handwriting vb
TRANSCRIPT
-
7/31/2019 Handwriting VB
1/30
CONTENTS
Sl No. Title Page No
1. INRODUCTION
1.1. About the Organization
1.2. About the project
2. SYSTEM SPECIFICAION
2.1. Hardware Specification
2.2. Software Specification
2.3. Software Features
3. SYSTEM STUDY AND ANALYSIS
3.1 Existing System
3.2 Drawbacks of existing system
3.3 Proposed System
3.4 Need of proposed system
4. SYSTEM DESIGN AND DEVELOPMENT
4.1. Feasibility Study
4.2. Database Design
4.3. Input Design
4.4. Output Design
5. SYSTEM TESTING AND IMPLEMENTATION
5.1 System Testing
5.2 System Implementation
5.3 System Maintenance
-
7/31/2019 Handwriting VB
2/30
6. CONCLUSION
7. SCOPE FOR FURTHER ENHANCEMENT
8. BIBLIOGRAPHY
9. APPENDIX
A. Sample coding
B. Data Flow Diagram
C. Table Design
D. Screen Design
E. Reports
-
7/31/2019 Handwriting VB
3/30
SYNOPSIS
Off-line handwriting recognition
Off-line handwriting recognition involves the automatic conversion of text in an image
I(x,y) into letter codes which are usable within computer and text-processing applications. The data
obtained by this form is regarded as a static representation of handwriting. Handwriting
recognition entails optical character recognition. However, the classification of characters is just
one of the functions of a complete handwriting recognition system. A complete system needs to
preprocess the image, find a proper segmentation into character and find the most plausible words.
The technology is successfully used by businesses which process lots of handwritten
documents, like insurance companies. The quality of recognition can be substantially increased by
structuring the document (by using forms).
The proposed project is a digit & character recognition application (OCR or ICR
application). The image processing begins and recognizes the digit and returns the result.
Correlation matching algorithm for digit recognition and k-neighbor classifying algorithm to select
the true digit have been used. Database is used to include handwritten digit samples.
The project is developed in VB
The modules in this project are as follows
GUI Design
Machine Training
Character Matching Character recognition
Database List
-
7/31/2019 Handwriting VB
4/30
INRODUCTION
1.1 About the organisation
Inovot is one of the emerging software development and web development company building
powerful solutions and comprehensive software solutions to the clients who are keen in using the
technology.
Inovot with its solution service, takes on customized software development ranging from a
small turnkey application to an entire large-scale project management effort. Inovot spans a variety
of mission-critical industries, including projects in software R&D, implementing new ERP
solutions, modifying existing business applications, upgrading large database systems or
performing on-site or off-shore code maintenance and testing services.
Inovot specializes in customizing different application for the textile industries, Banks,
departmental stores, hospitals, educational institutions, etc. They have also developed a product for
Schools which could provide complete academic activities of the students.
In web site development area, inovot specializes in rich multimedia contents using flash and
joomla/php web sites.
Inovot is committed to providing services that customers need. Inovot is flexible enough to do
the work on-site, in custom labs near the client location or off-site.
-
7/31/2019 Handwriting VB
5/30
1.2 About the Project
Off-line handwriting recognition
Off-line handwriting recognition involves the automatic conversion of text in an image
I(x,y) into letter codes which are usable within computer and text-processing applications. The data
obtained by this form is regarded as a static representation of handwriting. Handwriting
recognition entails optical character recognition. However, the classification of characters is just
one of the functions of a complete handwriting recognition system. A complete system needs to
preprocess the image, find a proper segmentation into character and find the most plausible words.
The technology is successfully used by businesses which process lots of handwritten
documents, like insurance companies. The quality of recognition can be substantially increased by
structuring the document (by using forms).
The proposed project is a digit & character recognition application (OCR or ICR
application). The image processing begins and recognizes the digit and returns the result.
Correlation matching algorithm for digit recognition and k-neighbor classifying algorithm to select
the true digit have been used. Database is used to include handwritten digit samples.
The project is developed in VB
The modules in this project are as follows
GUI Design
Machine Training
Character Matching
Character recognition
Database List
-
7/31/2019 Handwriting VB
6/30
Modules
There are mainly three modules in this project. They are
GUI Design
This module deals with designing the user interface design using VB
Machine Training
This module includes training the system with various forms of characters and
digits. For the character and digit drawn a pattern is generated and stored and based on the
pattern generated during the training phase, the characters are recognized.
