Vous êtes sur la page 1sur 30

CONTENTS Sl No. 1. Title INRODUCTION 1.1. About the Organization 1.2. About the project 2. SYSTEM SPECIFICAION 2.1.

Hardware Specification 2.2. Software Specification 2.3. Software Features 3. SYSTEM STUDY AND ANALYSIS 3.1 Existing System 3.2 Drawbacks of existing system 3.3 Proposed System 3.4 Need of proposed system 4. SYSTEM DESIGN AND DEVELOPMENT 4.1. Feasibility Study 4.2. Database Design 4.3. Input Design 4.4. Output Design 5. SYSTEM TESTING AND IMPLEMENTATION 5.1 System Testing 5.2 System Implementation 5.3 System Maintenance Page No

6. 7. 8. 9.

CONCLUSION SCOPE FOR FURTHER ENHANCEMENT BIBLIOGRAPHY APPENDIX A. Sample coding B. Data Flow Diagram C. Table Design D. Screen Design E. Reports

SYNOPSIS
Off-line handwriting recognition Off-line handwriting recognition involves the automatic conversion of text in an image I(x,y) into letter codes which are usable within computer and text-processing applications. The data obtained by this form is regarded as a static representation of handwriting. Handwriting recognition entails optical character recognition. However, the classification of characters is just one of the functions of a complete handwriting recognition system. A complete system needs to preprocess the image, find a proper segmentation into character and find the most plausible words. The technology is successfully used by businesses which process lots of handwritten documents, like insurance companies. The quality of recognition can be substantially increased by structuring the document (by using forms). The proposed project is a digit & character recognition application (OCR or ICR application). The image processing begins and recognizes the digit and returns the result. Correlation matching algorithm for digit recognition and k-neighbor classifying algorithm to select the true digit have been used. Database is used to include handwritten digit samples. The project is developed in VB The modules in this project are as follows GUI Design Machine Training Character Matching Character recognition Database List

INRODUCTION 1.1 About the organisation Inovot is one of the emerging software development and web development company building powerful solutions and comprehensive software solutions to the clients who are keen in using the technology. Inovot with its solution service, takes on customized software development ranging from a small turnkey application to an entire large-scale project management effort. Inovot spans a variety of mission-critical industries, including projects in software R&D, implementing new ERP solutions, modifying existing business applications, upgrading large database systems or performing on-site or off-shore code maintenance and testing services. Inovot specializes in customizing different application for the textile industries, Banks, departmental stores, hospitals, educational institutions, etc. They have also developed a product for Schools which could provide complete academic activities of the students. In web site development area, inovot specializes in rich multimedia contents using flash and joomla/php web sites. Inovot is committed to providing services that customers need. Inovot is flexible enough to do the work on-site, in custom labs near the client location or off-site.

1.2 About the Project Off-line handwriting recognition Off-line handwriting recognition involves the automatic conversion of text in an image I(x,y) into letter codes which are usable within computer and text-processing applications. The data obtained by this form is regarded as a static representation of handwriting. Handwriting recognition entails optical character recognition. However, the classification of characters is just one of the functions of a complete handwriting recognition system. A complete system needs to preprocess the image, find a proper segmentation into character and find the most plausible words. The technology is successfully used by businesses which process lots of handwritten documents, like insurance companies. The quality of recognition can be substantially increased by structuring the document (by using forms). The proposed project is a digit & character recognition application (OCR or ICR application). The image processing begins and recognizes the digit and returns the result. Correlation matching algorithm for digit recognition and k-neighbor classifying algorithm to select the true digit have been used. Database is used to include handwritten digit samples. The project is developed in VB The modules in this project are as follows GUI Design Machine Training Character Matching Character recognition Database List

Modules There are mainly three modules in this project. They are GUI Design This module deals with designing the user interface design using VB Machine Training This module includes training the system with various forms of characters and digits. For the character and digit drawn a pattern is generated and stored and based on the pattern generated during the training phase, the characters are recognized. Character Matching The verification work for the digits, which are going to verify, and the digits that are stored in the database is done in this module. When a digits has to be identified the new users digits are loaded into the system. The properties that uniquely identify the digits are calculated for the equivalent digits can be identified. These values are compared with the binary values of the digits and that are already stored in our database folder. The values that approximately match with the current digits value is said to match with the input digits. The values collected from the verification digit is compared with the values that are stored in the database and if there is a match then that digits and its profile is displayed and if there is no match then that result will be displayed. Character recognition In this module, the new character or digit is drawn and matched with the existing ones in the database. The closest match is retrieved. Database List This module is used to storing a character and digits along with its details to the database permanently .It also edits the database if any changes that the wants to store digits binary in database.

