pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Handwriting Recognition

Where space is limited, as with a PDA keyboard, typing can be slow and frustrating. Writing data into the PDA would obviously be a much more sensible idea, but the complexity involved in making handwriting recognition work is immense.

The problem is that vector, line-drawn shapes do not make words. So what is the difference between a drawing of a house and the word shape for wombat, for example? The human eye, of course, recognizes one as being a drawing and the other a word. There are two approaches a computer can take to resolvin the matter. The easy approach is the one taken by the Graffiti recognition system. It understands each letter shape as a unique pattern for that letter, and converts each shape to its corresponding letter. There’s no attempt at understanding words or context. To make it even easier, Graffiti uses some special character shapes which the user of the system has to learn.

The approach taken by Newton was much more ambitious. It attempted to read the user’s writing and convert it into words. It sought to learn the way the user wrote, based on some standard test scripts and some interactive tutorials. This approach becomes increasing effective as the system recognizes more and more of the user’s handwriting style. With Newton, it was possible to set up multiple user writing personalities, and thus it was important to always ensure that Newton always used the correct personality for a given user to avoid its knowledge base becoming polluted.

The apple was key to Newton, but sadly the Newton was a costly mistake for Apple. It will be remembered for the over-hype and for its bold, but ultimately unsuccessful attempt to solve the problem of handwriting recognition. The success of the Graffiti approach, on the other hand, was emulated by other developers. Communication Intelligence Corporation’s (CIC) Jot and ParaGraph’s CalliGrapher were two such systems commonly used by Windows CE and EPOC-based PDAs.

Originally, the Windows CE based Pocket PC platform provided two means of data entry, via a Soft Keyboard or – for those more comfortable with writing with a stylus – via the Letter Recognizer/Transcriber application. On selection of the former, a tablet of alphabetic characters appears in the familiar QWERTY format. The required characters are entered into the document window simply by tapping the required character with the stylus. The latter recognizes letters written with the stylus, supporting word recognition to speed data entry. It also allows complete words to be moved around using cut & paste.

The subsequent Pocket PC 2002 version added two new text input options: Block Recognizer, which accepts Palm-style Graffiti and Transcriber, which recognizes cursive script. Microsoft claims that the technology underlying the former is proprietary, and not licensed from Palm. Since the introduction of what amounts to a Graffiti emulator appears to be motivated by a desire to win market share from its rival, it would be surprising if this wasn’t true!

  • Handheld Organizer origins
  • Handheld Evolution
  • Palm Pilot
  • Handheld Operating Systems
  • Handwriting Recognition
  • Handheld Synchronization
  • Handheld Applications
  • Guide to UMPCs – Ultra Mobile Personal Computers

Filed Under: PDA's and Other Handhelds

Latest Articles

Getting the Most out of Windows 10 with Cortana

Have you ever wondered what it would be like to have your computer actually assist you? If you have Windows 10, it is possible with the new service called Cortana. This is a digital voice assistant that is much like Siri on the iPhone or Google Now. Cortana is a pretty cool app and this article will … [Read More...]

Windows Defence Counsel

Windows Defence Counsel If you've found this page, very likely you've been infected with Windows Defence Counsel. You must be wondering how something that can't even manage to spell defense correctly can cause so much trouble, we're right there with you. Generally speaking, Windows Defence Counsel … [Read More...]

Motherboard Memory Installation

Different types of memory need to be installed in different ways, so it's safest to refer to both your motherboard User's Manual and the documentation that came with the memory itself when doing this. In this case the memory is SDRAM packaged in a DIMM memory module. With many … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Redditors Talk About the Impact of AI on Freelance Writers

AI technology has had a huge impact on our lives. A 2023 survey by Pew Research found that 56% of people use AI at least once a day or once a week. … [Read More...]

11 Most Popular Books on Perl Programming

Perl is not the most popular programming language. It has only one million users, compared to 12 million that use Python. However, it has a lot of … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

European City Reveals Tragic Tale of Ryuk Computer Virus

The Ryuk computer virus is to blame the Jerez City Council having to make a journey back in time. This is the name of the computer virus that has … [Read More...]

Motherboard Fan

In this case, the motherboard has two fan pin headers in addition to the CPU fan, designated as follows: JP2: System fan JP15: Power … [Read More...]

How to Remove File Recovery

File Recovery Welcome! If you've made your way to this page, you've likely been infected with File Recovery. Infections of this kind are generally … [Read More...]

[footer_backtotop]

Copyright © 2025 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors