OCR OF TEMPLE INSCRIPTIONS AND TRANSLATIONS IN DEVANAGARI SCRIPTS Final
OCR OF TEMPLE INSCRIPTIONS AND TRANSLATIONS IN DEVANAGARI SCRIPTS Final
OCR OF TEMPLE INSCRIPTIONS AND TRANSLATIONS IN DEVANAGARI SCRIPTS Final
Project Report
on
Bachelor of Engineering
in
Information Technology
to
Mayur Matsagar
Dhanshri Borse
Snehal Patil
Rushikesh Bhalerao
Jay Chavda
Under the Guidance of
CERTIFICATE
Mayur Matsagar
Dhanshri Borse
Snehal Patil
Rushikesh Bhalerao
Jay Chavda
We would like to express our deep gratitude and sincere thanks to all who helped us in
completing project report successfully. Many thanks to almighty God who gave us the
strength to do. Our sincere thanks to Prof. Dr. G. K. Patnaik, Principal for providing
the facilities to complete the Project report. We would like to express our gratitude and
appreciation to all who gave us the possibility to complete the report. A special thanks to
Dr. Manoj E. Patil, Associate Professor, Head of the Department, whose help, stimulating
suggestions and encouragement, helped us in writing the report. We would also like to thank
Mr.Pankaj Zope and Mr.Kunal Pawar, Associate Professor and Project Guide, who has given
his full effort in guiding us and achieving the goal as well as his encouragement to maintain
the progress in track. I am also sincerely thankful to Mr.Aakash D Waghmare, Assistant
Professor, Incharge of the Project, for his valuable suggestions and guidance. We would also
like to appreciate the guidance given by other supervisor which has improved our presentation
skills by their comments and tips. Last but not the least, We are extremely thankful to our
parents and friends without whom it could not reach its successful completion. Thank You.
Mayur Matsagar
Dhanshri Borse
Snehal Patil
Rushikesh Bhalerao
Jay Chavda
Acknowledgements ii
Abstract 1
1 Introduction 2
1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3 Problem Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.4 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.5 Objective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.6 Selection of Life Cycle Model for Development . . . . . . . . . . . . . . . . . 4
1.7 Organization of the report . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.8 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3 Analysis 14
3.1 Requirement Collection and Identification : . . . . . . . . . . . . . . . . . . 14
3.1.1 Eliciting Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.1.2 Analyzing Requirements . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.1.3 Recoding Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.2 Software Requirement Specification (SRS) : . . . . . . . . . . . . . . . . . . 15
4 Design 17
4.1 System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
4.2 Data Flow Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
4.3 UML Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
4.3.1 Use case Diagram : . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
4.3.2 Class Diagram: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
4.3.3 Sequence Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
4.3.4 Component Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
4.3.5 Deployment Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
4.3.6 Activity Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
4.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
5 Coding / Implementation 26
5.1 Algorithm/Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
5.2 Software and Hardware for development in detail . . . . . . . . . . . . . . . 26
5.2.1 Hardware Requirement . . . . . . . . . . . . . . . . . . . . . . . . . 26
5.2.2 Software Requirement : . . . . . . . . . . . . . . . . . . . . . . . . . . 27
5.3 Project Modules : . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
5.4 Summary : . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
6 Testing 28
6.1 Black Box Testing/White Box Testing . . . . . . . . . . . . . . . . . . . . . 28
6.1.1 Black Box Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
6.1.2 White Box Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
6.2 Manual/Automated Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
6.3 Test case identification and execution . . . . . . . . . . . . . . . . . . . . . . 30
6.4 Summary : . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
A 35
Bibliography 36
1.1Prototype model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.1 Project Scheduling Chart. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
4.1 System Architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
4.2 Data flow diagram. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
4.3 Use case Diagram. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
4.4 Class Diagram. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
4.5 Sequence Diagram. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22
4.6 Component Diagram. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
4.7 Deployment Diagram. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24
4.8 Activity Diagram. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
7.1 Home Page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
7.2 Translation Result. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . 32
Hindi is that the most usually auditory communication in India, with in more than three
hundred million speakers. As there’s no division between the characters of writings writ-
ten in Hindi as there’s in English, the Optical Character Recognition (OCR) frameworks
created for the Hindi language convey a poor recognition rate. During this paper we have
a tendency to propose AN OCR for written Hindi content in Devanagari script content,
utilizing Artificial Neural Network (ANN), that improves its productivity. one in every of
the numerous functions behind the poor recognition rate is mistake in character division.
