منابع مشابه
Vehicle Logo Recognition Using Image Matching and Textural Features
In recent years, automatic recognition of vehicle logos has become one of the important issues in modern cities. This is due to the unlimited increase of cars and transportation systems that make it impossible to be fully managed and monitored by human. In this research, an automatic real-time logo recognition system for moving cars is introduced based on histogram manipulation. In the proposed...
متن کاملRecognition of Smart Objects by a Mobile Robot using SIFT-based Image Recognition and Wireless Communication
In this work, we focus on the problem of object location and recognition by an autonomous mobile robot. In our approach, the robot does not have any prior knowledge about the form and multiplicity of the objects. The robot, however, is equipped with an onboard camera and both objects and robot are capable of exchanging data by using a common low-cost, low-rate wireless technology, namely a Tmot...
متن کاملEnforcing Security in Smart Homes using Security Patterns
Providing context-dependent security services is an important challenge in ambient intelligence. The complexity and the unbounded nature of such systems make it difficult for software developers to integrate security solutions. In order to solve this problem, in this paper we discuss and address multifold security challenges involved in the implementation of remote healthcare in smart homes usi...
متن کاملSmart Parking and Security System Using Embedded
Project is designed with Microcontroller, LCD Display, Relays, Gate model, GSM Module, RFID Reader, IR sensors. The Microcontroller programmed to interface the RFID reader with the microcontroller to scan the RFID tag to read the amount. It uses IR sensor to identify the availability of free space in the parking area. Parking space are secured by gate system. So the gate is opened only for the ...
متن کاملImplement Security using smart card on Cloud
Cloud is a concept of accessing the data from their own datacenters such that the chances of eavesdropping have been reduced and storage cost is reduced. Here in this paper we are giving a brief survey of various cloud based technique implemented so far. Although there are various techniques implemented so far for the cloud computing but here we are giving a survey of not only cloud based techn...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology
سال: 2020
ISSN: 2321-9653
DOI: 10.22214/ijraset.2020.30624