Book Details

VEHICLE ALLOWANCE SYSTEM USING IMPROVED YOLO ALGORITHM

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format

Abstract

In this era of technology, automation everything is becoming smart using technologies like artificial intelligence and machine learning. There are certain rules for every university, especially for the parking section. The basic rule is that, for those who want to park their cars in the university, they should pay fees. There are some conventional techniques to check the allowance of the vehicle, one of them is by checking manually, but this a time- consuming process and also leads to an easy chance of proxy allowance. Hence there is a requirement of developing a smart system which reduces the manual work of security guards, time and also the chance of proxy. This automated system can be achieved using a recognition system along with some suitable hardware and software. Therefore, there is a need to develop Automatic Number Plate Recognition (ANPR) system as a one of the solutions to this problem. There are numerous ANPR systems available today. These systems are based on different methodologies but still it is really challenging task as some of the factors like high speed of vehicle, non-uniform vehicle number plate, language of vehicle number and different lighting conditions can affect a lot in the overall recognition rate.

References

[1] Patel, Chirag, Dipti Shah, and Atul Patel. "Automatic number plate recognition system (anpr): A survey." International Journal of Computer Applications 69.9 (2013).

[2] Sharma, Gajendra. "Performance analysis of vehicle number plate recognition system using template matching techniques." Journal of Information Technology & Software Engineering 8.2 (2018): 1-9.

[3] Zhao B, Liu Y, Xia SW (2000) Support Vector Machine and Its Application in Handwritten Numeral Recognition. Proceedings 15th International Conference on Pattern Recognition 2: 720-723.

[4] Kim KK, Kim KI, Kim JB, Kim HJ (2000) Learning Based Approach for License Plate Recognition, Neural Networks for Signal Processing. IEEE Signal Processing Society Workshop 2: 614-623.

[5] Massoud MA, Sabee M, Gergais M, Bakhit R (2013) Automated NEW LICENSE Plate Recognition in Egypt. Alexandria Engineering Journal 52: 319-326.

[6] Fink O (2008) Vulnerability Identification.

[7] Zhao B, Liu Y, Xia SW (2000) Support Vector Machine and Its Application in Handwritten Numeral Recognition. Proceedings 15th International Conference on Pattern Recognition 2: 720-723.

[8] Kim KK, Kim KI, Kim JB, Kim HJ (2000) Learning Based Approach for License Plate Recognition, Neural Networks for Signal Processing. IEEE Signal Processing Society Workshop 2: 614-623.

[9] Serkan O, Ergun E (2007) Automatic Vehicle Identification by Plate Recognition. International Journal of Computer and Information Engineering 1: 1418-1421.

[10] Gupta G (2011) Algorithm for Image Processing Using Improved Median Filter and Comparison of Mean Median and Improved Median Filter. IJSCE 1: 304-311.

[11] Kranthi Kumar Singamaneni, Abhinav Juneja, Mohammed Abd-Elnaby, Kamal Gulati, Ketan Kotecha, A. P. Senthil Kumar, "An Enhanced Dynamic Nonlinear Polynomial Integrity-Based QHCP-ABE Framework for Big Data Privacy and Security", Security and Communication Networks, vol. 2022, Article ID 4206000, 13 pages, 2022. https://doi.org/10.1155/2022/4206000

[12] Kranthi Kumar, S., Ramana, K., Dhiman, G., Singh, S., & Yoon, B. (2021). A Novel Blockchain and Bi-Linear Polynomial-Based QCP-ABE Framework for Privacy and Security over the Complex Cloud Data. Sensors, 21(21), 7300.

[13] Singamaneni, Kranthi Kumar, and P. Sanyasi Naidu. "An efficient quantum hash-based CP-ABE framework on cloud storage data." International Journal of Advanced Intelligence Paradigms 22.3-4 (2022): 336-347.

[14] Singamaneni, Kranthi Kumar, Pasala Sanyasi Naidu, and Pasupuleti Venkata Siva Kumar. "Efficient quantum cryptography technique for key distribution Efficient quantum cryptography technique for key distribution."

[15] Singamaneni, Kranthi Kumar, and Pasala Naidu. "Secure key management in cloud environment using quantum cryptography." Ingénierie des Systèmes d'Information 23.5 (2018).

[16] Singamaneni, Kranthi Kumar, and Pasala Sanyasi Naidu. "IBLIND Quantum Computing and HASBE for Secure Cloud Data Storage and Accessing." Rev. d'Intelligence Artif. 33.1 (2019): 33-37.

[17] Singamaneni, Kranthi Kumar, Pasala Sanyasi Naidu, and Pasupuleti Venkata Siva Kumar. "Efficient quantum cryptography technique for key distribution." Journal Europeen des Systemes Automatises 51.4-6 (2018): 283.