2.SYSTEM SPECIFICATION 2.1 Hardware Specification Processor Clock Speed RAM Hard disk Capacity Floppy disk Capacity Keyboard Mouse 2.2 Software Specification Front End Operating System : VB : Windows 2000/XP or above : Pentium IV : 2 GHz : 512 MB : 80 GB : 1.44 MB : 101 Keys : Optical Mouse

2.3Software Features VISUAL BASIC 6.0 Microsoft Visual Basic, the fastest and easiest way to create applications for Microsoft Windows. Whether you are an experienced professional or brand new to Windows programming, Visual Basic provides you with a complete set of tools to simplify rapid application development.

Data access features allow you to create databases, front-end applications, and scalable server-side components for most popular database formats, including Microsoft SQL Server and other enterprise-level databases.

ActiveX technologies allow you to use the functionality provided by other applications, such as Microsoft Word word processor, Microsoft Excel spreadsheet, and other Windows applications. You can even automate applications and objects created using the Professional or Enterprise editions of Visual Basic.

Internet capabilities make it easy to provide access to documents and applications across the Internet or intranet from within your application, or to create Internet server applications.

Your finished application is a true .exe file that uses a Visual Basic Virtual Machine that you can freely distribute.

The Visual Basic Professional and Enterprise editions include the Windows Common controls that allow you to create applications with the look and feel of Windows 95 (or later) toolbars, status bars, and tree views or directory structure. Other controls allow you to create applications.

Intrinsic controls, such as the command button and frame controls. These controls are contained inside the Visual Basic .exe file. Intrinsic controls are always included in the toolbox, unlike ActiveX controls and insertable objects, which can be removed from or added to the toolbox.

ActiveX controls, which exist as separate files with a .ocx file name extension. These include controls that are available in all editions of Visual Basic (DataCombo, DataList controls, and so on) and those that are available only in the Professional and Enterprise editions (such as Listview, Toolbar, Animation, and Tabbed Dialog). Many third-party ActiveX controls are also available. Note Controls with the .vbx file name extension use older technology and are found in applications written in earlier versions of Visual Basic. When Visual Basic opens a project containing a .vbx control, the default behavior is to replace the .vbx control with an .ocx control, but only if an .ocx version of the control is available. See "Updating Older Versions of Visual Basic Controls" later in this chapter for information on updating controls to the .ocx format.

Insertable Objects, such as a Microsoft Excel Worksheet object containing a list of all your company's employees, or a Microsoft Project Calendar object containing the scheduling information for a project. Since these can be added to the toolbox, they can be considered controls. Some of these objects also support Automation (formerly called OLE Automation), which allows you to program another application's objects from within a Visual Basic application. See "Programming with Objects," for more information on Automation.

3.SYSTEM STUDY AND ANALYSIS 3.1Existing System Existing systems are less efficient in handling handwritten data. It cannot handle hand drawn characters or digits. All data to be handled is only fed directly through keyboards digitally. Hence digital characters only are recognized. Hand drawn digits and characters are only treated as images and cannot be interpreted as characters. 3.2 Drawbacks of the Existing System System do not have capability to recognize hand-written characters Less user friendly Accuracy is less as cannot recognize Characters are considered as images and no differentiation between characters and images.