Character Matching
The verification work for the digits, which are going to verify, and the digits that
are stored in the database is done in this module. When a digits has to be identified the new
users digits are loaded into the system. The properties that uniquely identify the digits are
calculated for the equivalent digits can be identified. These values are compared with the
binary values of the digits and that are already stored in our database folder. The values that
approximately match with the current digits value is said to match with the input digits.
The values collected from the verification digit is compared with the values that are stored
in the database and if there is a match then that digits and its profile is displayed and if
there is no match then that result will be displayed.
Character recognition
In this module, the new character or digit is drawn and matched with the existing
ones in the database. The closest match is retrieved.
Database List
This module is used to storing a character and digits along with its details to the
database permanently .It also edits the database if any changes that the wants to store digits
binary in database.
-
7/31/2019 Handwriting VB
7/30
2.SYSTEM SPECIFICATION
2.1 Hardware Specification
Processor : Pentium IV
Clock Speed : 2 GHz
RAM : 512 MB
Hard disk Capacity : 80 GB
Floppy disk Capacity : 1.44 MB
Keyboard : 101 Keys
Mouse : Optical Mouse
2.2 Software Specification
Front End : VB
Operating System : Windows 2000/XP or above
-
7/31/2019 Handwriting VB
8/30
-
7/31/2019 Handwriting VB
9/30
ActiveX controls, which exist as separate files with a .ocx file name extension. These
include controls that are available in all editions of Visual Basic (DataCombo, DataList
controls, and so on) and those that are available only in the Professional and Enterprise
editions (such as Listview, Toolbar, Animation, and Tabbed Dialog). Many third-party
ActiveX controls are also available.
Note Controls with the .vbx file name extension use older technology and are found in
applications written in earlier versions of Visual Basic. When Visual Basic opens a project
containing a .vbx control, the default behavior is to replace the .vbx control with an .ocx
control, but only if an .ocx version of the control is available. See "Updating Older
Versions of Visual Basic Controls" later in this chapter for information on updating controls
to the .ocx format.
Insertable Objects, such as a Microsoft Excel Worksheet object containing a list of all your
company's employees, or a Microsoft Project Calendar object containing the scheduling
information for a project. Since these can be added to the toolbox, they can be considered
controls. Some of these objects also support Automation (formerly called OLE
Automation), which allows you to program another application's objects from within a
Visual Basic application. See "Programming with Objects," for more information on
Automation.
-
7/31/2019 Handwriting VB
10/30
3.SYSTEM STUDY AND ANALYSIS
3.1Existing System
Existing systems are less efficient in handling handwritten data. It cannot handle hand
drawn characters or digits. All data to be handled is only fed directly through keyboards digitally.
Hence digital characters only are recognized. Hand drawn digits and characters are only treated as
images and cannot be interpreted as characters.
3.2 Drawbacks of the Existing System
System do not have capability to recognize hand-written characters
Less user friendly
Accuracy is less as cannot recognize
Characters are considered as images and no differentiation between characters and images.
-
7/31/2019 Handwriting VB
11/30
3.3 Proposed System
The proposed system is to develop an application in VB that will recognize the hand drawn
characters and handle them. The application will first be trained for the specific characters and
converted to binary format. Then the application will use correlation algorithm and K neighbor
algorithm to arrive at the matching character and recognize it.
The following are the objectives and highlights of the proposed system.
No character input required through keyboard
Hand drawing of the character or digit is sufficient
Gives better recognition
Better accuracy
3.4 Need for proposed system
Existing systems are less efficient in handling handwritten data. It cannot handle hand
drawn characters or digits. All data to be handled is only fed directly through keyboards digitally.
Hence digital characters only are recognized. Hand drawn digits and characters are only treated as
images and cannot be interpreted as characters.
The proposed system is to develop an application in VB that will recognize the hand drawn
characters and handle them. The application will first be trained for the specific characters and
converted to binary format. Then the application will use correlation algorithm and K neighbor
algorithm to arrive at the matching character and recognize it.
-
7/31/2019 Handwriting VB
12/30
4.SYSTEM DESIGN AND DEVELOPMENT
4.1 Fesibility Study
Feasibility is a determination of whether or not a project worth doing. The process
followed in making this determination is called a feasibility analysis. This type of study
determines if a project can and should be done. When developing a system, it is necessary to
evaluate the feasibility of project at the earliest possible time. Unexpected technical problems and
timing problems can occur when poor problem definition is obtained. It is advisable to conduct
discussions regarding the analysis and design of the project before starting it.