The closeness of contacting characters within the examined records more entangles the divi-
sion procedure, creating an interesting issue once designing a compelling character division
methodology. Pre-processing, character division, embrace extraction; lastly, grouping and
recognition area unit the important advances that area unit pursued by a general OCR. The
pre-processing tasks thought of inside the paper conversion of gray scaled footage to binary
footage, image rectification, and segmentation of the document´s matter contents into para-
graphs, lines, words, thus at the extent of basic symbols. the basic symbols, obtained as
a result of the essential unit from the segmentation methodology, recognized by the neural
classifier. Neural Network is one in every of the foremost wide used and common techniques
for character recognition downside. This paper discusses the classification and recognition of
written Hindi Vowels and Consonants mistreatment Artificial Neural Networks. The vowels
and consonants in Hindi characters are often divided in to sub teams supported bound vital
characteristics for every cluster, a separate network is meant and trained to acknowledge the
characters that belong to it cluster. Keywords:-Artificial neural Newtwork(ANN)
Introduction
Optical Character Recognition (OCR) is an essential task for various applications, and nu-
merous approaches have been considered so far. Recently, the most widely used OCR models
are based on long short term memory-connectionist temporal classification (LSTM-CTC) [1]
or sequence to sequence (seq2seq) models with attention [2], which takes a sequence of slices
(narrow sub-images) as inputs and yields a sequence of recognition results. This approach al-
lows us to build an OCR system without explicit character segmentation. Also, it naturally
learns inter-character correlations by exploiting character-transition statistics. Therefore,
many current open source systems such as Tesseract [3] are based on this LSTM-CTC model
and provide the state-of-the-art performance in English recognition. However, the accuracy
of LSTM-based methods for other languages such as Chinese and Korean are not as high
as English. This is mainly because these kinds of languages have a large number of char-
acters compared to English; Chinese and Korean have thousands of character classes and
there are a huge number of possible cases even if we only consider pairwise combinations.
Therefore, unlike English, explicit character segmentation and individual character recogni-
tion are important for these types of languages. Based on these observations, we propose
a new multi-lingual OCR framework: We develop recognizers for individual languages and
incorporate them into a single framework in a globally optimized way
1.1 Background
Inscriptions are a great source to look back to ancient history and learn from it, discover
truths and may be secrets of life. Apart from the inscriptions in the country, there are
inscriptions in Sri Lanka and South East Asia, where we can find abundant inscriptions
in local languages, Sanskrit and Tamil In recent years, with the development of computer
sciences, computer technology has been applied to comprehensive fields. Language barriers is
one of the most important scenario. The web application has brought major changes all over
the world. We develop a web application which helps in providing the accurate translation
1.2 Motivation
One of the major problems OCR technology can help in solving is extracting data from
structured, unstructured documents, and hand-written documents, making it easy for orga-
nizations to automate the data entry or document digitization tasks. Other problems that
OCR technology helps in solving includes: OCR eliminates the chances of errors in data entry
task that usually arise while per- forming it manually. It helps in the identity verification of
individuals. In the verification process, OCR helps to extract the user information from their
identity document and match it with the one already provided by the user. OCR reduces the
time required to convert manual documents into digital form. In addition to time, the cost
of digitizing the docu- ments also reduces. Aside from all of these benefits, AI-based OCR
also known as intelligent OCR engines have the ability to automatically detect ad extract
the required information and fill-out those details in the digital copy of the document itself.
