IOT BASED VECHICLE LICENSE TRACKING SYSTEM
DOI:
https://doi.org/10.61841/x1n3wc21Keywords:
Digital image processing, automatic traffic, Computer vision, Haar-like features, Cascade classifier, Vehicle detection, Traffic managementAbstract
In this examination work, we investigate the vehicle discovery method that can be utilized for traffic observation frameworks. This framework works with the coordination of CCTV cameras for recognizing the vehicles. Beginning advance will consistently be vehicle object discovery. Haar cascades are utilized for the recognition of vehicles in the film. The Viola Jones algorithm is utilized in preparing these course classifiers. We adjust it to discover one of a kind articles in the video by following every vehicle in a chosen district of intrigue. This is one of the quickest strategies to effectively distinguish, track, and tally a vehicle object with precision up to 78 percent.
Downloads
References
1. ManasiPatil, AanchalRawat, Prateek Singh, Srishtie Dixit, “Accident Detection and Ambulance Control using Intelligent Traffic Control System,” International Journal of Engineering Trends and Technology (IJETT), International Journal of Engineering Trends and Technology (IJETT).
2. V. Sagar Reddy, L. PadmaSree, and V. Naveen Kumar, “Design and Development of an Accelerometer-Based System for Driver Safety,” International Journal of Science, Engineering, and Technology Research (IJSETR), Volume 3, Issue 12, December 2014.
3. Krishna ChaitanyaVarma, Poornesh, TarunVarma, Harsha, “Automatic Vehicle Accident Detection and Messaging System Using GPS and GSM Modems,” in International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August 2013.
4. Apurva Mane, JaideepRana, “Vehicle Collision Detection and Remote Alarm Device Using Arduino,” International Journal of Current Engineering and Technology, Vol. 4, No. 3, June 2014.
5. Gamer, J.E., Lee, C.E., and Huang, L.R., “Detectors for Counting, Classifying, and Weighing Vehicles,” Center for Transportation Research, the University of Texas at Austin. Infrared,1990 3-10-88/0-1162.
6. P. Viola and M. M. J. Jones, “Robust Real-time FaceDetection,” Int. J. Comput. Vis., Vol. 57, No. 2, Pp. 137–154, 2004.
7. A. Mordvintsev, “OpenCV-Python Tutorial Documentation,” in Release Beta, 2017.
8. J. Howse, “OpenCV Computer Vision with Python," 2013.
9. M. Syarif, P. Studi, T. Informatika, F. I. Komputer, U. Dian, and N. Semarang, “Blink Detection with Haar Cascade Classifier and Contour for Password Login,” in Techno.com, Vol. 14, No. 4, Pp. 242-249, 2015.
10. A. Helmi, “Application of Traffic Density Level Detec-tion Based on the Number of Passing Vehicles with OpenCV,” 2015.
11. FajarMitCahyana, “Design Counting Program on the Number of Vehicles on Uni-directional Traffic Using C++ Programming Language with OpenCV Database,” in Universitas Brawijaya, 2014
12. A. Mordvintsev, “OpenCV-Python Tutorials Document Release Beta,” 2017.
13. N. Redhantika, “Traffic Density in Malang City," alUni-versitasMerdeka Mang, pp. 1–10, 2014.
14. Akoum, A.H., “Automatic Traffic Using Image Processing.” Journal of Software Engineering and Applications, 10, 765-776. https://doi.org/10.4236/jsea.2017.109042.
15. Fleet, D.J., and Weiss, Y., “FleetResearch Optical Flow Estimation,” Flow chapter, 05. http://www.cs.toronto.edu/fleet/research/papers/flowChapter05.pdf
16. Visa M. Ibrahim, Asogwa A. Victor, "Microcontroller-Based Anti-Theft Security System Using GSM Networks with Text Messages as Feedback," International Journal of Engineering Research and Development, Vol. 2, Issue 10, pp. 18-22, 2012.
17. S. Sonika, Dr. K. Sathiyasekar, and S. Jaishree, "Intelligent Accident Identification System Using GPS, GSM Modem," IJARCCE Vol. 3, Issue 2, pp. 5487-5489, 2015.
18. Imane Benkhelifa, Nadia Nouali-Taboudjemat, and Samira Moussaoui, "Disaster Management Projects Using Wireless Sensor Networks," 28th International Conference on Advanced Information Networking and Application Workshops, pp. 605-610, 2014.
19. Chandra ShekarRamaiah, Dr. S. Asif Hussain, S. Zahid Hussain,andYahya Al Balushi, "Smart Vehicle Security System for Defeating Against Collaborative Attacks by malware”, 3rd MECInternational Conference on Big Data and smart Cities (ICBDSC), pp. 1-5, 2016
20. Li. Haiying, Zhang Dan, JiaYongli, Qiu-Xinhong, "Research of Electric Vehicle Security Assurance and Monitoring System”, IEEE Conference and Expo Transportation Electrification Asia-Pacific (ITEC-Asia Pacific), pp. 1-5, 2014
21. Ms. Sarika B. Kale, Gajanan P. Dhok, "Embedded systems for ambulance and traffic control management," International Journal of Computer and Electronics Research, Vol. 2, Issue 2, pp. 137-142, 2013.
22. Hue Ye, Gang Ding, "A digital vehicle monitoring system based on 3G for public security," International conference on computer and information application, pp. 146-148, 2010.
23. Shahada, S.A.A., Hreiji, S.M., and Shamsudheen, S., "OT-BASED GARBAGE CLEARANCE ALERT SYSTEM WITH GPS LOCATION USING ARDUINO," International Journal of MC Square Scientific Research, 11(1), pp. 1-8.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.