The feasibility is made according to the three key considerations:
Operational feasibility
Technical feasibility
Economic feasibility
Behavioral feasibility
OPERATIONAL FEASIBILITY
The purpose of Operational Feasibility study is to determine whether the new system will
be used if it is developed and implemented or will there be resistance from the users that will take
the possible application benefits.
There was no difficulty in implementing, the system as the Centralized network
Management System is so effective and user-friendly. The users of the system are fully aware of
the internal working of the system. So the users will not be facing any crisis in the running system.
Thus the Centralized network Management System is found to be operationally feasible.
TECHNICAL FEASIBILITY
This is concerned with specifying equipment and software that will successfully satisfy the
user requirements. The technical needs of system may vary considerably, but include
-
7/31/2019 Handwriting VB
13/30
The facility to produce outputs in a given time.
Response time under certain conditions
Ability to process a certain volume of transaction at a stipulated speed.
ECONOMIC FEASIBILITY
Economic analysis is the most frequently technique for evaluating the effectiveness of a
proposed system. Most commonly known as cost/benefit analysis, the procedure is to determine
the benefits and savings that are expected from the proposed system and compare them with cost.
Here, in the proposed system the benefits and savings are found to be more when compared
to the overall cost that is to be incurred. As the proposed system is being developed in VB.net the
company is not forced to invest more on resources. Also the implementation and maintenance of
the system doesnt take much of the cost. The overall project cost is also normal as compared with
other system development.
BEHAVIORAL FEASIBILITY
Behavioral Feasibility is a determination of whether proposed system is secured or not. So,
the main purpose is the security level that is tent. The changes needed in the existing system are
some security and communication problem where it is overcome with the proposed system. Hence
it is accepted.
-
7/31/2019 Handwriting VB
14/30
4.2Database Design
Database design is required to manage large bodies of information. The management of data
involves both the definition of structure for the manipulation of information. In addition the data
base system must provide for the safety of the information handled despite. System crashes or due
to attempt at unauthorized access. For developing an efficient data base we have to fulfill certain
condition such as ;
Control redundancy
Easy to use
Data independence
Accuracy and integrity
Performance
For achieving the above criteria, we have to make use of various features available with
DBMS such forcing integrity constrains.
-
7/31/2019 Handwriting VB
15/30
4.3 Input Design
The input design is the link that ties the information system into the world of its users. It is
a process of converting user-originated inputs to a computer-based format. Input data are collected
and organized into a group of similar data. Once identified, appropriate input media are selected
for processing.
The goal of designing input data is to make entry easy, logical and free form errors. In
input data design, we design source document that capture the data and then select the media used
to enter them into the computer. The input forms are developed in a user-friendly way so that a
layman also can easily understand everything. Menus are provided to users and different icons aredesigned so the proposed system design looks decorative. Input design is the part of the overall
system design.
Source documents initiate a processing cycle as soon as they are entered into the system
through the keyboard. A source should be logical and easy to understand.
Objectives of Input Design:
1 To achieve the highest possible level of accuracy.
2 To ensure that the input is acceptable and understood by the user.
-
7/31/2019 Handwriting VB
16/30
4.4 Output Design
Output forms are also designed in a specific manner as per the user requirement. Results
are formatted to enhance clarity. Depending on the user the system would generate appropriate
output. The output forms are designed in such a way that the entire user required data is presented.
While designing an output, the system analyst must accomplish the following.
Determine what information to present
Decide whether to display, print or speak information and select the output medium.
Arrange the presentation of information in an acceptable form.
Decide how to distribute the output to intended users.
-
7/31/2019 Handwriting VB
17/30
5.SYSTEM TESTING AND IMPLEMENTATION
5.1 System Testing
Testing Methodologies
Testing is a process used to help identify the correctness, completeness and quality of
developed computer software. There are many approaches tosoftware testing, but effective testing
of complex products is essentially a process of investigation, not merely a matter of creating and
following rote procedure. One definition of testing is "the process of questioning a product in order
to evaluate it", where the "questions" are things the tester tries to do with the product, and the
product answers with its behavior in reaction to the probing of the tester.
The quality of theapplication can and normally does vary widely from system to system
but some of the common quality attributes include reliability, stability, portability, maintainability
and usability.