1.4 Scope
The scope of this product Optical character Recognition of temple inscription is to provide an
efficient and enhanced software tool for the users to perform inscription document image anal-
ysis, document processing by reading and recognizing the characters in research, academic,
governmental and business organizations that are having large pool of document.Irrespective
of he size of documents and the type of characters in documents, the product is recognizing
them, searching them and processing them faster according to the needs of the environment.
• Information of OCR can be readable with high degree of accuracy. Flatbed scanners
are very accurate and may produce reasonably top quality images.
• Processing of OCR information is fast. Large quantities of text are often input quickly.
is cheaper than paying someone amount to manually enter great deal of text data.
Moreover it takes less time to convert within the electronic form.
• To reduce paperwork.
The Prototyping Model is one of the most popularly used Software Development Life Cycle
Models (SDLC models).This model is used when the customers do not know the exact project
requirements beforehand. In this model, a prototype of the end product is first developed,
tested and refined as per customer feedback repeatedly till a final acceptable prototype is
achieved which forms the basis for developing the final product. The Prototyping Model is
one of the most popularly used Software Development Life Cycle Models (SDLC models).This
model is used when the customers do not know the exact project requirements beforehand.
In this model, a prototype of the end product is first developed, tested and refined as per
customer feedback repeatedly till a final acceptable prototype is achieved which forms the
basis for developing the final product.
• Integration and Testing: The objective of this phase is to perform system integra-
tion testing of the developed system. The systems integration test function is to ensure
that the developed systems meet all the technical requirements with the components
and subsystems integrated.
• Maintenance: The maintenance phase of the SDLC occurs after the product is in
full operation. Main- tenance of software can include software upgrades, repairs, and
fixes of the software if it breaks. Software applications often need to be upgraded or
integrated with new systems the customer deploys.
The chapter includes details regarding Feasibility study, Risk Analysis, Project Scheduling,
Effort Allocation and Cost Estimation as well as a short summary. Section 2.1 includes
details regarding feasibility that includes Operating, Economical and Technical feasibility.
Details regarding Risk Analysis like Commercial risks, Design risks and other risks as well
are discussed in Section 2.2. Section 2.3 provides explanation about Project Scheduling while
section 2.4 describes the effort allocation i.e effort taken by each group member. Section 2.5
provides information about cost estimation of the project.
• Modeling of VedAnuvad:
The modeling of proposed SGS requires a completely automated system, thus helping the
user retrieve the information as soon as possible. The backup plans are provided in the form
of the database helping avoiding data in case of catastrophic situations. Hence, the system
is reliable to perform in adverse situations. The system is scalable and can be expanded
and customized to meet the needs of the firms for which it will be implemented. Moreover,
the system provides a user-friendly interface with a realistic view. The system provides
search facilities to search a specific entry matching in the database, and this system consists
of an auditor as a supreme body to monitor the entire system’s performance. The system
consists of an administrator and a collector within whom the tasks can even be passed at
the time of encountering someone not proficient in handling the given task, and thus the
system works smoothly without further delays. Victim’s authentication is done beforehand
in order to avoid the nuisance which might arise in the manual system. The aim of the
proposed GRS (prototype in Fig. 2) is to address the issues present in the current system,
implement validation techniques (with respective stakeholders, as shown in Fig. 3) that will
help reduce the margin of error in operations, providing adequate data backup facilities in
order to ensure system restart even after a calamity and ensures consistency. It is a foolproof
system that simulates and replaces the present manual system.
• Is there sufficient support for the project from management from users? If the current
system is well liked and used to the extent that persons will not be able to see reasons
for change, there may be resistance.
• Are the current business methods acceptable to the user? If they are not, Users may
welcome a change that will bring about a more operational and useful systems.
