A Senior Design Project Report: Hand Written Pattern Recognition Using Convolutional Neural Network
A Senior Design Project Report: Hand Written Pattern Recognition Using Convolutional Neural Network
NEURAL NETWORK
A Senior Design Project Report
Submitted to
Siksha 'O' Anusandhan University, Bhubaneswar
Department of Electrical & Electronics Engineering
Institute of Technical Education & Research, Bhubaneswar
In partial fulfillment of the requirement for the
AWARD OF DEGREE OF BACHELOR OF TECHNOLOGY IN
Electrical & Electronics Engineering
Submitted By
Name:- Shibani Khatua
(1641014201)
Shivani Kumari(1641014027)
1
CERTIFICATE
This is to certify that the project report entitled “Hand written pattern recognition using
convolutional neural network-” being submitted by Shibani Khatua& Shivani Kumari to the
Institute of Technical Education and Research, Siksha ‘O’ Anusandhan Deemed to be
University, Bhubaneswar for the partial fulfillment for the degree of Bachelor of Technology
inElectrical & Electronics Engineeringis a record of original bonafide work carried out by them
under our supervision and guidance. The project work, in our opinion, has reached the requisite
standard fulfilling the requirements for the degree of Bachelor ofTechnology.
TheresultscontainedinthisreporthavenotbeensubmittedinpartorfulltoanyotherUniversity or
Institute for the award of any degree ordiploma.
2
ACKNOWLEDGEMENT
We have taken efforts in this project. However, it would not have been possible without the kind
support and help of many individuals of our institution. Through this project work we have learnt a lot
about designing processes and considerations, which will help us infuture.
We would like to express our special thanks of gratitude to Mr. Mrutyunjaya Sahanifor his guidance
and support in completion of the project.
We are also very thankful to Mr. Mrutyunjaya Sahanifor his guidance in doing the calculation and
designing process throughout the project completion span.
We are grateful to Dr. N.Nayak, HOD Department of Electrical & Electronics Engineering for
allowing us to use all the facilities available in the college laboratories and library along with other
facilities, without which the completion of the project is impossible.
3
DECLARATION
We announce this composed accommodation speaks to our thoughts in our own words and
whereothers thoughts or words have been incorporated, we have enough referredto and referenced
the firstsources. We additionally pronounce that we have clung to all standards of scholastic
trustworthiness and respectability and have not distorted or manufactured or misrepresented any
thought/truth/source in our accommodation.
We comprehend that any infringement of the above will be cause for disciplinary activity by the
University and can likewise bring out reformatory activity from the sources which have therefore
not been appropriately referred to or from whom legitimate consent has not been taken when
required.
Place:Bhubaneswar
Date:-- 06.2020
4
REPORT APPROVAL
This project report entitled “Hand written pattern recognition using convolutional neural network“
By Mr. Mrutyunjaya Sahani group-11 section-B is approved for the degree of the Bachelor of Technology in
Electrical & Electronics Engineering
Examiners
Supervisor
Mrutyunjaya Sahani
Chairman
Place:Bhubaneswar
Date: June2020
5
ABSTRACT
Handwritten character recognition has been one of the active and challenging
research areas in the field of image processing and pattern recognition. A neural
network is a feed forward neural network used for classification and recognition of
which are reading aid for blind, bank cheques and conversion of any handwritten
characters for English alphabets without feature extraction using multilayer Feed
Forward neural network .Each character data set contains 26 alphabets .Fifty different
character data sets are used for training the neural network. In the proposed system,
each character has been resized into 30x20 pixels, which is directly subjected to
training. That is, each resized character has 600 pixels and these pixels are taken as
features for training the neural network . The results show that the proposed system
yields good recognition rates which are comparable to that of feature extraction based
6
TABLE OF CONTENTS
CONTENT Pages
12 Plagiarism 49
7
LIST OF FIGURES
22
1 BLOCK DIAGRAM OF TRADITIONAL
METHOD
BLOCK DIAGRAM OF MODERN 23
2 METHOD
BLOCK DIAGRAM OF 23
3 CONVOLUTIONAL NEURAL
NETWORK
BLOCK DIAGRAM OF WHOLE SYSTEM 24
4
OVERVIEW OF CONVOLUTIONAL 37
7 NEURAL NETWORK
ARCHITECTURE
OVERVIEW OF CONVOLUTIONAL
8 NEURAL NETWORK 39
FRAMEWORK
OVERVIEW OF CONVOLUTIONAL 39
9 NEURAL NETWORK
ARCHITURE OF THE 41
10 CONVOLUTIONAL NEURAL
NETWORK
CONTROL FLOW DIAGRAM 42
11
8
OVERVIEW OF ENCODING AND 44
12 DECODING LAYER
16 OVERVIEW OF CONVOLUTIONAL 46
NETWORK STRUCTURE
9
PROBLEM STATEMENT
The problem revolves around the data storage of handwritten and paper documents to
a memory disk where it can be used and edited as per the requirement. These days, the
scanning of documents by scanner does not produce accurate results in order to store
in a digital format and for this reason it takes a lot more time to type each single word
manually for the digital storage. Thus, one needs to find a different software , system
or algorithm which can detect these handwritten documents and can be converted to a
digital format along with storage can take place easily in memory devices for further
modifications .This solution could also help in maintaining the data and saving it for
Chapter 1
10
Introduction
11
has been given in table as multi-tiered model.