Testing objectives include
1. Testing is a process of executing a program with the intent of finding an error.
2. A goodtest case is one that has a high probability of finding an as yet undiscovered error.
3. A successful test is one that uncovers an as yet undiscovered error.
Testing should systematically uncover different classes of errors in a minimum amount of
time and with a minimum amount of effort. A secondary benefit of testing is that it demonstrates
that the software appears to be working as stated in the specifications. The data collected through
testing can also provide an indication of the software's reliability and quality. But, testing cannot
show the absence of defect -- it can only show that software defects are present.
Black box testing
Black box testing attempts to derive sets of inputs that will fully exercise all the functional
requirements of a system. It is not an alternative to white box testing. This type of testing attempts
to find errors in the following categories:
http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/types/Blackbox.asphttp://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/types/Blackbox.asphttp://www.onestoptesting.com/Introduction/ -
7/31/2019 Handwriting VB
18/30
1. incorrect or missing functions,
2. interface errors,
3. errors in data structures or external database access,
4. performance errors, and
5. initialization and termination errors.
White box testing
This testing is based on knowledge of the internal logic of an applications code. Also
known asGlass box Testing. Internal software and code working should be known for this type of
testing. Tests are based on coverage of code statements, branches, paths, conditions.White box
testing is a test case design method that uses the control structure of the procedural design to derive
test cases. Test cases can be derived that
1. Guarantee that all independent paths within a module have been exercised at least once.
2.Exercise all logical decisions on their true and false sides,
3. Execute all loops at their boundaries and within their operational bounds, and
4. Exercise internal data structuresto ensure their validity.
Quality Assurance
Generic risks
Security Technologies & Policies
A computer-base system is a combination of many assets or resources designed to perform some
function or to provide some services.Each of these assets is threatened by one or more of the
following unacceptable events:
Interruption
Disclosure
Removal
Destruction
Security Issues
http://www.onestoptesting.com/types/Whitebox.asphttp://www.onestoptesting.com/types/Whitebox.asphttp://www.onestoptesting.com/types/Whitebox.asphttp://www.onestoptesting.com/types/Whitebox.asphttp://www.onestoptesting.com/types/Whitebox.asp -
7/31/2019 Handwriting VB
19/30
The term security can be divided into four related issues
Security
Integrity
Privacy
Confidentiality
Authentication
In the system brief log on procedure for the customer was provided in order to enter and accessthe
system. This process is done in order to identify the valid user.
These attributes are stored in a table that cannot be easily trapped by unauthorized persons.
File protection
The various files and database tables are also highly secured in this system. The necessity for
securing the files and the table evolves because some persons who were not given authorization for
access may hacker files and corrupt the tables with wrong data which will response tremendous
hazards to the operations of the system. So in order to avoid these things,the data encryption
standards engine is attached to all files and database tables associated with the system,which will
facilitate encryption and decryption of files. Backup of the system are also taken as a preventive
measure.
5.2 System Implementation
Implementation is the stage of the project where the theoretical design is turned into a
working system. At this stage the main work load and the major impact on the existing system
shifts to the user department. If the implementation is not carefully planned and controlled, it cancause chaos and confusion.
Implementation includes all those activities that take place to convert from the old system
to the new one. The new system may be totally new, replacing an existing manual or automated
-
7/31/2019 Handwriting VB
20/30
system or it may be a major modification to an existing system. Proper implementation is essential
to provide a reliable system to meet the organization requirements.
The process of putting the developed system in actual use is called system implementation.
The system can be implemented only after thorough testing is done and it is found to be working
according to the specifications. The system personnel check the feasibility of the system. The most
crucial stage is achieving a new successful system and giving confidence on the new system for the
user that it will work efficiently and effectively. It involves careful planning, investigation of the
current system and its constraints on implementation. The system implementation has three main
aspects. They are education and training, system testing and changeover.
The implementation stage involves following tasks.
Careful planning
Investigation of system and constraints
Design of methods to achieve the changeover.
Training of the staff in the changeover phase
Evaluation of the changeover method
Implementation Procedures
Implementation of software refers to the final installation of the package in its real
environment, to the satisfaction of the intended users and the operation of the system. The people
are not sure that the software is meant to make their job easier. In the initial stage they doubt about
the software but we have to ensure that the resistance does not build up as one has to make sure
that.
