Handwriting VB

download Handwriting VB

of 30

Transcript of Handwriting VB

  • 7/31/2019 Handwriting VB

    1/30

    CONTENTS

    Sl No. Title Page No

    1. INRODUCTION

    1.1. About the Organization

    1.2. About the project

    2. SYSTEM SPECIFICAION

    2.1. Hardware Specification

    2.2. Software Specification

    2.3. Software Features

    3. SYSTEM STUDY AND ANALYSIS

    3.1 Existing System

    3.2 Drawbacks of existing system

    3.3 Proposed System

    3.4 Need of proposed system

    4. SYSTEM DESIGN AND DEVELOPMENT

    4.1. Feasibility Study

    4.2. Database Design

    4.3. Input Design

    4.4. Output Design

    5. SYSTEM TESTING AND IMPLEMENTATION

    5.1 System Testing

    5.2 System Implementation

    5.3 System Maintenance

  • 7/31/2019 Handwriting VB

    2/30

    6. CONCLUSION

    7. SCOPE FOR FURTHER ENHANCEMENT

    8. BIBLIOGRAPHY

    9. APPENDIX

    A. Sample coding

    B. Data Flow Diagram

    C. Table Design

    D. Screen Design

    E. Reports

  • 7/31/2019 Handwriting VB

    3/30

    SYNOPSIS

    Off-line handwriting recognition

    Off-line handwriting recognition involves the automatic conversion of text in an image

    I(x,y) into letter codes which are usable within computer and text-processing applications. The data

    obtained by this form is regarded as a static representation of handwriting. Handwriting

    recognition entails optical character recognition. However, the classification of characters is just

    one of the functions of a complete handwriting recognition system. A complete system needs to

    preprocess the image, find a proper segmentation into character and find the most plausible words.

    The technology is successfully used by businesses which process lots of handwritten

    documents, like insurance companies. The quality of recognition can be substantially increased by

    structuring the document (by using forms).

    The proposed project is a digit & character recognition application (OCR or ICR

    application). The image processing begins and recognizes the digit and returns the result.

    Correlation matching algorithm for digit recognition and k-neighbor classifying algorithm to select

    the true digit have been used. Database is used to include handwritten digit samples.

    The project is developed in VB

    The modules in this project are as follows

    GUI Design

    Machine Training

    Character Matching Character recognition

    Database List

  • 7/31/2019 Handwriting VB

    4/30

    INRODUCTION

    1.1 About the organisation

    Inovot is one of the emerging software development and web development company building

    powerful solutions and comprehensive software solutions to the clients who are keen in using the

    technology.

    Inovot with its solution service, takes on customized software development ranging from a

    small turnkey application to an entire large-scale project management effort. Inovot spans a variety

    of mission-critical industries, including projects in software R&D, implementing new ERP

    solutions, modifying existing business applications, upgrading large database systems or

    performing on-site or off-shore code maintenance and testing services.

    Inovot specializes in customizing different application for the textile industries, Banks,

    departmental stores, hospitals, educational institutions, etc. They have also developed a product for

    Schools which could provide complete academic activities of the students.

    In web site development area, inovot specializes in rich multimedia contents using flash and

    joomla/php web sites.

    Inovot is committed to providing services that customers need. Inovot is flexible enough to do

    the work on-site, in custom labs near the client location or off-site.

  • 7/31/2019 Handwriting VB

    5/30

    1.2 About the Project

    Off-line handwriting recognition

    Off-line handwriting recognition involves the automatic conversion of text in an image

    I(x,y) into letter codes which are usable within computer and text-processing applications. The data

    obtained by this form is regarded as a static representation of handwriting. Handwriting

    recognition entails optical character recognition. However, the classification of characters is just

    one of the functions of a complete handwriting recognition system. A complete system needs to

    preprocess the image, find a proper segmentation into character and find the most plausible words.