Table 1.2
12
1.3 Course results
The Course had been organized to such an extent that the under studies get the chance
to put his/her structure and assembling aptitude into utilization alongside the chance to
Outcom Description
Number
CO-1 Understand concepts of product design process.
CO-2 Work effectively in team to achieve a common goal.
CO-3 Gathering and analyzing customer needs for design of product.
CO-4 Decompose a product design problem into simpler sub problems for
analysis.
CO-5 Evaluate the quality, value and performance of
the product through benchmarking.
CO-6 Develop possible alternatives and selecting the best one for solving
the product function.
CO-7 Develop model and analyze it by various methods.
CO-8 Design for manufacturing and assembly a product by effective
methodology to reduce product cost.
CO-9 Develop the physical prototype and experiment it using
experimental techniques.
CO-10 Use design resources such as professional journals, trade journals,
catalogs, and the internet in project design for lifelong learning.
CO-11 Understand the global issues and social responsibility in product design.
CO-12 Discuss various socio-economic issues related to the developed
product.
CO-13 Understand professional code of ethics.
CO-14 Communicate effectively.
13
Table 1.3:- Course Outcomes
checkpoint A B C D E F G H I J K
1 Customer √ √
needs
recognitio
n
2 Function √ √
decompositio
n
3 Engineering √ √
specification
4 Product √ √
architecture
5 Concept √ √
generation
6 Concept √ √ √ √ √ √
selection
7 Product √ √
embodiment
8 Product √ √ √ √
metric model
9 DFM, DFA, √ √ √ √ √ √
DFE
10 Analysis and √ √ √ √ √
numerical
solution
Table 1,4:- Design checkpoint and student outcome
14
INTRODUCTION:-.
Hand written pattern are trouble-free to understand by humans being, as they have the
capability to learn. This capability has been feed to the machinery by artificial
intelligence and machine knowledge . And the field which deals with these pattern are
detecting, segmenting and identifying font from a picture .Its purpose is to transfer the
handwriting of the human being into machine programmed type. An ultimate purpose
of hand written character detection is to copy the human reading capabilities so that
manuscript Handwritten recognition has been one of the most interesting and
demanding in research areas in field of image processing and pattern recognition in the
modern days .It contribute enormously in the development of automation process and
improve the limit between human being and device in various application. Numerous
study works have been focusing on new techniques and methods that would decrease
recognition is mainly of two types online and offline. Online pattern recognition,
information is capture throughout the writing process with the aid of a particular pen
document. The scanned information are massive in size and many processing
applications as searching for a content, editing, maintenance are either rigid or not
possible.
The online mode of recognition is typically used to identify only human handwriting.
In this the handwriting is capture and store in digital form through different way.
Page 15
Generally, a particular pen is used in combination with an electronic surface. As the
pen moves across the surface, the two- dimensional coordinates of successive points
are represented as a function of time and are stored in order. The online handwriting
recognition has great potential to improve user and computer communication. Various
applications including mail sorting, bank processing, document reading and postal
the off-line handwriting recognition continues to be an active area for research towards
Page 16
Chapter 2
Direct Need- Direct use of pattern recognizer is in the field of medical science like biological and
biomedical imaging. Pattern recognition is used to extract meaningful features from given image sample
Latent Need – In library , there is a latent need of handwritten pattern recognizer so that the entries
Constant Need- In research area, laboratory, there is constant use of this method to extract the
important data.