3.3 Proposed System The proposed system is to develop an application in VB that will recognize the hand drawn characters and handle them. The application will first be trained for the specific characters and converted to binary format. Then the application will use correlation algorithm and K neighbor algorithm to arrive at the matching character and recognize it. The following are the objectives and highlights of the proposed system. No character input required through keyboard Hand drawing of the character or digit is sufficient Gives better recognition Better accuracy

3.4 Need for proposed system Existing systems are less efficient in handling handwritten data. It cannot handle hand drawn characters or digits. All data to be handled is only fed directly through keyboards digitally. Hence digital characters only are recognized. Hand drawn digits and characters are only treated as images and cannot be interpreted as characters. The proposed system is to develop an application in VB that will recognize the hand drawn characters and handle them. The application will first be trained for the specific characters and converted to binary format. Then the application will use correlation algorithm and K neighbor algorithm to arrive at the matching character and recognize it.

4.SYSTEM DESIGN AND DEVELOPMENT 4.1 Fesibility Study Feasibility is a determination of whether or not a project worth doing. The process followed in making this determination is called a feasibility analysis. This type of study determines if a project can and should be done. When developing a system, it is necessary to evaluate the feasibility of project at the earliest possible time. Unexpected technical problems and timing problems can occur when poor problem definition is obtained. It is advisable to conduct discussions regarding the analysis and design of the project before starting it. The feasibility is made according to the three key considerations: Operational feasibility Technical feasibility Economic feasibility Behavioral feasibility

OPERATIONAL FEASIBILITY The purpose of Operational Feasibility study is to determine whether the new system will be used if it is developed and implemented or will there be resistance from the users that will take the possible application benefits. There was no difficulty in implementing, the system as the Centralized network Management System is so effective and user-friendly. The users of the system are fully aware of the internal working of the system. So the users will not be facing any crisis in the running system. Thus the Centralized network Management System is found to be operationally feasible.

TECHNICAL FEASIBILITY This is concerned with specifying equipment and software that will successfully satisfy the user requirements. The technical needs of system may vary considerably, but include

The facility to produce outputs in a given time. Response time under certain conditions Ability to process a certain volume of transaction at a stipulated speed.

ECONOMIC FEASIBILITY Economic analysis is the most frequently technique for evaluating the effectiveness of a proposed system. Most commonly known as cost/benefit analysis, the procedure is to determine the benefits and savings that are expected from the proposed system and compare them with cost. Here, in the proposed system the benefits and savings are found to be more when compared to the overall cost that is to be incurred. As the proposed system is being developed in VB.net the company is not forced to invest more on resources. Also the implementation and maintenance of the system doesnt take much of the cost. The overall project cost is also normal as compared with other system development. BEHAVIORAL FEASIBILITY Behavioral Feasibility is a determination of whether proposed system is secured or not. So, the main purpose is the security level that is tent. The changes needed in the existing system are some security and communication problem where it is overcome with the proposed system. Hence it is accepted.

4.2Database Design Database design is required to manage large bodies of information. The management of data involves both the definition of structure for the manipulation of information. In addition the data base system must provide for the safety of the information handled despite. System crashes or due to attempt at unauthorized access. For developing an efficient data base we have to fulfill certain condition such as ; Control redundancy Easy to use Data independence Accuracy and integrity Performance

For achieving the above criteria, we have to make use of various features available with DBMS such forcing integrity constrains.

4.3 Input Design The input design is the link that ties the information system into the world of its users. It is a process of converting user-originated inputs to a computer-based format. Input data are collected and organized into a group of similar data. Once identified, appropriate input media are selected for processing. The goal of designing input data is to make entry easy, logical and free form errors. In input data design, we design source document that capture the data and then select the media used to enter them into the computer. The input forms are developed in a user-friendly way so that a layman also can easily understand everything. Menus are provided to users and different icons are designed so the proposed system design looks decorative. Input design is the part of the overall system design. Source documents initiate a processing cycle as soon as they are entered into the system through the keyboard. A source should be logical and easy to understand. Objectives of Input Design: 1 2 To achieve the highest possible level of accuracy. To ensure that the input is acceptable and understood by the user.

4.4 Output Design Output forms are also designed in a specific manner as per the user requirement. Results are formatted to enhance clarity. Depending on the user the system would generate appropriate output. The output forms are designed in such a way that the entire user required data is presented. While designing an output, the system analyst must accomplish the following. Determine what information to present Decide whether to display, print or speak information and select the output medium. Arrange the presentation of information in an acceptable form. Decide how to distribute the output to intended users.