    The technology is successfully used by businesses which process lots of handwritten

    documents, like insurance companies. The quality of recognition can be substantially increased by

    structuring the document (by using forms).

    The proposed project is a digit & character recognition application (OCR or ICR

    application). The image processing begins and recognizes the digit and returns the result.

    Correlation matching algorithm for digit recognition and k-neighbor classifying algorithm to select

    the true digit have been used. Database is used to include handwritten digit samples.

    The project is developed in VB

    The modules in this project are as follows

    GUI Design

    Machine Training

    Character Matching

    Character recognition

    Database List

  • 7/31/2019 Handwriting VB

    6/30

    Modules

    There are mainly three modules in this project. They are

    GUI Design

    This module deals with designing the user interface design using VB

    Machine Training

    This module includes training the system with various forms of characters and

    digits. For the character and digit drawn a pattern is generated and stored and based on the

    pattern generated during the training phase, the characters are recognized.

    Character Matching

    The verification work for the digits, which are going to verify, and the digits that

    are stored in the database is done in this module. When a digits has to be identified the new

    users digits are loaded into the system. The properties that uniquely identify the digits are

    calculated for the equivalent digits can be identified. These values are compared with the

    binary values of the digits and that are already stored in our database folder. The values that

    approximately match with the current digits value is said to match with the input digits.

    The values collected from the verification digit is compared with the values that are stored

    in the database and if there is a match then that digits and its profile is displayed and if

    there is no match then that result will be displayed.

    Character recognition

    In this module, the new character or digit is drawn and matched with the existing

    ones in the database. The closest match is retrieved.

    Database List

    This module is used to storing a character and digits along with its details to the

    database permanently .It also edits the database if any changes that the wants to store digits

    binary in database.

  • 7/31/2019 Handwriting VB

    7/30

    2.SYSTEM SPECIFICATION

    2.1 Hardware Specification

    Processor : Pentium IV

    Clock Speed : 2 GHz

    RAM : 512 MB

    Hard disk Capacity : 80 GB

    Floppy disk Capacity : 1.44 MB

    Keyboard : 101 Keys

    Mouse : Optical Mouse

    2.2 Software Specification

    Front End : VB

    Operating System : Windows 2000/XP or above

  • 7/31/2019 Handwriting VB

    8/30

  • 7/31/2019 Handwriting VB

    9/30

    ActiveX controls, which exist as separate files with a .ocx file name extension. These

    include controls that are available in all editions of Visual Basic (DataCombo, DataList

    controls, and so on) and those that are available only in the Professional and Enterprise

    editions (such as Listview, Toolbar, Animation, and Tabbed Dialog). Many third-party

    ActiveX controls are also available.

    Note Controls with the .vbx file name extension use older technology and are found in

    applications written in earlier versions of Visual Basic. When Visual Basic opens a project

    containing a .vbx control, the default behavior is to replace the .vbx control with an .ocx

    control, but only if an .ocx version of the control is available. See "Updating Older

    Versions of Visual Basic Controls" later in this chapter for information on updating controls

    to the .ocx format.

    Insertable Objects, such as a Microsoft Excel Worksheet object containing a list of all your

    company's employees, or a Microsoft Project Calendar object containing the scheduling

    information for a project. Since these can be added to the toolbox, they can be considered

    controls. Some of these objects also support Automation (formerly called OLE

    Automation), which allows you to program another application's objects from within a

    Visual Basic application. See "Programming with Objects," for more information on

    Automation.

  • 7/31/2019 Handwriting VB

    10/30

    3.SYSTEM STUDY AND ANALYSIS

    3.1Existing System

    Existing systems are less efficient in handling handwritten data. It cannot handle hand

    drawn characters or digits. All data to be handled is only fed directly through keyboards digitally.

    Hence digital characters only are recognized. Hand drawn digits and characters are only treated as

    images and cannot be interpreted as characters.

    3.2 Drawbacks of the Existing System

    System do not have capability to recognize hand-written characters

    Less user friendly

    Accuracy is less as cannot recognize

    Characters are considered as images and no differentiation between characters and images.

  • 7/31/2019 Handwriting VB

    11/30

    3.3 Proposed System

    The proposed system is to develop an application in VB that will recognize the hand drawn

    characters and handle them. The application will first be trained for the specific characters and

    converted to binary format. Then the application will use correlation algorithm and K neighbor

    algorithm to arrive at the matching character and recognize it.

    The following are the objectives and highlights of the proposed system.

    No character input required through keyboard

    Hand drawing of the character or digit is sufficient

    Gives better recognition

    Better accuracy

    3.4 Need for proposed system

    Existing systems are less efficient in handling handwritten data. It cannot handle hand

    drawn characters or digits. All data to be handled is only fed directly through keyboards digitally.

    Hence digital characters only are recognized. Hand drawn digits and characters are only treated as

    images and cannot be interpreted as characters.

    The proposed system is to develop an application in VB that will recognize the hand drawn

    characters and handle them. The application will first be trained for the specific characters and

    converted to binary format. Then the application will use correlation algorithm and K neighbor

    algorithm to arrive at the matching character and recognize it.

  • 7/31/2019 Handwriting VB

    12/30

    4.SYSTEM DESIGN AND DEVELOPMENT

    4.1 Fesibility Study

    Feasibility is a determination of whether or not a project worth doing. The process

    followed in making this determination is called a feasibility analysis. This type of study

    determines if a project can and should be done. When developing a system, it is necessary to

    evaluate the feasibility of project at the earliest possible time. Unexpected technical problems and

    timing problems can occur when poor problem definition is obtained. It is advisable to conduct

    discussions regarding the analysis and design of the project before starting it.

    The feasibility is made according to the three key considerations:

    Operational feasibility

    Technical feasibility

    Economic feasibility

    Behavioral feasibility

    OPERATIONAL FEASIBILITY

    The purpose of Operational Feasibility study is to determine whether the new system will

    be used if it is developed and implemented or will there be resistance from the users that will take

    the possible application benefits.

    There was no difficulty in implementing, the system as the Centralized network

    Management System is so effective and user-friendly. The users of the system are fully aware of

    the internal working of the system. So the users will not be facing any crisis in the running system.

    Thus the Centralized network Management System is found to be operationally feasible.

    TECHNICAL FEASIBILITY

    This is concerned with specifying equipment and software that will successfully satisfy the

    user requirements. The technical needs of system may vary considerably, but include

  • 7/31/2019 Handwriting VB

    13/30

    The facility to produce outputs in a given time.

    Response time under certain conditions

    Ability to process a certain volume of transaction at a stipulated speed.

    ECONOMIC FEASIBILITY

    Economic analysis is the most frequently technique for evaluating the effectiveness of a

    proposed system. Most commonly known as cost/benefit analysis, the procedure is to determine

    the benefits and savings that are expected from the proposed system and compare them with cost.

    Here, in the proposed system the benefits and savings are found to be more when compared

    to the overall cost that is to be incurred. As the proposed system is being developed in VB.net the

    company is not forced to invest more on resources. Also the implementation and maintenance of

    the system doesnt take much of the cost. The overall project cost is also normal as compared with

    other system development.

    BEHAVIORAL FEASIBILITY

    Behavioral Feasibility is a determination of whether proposed system is secured or not. So,

    the main purpose is the security level that is tent. The changes needed in the existing system are

    some security and communication problem where it is overcome with the proposed system. Hence

    it is accepted.

  • 7/31/2019 Handwriting VB

    14/30

    4.2Database Design

    Database design is required to manage large bodies of information. The management of data

    involves both the definition of structure for the manipulation of information. In addition the data

    base system must provide for the safety of the information handled despite. System crashes or due

    to attempt at unauthorized access. For developing an efficient data base we have to fulfill certain

    condition such as ;

    Control redundancy

    Easy to use

    Data independence

    Accuracy and integrity

    Performance

    For achieving the above criteria, we have to make use of various features available with

    DBMS such forcing integrity constrains.

