Recognizing Hebrew alphabet of specific handwriting Introduction to Computational and Biological Vision 2010 By Rotem Dvir and Osnat Stein.

Slides:



Advertisements
Similar presentations
Don’t Type it! OCR it! How to use an online OCR..
Advertisements

Lex -- a Lexical Analyzer Generator (by M.E. Lesk and Eric. Schmidt) –Given tokens specified as regular expressions, Lex automatically generates a routine.
The Binary Numbering Systems
Room Locator Yehia Khoja Vinayak Gokahle Aabhas Sharma.
Handwritten Character Recognition Using Artificial Neural Networks Shimie Atkins & Daniel Marco Supervisor: Johanan Erez Technion - Israel Institute of.
Prénom Nom Document Analysis: Segmentation & Layout Analysis Prof. Rolf Ingold, University of Fribourg Master course, spring semester 2008.
1 The Information School of the University of Washington Nov 6fit more-digital © 2006 University of Washington Digital Information INFO/CSE 100,
BRETT GIPSON PRESENTS CHAPTER 5. DESCRIBE INPUT Input devices translate words, sounds, images and actions that people understand into symbols that the.
CS 376b Introduction to Computer Vision 04 / 14 / 2008 Instructor: Michael Eckmann.
Input and Outputs Leslie Flores. What is an Input? Input consists of data and instructions. Input devices translate what people understand into a form.
CSE1301 Computer Programming: Lecture 29 Group Project: “Quabble”
Complete the below… Input Complete the below… Processing Input Complete the below…
Chapter 7 Input and Output.
1 Turing Machines. 2 A Turing Machine Tape Read-Write head Control Unit.
04/05/031 Computer Input and Output Dairne Jesperson Charles Darwin University.
ChartWare Product Tour. Upon Log-in, view all reminders. Items in red are past-due. Use this for “internal messaging”
ONLINE HANDWRITTEN GURMUKHI SCRIPT RECOGNITION AND ITS CHALLENGES R. K. SHARMA THAPAR UNIVERSITY, PATIALA.
Representing Information Digitally. Digitization Initially transforming data for computer use Assigning people social security numbers The creation of.
1 Grade Chapter  To know Parts of the computer, follow these steps as shown below:
Chapter 1 What is Programming? Lecture Slides to Accompany An Introduction to Computer Science Using Java (2nd Edition) by S.N. Kamin, D. Mickunas, E.
Lecture Objectives  To learn how to use a Huffman tree to encode characters using fewer bytes than ASCII or Unicode, resulting in smaller files and reduced.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. This work is licensed under the Creative.
CS151 Introduction to Digital Design
Machine Learning Introduction Study on the Coursera All Right Reserved : Andrew Ng Lecturer:Much Database Lab of Xiamen University Aug 12,2014.
CE06_PP07-1 What is Input? Any data or instructions used by a computer Input devices Hardware Keyboards Pointing devices Scanners Other devices Translates.
By Ian Jackman Davit Stepanyan.  User executed untested code.  The order in which statements were meant to be executed are different than the order.
Gili Werner. Motivation Detecting text in a natural scene is an important part of many Computer Vision tasks.
Presented By: ROLL No IMTIAZ HUSSAIN048 M.EHSAN ULLAH012 MUHAMMAD IDREES027 HAFIZ ABU BAKKAR096(06)
CS-498 Computer Vision Week 8, Day 3 Thresholding and morphological operators My thesis? 1.
Chapter 2: Variables, Functions, Objects, and Events JavaScript - Introductory.
Figure ground segregation in video via averaging and color distribution Introduction to Computational and Biological Vision 2013 Dror Zenati.
Gesture Recognition in a Class Room Environment Michael Wallick CS766.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
Lexical Analysis S. M. Farhad. Input Buffering Speedup the reading the source program Look one or more characters beyond the next lexeme There are many.
A New Operating Tool for Coding in Lossless Image Compression Radu Rădescu University POLITEHNICA of Bucharest, Faculty of Electronics, Telecommunications.
Sequencing The most simple type of program uses sequencing, a set of instructions carried out one after another. Start End Display “Computer” Display “Science”
TM Design Macro Language D and SD MA/CSSE 474 Theory of Computation.
Purpose of Operating System Monil Adhikari. Agenda Introduction Responsibilities of Operating System User Interfaces Command Line Interface Graphical.
Theory of computing, part 4. 1Introduction 2Theoretical background Biochemistry/molecular biology 3Theoretical background computer science 4History of.
Programming Introduction. What is a program? Computers cannot think for themselves, they can only follow instructions. A program is a set of instructions.
Quiz Week 8 Topical. Topical Quiz (Section 2) What is the difference between Computer Vision and Computer Graphics What is the difference between Computer.
بسم الله الرحمن الرحيم My Project Huffman Code. Introduction Introduction Encoding And Decoding Encoding And Decoding Applications Applications Advantages.
Essential components of the implementation are:  Formation of the network and weight initialization routine  Pixel analysis of images for symbol detection.
1 Introduction to Turing Machines
1 Turing Machines. 2 The Language Hierarchy Regular Languages Context-Free Languages ? ?
Pattern Matching With Don’t Cares Clifford & Clifford’s Algorithm Orgad Keller.
Text Reader And Typer Project By: Brandon Smith. What it does ● First, a picture containing text is used as an input. ● The program scans it for distinct.
Goal To use technology in a creative and responsible way to expand and express learning We follow NYS Technology Standards, NETS, ISTE, and Diocese of.
1 A Statistical Matching Method in Wavelet Domain for Handwritten Character Recognition Presented by Te-Wei Chiang July, 2005.
CSC-305 Design and Analysis of AlgorithmsBS(CS) -6 Fall-2014CSC-305 Design and Analysis of AlgorithmsBS(CS) -6 Fall-2014 Design and Analysis of Algorithms.
By: Shane Serafin.  What is handwriting recognition  History  Different types  Uses  Advantages  Disadvantages  Conclusion  Questions  Sources.
Advanced issues in Robotics and Programming Dr. Katerina G. Hadjifotinou Experimental Junior High School of the University of Macedonia.
How do you get here?
Optical Character Recognition
1 Usage of REST-GCA ZANG Zhenxiang
Bassem Makni SML 16 Click to add text 1 Deep Learning of RDF rules Semantic Machine Learning.
Input & Output Devices ASHIMA KALRA.
Microsoft Visual Basic 2005 BASICS
network of simple neuron-like computing elements
INFO/CSE 100, Spring 2005 Fluency in Information Technology
Thank You!! For More Information Visit: m/ Call to :
Pattern Recognition & Machine Learning
Number Systems Instructions, Compression & Truth Tables.
Computability Catch up last lecture. Turing machines. Variations
Input and Output devices in a Computer
Title Introduction: Discussion & Conclusion: Methods & Results:
University of Warith AL-Anbiya’a
Xiao-Yu Zhang, Shupeng Wang, Xiaochun Yun
PowerPoint Template.
Presentation transcript:

