --- p.4Chapter 2 --- ORGANIZATION OF THIS REPORT --- p.7Chapter 3 --- DATA SAMPLING --- p.8Chapter 3.1 --- GENERAL CONSIDERATION --- p.8Chapter 3.2 --- IMPLEMENTATION --- p.9Chapter 4 --- PREPROCESSING --- p.10Chapter 4.1 --- GENERAL CONSIDERATION --- p.10Chapter 4.2 --- IMPLEMENTATION --- p.12Chapter 4.2.1 --- Stroke connection --- p.12Chapter 4.2.2 --- Rotation --- p.12Chapter 4.2.3 --- Scaling --- p.14Chapter 4.2.4 --- De-skewing --- p.15Chapter 5 --- STROKE SEGMENTATION --- p.17Chapter 5.1 --- CONSIDERATION --- p.17Chapter 5.2 --- IMPLEMENTATION --- p.20Chapter 6 --- LEARNING --- p.26Chapter 7 --- PROTOTYPE MANAGEMENT --- p.27Chapter 8 --- RECOGNITION --- p.29Chapter 8.1 --- CONSIDERATION --- p.29Chapter 8.1.1 --- Delayed Stroke Tagging --- p.29Chapter 8.1.2 --- Bi-gram --- p.29Chapter 8.1.3 --- Character Scoring --- p.30Chapter 8.1.4 --- Ligature Handling --- p.32Chapter 8.1.5 --- Word Scoring --- p.32Chapter 8.2 --- IMPLEMENTATION --- p.33Chapter 8.2.1 --- Simple Matching --- p.33Chapter 8.2.2 --- Best First Search Matching --- p.33Chapter 8.2.3 --- Multiple Track Method --- p.35Chapter 8.3 --- SYSTEM PERFORMANCE TUNING --- p.37Chapter 9 --- POST-PROCESSING --- p.38Chapter 9.1 --- PROBABILITY MODEL --- p.38Chapter 9.2 --- WORD DICTIONARY APPROACH --- p.39Chapter 10 --- SYSTEM IMPLEMENTATION AND PERFORMANCE --- p.41Chapter 11 --- DISCUSSION --- p.43Chapter 12 --- EPILOG --- p.47Chapter APPENDIX I - --- PROBLEMS ENCOUNTERED AND SUGGESTED ENHANCEMENTS ON THE SYSTEM --- p.48Chapter APPENDIX II - --- GLOSSARIES --- p.51REFERENCES --- p.5
- …