  • 7/31/2019 Handwriting VB

    15/30

    4.3 Input Design

    The input design is the link that ties the information system into the world of its users. It is

    a process of converting user-originated inputs to a computer-based format. Input data are collected

    and organized into a group of similar data. Once identified, appropriate input media are selected

    for processing.

    The goal of designing input data is to make entry easy, logical and free form errors. In

    input data design, we design source document that capture the data and then select the media used

    to enter them into the computer. The input forms are developed in a user-friendly way so that a

    layman also can easily understand everything. Menus are provided to users and different icons aredesigned so the proposed system design looks decorative. Input design is the part of the overall

    system design.

    Source documents initiate a processing cycle as soon as they are entered into the system

    through the keyboard. A source should be logical and easy to understand.

    Objectives of Input Design:

    1 To achieve the highest possible level of accuracy.

    2 To ensure that the input is acceptable and understood by the user.

  • 7/31/2019 Handwriting VB

    16/30

    4.4 Output Design

    Output forms are also designed in a specific manner as per the user requirement. Results

    are formatted to enhance clarity. Depending on the user the system would generate appropriate

    output. The output forms are designed in such a way that the entire user required data is presented.

    While designing an output, the system analyst must accomplish the following.

    Determine what information to present

    Decide whether to display, print or speak information and select the output medium.

    Arrange the presentation of information in an acceptable form.

    Decide how to distribute the output to intended users.

  • 7/31/2019 Handwriting VB

    17/30

    5.SYSTEM TESTING AND IMPLEMENTATION

    5.1 System Testing

    Testing Methodologies

    Testing is a process used to help identify the correctness, completeness and quality of

    developed computer software. There are many approaches tosoftware testing, but effective testing

    of complex products is essentially a process of investigation, not merely a matter of creating and

    following rote procedure. One definition of testing is "the process of questioning a product in order

    to evaluate it", where the "questions" are things the tester tries to do with the product, and the

    product answers with its behavior in reaction to the probing of the tester.

    The quality of theapplication can and normally does vary widely from system to system

    but some of the common quality attributes include reliability, stability, portability, maintainability

    and usability.

    Testing objectives include

    1. Testing is a process of executing a program with the intent of finding an error.

    2. A goodtest case is one that has a high probability of finding an as yet undiscovered error.

    3. A successful test is one that uncovers an as yet undiscovered error.

    Testing should systematically uncover different classes of errors in a minimum amount of

    time and with a minimum amount of effort. A secondary benefit of testing is that it demonstrates

    that the software appears to be working as stated in the specifications. The data collected through

    testing can also provide an indication of the software's reliability and quality. But, testing cannot

    show the absence of defect -- it can only show that software defects are present.

    Black box testing

    Black box testing attempts to derive sets of inputs that will fully exercise all the functional

    requirements of a system. It is not an alternative to white box testing. This type of testing attempts

    to find errors in the following categories:

    http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/types/Blackbox.asphttp://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/Introduction/http://www.onestoptesting.com/types/Blackbox.asphttp://www.onestoptesting.com/Introduction/
  • 7/31/2019 Handwriting VB

    18/30

    1. incorrect or missing functions,

    2. interface errors,

    3. errors in data structures or external database access,

    4. performance errors, and

    5. initialization and termination errors.