• Have the users been involved in the planning and development of the project?
• early involvement reduces the chances of resistance to the system and in general and
increase the likelihood of successful project.
• Route Discovery:- Route discovery mechanism is discussed below. The steps for
route discovery are as follows:
• Reliability:-As tables are used for storing data, so reliability is maintained as exact
data is retrieved.
In our project technical feasibility is considered up to a great extent. The website is build
using Html, CSS, Java Script which is freely available. Thus the problem of non-availability
of software does not appear. The backend of the system PHP and MY SQL which is freeware
database. Proposed system has the capacity to hold the data. It also provides data security
by password protecting.
2.2 Analysis
Taking decision on an uncertain event or situation may or may not be successful, which
is what risk is about. Risk management not only prevents organizations from entering
a dangerous and uncertain territory, which could lead to a catastrophic failures, but also
ensure the development and growth of the business. The depth and clarity with which a risk
is defined is critical for risk management. In an event where an organization has a low risk
situation at hand and decides to postpone rather than resolve the issue involved for financial
or other reasons, the risk may eventually become a threat of moderate to high level and this
could prove to be disastrous for management.
• Commercial Risks:
• Risk: Privacy Security also possess significant challenges that the IT industry. The
privacy of data for every user is must and everyone want that security in the Due to
inconsistencies in augmented reality programming, oversight, and negligence, there is.
• Risk: These elements are driving attention from reality which may cause a less clear
or improper information getting from this portal.
• Design/Engineering Risks:
• Risk: Errors and design assumptions. Action to be taken: Use the expertise by project
coordinators.
• Other Risks:
• Risk: Co-ordination.
2.6 Summary :
In the chapter, all the details related to Project Planning and Management are mentioned.
In the next chapter, all the details regarding the requirements gathering and analysis are
presented.
Analysis
The chapter describes everything related to the requirement gathering and further analysis
such as hardware, software, functional and non-functional requirements. Also it has the
software requirements specification that provides complete description of the requirements of
the system. Section 3.1 describes requirement collection and identification. All the hardware
and software requirements are discussed in Section 3.2. Section 3.3 describes the functional
and non-functional requirements of the system to be developed. Section 3.4 describes the
Software Requirements Specification (SRS)
• Correctness
• Completeness
• Consistency
• unambiguous
• Modifiability
• Verifiability
• Traceability
4. HDD/SSD: Any
3.3 Summary :
In the chapter, Analysis was presented which included the hardware and software require-
ments, functional and non-functional requirements and the software requirements specifica-
tion (SRS) as well to give detail information about above points. In the next chapter, Design
is described along with various UML diagrams.
Design
System design provides the understanding and procedural details necessary for implement-
ing the system. Design is an activity concerned with making major decisions, often of a
structural nature.Software design is the rest of the three technical activities: designs, coding
and tests which are required to build and verify the software. Section 4.1 describes the Sys-
tem Architecture which includes. Description about the Data Flow Diagram is provided in
Section 4.2. Section 4.3 describes various UML diagrams related to the architecture. Section
4.4 provides a short summary.
• DFD Diagram
• Student will choose the domain in which he/she has problem and raise Complain about
the issues he finds.
• Teacher has to login through his login id and can view the complaints that has been
raised by the students.
• Later, the teachers can view the complaint details and takes further actions required
accordingly. Each complaint will have a definite time limit associated with it.
• Later, the teachers can view the complaint details and takes further actions required
accordingly. Each complaint will have a definite time limit associated with it.
• Firstly the complaint will issued to class teacher when the time limit gets over and the
teacher takes no action then the same complaint gets promoted to HOD and he/she also
takes no action then it will be promoted to Principal wherein a message is forwarded
to through the system. This makes it easier for the teachers to recognize that the
complaint is come from the Grievance System.
• The student gets the notification whether the complaint is IN PROCESS or it has been
CLOSED by the teachers ON Dashboard.