Variable Need – There is variable need in Educational Institute like student detail analysis, project
evaluation, exams.
General Need – Postal address interpretation is the general need assigned at postal offices.
Addresses that are handwritten are of poor quality, these are encoded from the image of letters
Niche Need- There is several need in signal processing, image analysis and computer graphic and
Artificial intelligence
Questionnaire Method
Title
Customer name: SANJAY
AGARWAL
Occupation :Researcher in
laboratary
Address : SAKCHI ,UP
Q. 1 Does this method seem practical to you?
Q. 2 Are you satisfied with the procedure and the techniques used ?
Q. 3 Have you ever worked with this type of technology?
Q. 4 Do you think this method can save your labor?
Q. 5 Do you think this method can save your time?
Q. 6 Do you think there is no loss in this method?
Q. 7 Do you think the method is easy to use?
Q. 8 Is the method fulfilling the need?
Q. 9 Do you need any changes in the mechanism part?
Q.10 How is the accuracy compared to previous methods?
Q.11 Do you think any that its application is limited?
Q.12 Is this method is welfare for the society?
Q.13 Is the method is reliable?
Q.14 Is the maintenance procedure easy and for you?
Q.15 Do you think that is this method is environment friendly?
Interview Method
Easy to
handle
Highly
reduce
labour
Evaluation shows the best to worst (5-1). Following these weightage , we have to modify
our design.
Table 2.4: Prioritized Customer
Need (Weightage Calculation)
Serial Questions W 5 4 3 2 1 0
(
.No.
5-
1
)
1 Labor and time saving model 4 7 5 6 2 0 0
2 Time saving 3 4 3 6 3 3 1
3 Easy transportation. 4 5 8 6 1 0 0
4 Highly Durable product 3 5 4 3 3 4 1
5 Environment friendly 4 8 6 5 1 0 0
6 Less maintenance cost of the system 4 8 4 5 2 1 0
7 Accuracy 4 8 5 5 2 0 0
8 Easy to handle 3 2 5 3 4 3 3
5 is the maximum and 1 is the minimum weightage that a customer can rate.
If customer does not mention any thing then the rating is considered as0.
n1 + n2 + n3 + n4 + n5 +n6
Here n1,n2,n3,n4,n5,n6 = number of customers who gives the corresponding ratings to the product that is
5, 4, 3, 2, 1, 0 respectively. This helps us to identify the needs of the customers which is required to be
given prioritization. In the above method weightage(WT) is given by referring customers about each part
of the product and ask them to rate each function according to their need from 1 to 5 and then the average
importance of need is calculated as follows Example: Weightage calculation of Sl. No. 11is
Affordable price
Maintenance free
Easy to move
Long lasting
Chapter 3
Function Decomposition
TRADITIONAL METHOD
CHARACTER EXACTRACTION
INPUT
CHARACTER RECOGNITION
HANDWRITTEN
PATTERN
FEATURES EXTRACTION
OUTPUT
Page 22
MODERN METHOD
PRE-PROCESSING FEATURES
EXACTRACTION CLASSIFICATI
ON
SENSOR
OUTPUT
HANDWRITTEN
PATTERN
INPUT
CONVULUTIONAL
LAYER
POOLING LAYER
FULLY CONNECTED
LAYER
OUTPUT
Page 23
Chapter 4 Product Tear-down
INPUT
CONVOLUTION
AL NEURAL
LAYER
POOLING LAYER
DENSE LAYER
OUTPUT
It is the phase wherein we begin to take significant choices on how the Last item will
truly work. It starts the arrangement of powerful frameworks of the following system.
: Engineering Types
There are two kinds of designs: Product and Portfolio. Portfolio plans Relate to a
social event or gathering of things however thing models relate to express thing.
Philosophies for thing setup turn around the thing's business sector and execution.
Integral:- Essential thing models are physical structures where most of the sub
capacity illustrate.
The Team head has allocating various errands to various individuals and set the
Page 25
Task completed with alternative arrangement:
Task name Originally Reason Member,
assigned to for who
Non- complet
compl ed it
etion
multiple hidden layers. The hidden layers of a CNN typically consist of a series of
convolutional layers that convolve with a multiplication or other dot product. The
normalization layers, referred to as hidden layers because their inputs and outputs are
masked by the activation function and final convolution. Though the layers are
is technically a sliding dot product or cross Correlation. This has significance for the
indices in the matrix, in that it affects how weight is determined at a specific index
point.
