International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Vehicle Number Plate Recognition using MATLABAI Publications
The VPR (Vehicle Number plate Recognition) system is based on image processing technology. It is one of the necessary systems designed to detect the vehicle number plate. In today’s world with the increasing number of vehicle day by day it’s not possible to manually keep a record of the entire vehicle. With the development of this system it becomes easy to keep a record and use it whenever required. The main objective here is to design an efficient automatic vehicle identification system by using vehicle number plate. The system first would capture the vehicles image as soon as the vehicle reaches the security checking area. The captured images are then extracted by using the segmentation process. Optical character recognition is used to identify the characters. The obtained data is then compared with the data stored in their database. The system is implemented and simulated on MATLAB and performance is tested on real images. This type of system is widely used in Traffic control areas, tolling, parking area .etc. This system is mainly designed for the purpose of security system. Basically video surveillance system is used for security purpose as well as monitoring systems. But Detection of moving object is a challenging part of video surveillance. Video surveillance system is used for Home security, Military applications, Banking /ATM security, Traffic monitoring etc. Now a day’s due to decreasing costs of high quality video surveillance systems, human activity detection and tracking has become increasingly in practical. Accordingly, automated systems have been designed for numerous detection tasks, but the task of detecting illegally parked vehicles has been left largely to the human operators of surveillance systems. The detection of Indian vehicles by their number plates is the most interesting and challenging research topic from past few years.
IRJET- iSecurity: The AI Surveillance, a Smart Tracking SystemIRJET Journal
The document describes an AI surveillance system called iSecurity that aims to help police catch criminals more easily. The system uses CCTV footage to capture license plate numbers of vehicles, store their locations in a database, and display recent locations of a specific vehicle on a map. This avoids manually searching hours of footage. The system has three parts: video processing to obtain license plate numbers using techniques like OpenCV, storing license plate and location data in a database, and displaying recent vehicle locations on a map using APIs. It is developed in Python for its machine learning and image processing libraries.
The document summarizes a proposed license plate recognition system for Indian vehicles. The system works in three modules: license plate localization, character segmentation, and character recognition. License plate localization is performed using morphological operations and edge detection. Character segmentation uses connected component labeling. Character recognition employs a neural network classifier. The system was tested on 100 Indian vehicle images, achieving 86% accuracy for localization, 81% for segmentation, and 80% for character recognition. The overall goal of the system is to automatically recognize license plate numbers from vehicle images captured in India.
Number Plate Recognition for Indian Vehiclesmonjuri10
This paper presents Automatic Number Plate
extraction, character segmentation and recognition for
Indian vehicles. In India, number plate models are not
followed strictly. Characters on plate are in different
Indian languages, as well as in English. Due to variations
in the representation of number plates, vehicle number
plate extraction, character segmentation and recognition
are crucial. We present the number plate extraction,
character segmentation and recognition work, with english
characters. Number plate extraction is done using Sobel
filter, morphological operations and connected component
analysis. Character segmentation is done by using
connected component and vertical projection analysis.
Character recognition is carried out using Support Vector
machine (SVM). The segmentation accuracy is 80% and
recognition rate is 79.84 %.
IRJET- Vehicle Number Plate Recognition SystemIRJET Journal
This document summarizes a research paper on a vehicle number plate recognition system. The system uses image processing techniques like preprocessing, segmentation, and optical character recognition to extract characters from vehicle number plates in images. The key steps are preprocessing the image to remove noise, segmenting the number plate from the vehicle image, isolating individual characters, and recognizing the characters using a template matching algorithm. The system is intended to help with applications like traffic enforcement, toll collection, and vehicle surveillance and management.
Vehicle plate recognition is a successful image processing technique used to recognize vehicles' plate numbers. There are several applications for this method which enlarge through many fields and attention groups. Vehicle plate recognition may be considered as an advertising equipment, for the purpose of traffic and border securities for law enforcement, and travel. Many methods have been accompanied to make this technique easy. This learning proposes an edge-detection method to allow a Plate Recognition System of a vehicle through the practical situations like the various environmental or meteorological conditions. Image processing tools are used to examine the plate area, resize it, and change it on the way to a gray scale earlier to filtering of the image in order to remove the unwanted areas. The obtained objects is processed in such a way that the number plate image and the information related to that is completely perfect The information of the obtained image is processed through the average deviation of the Gaussian filter (sigma).
Smart License Plate Recognition System based on Image Processingijsrd.com
This report describes the Smart License Plate Reorganization System, which can be installed into a tollbooth for automated acceptation of vehicle license plate details using an image of a vehicle. This Smart License Plate Reorganization system could then be implemented to control the payment of fees, highways, bridges, parking areas or tunnels, etc. This report contains new algorithm for acceptation number plate using Structural operation, Thresholding operation, Edge detection, Bounding box analysis for number plate extraction, character separation using separation and character acceptation using Template method and Feature extraction.
Vehicle Number Plate Recognition using MATLABAI Publications
The VPR (Vehicle Number plate Recognition) system is based on image processing technology. It is one of the necessary systems designed to detect the vehicle number plate. In today’s world with the increasing number of vehicle day by day it’s not possible to manually keep a record of the entire vehicle. With the development of this system it becomes easy to keep a record and use it whenever required. The main objective here is to design an efficient automatic vehicle identification system by using vehicle number plate. The system first would capture the vehicles image as soon as the vehicle reaches the security checking area. The captured images are then extracted by using the segmentation process. Optical character recognition is used to identify the characters. The obtained data is then compared with the data stored in their database. The system is implemented and simulated on MATLAB and performance is tested on real images. This type of system is widely used in Traffic control areas, tolling, parking area .etc. This system is mainly designed for the purpose of security system. Basically video surveillance system is used for security purpose as well as monitoring systems. But Detection of moving object is a challenging part of video surveillance. Video surveillance system is used for Home security, Military applications, Banking /ATM security, Traffic monitoring etc. Now a day’s due to decreasing costs of high quality video surveillance systems, human activity detection and tracking has become increasingly in practical. Accordingly, automated systems have been designed for numerous detection tasks, but the task of detecting illegally parked vehicles has been left largely to the human operators of surveillance systems. The detection of Indian vehicles by their number plates is the most interesting and challenging research topic from past few years.
IRJET- iSecurity: The AI Surveillance, a Smart Tracking SystemIRJET Journal
The document describes an AI surveillance system called iSecurity that aims to help police catch criminals more easily. The system uses CCTV footage to capture license plate numbers of vehicles, store their locations in a database, and display recent locations of a specific vehicle on a map. This avoids manually searching hours of footage. The system has three parts: video processing to obtain license plate numbers using techniques like OpenCV, storing license plate and location data in a database, and displaying recent vehicle locations on a map using APIs. It is developed in Python for its machine learning and image processing libraries.
The document summarizes a proposed license plate recognition system for Indian vehicles. The system works in three modules: license plate localization, character segmentation, and character recognition. License plate localization is performed using morphological operations and edge detection. Character segmentation uses connected component labeling. Character recognition employs a neural network classifier. The system was tested on 100 Indian vehicle images, achieving 86% accuracy for localization, 81% for segmentation, and 80% for character recognition. The overall goal of the system is to automatically recognize license plate numbers from vehicle images captured in India.
Number Plate Recognition for Indian Vehiclesmonjuri10
This paper presents Automatic Number Plate
extraction, character segmentation and recognition for
Indian vehicles. In India, number plate models are not
followed strictly. Characters on plate are in different
Indian languages, as well as in English. Due to variations
in the representation of number plates, vehicle number
plate extraction, character segmentation and recognition
are crucial. We present the number plate extraction,
character segmentation and recognition work, with english
characters. Number plate extraction is done using Sobel
filter, morphological operations and connected component
analysis. Character segmentation is done by using
connected component and vertical projection analysis.