• Student needs to check the complaint status whereas a teacher needs to check the
complaint regularly to see whether new complaint has been filed or not.
4.4 Summary
In the chapter, design and system architecture 4.1,Data Flow Diagram 4.2 is described with
UML diagram 4.3,Use case diagram 4.3.1 and class diagram 4.3.2.
Coding / Implementation
Important phase in system development is the successful implementation of the new system
design. Implementation includes all those activities that take place to convert from the old
system to the new system.
This chapter mainly contains following sections: Section 5.1 Algorithm /Steps 5.2 de-
scribed Software and Hardware Requirements in details. Section 5.3 described the project
modules and Section 5.4 described Summary.
5.1 Algorithm/Steps
1. Input image.
6. Output.
4. HDD/SSD: Any.
5.4 Summary :
In this chapter, describe the Implementation details, Hardware and software requirements
in details, Modules of project and summary are presented. In the next chapter, Testing and
Test cases are presented.
Testing
Testing goes side by side with the implementation is aimed at ensuring the system works
accurately before the live operation is performed. The common view of testing held by the
user is to ensure they are no errors in a program. Testing usually means the process of
executing a program with explicit intention of handling errors. It depends on the process
and the associated stakeholders of the project.
The chapter mainly contains following sections:- Section 6.1 describes the Black Box
Testing. And the White Box Testing is described in the Section 6.2. Summery of the
chapter is described in the section 6.3.
4. Behavioral issues.
4. Expected output
6. Testing of each statement, object, and function on an individual basis done successfully
with expected outputs.
6.4 Summary :
In this Chapter, Testing of the project is described. In the next Chapter, Result of the
project s and Discussion about the project is described.
Result is a thing that is caused or produced by something else and also called as the con-
sequences and outcomes. Discussion is the action or process of talking about something in
order to reach a decision or to exchange ideas.
The organization of this Chapter is as follows. Section 7.1 represents the Result of the
Project. Discussion is described in Section 7.2. Finally, the last section 7.3 represents
Summary of this chapter.
7.1 Results :
Now here are the snapshot of Translation in Devanagari Scripts. In this section, we are
discussing through some of the snapshot of project.
Figure 7.1 shows the Home page as well as the first part which user has to be faced .It
also contains the VedAnuved upload Files and choose language which translate it.
8.1 Conclusion
• This work attempted at creating a universally applicable OCR system integrated with
audio output for ancient Maharashtra script.
• By using a CNN and Image Recognition techniques, an operable system was designed
for modern and ancient Maharashtra.
• The difference in the style of the ancient Maharashtra scripts from the modern Maha-
rashtra script posed as a challenge to execute the task efficiently .
• Multiple samples of ancient inscriptions from some historical temples were taken as
case studies to implement the developed methodology. An acceptable accuracy rate of
77.7was attained for these samples.
• We are trying to integrate speech to text and make in more efficient for users. 3.The
recognition of new font characters by the system is very easy and quick. 4.We are
trying to increase the accuracy near about 8013/16
Application is very simple to use . User have only emmulator. There is no any requirement
to any other installation process.
1. https://www.google.com/url?sa=tsource=webrct=jurl=https://www.irjet.net /archive/V8/i5/V
AOvVaw02qI 5konedx
2. https://www.geeksforgeeks.org/software-engineering-prototyping-model/
4. https://costmanagement.eu/blog-article/what-is-cost estimation-we-explain-it-to-you-
in- 4-steps
5. https://www.slideshare.net/miteshpatel414/complaint- management-system
6. https://www.chegg.com/homework-help/questions-and-answers/student-complaint-managemen
system-scms-scenario-student-actor-enters-details-order-regis- q26132437
7. https://creately.com/diagram/example/i1acnwpa1/grievance-redressal-system-
8. https://qdoc.tips/complaint-management-system-ppt-pdf-free.html