Page 26
CONVOLUTIONAL LAYER
When programming a CNN, the input is a tensor with shape (number of images) x
(image width) x (image height) x (image depth). Then after passing through a
convolutional layer, the image becomes abstracted to a feature map, with shape
(number of images) x (feature map width) x (feature map height) x (feature map
Channels). A convolutional layer within a neural network should have the following
attributes:
The depth of the Convolution filter (the input channels) must be equal to the
POOLING LAYER
Convolutional networks may include local or global pooling layers to streamline the
combining the outputs of neuron clusters at one layer into a single neuron in the next
layer. Local pooling combines small clusters, typically 2 x 2. Global pooling acts on
all the neurons of the convolutional layer. In addition, pooling may compute a max or
an average. Max pooling uses the maximum value from each of a cluster of neurons at
the prior layer. Average pooling uses the average value from each of a cluster of
Fully connected layers connect every neuron in one layer to every neuron in another
network (MLP). The flattened matrix goes through a full layer to classify the images.
CONSTRUCTING THE ARCHITECTURE OF NETWORK
Neural networks with multiple hidden layers can be useful for solving classification
Problems with complex data, such as images. Each layer can learn features at a
different level of abstraction. However, training neural networks with multiple hidden
layers can be difficult in practice. One way to effectively train a neural network with
multiple layers is by training one Layer at a time. You can achieve this by training a
special type of network also known as an autoencoder for each desired hidden layer.
This experiment focuses on how to train a neural network with two hidden layers to
Classify digits in images. First, you train the hidden layers individually in an
unsupervised fashion using encoding and decoding under the hidden layers. Then you
train a final softmax layer, and join the layers together to form a stacked network,
DATASET
Concept generation enables the team by giving a platform to apply their ideas in order
has assigning different task to different members of the Group and set the timeline for
played an important role in the storage and in the recovery of critical handwriting
Information. This handwritten recognition ensured an accurate medical care and it also
reduced storage costs. It ensured that an essential field of research remains available to
there like National ID number recognition, postal office automation with code number
time.
TRADITIONAL TECHNIQUES
CHARACTER EXACTRACTION
CHARACTER RECOGNITION
FEATURES EXTRACTION
MODERN TECHNIQUES
ONLINE RECOGNITION
PRE-PROCESSING
FEATURES EXTRACTION
CLASSIFICATION
Chapter 7
Concept Selection
research area of pattern recognition due to vast applications and ambiguity in the of
recognition and feature extraction are required based on some classification algorithm
for handwritten pattern recognition. Previous schemes exhibit lack of high accuracy
and low computational speed for handwritten pattern recognition process. The aim of
the proposed attempt was to make the path toward digitalization should be clearer and
provide high accuracy and faster computational for recognizing the handwritten
pattern.
layers for recognizing (encoding and decoding) and classifying the given input to a
better output. As classifier, MNIST as dataset with suitable parameters for training
and testing and deep learning framework for handwritten pattern recognition. The
which is higher than formerly proposed schemes. In addition, the proposed system
reduces computational time significantly for training and testing due to which
The name “convolutional neural network” indicates that the network employs a
Operation. Convolutional networks are simply neural networks that use convolution in
This stage means to change item ideas and structures into acknowledged Frameworks.
These frameworks must fulfill client needs, be vigorous concerning all natural and
The task for this work has been divided among the group members.
which memorizes the features of input image which covers its entire region during
scanning through vertical and horizontal sliding filters. It adds a bias for every region
followed by evaluation of scalar product of both filter values and image regions. For
At second, there comes pooling layer which is also called as max pooling layer or sub
Sampling. In pooling layer (PL), shrinkage in the volume of data takes place for the
easier and faster network computation. Max pooling and average pooling are main
tools for implementing pooling .This layer obtains maximum value or average value
for each region of the input data by applying vertical and horizontal sliding filters
At last, there is fully connected layer after convolution and pooling layer in the
standard neural network (separate neuron for each pixel) which is comprised of n
For example, There are ten neurons for ten classes (0–9) in digit character
connections and parameters. Therefore, to train the network with very less amount
Page 35
only few set of parameters are needed for training of the system. So, convolutional
neural network is the key solution capable map correctly datasets for both input
and output by varying the trainable parameters and numbers of hidden layers with
with deep learning framework had been considered as the best fit for the character
recognition from the handwritten pattern images. For the experiments and the
is utilized.