5.SYSTEM TESTING AND IMPLEMENTATION 5.1 System Testing Testing Methodologies Testing is a process used to help identify the correctness, completeness and quality of developed computer software. There are many approaches to software testing, but effective testing of complex products is essentially a process of investigation, not merely a matter of creating and following rote procedure. One definition of testing is "the process of questioning a product in order to evaluate it", where the "questions" are things the tester tries to do with the product, and the product answers with its behavior in reaction to the probing of the tester. The quality of the application can and normally does vary widely from system to system but some of the common quality attributes include reliability, stability, portability, maintainability and usability. Testing objectives include 1. Testing is a process of executing a program with the intent of finding an error. 2. A good test case is one that has a high probability of finding an as yet undiscovered error. 3. A successful test is one that uncovers an as yet undiscovered error. Testing should systematically uncover different classes of errors in a minimum amount of time and with a minimum amount of effort. A secondary benefit of testing is that it demonstrates that the software appears to be working as stated in the specifications. The data collected through testing can also provide an indication of the software's reliability and quality. But, testing cannot show the absence of defect -- it can only show that software defects are present. Black box testing Black box testing attempts to derive sets of inputs that will fully exercise all the functional requirements of a system. It is not an alternative to white box testing. This type of testing attempts to find errors in the following categories:

1. incorrect or missing functions, 2. interface errors, 3. errors in data structures or external database access, 4. performance errors, and 5. initialization and termination errors. White box testing This testing is based on knowledge of the internal logic of an applications code. Also known as Glass box Testing. Internal software and code working should be known for this type of testing. Tests are based on coverage of code statements, branches, paths, conditions.White box testing is a test case design method that uses the control structure of the procedural design to derive test cases. Test cases can be derived that 1. Guarantee that all independent paths within a module have been exercised at least once. 2.Exercise all logical decisions on their true and false sides, 3. Execute all loops at their boundaries and within their operational bounds, and 4. Exercise internal data structures to ensure their validity.

Quality Assurance Generic risks Security Technologies & Policies A computer-base system is a combination of many assets or resources designed to perform some function or to provide some services.Each of these assets is threatened by one or more of the following unacceptable events: Interruption Disclosure Removal Destruction Security Issues

The term security can be divided into four related issues Security Integrity Privacy Confidentiality Authentication In the system brief log on procedure for the customer was provided in order to enter and accessthe system. This process is done in order to identify the valid user. These attributes are stored in a table that cannot be easily trapped by unauthorized persons. File protection The various files and database tables are also highly secured in this system. The necessity for securing the files and the table evolves because some persons who were not given authorization for access may hacker files and corrupt the tables with wrong data which will response tremendous hazards to the operations of the system. So in order to avoid these things,the data encryption standards engine is attached to all files and database tables associated with the system,which will facilitate encryption and decryption of files. Backup of the system are also taken as a preventive measure. 5.2 System Implementation Implementation is the stage of the project where the theoretical design is turned into a working system. At this stage the main work load and the major impact on the existing system shifts to the user department. If the implementation is not carefully planned and controlled, it can cause chaos and confusion. Implementation includes all those activities that take place to convert from the old system to the new one. The new system may be totally new, replacing an existing manual or automated

system or it may be a major modification to an existing system. Proper implementation is essential to provide a reliable system to meet the organization requirements. The process of putting the developed system in actual use is called system implementation. The system can be implemented only after thorough testing is done and it is found to be working according to the specifications. The system personnel check the feasibility of the system. The most crucial stage is achieving a new successful system and giving confidence on the new system for the user that it will work efficiently and effectively. It involves careful planning, investigation of the current system and its constraints on implementation. The system implementation has three main aspects. They are education and training, system testing and changeover. The implementation stage involves following tasks. Careful planning Investigation of system and constraints Design of methods to achieve the changeover. Training of the staff in the changeover phase Evaluation of the changeover method

Implementation Procedures Implementation of software refers to the final installation of the package in its real environment, to the satisfaction of the intended users and the operation of the system. The people are not sure that the software is meant to make their job easier. In the initial stage they doubt about the software but we have to ensure that the resistance does not build up as one has to make sure that. The active user must be aware of the benefits of using the system Their confidence in the software built up

Proper guidance is impaired to the user so that he is comfortable in using the application Before going ahead and viewing the system, the user must know that for viewing the result, the server program should be running in the server. If the server object is not running on the server, the actual processes will not take place.