    White box testing

    This testing is based on knowledge of the internal logic of an applications code. Also

    known asGlass box Testing. Internal software and code working should be known for this type of

    testing. Tests are based on coverage of code statements, branches, paths, conditions.White box

    testing is a test case design method that uses the control structure of the procedural design to derive

    test cases. Test cases can be derived that

    1. Guarantee that all independent paths within a module have been exercised at least once.

    2.Exercise all logical decisions on their true and false sides,

    3. Execute all loops at their boundaries and within their operational bounds, and

    4. Exercise internal data structuresto ensure their validity.

    Quality Assurance

    Generic risks

    Security Technologies & Policies

    A computer-base system is a combination of many assets or resources designed to perform some

    function or to provide some services.Each of these assets is threatened by one or more of the

    following unacceptable events:

    Interruption

    Disclosure

    Removal

    Destruction

    Security Issues

    http://www.onestoptesting.com/types/Whitebox.asphttp://www.onestoptesting.com/types/Whitebox.asphttp://www.onestoptesting.com/types/Whitebox.asphttp://www.onestoptesting.com/types/Whitebox.asphttp://www.onestoptesting.com/types/Whitebox.asp
  • 7/31/2019 Handwriting VB

    19/30

    The term security can be divided into four related issues

    Security

    Integrity

    Privacy

    Confidentiality

    Authentication

    In the system brief log on procedure for the customer was provided in order to enter and accessthe

    system. This process is done in order to identify the valid user.

    These attributes are stored in a table that cannot be easily trapped by unauthorized persons.

    File protection

    The various files and database tables are also highly secured in this system. The necessity for

    securing the files and the table evolves because some persons who were not given authorization for

    access may hacker files and corrupt the tables with wrong data which will response tremendous

    hazards to the operations of the system. So in order to avoid these things,the data encryption

    standards engine is attached to all files and database tables associated with the system,which will

    facilitate encryption and decryption of files. Backup of the system are also taken as a preventive

    measure.

    5.2 System Implementation

    Implementation is the stage of the project where the theoretical design is turned into a

    working system. At this stage the main work load and the major impact on the existing system

    shifts to the user department. If the implementation is not carefully planned and controlled, it cancause chaos and confusion.

    Implementation includes all those activities that take place to convert from the old system

    to the new one. The new system may be totally new, replacing an existing manual or automated

  • 7/31/2019 Handwriting VB

    20/30

    system or it may be a major modification to an existing system. Proper implementation is essential

    to provide a reliable system to meet the organization requirements.

    The process of putting the developed system in actual use is called system implementation.

    The system can be implemented only after thorough testing is done and it is found to be working

    according to the specifications. The system personnel check the feasibility of the system. The most

    crucial stage is achieving a new successful system and giving confidence on the new system for the

    user that it will work efficiently and effectively. It involves careful planning, investigation of the

    current system and its constraints on implementation. The system implementation has three main

    aspects. They are education and training, system testing and changeover.

    The implementation stage involves following tasks.

    Careful planning

    Investigation of system and constraints

    Design of methods to achieve the changeover.

    Training of the staff in the changeover phase

    Evaluation of the changeover method

    Implementation Procedures

    Implementation of software refers to the final installation of the package in its real

    environment, to the satisfaction of the intended users and the operation of the system. The people

    are not sure that the software is meant to make their job easier. In the initial stage they doubt about

    the software but we have to ensure that the resistance does not build up as one has to make sure

    that.

    The active user must be aware of the benefits of using the system

    Their confidence in the software built up

  • 7/31/2019 Handwriting VB

    21/30

    Proper guidance is impaired to the user so that he is comfortable in using the

    application

    Before going ahead and viewing the system, the user must know that for viewing the result, the

    server program should be running in the server. If the server object is not running on the server, theactual processes will not take place.

    5.3 System Maintenance

    The maintenance phase of the software cycle is the time in which software performs useful

    work. After a system is successfully implemented, it should be maintained in a proper manner.

    System maintenance is an important aspect in the software development life cycle. The need for

    system maintenance is to make adaptable to the changes in the system environment. There may be

    social, technical and other environmental changes, which affect a system which is being

    implemented. Software product enhancements may involve providing new functional capabilities,

    improving user displays and mode of interaction, upgrading the performance characteristics of the

    system. So only thru proper system maintenance procedures, the system can be adapted to cope up

    with these changes.

    Software maintenance is of course, far more than finding mistakes. We may define

    maintenance by describing four activities that are undertaken, after a product is released for use.

    Corrective Maintenance

    The first maintenance activity occurs because it is unreasonable to assume that software

    testing will uncover all latent errors in a large software system. During the use of any large

    program, errors will occur and be reported to the developer. The process that includes the diagnosis

    and correction of one or more errors is called Corrective Maintenance.

    Adaptive Maintenance

  • 7/31/2019 Handwriting VB

    22/30

    The second activity that contributes to a definition of maintenance occurs because of the

    rapid change that is encountered in every aspect of computing. Therefore Adaptive maintenance

    termed as an activity that modifies software to properly interfere with a changing environment is

    both necessary and commonplace.

    Perceptive Maintenance

    The third activity that may be applied to a definition of maintenance occurs when a

    software package is successful. As the software is used, recommendations for new capabilities,

    modifications to existing functions, and general enhancement are received from users. To satisfy

    requests in this category, Perceptive maintenance is performed. This activity accounts for the

    majority of all efforts expended on software maintenance.

    Preventive Maintenance

    The fourth maintenance activity occurs when software is changed to improve future

    maintainability or reliability, or to provide a better basis for future enhancements. Often called

    preventive maintenance, this activity is characterized by reverse engineering and re-engineering

    techniques.

  • 7/31/2019 Handwriting VB

    23/30

  • 7/31/2019 Handwriting VB

    24/30

  • 7/31/2019 Handwriting VB

    25/30

  • 7/31/2019 Handwriting VB

    26/30

    6.CONCLUSION

    The Digit and Character Recognition is really a good start to identify the digits and

    character through mouse draw events. Its interesting to draw the digits and characters in the

    computer instead of typing. As far as the work done is considered, so far much care was given

    about the user friendlines. The interface are designed and channeled in a mannaer that the users can

    never make any mistake while using the application.For example while adding new record, users

    cant go out without either saving or canceling the operation.Till they save or cancel the current

    operation all other operation are blocked.

  • 7/31/2019 Handwriting VB

    27/30

    7. SCOPE FOR FURTHER ENHANCEMENT

    The growth of any organization leads to enhancements, in future the system can be

    enhanced according to requirements. In order to become an effective system, the developed system

    should provide room for improvement and enhancement.

    The project entitled Hand Written Character and Digit Recognition helps to

    recognize the digits and characters that are drawn with the help of mouse. This system is effective

    in finding a digit and character.

    In future, the application can be modified with additional features such as identifying a

    word and a sentence. It can also be upgraded to identify Tamil fonts and signature of a person.

  • 7/31/2019 Handwriting VB

    28/30

    8. BIBLIOGRAPHY

    o Evangelos Petroustaos Mastering in Visual Basic 6.0, BPB Publication, Second

    Edition, 1999.

    o Gray Corncell, Visual Basic 6.0, TATA McGraw Hill Publication, 1999 Edition

    o Roger Jennings, Database Developers guide with Visual basic 6.0, SAMS

    Publications, First Edition , 1999.

    o Roger S.Pressman, Software Engineering a Practitioners approach, MC

    Graw Hill International Editions, Fourth Edition, 1997.

    o Ellis M.Awad, System Analysis and design , Galgotia Publication, 1997

    Edition .

  • 7/31/2019 Handwriting VB

    29/30

    9.APPENDIX

    B. System Flow Diagram

    Hand Writing Recognition

    Admin Module User Module

    User Management

    Input Digit/CharacterInput Digit/character to

    recognise

    Convert to machine pattern

    Save to text file

    Convert to machine pattern

    Read the text file database

    Perform K-Neighbour algorithm to

    identify all matching digits and

    characters

    Perform Correlation algorithm to

    identify the most matching digit or

    character

    Display identified digit or character Logoff

  • 7/31/2019 Handwriting VB

    30/30