Study of Various Vehicle Detection Techniques –A Review
نویسندگان
چکیده
the Vehicle detection is used to identify the vehicles in any video or image file. The process of detection of vehicles includes the object detection by considering the vehicles as the primary object. By taking the images form aerial or horizontal view and from road or parking using surveillance cameras, the detection process can be initiated. In this paper, authors proposed a novel algorithm to identify the density of vehicles by using the vehicle detection and classification algorithm by implementing the hybrid deep neural network over the huge dataset of video and images that are obtained from the satellite images. For feature extraction Non-negative Matrix Factorization (NMF) and compression is used. Where, compression is used to increase the response time for detection and classification. Proposed system is able to identify the vehicles as partial object or full object in any given image. This will provide the vehicles density their movement reports and upside or downside reports of highways to the researcher. Proposed system will help them to detect and classify the vehicles with the main objective to produce the robust system by accessing the given image video frame with higher precision and accuracy. KeywordsImage analysis, artificial neural networks (ANN), vehicular classification, vehicle density evaluation.
منابع مشابه
Vehicle Routing Problem: Meta-heuristic Approaches
The purpose of this article is to review the literature on the topic of deterministic vehicle routing problem (VRP) and to give a review on the exact and approximate solution techniques. More specifically the approximate (meta-heuristic) solution techniques are classified into: tabu search, simulated annealing, genetic algorithm, evolutionary algorithm, hybrid algorithm, and Ant Colony Opti...
متن کاملThe Use of Aptamer in Detection of Pathogenic Bacteria-
Detection, identification and measurement of microbial pathogens is critical for protecting public health. Although microbial culture-based tests and molecular techniques are currently the most commonly used, these techniques are time-consuming and require complex tools and experienced individuals. Consequently, it is costly to analyze these techniques. The emergence of the aptamer led to the e...
متن کاملDetection of Fuel Adulteration in Real Time Using Optical Fiber Sensor and Peripheral Interface Controller
Detection of fuel adulteration in real time is the most important need of the world as it generates the hazardous effects on the environment, living and nonliving things. Various automotive users and fuel providers may mix kerosene in petrol and diesel. Adulterated fuel increases air pollution, as well as reduces the performance of vehicle engines. Such a malpractice in fuel is prevailing becau...
متن کاملReview of transmission scanning configurations in cardiac SPECT
The diagnostic accuracy of single photon emission computed tomography (SPECT) is profoundly influenced by attenuation phenomenon. Soft tissue attenuation degrades cardiac SPECT image quality, thereby decreasing the possibility of the detection of the lesions. A variety of correction techniques based on different assumptions have been used to reduce the impact of attenuation. Several types of sy...
متن کاملA Review on Video-Based Techniques for Vehicle Detection, Tracking and Behavior Understanding
The Intelligent Transportation System (ITS) provides services related to different modes of transport and traffic management systems with an integration of traffic control centers. Video-Based investigation for traffic surveillance has been a vital part of ITS. The traffic surveillance in urban environment have become more challenging compared to the highways due to various factors like camera ...
متن کاملA Review of Intrusion Detection Defense Solutions Based on Software Defined Network
Most networks without fixed infrastructure are based on cloud computing face various challenges. In recent years, different methods have been used to distribute software defined network to address these challenges. This technology, while having many capabilities, faces some vulnerabilities in the face of some common threats and destructive factors such as distributed Denial of Service. A review...
متن کامل