5.3 System Maintenance The maintenance phase of the software cycle is the time in which software performs useful work. After a system is successfully implemented, it should be maintained in a proper manner. System maintenance is an important aspect in the software development life cycle. The need for system maintenance is to make adaptable to the changes in the system environment. There may be social, technical and other environmental changes, which affect a system which is being implemented. Software product enhancements may involve providing new functional capabilities, improving user displays and mode of interaction, upgrading the performance characteristics of the system. So only thru proper system maintenance procedures, the system can be adapted to cope up with these changes. Software maintenance is of course, far more than finding mistakes. We may define maintenance by describing four activities that are undertaken, after a product is released for use. Corrective Maintenance The first maintenance activity occurs because it is unreasonable to assume that software testing will uncover all latent errors in a large software system. During the use of any large program, errors will occur and be reported to the developer. The process that includes the diagnosis and correction of one or more errors is called Corrective Maintenance. Adaptive Maintenance

The second activity that contributes to a definition of maintenance occurs because of the rapid change that is encountered in every aspect of computing. Therefore Adaptive maintenance termed as an activity that modifies software to properly interfere with a changing environment is both necessary and commonplace. Perceptive Maintenance The third activity that may be applied to a definition of maintenance occurs when a software package is successful. As the software is used, recommendations for new capabilities, modifications to existing functions, and general enhancement are received from users. To satisfy requests in this category, Perceptive maintenance is performed. This activity accounts for the majority of all efforts expended on software maintenance. Preventive Maintenance The fourth maintenance activity occurs when software is changed to improve future maintainability or reliability, or to provide a better basis for future enhancements. Often called preventive maintenance, this activity is characterized by reverse engineering and re-engineering techniques.

6.CONCLUSION The Digit and Character Recognition is really a good start to identify the digits and character through mouse draw events. Its interesting to draw the digits and characters in the computer instead of typing. As far as the work done is considered, so far much care was given about the user friendlines. The interface are designed and channeled in a mannaer that the users can never make any mistake while using the application.For example while adding new record, users cant go out without either saving or canceling the operation.Till they save or cancel the current operation all other operation are blocked.

7. SCOPE FOR FURTHER ENHANCEMENT The growth of any organization leads to enhancements, in future the system can be enhanced according to requirements. In order to become an effective system, the developed system should provide room for improvement and enhancement. The project entitled Hand Written Character and Digit Recognition helps to recognize the digits and characters that are drawn with the help of mouse. This system is effective in finding a digit and character. In future, the application can be modified with additional features such as identifying a word and a sentence. It can also be upgraded to identify Tamil fonts and signature of a person.

8. BIBLIOGRAPHY o Evangelos Petroustaos Mastering in Visual Basic 6.0, BPB Publication, Second Edition, 1999.

o Gray Corncell, Visual Basic 6.0, TATA McGraw Hill Publication, 1999 Edition

o Roger Jennings, Database Developers guide with Visual basic 6.0, SAMS Publications, First Edition , 1999.

o Roger S.Pressman, Software Engineering a Practitioners approach, MC Graw Hill International Editions, Fourth Edition, 1997.

o Ellis M.Awad, System Analysis and design , Galgotia Publication, 1997 Edition .

9.APPENDIX B. System Flow Diagram

Hand Writing Recognition

Admin Module

User Module

User Management Input Digit/character to recognise

Input Digit/Character

Convert to machine pattern

Convert to machine pattern

Read the text file database

Save to text file

Perform K-Neighbour algorithm to identify all matching digits and characters

Perform Correlation algorithm to identify the most matching digit or character

Display identified digit or character

Logoff

Vous aimerez peut-être aussi