Recognizing Hebrew alphabet of specific handwriting Introduction to Computational and Biological Vision 2010 By Rotem Dvir and Osnat Stein

Motivation Usage of existing function on the text. Reprocessing and rearranging the text. Redesign the text. Combining the text with another document. Using other applications that require text files.

Goal Recognize handwritten Hebrew alphabet of specific handwriting, known in advance. When given a scanned image of an alphabetic letter, we would like to recognize this letter.

Chain code - reminder Absolute Relative

Generic Algorithm Input: scanned letter image. Output: Numerical chain code. Find black pixel to start the encoding from. While there is black pixel who wasn't visited: – Find a direction to continue. – Update chain code and mark the pixel as visited. – Move forward to the chosen pixel. Return chain code.

Question marks How to choose the beginning pixel? How to choose the next direction if there is more than one option? Which encoder to use? What to do if we reached dead-end, but there are still black pixels left?

In our project Three different approaches – Same beginning pixel – Encoder – Method for progressing – Dead end State machine

An easier problem Easier problem then recognize is to determine if an input letter is a specific target letter or not. cannot produce good results, as long as using chain codes as described before

Conclusions The chain code must describe the shape of the letter. For thin letters we had good results, but for regular letters it is much harder. Improvement Reduction

Questions…? Thank you!