The active user must be aware of the benefits of using the system
Their confidence in the software built up
-
7/31/2019 Handwriting VB
21/30
Proper guidance is impaired to the user so that he is comfortable in using the
application
Before going ahead and viewing the system, the user must know that for viewing the result, the
server program should be running in the server. If the server object is not running on the server, theactual processes will not take place.
5.3 System Maintenance
The maintenance phase of the software cycle is the time in which software performs useful
work. After a system is successfully implemented, it should be maintained in a proper manner.
System maintenance is an important aspect in the software development life cycle. The need for
system maintenance is to make adaptable to the changes in the system environment. There may be
social, technical and other environmental changes, which affect a system which is being
implemented. Software product enhancements may involve providing new functional capabilities,
improving user displays and mode of interaction, upgrading the performance characteristics of the
system. So only thru proper system maintenance procedures, the system can be adapted to cope up
with these changes.
Software maintenance is of course, far more than finding mistakes. We may define
maintenance by describing four activities that are undertaken, after a product is released for use.
Corrective Maintenance
The first maintenance activity occurs because it is unreasonable to assume that software
testing will uncover all latent errors in a large software system. During the use of any large
program, errors will occur and be reported to the developer. The process that includes the diagnosis
and correction of one or more errors is called Corrective Maintenance.
Adaptive Maintenance
-
7/31/2019 Handwriting VB
22/30
The second activity that contributes to a definition of maintenance occurs because of the
rapid change that is encountered in every aspect of computing. Therefore Adaptive maintenance
termed as an activity that modifies software to properly interfere with a changing environment is
both necessary and commonplace.
Perceptive Maintenance
The third activity that may be applied to a definition of maintenance occurs when a
software package is successful. As the software is used, recommendations for new capabilities,
modifications to existing functions, and general enhancement are received from users. To satisfy
requests in this category, Perceptive maintenance is performed. This activity accounts for the
majority of all efforts expended on software maintenance.
Preventive Maintenance
The fourth maintenance activity occurs when software is changed to improve future
maintainability or reliability, or to provide a better basis for future enhancements. Often called
preventive maintenance, this activity is characterized by reverse engineering and re-engineering
techniques.
-
7/31/2019 Handwriting VB
23/30
-
7/31/2019 Handwriting VB
24/30
-
7/31/2019 Handwriting VB
25/30
-
7/31/2019 Handwriting VB
26/30
6.CONCLUSION
The Digit and Character Recognition is really a good start to identify the digits and
character through mouse draw events. Its interesting to draw the digits and characters in the
computer instead of typing. As far as the work done is considered, so far much care was given
about the user friendlines. The interface are designed and channeled in a mannaer that the users can
never make any mistake while using the application.For example while adding new record, users
cant go out without either saving or canceling the operation.Till they save or cancel the current
operation all other operation are blocked.
-
7/31/2019 Handwriting VB
27/30
7. SCOPE FOR FURTHER ENHANCEMENT
The growth of any organization leads to enhancements, in future the system can be
enhanced according to requirements. In order to become an effective system, the developed system
should provide room for improvement and enhancement.
The project entitled Hand Written Character and Digit Recognition helps to
recognize the digits and characters that are drawn with the help of mouse. This system is effective
in finding a digit and character.
In future, the application can be modified with additional features such as identifying a
word and a sentence. It can also be upgraded to identify Tamil fonts and signature of a person.
-
7/31/2019 Handwriting VB
28/30
8. BIBLIOGRAPHY
o Evangelos Petroustaos Mastering in Visual Basic 6.0, BPB Publication, Second
Edition, 1999.
o Gray Corncell, Visual Basic 6.0, TATA McGraw Hill Publication, 1999 Edition
o Roger Jennings, Database Developers guide with Visual basic 6.0, SAMS
Publications, First Edition , 1999.
o Roger S.Pressman, Software Engineering a Practitioners approach, MC
Graw Hill International Editions, Fourth Edition, 1997.
o Ellis M.Awad, System Analysis and design , Galgotia Publication, 1997
Edition .
-
7/31/2019 Handwriting VB
29/30
9.APPENDIX
B. System Flow Diagram
Hand Writing Recognition
Admin Module User Module
User Management
Input Digit/CharacterInput Digit/character to
recognise
Convert to machine pattern
Save to text file
Convert to machine pattern
Read the text file database
Perform K-Neighbour algorithm to
identify all matching digits and
characters
Perform Correlation algorithm to
identify the most matching digit or
character
Display identified digit or character Logoff
-
7/31/2019 Handwriting VB
30/30