Page 36
Chapter 9
Analytical and Numerical Model
Solutions
The idea is hypothetically broken down, with the goal that numerous setups might be
The errand for this work has been separated among the gathering individuals. The Team
head has doling out various assignments to various individuals and set the timetable for
THEORETICAL ANALYSIS
encoding layer and a decoding layer for the system function where output units are
directly connected back to input units that shown in Figure 1. The proposed sparse
neural network was trained on the 𝑋𝑛𝑙 raw inputs , 𝑋𝑚𝑙 hidden layer and output layer
Page 37
𝑌𝑛𝑙 where n is number of inputs or outputs neuron and m is number of hidden neuron
and l is number of sparse neural network . The output layer maps the input vector 𝐼𝑛𝑙
------------------------- (1)
Where, 𝑊𝑖𝑙 denote the parameters (or weights) associated with the connection
between input unit and hidden unit bm are a biases in hidden layer. S(v) is the sigmoid
formula.
The output layer 𝑌𝑛𝑙 has the same number of units with the input layer and defined by
a power series expansion equation. Where 𝑊j, denote the parameters (or weights)
associated with the connection between hidden unit and output unit.bn are the biases in
Page 38
STACKED NETWORK
We introduce the design of digit-level stacked layered network for digits classification.
The first sparse network structure contains the input layer 𝑋𝑛𝑙 to learn primary
features on the raw input that illustrated in below figure. The first sparse structure
produces the primary feature (I). The primary feature𝐻𝑚1 feeds the input layer into
the second trained sparse network that produce the secondary features (II). In below
figures focuses the primary features used as the raw input to next sparse network to
learn secondary features. Then, the secondary feature treat as input layer to a softmax
classifier to map secondary features to digit labels that shown in below figures.
Page 39
OVERALL STRUCTURE
Page 40
TRAINING
The training begins by a sparse neural network on the training data without using the
labels. An autoencoder is a neural network which attempts to replicate its input at its
output. Thus, the size of its input will be the same as the size of its output. Neural
networks have weights randomly initialized before training. Therefore the results from
After training the first sparse network, you train the second network in a similar way.
The main difference is that you use the features that were generated from the first
network as the training data in the second sparse network. Also, you decrease the size
Page 41
SOFTMAX LAYER
Train a softmax layer to classify the 50-dimensional feature vectors. Unlike the sparse
network, you train the softmax layer in a supervised fashion using labels for the
training data.
The formation of neural network takes place by the combination of all network layers
Page 42
FIG NO-22 OVERVIEW OF COMBINATIONAL STRUCTURE
With the full network formed, you can compute the results on the test set. To use this,
you have to reshape these into a matrix. It is done by stacking the columns of an image
Page 43
Chapter 10 Bill of materials
2 Image - - Rs 0/-
Segmentation
3 Feature Extraction - - Rs 0/-
Page 44
Chapter 11 Results
These are the required outputs by the given MATLAB code proposed by us and
Page 45
Page 46
Chapter 12
Conclusion
The aim of our project is to make an interface that can be used to recognize human
networks, so that we get a higher accuracy than the primitive method. Using modern
day techniques like neural networks to implement deep learning to solve basic tasks
which can be done within a blink of an eye by any human like text recognition is just
scratch the surface of the potential behind machine learning. There are vast
possibilities and use of this technology. Traditional optical character recognizer used
to work similar to biometric device .Photo sensor knowledge was used to gather the
match points of physical attributes and then convert it into database of identified types.
But with the help of recent techniques like convolution neural networks we are
capable of scanning and understand words with an accuracy never seen before in the
network are there like reading postal addresses, bank check amounts and forms.
(a) I should vigorously took part in meetings and share information with ideas.
(b) I must be enthusiastic.
(c) I should carefully work.
(d) I should respect other’s contribution.
(e) I must be dedicated to team goal.
(f) I should carry out the tasks through observing process and information.
REFERENCES:-
Page 47
Surya Nath R S M, Afseena “Handwritten Recognition- A review”,
International Journal of Scientific and Research Publication
Page 48
Page 49