[18] Singamaneni, Kranthi, Abdullah Shawan Alotaibi, and Purnendu Shekhar Pandey. "The Performance Analysis and Security Aspects of Manet." ECS Transactions 107.1 (2022): 10945.

[19] S. Kranthi Kumar, A. Alolo Abdul-Rasheed Akeji, T. Mithun, M. Ambika, L. Jabasheela et al., "Stock price prediction using optimal network based twitter sentiment analysis," Intelligent Automation & Soft Computing, vol. 33, no.2, pp. 1217–1227, 2022.

[20] T. Murari, L. Prathiba, K. Kumar Singamaneni, D. Venu, V. Kumar Nassa et al., "Big data analytics with oenn based clinical decision support system," Intelligent Automation & Soft Computing, vol. 31, no.2, pp. 1241–1256, 2022.

[21] Kiran Kumar, M., Kranthi Kumar, S., Kalpana, E., Srikanth, D., & Saikumar, K. (2022). A Novel Implementation of Linux Based Android Platform for Client and Server. In A Fusion of Artificial Intelligence and Internet of Things for Emerging Cyber Systems (pp. 151-170). Springer, Cham.

[22] Sasank, V. V. S., Singamaneni, K. K., Murthy, A. S. D., & Ahammad, S. H. (2021). Executing CNN-LSTM Algorithm for Recognizable Proof of Cervical Spondylosis Infection on Spinal Cord MRI Image: Machine Learning Image. In Handbook of Research on Innovations and Applications of AI, IoT, and Cognitive Technologies (pp. 468-484). IGI Global.

[23] Singamaneni, K., et al. "Exploration of convolutional neural network with node-centred intrusion detection structure plan for green cloud." Journal of Green Engineering (2020).

[24] S. Kranthi Kumar, B. Thulasi. (2020). A Novel Integrated Approach to Predict Bitcoin Price using LSTM of RNN, GBDT and Gated Recurrent Unit Architecture . International Journal of Advanced Science and Technology, 29(3), 9128 - 9134. Retrieved from http://sersc.org/journals/index.php/IJAST/article/view/12393.

[25] Singamaneni, Kranthi Kumar, and Sanyasi Naidu Pasala. "An improved dynamic polynomial integrity based QCP-ABE framework on large cloud data security." International Journal of Knowledge-based and Intelligent Engineering Systems 24.2 (2020): 145-156.

[26] Sasank, V. V. S., et al. "Executing CNN-LSTM Algorithm for Recognizable Proof of Cervical Spondylosis Infection on Spinal Cord MRI Image: Machine Learning Image." Handbook of Research on Innovations and Applications of AI, IoT, and Cognitive Technologies. IGI Global, 2021. 468-484.

[27] Kumar, Singamaneni Kranthi, P. V. Kumar, and M. Rao. "Different Methodologies on Block chain Consensus Models-A Survey." (2018).

[28] Kumar, Singamaneni Kranthi, et al. "Image transformation technique using steganography methods using LWT technique." Traitement du Signalvol 36 (2019): 233-237.

[29] Singamaneni, K. Kumar, et al. "An Effective Parkinson’s Disease Prediction Using Logistic Decision Regression and Machine Learning with Big Data." Turkish Journal of Physiotherapy and Rehabilitation 32.3: 778-786.

[30] Kumar, S. Kranthi, PV Siva Kumar, and M. Venkata Krishna Rao. "A Comparative Study of Different Attribute Based Encryption Models for Cloud Data Security." (2005).

[31] Kumar, S. K., and S. Venkateswarlu. "Efficiently providing data security and linear programming in cloud computing." International Journal Of Computer Science & Technology 4.2 (2013): 1569-1570.

[32] AI-Atroshi, Chiai, et al. "Automated speech-based evaluation of mild cognitive impairment and Alzheimer’s disease detection using with deep belief network model." International Journal of Healthcare Management (2022): 1-11.

[33] Singamaneni, Kranthi Kumar, et al. "An Efficient Hybrid QHCP-ABE Model to Improve Cloud Data Integrity and Confidentiality." Electronics 11.21 (2022): 3510.

[34] Singamaneni, Kranthi Kumar, et al. "A novel qkd approach to enhance iiot privacy and computational knacks." Sensors 22.18 (2022): 6741.

Keywords

Image
  • Format Volume 10, Issue 2, No 7, 2022
  • Copyright All Rights Reserved ©2022
  • Year of Publication 2022
  • Author Pillala Sashi Kiran, Avinash Mudda, Ashish Kumar Yadav
  • Reference IJCS-450
  • Page No 3044-3051

Copyright 2024 SK Research Group of Companies. All Rights Reserved.