Character recognition is carried out using Support Vector
machine (SVM). The segmentation accuracy is 80% and
recognition rate is 79.84 %.
IRJET- Vehicle Number Plate Recognition SystemIRJET Journal
This document summarizes a research paper on a vehicle number plate recognition system. The system uses image processing techniques like preprocessing, segmentation, and optical character recognition to extract characters from vehicle number plates in images. The key steps are preprocessing the image to remove noise, segmenting the number plate from the vehicle image, isolating individual characters, and recognizing the characters using a template matching algorithm. The system is intended to help with applications like traffic enforcement, toll collection, and vehicle surveillance and management.
Vehicle plate recognition is a successful image processing technique used to recognize vehicles' plate numbers. There are several applications for this method which enlarge through many fields and attention groups. Vehicle plate recognition may be considered as an advertising equipment, for the purpose of traffic and border securities for law enforcement, and travel. Many methods have been accompanied to make this technique easy. This learning proposes an edge-detection method to allow a Plate Recognition System of a vehicle through the practical situations like the various environmental or meteorological conditions. Image processing tools are used to examine the plate area, resize it, and change it on the way to a gray scale earlier to filtering of the image in order to remove the unwanted areas. The obtained objects is processed in such a way that the number plate image and the information related to that is completely perfect The information of the obtained image is processed through the average deviation of the Gaussian filter (sigma).
Smart License Plate Recognition System based on Image Processingijsrd.com
This report describes the Smart License Plate Reorganization System, which can be installed into a tollbooth for automated acceptation of vehicle license plate details using an image of a vehicle. This Smart License Plate Reorganization system could then be implemented to control the payment of fees, highways, bridges, parking areas or tunnels, etc. This report contains new algorithm for acceptation number plate using Structural operation, Thresholding operation, Edge detection, Bounding box analysis for number plate extraction, character separation using separation and character acceptation using Template method and Feature extraction.
The document describes an automatic license plate recognition system (LPRS) that consists of three main modules: license plate detection, character segmentation, and optical character recognition (OCR). The license plate detection module uses preprocessing, morphological operations, and horizontal/vertical segmentation to identify license plate regions. Character segmentation converts images to grayscale, performs binarization, and further segments images horizontally and vertically. The OCR module is trained on character templates then uses template matching to recognize characters by comparing pixel values between segmented characters and stored templates. The system has applications in traffic monitoring, electronic toll collection, surveillance, and safety systems.
Automatic Number Plate Recognition(ANPR) System Project Gulraiz Javaid
This document summarizes a student project on automatic number plate recognition (ANPR) using optical character recognition (OCR). The project aims to reduce crime by identifying vehicles. Students created a dataset of license plates and used the Tesseract OCR engine to recognize characters. The system workflow involves capturing license plate images, preprocessing them, extracting characters via OCR, and matching the results to the dataset. The project demonstrates applications for parking management, access control, toll collection and border security. It concludes the system could be improved with higher resolution cameras.
Smart Car Parking System Using FPGA and E-ApplicationIRJET Journal
This document proposes a smart car parking system using FPGA and a mobile application. The system has three main parts: 1) an e-application that allows users to reserve parking spots in advance, 2) a number plate recognition system using image processing to identify vehicles, and 3) a parking area with sensors to detect available spots. The e-application collects vehicle and driver information to reserve spots by date and time. Number plate recognition identifies vehicles by separating, recognizing, and comparing characters on license plates to stored data. Sensors in the parking area detect available spots in real-time and guide drivers to their reserved spots.
India is one of the countries which has the electronic voting machine for parliamentary and assembly polls. But in every poll election commission is facing so much of troubles and various types of issues through the election. The most familiar issue which is faced by the election commission is, no proper acknowledgement regarding the confirmation of casting the votes, duplication or illegal casting of votes. In this project all these issues has been handled and overcome with the perfect solution. The main advantage of this project is handling of data by using biometric system such as finger print and face recognition (is done by masking technique). This is used to ensure the security to avoid fake and repeating voting. It also enhances the accuracy and speed of the process. The system performs with perfect recognition on a face and thumb impression of all the eligible voters in a constituency, which is done as pre-polled procedure. During election, thumb impression and face templates of voters is given as an input to the system. This is then compared with the already stored database and available records. If the particular pattern matches with the record then the voters are allowed to vote but incase if it doesn’t match or in case of repetition, voters vote are denied or gets rejected. The result is instant and counting is done.
AADHAR based Electronic Voting Machine using Arduino - reviewakshay hebbar
This paper describes an online electoral system for Indian election is proposed for the first time. The voting system is managed in a easier way as all the users should login by Aadhar card number and password and click on his/her favorable candidates to cast the vote. This features a larger security in the sense that voter high security password is confirmed before the vote is accepted in the main database of ECI. The extra feature of the model is that the voter will ensure if his/her vote has gone to correct candidate/party. The votes are going to be done automatically, therefore saving an enormous time and facultative ECI to announce the result at intervals a very short period.
This document discusses security issues related to electronic voting systems. It examines security threats to direct recording electronic (DRE) voting machines, such as vulnerabilities in the Diebold software and database. Issues with DRE systems include a lack of voter-verified paper audit trails and difficulties with auditing and verifiability. Security threats to internet voting are also analyzed, including denial of service attacks, malware infections, and spoofing attacks. The document proposes solutions such as using open-source software, voter-verified paper audit trails, encryption protocols, and digital signatures to address security problems with electronic voting systems.
Currency Recognition System for Visually Impaired: Egyptian Banknote as a Stu...DrNoura Semary
The document describes a currency recognition system that uses image processing and template matching to identify Egyptian paper money denominations. A camera captures an image of a bill which undergoes preprocessing like thresholding and noise removal before extracting the region of interest. Template matching is then used to compare the region of interest to templates of each denomination in a dataset, identifying the bill based on the highest correlation. The system achieved an average accuracy of 89% across 120 test images of various denominations. Future work aims to improve accuracy with feature-based models and incorporate additional currencies.
Traditionally, in paper based election,voters cast their vote to select right candidate, where they simply put their vote in voting box and at the end of the voting day the votes are going to be count manually. This process was much time consuming as well as was erroneous. To overcome this drawback Electronic Voting Machine (EVM) was introduced. In EVM, Voter cast their vote by pressing the voting button which was on EVM. The Major advantage of EVM system is , the votes are counted automatically instead of manually. But the drawback of EVM machine was, the votes may get manipulated and was not secure. So to overcome all these drawbacks, research on biometric based voting system is going on. This Paper focuses on survey of different voting system using Fingerprint biometric through different algorithms and methods.
IRJET- Extraction and Application of Natural Dye on Tanned Leather and Eco-Fr...IRJET Journal
This document describes research on automatic number plate recognition using image segmentation. The proposed methodology involves capturing an image of a vehicle, converting it to grayscale, performing thresholding for binarization, detecting the number plate region, segmenting individual characters, and recognizing the characters using optical character recognition. Previous literature on number plate recognition methods is reviewed, including works involving Persian, English, and Indian license plates. The proposed system aims to localize the license plate with 99% accuracy, segment characters with 99.2% accuracy, and recognize the plate number with 98% accuracy.
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerIOSR Journals
This document describes a proposed biometric system for an electronic voting machine that uses fingerprint authentication with an ARM9 microcontroller. The system aims to enhance security over existing EVMs by identifying voters through fingerprint matching instead of manual verification of ID cards. It discusses the components used, including an ARM9 microcontroller, KY-M6 fingerprint sensor module, and MAX232 for serial communication. The proposed system stores voter fingerprints during enrollment and matches them during voting to authenticate voters and prevent multiple votes. If validated, the voter can then cast their vote which is displayed and results can be viewed later through the centralized server.
The document proposes a secure mobile-based voting system that allows voters to cast their votes from anywhere using a mobile device. It outlines the existing electronic and ballot-based voting systems and their drawbacks. The proposed system uses speech recognition and a three-tier architecture to authenticate voters and securely collect, count, and store votes. It aims to improve accessibility, participation, and reduce costs compared to traditional voting methods.
Mobile Voting System Using Advanced NFC Technologyijsrd.com
Electronic voting system are becoming popular with wide spread use of computer and embedded system. Security is the main important issue should be considered in such system. Mobile voting system is basically used for collecting and counting votes. In this technology include punch card, optical scan voting system. This paper proposes a new Mobile based voting system using advanced NFC technology, Voting is the process that allows the general public or the people to choose their leaders and articulate views on how they will be governed. This gives a comprehensive analysis of security with respect to NFC. This study deals with the use of information technology to handle electoral processes starting from voters and candidates registration to the actual casting and counting of ballots. Exploring mobile voting from a systems perspective can demonstrate the attributes of the current systems and the possible solutions for the voting process so any one can caste their vote from any place.
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET Journal
This document proposes an effective and secure e-voting application using biometrics for user authentication. The system would allow authorized users to cast their votes using their mobile phones, addressing limitations of traditional in-person voting. Fingerprints and RFID would be used to verify voters' identities and prevent duplicate voting. The votes would be securely transmitted through an IoT network and tabulated in real-time, allowing election results to be announced on the same day. This could help increase voter turnout by allowing remote voting while maintaining security through multi-factor authentication.
Fake Currency detction Using Image ProcessingSavitaHanchinal
This document describes a project to develop a system for detecting fake currency using image processing techniques. It discusses how images of currency will be input, preprocessed, segmented, have features extracted and then classified as real or fake using a support vector machine model. The goal is to build a system that can be easily used by the public to verify currency authenticity by analyzing images. It reviews the methodology and components used, including pre-processing, segmentation, feature extraction of texture and other visual properties, and classification. The system is intended to identify fake currency based on differences detected in real currency features.
This document presents a system for detecting stop line violations in Myanmar using license plate detection. The system first preprocesses video frames, then uses projection analysis and filtering to localize license plates. It extracts candidate plates based on geometric features like area and aspect ratio. Finally, it makes a decision by comparing the Y-coordinate of the license plate to the Y-coordinate of the stop line - if the plate is above the line, it is a violation. The system was tested on 17 hours of video from Myanmar intersections and showed accuracy in determining violated versus non-violated vehicles.
IRJET- Biometric Voting Machine using Aadhar AuthenticationIRJET Journal
This document summarizes a research paper that proposes a biometric voting machine using Aadhar authentication. The proposed system uses fingerprint authentication and matches fingerprints to the Aadhar card database to verify voters' identities. If the fingerprint matches a voter's data in the database, they are allowed to cast their vote. The system aims to make the voting process more secure, efficient and accessible compared to existing paper ballot-based systems. It describes the components, workflow and advantages of the biometric voting machine, including overcoming issues like fake identities, errors in counting votes, and the need to be physically present at a polling station.
Abstract The dynamic nature of loads, seasonal variation of soil properties, uneven soil strata below footings or inappropriate design of foundation makes differential settlement inevitable. Differential settlement is largely responsible for developing forces or changing the existing forces in the structure and is often considered as the underlying cause of many structural failures. A structural engineer has to take into account these forces while designing the structure. Different structural parameters like stiffness of columns and beams and number of storeys and bays affect the response of the structure to differential settlement. In the present study, a plain portal frame subjected to constant differential settlement of 10 mm is analyzed for different cases using a structural analysis software i.e. STAAD Pro. Different parameters of the frame are varied to understand their influence on frame forces developed due to differential settlement. The parameters taken into account in this study are length of beam, height of column, moment of inertia of beam and column and number of storeys and bays. It is found that the forces in the frame developed due to differential settlement decrease on increasing beam lengths and column heights. Also, decreasing the moment of inertia of beams and columns is effective in reducing these forces. In addition, differential settlement tends to affect forces more in lower storeys as compared to higher storeys. The frame forces are more prominent for bays which are near to the support subjected to settlement. The increase or decrease in frame forces due to differential settlement can be attributed to the change in stiffness of the members. Hence, the study concludes that the stiffer members tend to develop higher forces for constant differential settlement in frames. Key Words: Differential settlement, Portal frame, Structural response, Frame forces, Storey, Bays
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and DevelopmentIJERD Editor
This document discusses the emerging health threats posed by electronic waste (e-waste). It begins by defining e-waste and noting that it makes up 2.7-3% of total waste but contains many toxic and hazardous elements. The main constituents of e-waste are discussed, including heavy metals like lead, mercury, and cadmium which can cause health effects when exposed. India's annual e-waste generation is estimated at 400,000 tons and is growing rapidly. While formal recycling systems exist, most e-waste in developing countries is handled by the informal sector without proper health and safety practices, exposing workers and local communities to the toxic materials. Proper regulations and disposal facilities are needed to address this important environmental and public
International Journal of Engineering Research and DevelopmentIJERD Editor
This document discusses a study that uses the ke-REM (ke-Rule Extraction Method) classifier to predict promoter regions in DNA sequences. The study evaluates the performance of ke-REM compared to existing promoter prediction techniques. ke-REM constructs rules based on attribute-value pairs from a dataset of 106 E. coli DNA sequences, each containing 57 nucleotides. The results show that ke-REM competes well with existing methods for identifying promoter regions in DNA.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
The document describes an automatic license plate recognition system (LPRS) that consists of three main modules: license plate detection, character segmentation, and optical character recognition (OCR). The license plate detection module uses preprocessing, morphological operations, and horizontal/vertical segmentation to identify license plate regions. Character segmentation converts images to grayscale, performs binarization, and further segments images horizontally and vertically. The OCR module is trained on character templates then uses template matching to recognize characters by comparing pixel values between segmented characters and stored templates. The system has applications in traffic monitoring, electronic toll collection, surveillance, and safety systems.
Automatic Number Plate Recognition(ANPR) System Project Gulraiz Javaid
This document summarizes a student project on automatic number plate recognition (ANPR) using optical character recognition (OCR). The project aims to reduce crime by identifying vehicles. Students created a dataset of license plates and used the Tesseract OCR engine to recognize characters. The system workflow involves capturing license plate images, preprocessing them, extracting characters via OCR, and matching the results to the dataset. The project demonstrates applications for parking management, access control, toll collection and border security. It concludes the system could be improved with higher resolution cameras.
Smart Car Parking System Using FPGA and E-ApplicationIRJET Journal
This document proposes a smart car parking system using FPGA and a mobile application. The system has three main parts: 1) an e-application that allows users to reserve parking spots in advance, 2) a number plate recognition system using image processing to identify vehicles, and 3) a parking area with sensors to detect available spots. The e-application collects vehicle and driver information to reserve spots by date and time. Number plate recognition identifies vehicles by separating, recognizing, and comparing characters on license plates to stored data. Sensors in the parking area detect available spots in real-time and guide drivers to their reserved spots.
India is one of the countries which has the electronic voting machine for parliamentary and assembly polls. But in every poll election commission is facing so much of troubles and various types of issues through the election. The most familiar issue which is faced by the election commission is, no proper acknowledgement regarding the confirmation of casting the votes, duplication or illegal casting of votes. In this project all these issues has been handled and overcome with the perfect solution. The main advantage of this project is handling of data by using biometric system such as finger print and face recognition (is done by masking technique). This is used to ensure the security to avoid fake and repeating voting. It also enhances the accuracy and speed of the process. The system performs with perfect recognition on a face and thumb impression of all the eligible voters in a constituency, which is done as pre-polled procedure. During election, thumb impression and face templates of voters is given as an input to the system. This is then compared with the already stored database and available records. If the particular pattern matches with the record then the voters are allowed to vote but incase if it doesn’t match or in case of repetition, voters vote are denied or gets rejected. The result is instant and counting is done.
AADHAR based Electronic Voting Machine using Arduino - reviewakshay hebbar
This paper describes an online electoral system for Indian election is proposed for the first time. The voting system is managed in a easier way as all the users should login by Aadhar card number and password and click on his/her favorable candidates to cast the vote. This features a larger security in the sense that voter high security password is confirmed before the vote is accepted in the main database of ECI. The extra feature of the model is that the voter will ensure if his/her vote has gone to correct candidate/party. The votes are going to be done automatically, therefore saving an enormous time and facultative ECI to announce the result at intervals a very short period.
This document discusses security issues related to electronic voting systems. It examines security threats to direct recording electronic (DRE) voting machines, such as vulnerabilities in the Diebold software and database. Issues with DRE systems include a lack of voter-verified paper audit trails and difficulties with auditing and verifiability. Security threats to internet voting are also analyzed, including denial of service attacks, malware infections, and spoofing attacks. The document proposes solutions such as using open-source software, voter-verified paper audit trails, encryption protocols, and digital signatures to address security problems with electronic voting systems.
Currency Recognition System for Visually Impaired: Egyptian Banknote as a Stu...DrNoura Semary
The document describes a currency recognition system that uses image processing and template matching to identify Egyptian paper money denominations. A camera captures an image of a bill which undergoes preprocessing like thresholding and noise removal before extracting the region of interest. Template matching is then used to compare the region of interest to templates of each denomination in a dataset, identifying the bill based on the highest correlation. The system achieved an average accuracy of 89% across 120 test images of various denominations. Future work aims to improve accuracy with feature-based models and incorporate additional currencies.
Traditionally, in paper based election,voters cast their vote to select right candidate, where they simply put their vote in voting box and at the end of the voting day the votes are going to be count manually. This process was much time consuming as well as was erroneous. To overcome this drawback Electronic Voting Machine (EVM) was introduced. In EVM, Voter cast their vote by pressing the voting button which was on EVM. The Major advantage of EVM system is , the votes are counted automatically instead of manually. But the drawback of EVM machine was, the votes may get manipulated and was not secure. So to overcome all these drawbacks, research on biometric based voting system is going on. This Paper focuses on survey of different voting system using Fingerprint biometric through different algorithms and methods.
IRJET- Extraction and Application of Natural Dye on Tanned Leather and Eco-Fr...IRJET Journal
This document describes research on automatic number plate recognition using image segmentation. The proposed methodology involves capturing an image of a vehicle, converting it to grayscale, performing thresholding for binarization, detecting the number plate region, segmenting individual characters, and recognizing the characters using optical character recognition. Previous literature on number plate recognition methods is reviewed, including works involving Persian, English, and Indian license plates. The proposed system aims to localize the license plate with 99% accuracy, segment characters with 99.2% accuracy, and recognize the plate number with 98% accuracy.
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerIOSR Journals
This document describes a proposed biometric system for an electronic voting machine that uses fingerprint authentication with an ARM9 microcontroller. The system aims to enhance security over existing EVMs by identifying voters through fingerprint matching instead of manual verification of ID cards. It discusses the components used, including an ARM9 microcontroller, KY-M6 fingerprint sensor module, and MAX232 for serial communication. The proposed system stores voter fingerprints during enrollment and matches them during voting to authenticate voters and prevent multiple votes. If validated, the voter can then cast their vote which is displayed and results can be viewed later through the centralized server.
The document proposes a secure mobile-based voting system that allows voters to cast their votes from anywhere using a mobile device. It outlines the existing electronic and ballot-based voting systems and their drawbacks. The proposed system uses speech recognition and a three-tier architecture to authenticate voters and securely collect, count, and store votes. It aims to improve accessibility, participation, and reduce costs compared to traditional voting methods.
Mobile Voting System Using Advanced NFC Technologyijsrd.com
Electronic voting system are becoming popular with wide spread use of computer and embedded system. Security is the main important issue should be considered in such system. Mobile voting system is basically used for collecting and counting votes. In this technology include punch card, optical scan voting system. This paper proposes a new Mobile based voting system using advanced NFC technology, Voting is the process that allows the general public or the people to choose their leaders and articulate views on how they will be governed. This gives a comprehensive analysis of security with respect to NFC. This study deals with the use of information technology to handle electoral processes starting from voters and candidates registration to the actual casting and counting of ballots. Exploring mobile voting from a systems perspective can demonstrate the attributes of the current systems and the possible solutions for the voting process so any one can caste their vote from any place.
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET Journal
This document proposes an effective and secure e-voting application using biometrics for user authentication. The system would allow authorized users to cast their votes using their mobile phones, addressing limitations of traditional in-person voting. Fingerprints and RFID would be used to verify voters' identities and prevent duplicate voting. The votes would be securely transmitted through an IoT network and tabulated in real-time, allowing election results to be announced on the same day. This could help increase voter turnout by allowing remote voting while maintaining security through multi-factor authentication.
Fake Currency detction Using Image ProcessingSavitaHanchinal
This document describes a project to develop a system for detecting fake currency using image processing techniques. It discusses how images of currency will be input, preprocessed, segmented, have features extracted and then classified as real or fake using a support vector machine model. The goal is to build a system that can be easily used by the public to verify currency authenticity by analyzing images. It reviews the methodology and components used, including pre-processing, segmentation, feature extraction of texture and other visual properties, and classification. The system is intended to identify fake currency based on differences detected in real currency features.
This document presents a system for detecting stop line violations in Myanmar using license plate detection. The system first preprocesses video frames, then uses projection analysis and filtering to localize license plates. It extracts candidate plates based on geometric features like area and aspect ratio. Finally, it makes a decision by comparing the Y-coordinate of the license plate to the Y-coordinate of the stop line - if the plate is above the line, it is a violation. The system was tested on 17 hours of video from Myanmar intersections and showed accuracy in determining violated versus non-violated vehicles.
IRJET- Biometric Voting Machine using Aadhar AuthenticationIRJET Journal
This document summarizes a research paper that proposes a biometric voting machine using Aadhar authentication. The proposed system uses fingerprint authentication and matches fingerprints to the Aadhar card database to verify voters' identities. If the fingerprint matches a voter's data in the database, they are allowed to cast their vote. The system aims to make the voting process more secure, efficient and accessible compared to existing paper ballot-based systems. It describes the components, workflow and advantages of the biometric voting machine, including overcoming issues like fake identities, errors in counting votes, and the need to be physically present at a polling station.
Abstract The dynamic nature of loads, seasonal variation of soil properties, uneven soil strata below footings or inappropriate design of foundation makes differential settlement inevitable. Differential settlement is largely responsible for developing forces or changing the existing forces in the structure and is often considered as the underlying cause of many structural failures. A structural engineer has to take into account these forces while designing the structure. Different structural parameters like stiffness of columns and beams and number of storeys and bays affect the response of the structure to differential settlement. In the present study, a plain portal frame subjected to constant differential settlement of 10 mm is analyzed for different cases using a structural analysis software i.e. STAAD Pro. Different parameters of the frame are varied to understand their influence on frame forces developed due to differential settlement. The parameters taken into account in this study are length of beam, height of column, moment of inertia of beam and column and number of storeys and bays. It is found that the forces in the frame developed due to differential settlement decrease on increasing beam lengths and column heights. Also, decreasing the moment of inertia of beams and columns is effective in reducing these forces. In addition, differential settlement tends to affect forces more in lower storeys as compared to higher storeys. The frame forces are more prominent for bays which are near to the support subjected to settlement. The increase or decrease in frame forces due to differential settlement can be attributed to the change in stiffness of the members. Hence, the study concludes that the stiffer members tend to develop higher forces for constant differential settlement in frames. Key Words: Differential settlement, Portal frame, Structural response, Frame forces, Storey, Bays
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and DevelopmentIJERD Editor
This document discusses the emerging health threats posed by electronic waste (e-waste). It begins by defining e-waste and noting that it makes up 2.7-3% of total waste but contains many toxic and hazardous elements. The main constituents of e-waste are discussed, including heavy metals like lead, mercury, and cadmium which can cause health effects when exposed. India's annual e-waste generation is estimated at 400,000 tons and is growing rapidly. While formal recycling systems exist, most e-waste in developing countries is handled by the informal sector without proper health and safety practices, exposing workers and local communities to the toxic materials. Proper regulations and disposal facilities are needed to address this important environmental and public
International Journal of Engineering Research and DevelopmentIJERD Editor
This document discusses a study that uses the ke-REM (ke-Rule Extraction Method) classifier to predict promoter regions in DNA sequences. The study evaluates the performance of ke-REM compared to existing promoter prediction techniques. ke-REM constructs rules based on attribute-value pairs from a dataset of 106 E. coli DNA sequences, each containing 57 nucleotides. The results show that ke-REM competes well with existing methods for identifying promoter regions in DNA.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
This document summarizes an academic paper presented at the International Conference on Emerging Trends in Engineering and Management in 2014. The paper proposes a design and implementation of an elliptic curve scalar multiplier on a field programmable gate array (FPGA) using the Karatsuba algorithm. It aims to reduce hardware complexity by using a polynomial basis representation of finite fields and projective coordinate representation of elliptic curves. Key mathematical concepts like finite fields, point addition, and point doubling that are important to elliptic curve cryptography are also discussed at a high level.
1. The document describes a five-level cascaded H-bridge inverter used as a distribution static compensator (DSTATCOM) to compensate for reactive power and harmonics in a power system.
2. A DSTATCOM is connected in shunt with the distribution system and uses a voltage source converter to generate a set of three-phase output voltages that can be adjusted to control the exchange of active and reactive power with the system.
3. The five-level cascaded H-bridge inverter topology reduces device voltage stress and output harmonics. Level shifted pulse width modulation and phase shifted pulse width modulation techniques are investigated for controlling the DSTATCOM.
Efficient implementation of bit parallel finite eSAT Journals
Abstract Arithmetic in Finite/Galois field is a major aspect for many applications such as error correcting code and cryptography. Addition and multiplication are the two basic operations in the finite field GF (2m).The finite field multiplication is the most resource and time consuming operation. In this paper the complexity (space) analysis and efficient FPGA implementation of bit parallel Karatsuba Multiplier over GF (2m) is presented. This is especially interesting for high performance systems because of its carry free property. To reduce the complexity of Classical Multiplier, multiplier with less complexity over GF (2m) based on Karatsuba Multiplier is used. The LUT complexity is evaluated on FPGA by using Xilinx ISE 8.1i.Furthermore,the experimental results on FPGAs for bit parallel Karatsuba Multiplier and Classical Multiplier were shown and the comparison table is provided. To the best of our knowledge, the bit parallel karatsuba multiplier consumes least resources among the known FPGA implementation. Keywords: Classical Multiplier, Cryptograph, FPGA, Galois field, Karatsuba Multiplier
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
IRJET- Number Plate Extraction from Vehicle Front View Image using Image ...IRJET Journal
This document summarizes a research paper on extracting vehicle number plates from front-facing images using image processing techniques. The paper proposes a system that uses a camera to capture vehicle images, processes the images to isolate and extract the number plate, recognizes the characters on the plate, and displays the plate text. The system works by first converting the color image to grayscale. Edge detection, morphological operations and binary thresholding are then used to segment and extract the number plate region. Bounding box techniques isolate individual characters which are converted to text using OCR. The method achieved accurate number plate extraction on vehicle images taken in different lighting conditions and resolutions. The system has applications in traffic monitoring, law enforcement and vehicle identification.
IRJET- Advenced Traffic Management System using Automatic Number Plate Recogn...IRJET Journal
This document describes an advanced traffic management system using automatic number plate recognition (ANPR). It discusses how current vehicle tracking systems have limitations in identifying fake number plates. The proposed system uses image processing and computer vision techniques to identify the number plate and type of vehicle from images or video. It extracts the number plate using edge detection and morphological operations. Optical character recognition and template matching are then used to recognize the characters. A convolutional neural network classifies the vehicle type. The system can check if a number plate is fake by comparing with an RTO database, and alert police if a match is found to a wanted vehicle number. It aims to help police track vehicles of interest and improve traffic management.
License Plate Recognition System for Moving Vehicles Using Laplacian Edge De...IRJET Journal
This document presents a license plate recognition system for moving vehicles that uses the Laplacian edge detector and feature extraction. The system first applies Otsu's method to binarize the captured vehicle image and reduce noise using a median filter. It then uses the Laplacian operator to detect edges and locate the license plate region. The characters in the plate are segmented and normalized. Finally, features are extracted from the characters for recognition, allowing the system to handle characters written in English or Hindi scripts. The proposed approach aims to address challenges in recognizing Indian license plates, which can vary in format and contain text in multiple languages.
A Review: Machine vision and its ApplicationsIOSR Journals
Abstract:The machine vision has been used in the industrial machine designing by using the intelligent character recognition. Due to its increased use, it makes the significant contribution to ensure the competitiveness in modern development. The state of art in machine vision inspection and a critical overview of applications in various industries are presented in this paper. In its restricted sense it is also known as the computer vision or the robot vision. This paper gives the overview of Machine Vision Technology in the first section, followed by various industrial application and thefuture trends in Machine Vision. Keywords:CCD- charged coupled devices, Fruit harvesting system, HIS- Hue Saturation Intensity, Image analysis, Image enhancement, Image feature extraction, Image feature classification processing, Intelligent Vehicle tracking , Isodiscriminationn Contour, Machine Vision
The document proposes a traffic rules violation detection system using machine learning. It would use image processing technologies like object detection and optical character recognition to detect violations like speeding, lack of helmet, and license plate identification. A camera would take photos, detect objects like motorcycles, identify if helmets are worn, and recognize license plates. If violations are found, an SMS would be sent to the owner. The system aims to more efficiently manage traffic by automatically detecting violations. It analyzed literature on similar systems and proposed a methodology and working model with steps like preprocessing, segmentation, character recognition and saving results. An application was created with 93% accuracy for motorcycle detection, 85% for helmet identification and 51% for license plate recognition, providing overall
Automated License Plate Recognition for Toll Booth ApplicationIJERA Editor
This document describes an automated license plate recognition system that can be used for toll booth applications. It analyzes images of vehicles to detect and recognize their license plates for automated payment of tolls. The system uses image processing techniques like thresholding, edge detection and template matching to locate and extract the license plate from an image. It then recognizes the characters on the plate using a neural network and compares it to databases to obtain vehicle information. The key steps involve preprocessing the image, segmenting the license plate region, extracting and enhancing the characters, and recognizing the plate number. This automated system allows contactless and real-time processing of vehicles for toll payment and has applications in traffic management and security control.
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...IRJET Journal
The document describes techniques for detecting potholes and speed breakers in real-time using a smartphone camera and algorithms like YOLOv4, YOLOv5, EfficientDet and ResNet. It discusses how the smartphone camera continuously captures video frames which are fed into a trained object detection model. When potholes or speed breakers are detected, the user is alerted with a sound notification. The document outlines the dataset creation process involving collection of over 20,000 images of potholes and speed breakers with annotations. It also discusses the training of models on this dataset using Google Collab and achieving highest accuracy of 96.9% using EfficientDet. The trained models are able to detect different types
Automatic Vehicle Detection Using Pixelwise Classification ApproachIOSR Journals
This document presents an automatic vehicle detection system using a pixelwise classification approach. The system first performs background color subtraction to remove background pixels. It then extracts features like edges, corners and color from each pixel. These features are used in a dynamic Bayesian network to classify each pixel as vehicle or non-vehicle. The network is trained on labeled image data. In detection, the Bayesian rule is used to calculate the probability of each pixel belonging to a vehicle. Post processing includes morphological operations and connected component analysis to obtain final vehicle detections. Experimental results on video data show the approach provides accurate vehicle detection across different scenes and camera heights.
IRJET- Vehicle Number Plate Detection using Image ProcessingIRJET Journal
This document describes a research project that aims to develop a system for vehicle number plate detection using image processing. The system would extract the vehicle number plate from images, such as those captured by CCTV cameras. It would then compare the vehicle number to a database to check registration details and identify suspicious vehicles that may be stolen or violating traffic laws. The system is intended to help reduce criminal activity involving motor vehicles through automated number plate recognition and registration verification. It outlines the methodology, which includes capturing images, converting to grayscale, segmenting the number plate, recognizing characters using optical character recognition, and generating tickets for non-compliant vehicles. Potential applications are discussed, such as for traffic control, airport parking, and electronic toll collection.
Number Plate Recognition (NPR) is a computer vision technology that captures images of vehicles using a camera. It extracts the vehicle's number plate to identify the owner's details by matching it to a database. The system works by capturing images, preprocessing them, detecting the number plate using YOLO, recognizing the characters, and outputting the results to a database. It has benefits like saving time, reducing errors, and aiding in tracking criminals. Potential future improvements include enhancing plate recognition for different fonts/sizes and speeding up the system.
A License plate is a rectangular plate which is alphanumeric. The license plate is fixed on the vehicle and used to identify the
vehicle along with honor of that vehicle. There is a huge nos. of vehicles are on the road word wile so that traffic control and
vehicle owner identification has become a major problem.
The automatic number plate reorganization (ANPR) is one of the solutions of such kind of problem. There is nos. of methodologies
but it is challenging task as some of the factors like high speed of vehicles, languages of number plate & mostly non-uniform
letter on number plate effects a lot in recognition. The license plate recognition (LPR) system have many application like payment
of parking fees; toll fee on highway; traffic monitoring system; border security system; signal system etc.
In this paper, the different method of license plate recognition is discussed. The systems first detects the vehicle and capture the
image then the number plate of vehicle is extracted from the image using image Segmentation optical character recognition technique
is used for the character recognition. Then the resulting date is compared with the database record so we come up the information
like the vehicle’s owner, vehicle registration place, address etc. it is observed that developed system successfully defect
& recognize the vehicle number plate on real image.
IRJET- Vehicle Seat Vacancy Identification using Image Processing TechniqueIRJET Journal
This document describes a system that uses image processing techniques on images captured by a webcam installed in a vehicle to detect passengers' faces and estimate the number of passengers and seat vacancy. The system first captures images of the passenger area and sends them to a server. It then uses techniques like morphological operations, CLAHE, and Haar classifiers for face detection. Features are extracted using LBP and HOG, and an SVM classifies images to estimate passengers' gender. Experimental results show the system can accurately detect faces and estimate numbers even from low quality images, providing real-time vacancy information to help passengers plan their travel.
Iaetsd fpga implementation of various security based tollgate system using anprIaetsd Iaetsd
The document describes an automatic toll collection system using license plate recognition (LPR) technology. The system uses cameras to capture images of vehicles' license plates as they pass through the toll gate. An image processing algorithm segments the license plate from the image and recognizes the characters. The recognized license plate number is matched to a database to retrieve payment and vehicle ownership details. Based on the vehicle weight detected by a pressure sensor and the database lookup, the appropriate toll is calculated and deducted. Sensors also detect any hazardous gases in vehicles and trigger an alarm and gate closure. The system is designed and implemented using a field programmable gate array (FPGA) for high-speed operation and testing on real-world scenarios.
VEHICLE DETECTION USING YOLO V3 FOR COUNTING THE VEHICLES AND TRAFFIC ANALYSISIRJET Journal
This document discusses using YOLOv3 for vehicle detection and counting from video to analyze traffic. Video frames are used to identify moving vehicles and background extraction is applied to each frame to detect and count vehicles. YOLOv3 with a pre-trained model is used for object detection and classification of vehicles into classes like car, bus, motorcycle. Classification is shown for vehicles and individual types to analyze traffic levels. The analysis of vehicle levels is displayed using a pie chart.
Smart Parking Solution using Camera Networks and Real-time Computer VisionIRJET Journal
This document proposes a smart parking solution using computer vision and AI techniques applied to existing surveillance camera footage. The system would detect vacant parking spots, identify vehicle license plates, detect collisions, and track parking durations to calculate fees. It would provide real-time parking information and status updates to drivers via a mobile app. The system would use deep learning models like YOLOv5 trained on labeled camera images to perform tasks like license plate recognition and space availability detection without additional hardware. This could help optimize urban parking infrastructure and reduce traffic compared to alternative IoT-based approaches.
Automatic Number Plate Recognition and IoT Based Vehicle TrackingIRJET Journal
This document presents a system for automatic number plate recognition and IoT-based vehicle tracking. It discusses limitations in existing systems and proposes a new system that uses image processing techniques like segmentation, localization and optical character recognition to recognize vehicle number plates from images. It then uses IoT technologies like GPS to track the location of vehicles in real-time and monitor them remotely. The system architecture involves localizing the number plate, extracting individual characters, recognizing the characters using a support vector machine model, and tracking vehicle location using GPS and storing it on a server. This integrated system allows for both number plate recognition and remote vehicle tracking.
Smart Car Parking system using GSM Technologydbpublications
In this paper, we present PGS, a Parking Guidance System based on wireless sensor network(WSN) which guides a driver to an available parking lot. The system consists of a WSN based VDS (vehicle detection sub-system) and a management subsystem. The WSN based VDS gathers information on the availability of each parking lot and the management sub-system processes the information and refines them and guides the driver to the available parking lot by controlling a VMS (Variable Messaging System). The paper describes the overall system architecture of PGS from the hardware platform to the application software in the view point of a WSN. We implemented the WSN based VDS of PGS and experimented on the system with several kinds of cars.
Automatic Traffic Rules Violation Control and Vehicle Theft Detection Using D...IRJET Journal
The document describes a proposed system to automatically detect traffic rule violations and stolen vehicles using deep learning techniques. Video from CCTV cameras placed around the city would be input to the system. It would use YOLOv5 and CNN models to detect vehicles, identify violations like speeding or wrong lane use, and detect stolen vehicles by recognizing license plates. If a violation or stolen vehicle is detected, the system would extract the license plate number and notify the nearby police station so further action can be taken. The goal is to help control traffic and reduce accidents through automatic monitoring that does not require much human resources or involvement.
Barcode Based Parking Management SystemIRJET Journal
This document summarizes a proposed barcode-based parking management system that uses image processing and barcode scanning. The system uses a camera to capture images of the parking lot and compare them to reference images to identify vacant spaces. Drivers scan a barcode at entry that records the check-in time and date. When a vehicle enters, it is assigned a free parking slot and guided there. The system aims to reduce human interference in parking and lower power consumption compared to existing systems. A prototype was implemented using a Raspberry Pi, and testing identified vacant spaces accurately based on image comparisons.
Automatic face and VLP’S recognition for smart parking systemTELKOMNIKA JOURNAL
One of the concerning issues regarding smart city is Smart Parking. In Smart Parking, some
researchers try to provide solutions and breakthroughs on several research topics among security
systems, the availability of single space, an IoT framework, etc. In this study, we proposed a security
system on Smart Parking based on face recognition and VLP’s (Vehicle License Plates) identification. In
this research, SSIM (Structural Similarity) method as part of IQA has been applied due to its reliability and
simple computation for face detection and recognition process. From the test results of 30 data, obtained
the highest SSIM value 0.83 with the highest accuracy rate of 76.67%. That level of accuracy still has not
reached the implementation standard of 99.9%. So that it still needs to be improved in the future studies,
especially in the filtering noise section.
Similar to International Journal of Engineering Research and Development (IJERD) (20)
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
This document summarizes a study on reducing corrosion rates in steel through welding design. The researchers tested different welding groove designs (X, V, 1/2X, 1/2V) and preheating temperatures (400°C, 500°C, 600°C) on ferritic malleable iron samples. Testing found that X and V groove designs with 500°C and 600°C preheating had corrosion rates of 0.5-0.69% weight loss after 14 days, compared to 0.57-0.76% for 400°C preheating. Higher preheating reduced residual stresses which decreased corrosion. Residual stresses were 1.7 MPa for optimal X groove and 600°C
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
The document summarizes a study on the use of ground granulated blast furnace slag (GGBS) and limestone powder to replace cement in self-compacting concrete (SCC). Tests were conducted on SCC mixes with 0-50% replacement of cement with GGBS and 0-20% replacement with limestone powder. The results showed that replacing 30% of cement with GGBS and 15% with limestone powder produced SCC with the highest compressive strength of 46MPa, meeting fresh property requirements. The study concluded that this ternary blend of cement, GGBS and limestone powder can improve SCC properties while reducing costs.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Building Production Ready Search Pipelines with Spark and Milvus
International Journal of Engineering Research and Development (IJERD)
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 9, Issue 3 (December 2013), PP. 17-22
Adaptive Bounding Box Searching Method Implementation for
the Character Number Motor Vehicles Analysis
Sudarma M., Widarma BGB.
Computer System and Informatics, Department of Electrical Engineering,
Faculty of Engineering Udayana University, Bali, Indonesia
Abstract:- Motor vehicle license plate detection system based on mobile is a motor vehicle license plate area
detection system by using smart phone with windows phone operating system version 7.5. The pictures taken by
smart phone camera are processed with high-pass convolution in order to get character objects on license plate.
The outcome of convolution further is marking license plate’s character candidates with adaptive bounding box
searching method. License plate’s character candidates obtained will be selected again to form a vehicle license
plate. In this research 150 image samples were tested, where 50 images were tested with image taken distance of
1 – 1.5 meter, 50 images were tested with image taken distance of 1.5 – 2 meter, and 50 images were tested with
image taken distance of 2 – 2.5 meter. From the research it was obtained that the highest success rate was at
image taken distance of 1.5 – 2 meter which was 90%.
Keywords:- PCD, vehicle detection plate, adaptive bounding box searching
I.
INTRODUCTION
The vehicle license plate is one of identification types of motor vehicle. The shape of vehicle’s plate is
in the form of metal or plastic piece mounted in motor vehicle as formal identification. The mounting of
vehicle’s plate usually mounted in the front or in the rear of the vehicle. Plate’s numbers have certain serial
numbers constitutes of special arrangement of letters and numbers integrated with the information of related
vehicle. The arrangement of these letters and numbers in Indonesia is called police’s numbers[8]. All the data is
covered in motor vehicle registration letter which is the evidence document of vehicle ownership.
The progress in the field of computer technology brings about many benefits for humanity. One of it is in the
field of digital image processing which is widely utilized as a technique in detection and recognizing an object
in a digital image or in a digital video[7]. Motor vehicle license plate detection system is one of the applications
in object recognition technique of an image[3].
The technology of portable computer currently is widespread in public such as smart phones. The
processing speed of smart phone’s microprocessor also is increasing significantly. Along with the development
of portable computer’s hardware, the development of operating system is also increasing rapidly. Motor
vehicle’s plate can be easily captured with common smart phone’s camera so that is not required to use special
equipment such as earth’s surface image capture[5]. Motor vehicle’s plate in Indonesia has standardized
dimension constitutes of colour composition, length, and width of license plate so it is possible in detection of
motor vehicle license plate[8].
The initial stage prior to the implementation of motor vehicle license plate detection is the image
capture by digital camera on smart phone. To simplify the detection of vehicle license plate, the image taken
using smart phone at least should be perpendicular with the vehicle plate object and using the specified distance,
the capture of vehicle plate object image also should not be blocked or covered by other object. The detection
will be difficult to conduct if inside the image there are a lot of writing objects similar to the writing on vehicle
plate. The process of image or object capture from hand phone’s camera also is instrumental in the detection of
motor vehicle license plate[3]. Moreover, background color and vehicle plate’s writing also greatly affecting the
ease of vehicle plate detection. Based on the problem mentioned above can be formulated several issues as; how
to create motor vehicle license plate detection system based on mobile, and how is the performance of motor
vehicle license plate detection system based on mobile.
The objective of this research is to create a software system to perform a detecting or the searching of
motor vehicle plate area on digital image obtained from the outcome of mobile device’s photo in the form of
smart phone which is widely available in public and can be done anywhere (portable). Moreover, the benefits
that can be provided from the preparation of this this research such as the system that will be created is expected
to be able to produce a motor vehicle license plate detection system based on mobile and performs a cropping on
vehicle plate that being found, can be used as a stage of vehicle plate recognition system or plate recognition,
and can be used to collect data of vehicle plate automatically from the result of smart phone’s camera photo.
17
2. Adaptive Bounding Box Searching Method Implementation for the Character…
II.
RESEARCH METHOD
The research method is conducted by using the image on motor vehicle license plate’s object obtained
with mobile camera of capture camera mobile device with the distance range of capture from 1 to 2.5 meter and
perpendicular position to vehicle plate’s object. The outcome of image obtained further subject to be tested such
as resizing, gray-scaling, High Pass Convolution, binary thresholding, which will simplify in the detection
process of motor vehicle license plate[3]. The searching process of vehicle plate location conducted by
searching process of pixel by pixel which qualifies as a feature of vehicle license plate in order to obtain output
cropping of motor vehicle license plate.
Considering the extent of existing problems then in this discussion will be confined several issues such
as: The capture of vehicle plate image performed in the distance range that has been specified before that is
from 1 meter to 2.5 meter and image capture should be motionless, so that will not produce blur or fuzzy effect.
Vehicle plate that will be detected or searched should be facing perpendicular with smart phone’s camera and is
not blocked by the other object. Vehicle plate that will be detected is a legal vehicle plate from One Roof
System Office, without changing physical form or modifying vehicle plate. The type of vehicle plate that will be
detected is non public (personal) vehicle plate, and government vehicle license plate.
The analysis flow of the research conducted are: Problem defining of the application that will be made
to increase the understanding regarding the issue. From this defining can be obtained several problem
formulations and the data collection related to a system design and creation. Understanding of the occurring
processes, so that a data modeling can be performed. The making of software which being implemented on
desktop and running on mobile windows phone 7.5[5]. The testing for software which has been made to insert
several data samples and try the software on several mobile Windows phone 7.5 devices. To draw the
conclusion to find out the result of research and provide suggestions for the development of further applications.
III.
RESULT AND DISCUSSION
License plate detection process is starting from capture image, resizing, gray-scaling, high pass,
thresholding, character detection on test image, the marking of license plate’s candidates, the selection of
vehicle license plate, object cropping of vehicle plate and delivery process of plate image to the computer.
Capture image process is conducted by using the camera on smart phone Nokia Lumia 710 Windows phone 7.5
devices[4]. Image resize is an image resolution changing process (height and width dimension) to be the desired
resolution. Resize is performed due to the limitation of hardware resource on Nokia Lumia 710 device. Resize
process is starting from opening and displaying test image on Picture Box with specified dimension (height =
335 pixels and width = 447 pixels). Test image has 3 (three) color spaces that is Red, Green and Blue. Image
processing on 3 color spaces will consume a lot of hardware resources on a mobile device, therefore test image’s
color is altered first to be a grayscale image. Grayscale process is an average of the value of three color spaces
of R, G, and B, so that the further process is enough to use one of those color spaces.
Detection of vehicle license plate is conducted by the searching of license plate writing’s object in the
image. The amount of white color in test image will make the searching takes a longer time, therefore a process
is performed to sharpen only the edge of the object by using High-Pass method. The using of high-pass kernel in
the picture above will make the outcome to be minus or more than gray limit (255), therefore the result of
convolution by using high-pass kernel is made with minimum limit of pixel value at 0 and maximum limit of
pixel value at 255.
In order to obtain binary image with value of 0 or 255, it is necessary to do thresholding to the
grayscale image mentioned above. Thresholding process is conducted by means of altering pixel value smaller
than threshold value to become 0 and the pixel greater than threshold value to become 255[1]. Thresholding
process is crucial to do since the license plate detection process is conducted in binary image.
Motor vehicle license plate is containing letters and numbers. Character detection is performed by using
reversed L filters. Reversed L filters will check horizontal position (first stage) if pixel value exists continued
with checking vertical position (first stage) if in this position also pixel value exists then this position is the
starting point of a character candidate. Furthermore to determine the height of character candidate by way of
shifting the filter of horizontal section downward until pixel value is not found[3]. The final stage is to
determine character’s width by way of shifting the filter of vertical section to the right until pixel value is not
found. Character’s width in vehicle license plate certainly will not exceed character’s height, if the width found
exceeding character’s height then this object is not license plate’s character.
The marking of license plate’s candidate is conducted by way of comparing ordinate position (Y) of the
adjacent characters. As for the requirements that must be fulfilled among others: The difference of ordinate’s
(Y) character and adjacent character not exceeding from the specified value. The distance width between
adjacent characters should not exceed 2 times of character’s height. The plate’s candidate that fulfills the
requirements will be marked and recorded.
18
3. Adaptive Bounding Box Searching Method Implementation for the Character…
The selection of vehicle license plate’s candidate is performed by way of comparing with legal vehicle
license plate. Comparison process between test license plate’s candidates and legal license plate is conducted
with the stages as follows:
1.
To calculate the pixel’s height and width of motor vehicle license plate manually to obtain reference
value.
2.
Next stage is to calculate the height and width of each candidate found. The image of license plate’s
candidate number 1 has the dimension of height by 17 pixels and width by 20 pixels, whereas the image of
license plate’s candidate number 2 has the height of 13 pixels and width of 75 pixels.
3.
Further stage is to calculate the magnitude of difference between legal license plate which processed
manually and license plate’s candidate obtained by the system.
4.
The final stage is to determine the license plate’s candidate. The defining of license plate’s candidate is
conducted by comparing tolerance value obtained in previous stage with tolerance threshold value of vehicle
license plate. The greater the tolerance value of a license plate’s candidate the greater the accuracy level as a
license plate. The calculation performed in the previous stage, the size of license plate’s candidate number 1 is
not fitting with the size of legal license plate, where tolerance value of license plate’s candidate number 1 is at
327, whereas license plate’s candidate number 2 is closing to the size of legal license plate with tolerance value
is at 13.2.
Cropping process is the final process in detection of motor vehicle license plate. Cropping process is
conducted in accordance with motor vehicle plate’s object coordinate. Vehicle license plate’s object which
lopsided or not aligned will do rotation process to align motor vehicle license plate’s object. Rotation process of
motor vehicle license plate’s object is performed to align motor vehicle license plate’s character. The magnitude
of slope degree can be found by using trigonometric formulas[3]:
or
or
Considering that the research’s result data of license plate detection system is also used in motor
vehicle license plate recognition system, then in motor vehicle license plate detection system based on mobile is
provided with the process to deliver the image of motor vehicle plate to personal computer (PC). Windows
phone does not provide file transfer protocol facility so that data delivery to computer is using socket facility
provided by Microsoft[5]. The image of vehicle license plate’s object which has been found is processed by
cropping process, gray-scaling process, storing height data of a license plate, storing width data of a license
plate and storing all the pixels’ value on the image of motor vehicle license plate’s object. Obtained data is
converted to become text and sends to the computer using socket. Data received by the computer is rearranged
to become a digital image to be stored. The following is the receiving process on personal computer.
Recognition system of motor vehicle license plate further is processing the image to perform character
recognition to the image, where the outcome of character recognition is stored in the form of text file.
Simultaneously on the mobile device side is waiting for the text file to be downloaded.
The Outcome of System Testing
Threshold or test image threshold is a 2 colours image namely black and white. It is required 1 bit in
memory to store both. Binary image is an image which already passed through pixel separation process based on
gray scale degree owned. The forming of binary image requires gray limit value which will be used as a
reference value. Pixel with gray scale degree greater than threshold value (T) will be given the value of 255 and
in contrary pixel with gray scale degree smaller than threshold value (T) will be given the value of 0. The testing
of motor vehicle license plate detection system is performed with 3 (three) threshold values (T) namely T = 96,
T = 127, and T = 150. From test result the outcome is obtained as follows:
The outcome of each object’s testing with varied threshold values (T) has different accuracies which
impacting on the success of motor vehicle license plate detection. The magnitude of accuracy value not
necessarily is a motor vehicle license plate. The accuracy of test result finds a minus value, due to plate’s
candidate is too much differed with reference plate’s object. Accuracy value in the table above also contains “x”
symbol, means that vehicle license plate’s candidate is not found in test image, so that accuracy searching can
not be done[3]. Figure 1 shows the average of values concluded by using threshold value of 127 and the distance
of image capture from 1.5 to 2 meter it is obtained the largest license plate area that is at 90%. It is due to the
distance of image capture from 1.5 to 2 meter, the distance between characters on vehicle license plate clearly
visible and supported with threshold value of 127 making both the information of license plate’s character
object and background object not huddling each other. The distance of image capture from 1 to 1.5 meter with
A.
19
4. Adaptive Bounding Box Searching Method Implementation for the Character…
threshold value of 96 making character object huddling with other character object and with background object,
meanwhile the distance of image capture from 2 to 2.5 meter with threshold value of 150 making a lot of
information in the image lost so that the marking of license plate’s character is failed to be done.
Shooting Distance
Figure 1. Comparison graphics of threshold values.
Character position on motor vehicle license plate’s object obviously will not differ much with other
character object. Position tolerance of each character will be crucial whether the group of such character objects
constitutes vehicle plate’s objects or not. Variation of values which used in this comparison is between 0 pixel, 5
pixels, and 10 pixels. The greater the tolerance value is, then the greater the difference of position’s height gap
between characters which being received as motor vehicle license plate’s candidate. The test result of each
object with difference value variation of character position’s height has different accuracies impacting on the
success rate of motor vehicle license plate detection. The magnitude of accuracy value is not necessarily a motor
vehicle license plate. The accuracy of test result finds a minus value, due to plate’s candidate is too much
different with reference plate’s object. Accuracy value in the table above also contains the symbol of “x”, means
vehicle license plate’s candidate is not found on test image, so that the searching of accuracy can not be done.
Figure 2 can be shows the average of values concluded by using difference value of character
position’s height 5 and the distance of image capture from 1.5 to 2 meter it gets the largest license plate area that
is at 90%. Difference value of character position’s height 10 is making the non character object located next to
the plate also joining to become vehicle license plate’s candidate, so that when tested with reference plate,
accuracy becomes exceeding tolerance limit. Whereas difference value of character position’s height 0 requires
each character candidate found is in parallel with other character candidates. The result of system testing with
tolerance of 10%, 20%, and 30% is providing different accuracies. This tolerance value aims to compare the
differences between test vehicle license plate’s object with vehicle plate’s object specified manually. The result
of each object testing with tolerance value variation has different accuracies impacting on the success rate of
motor vehicle license plate detection. The magnitude of accuracy value is not necessarily a motor vehicle license
plate. The accuracy of test result finds a minus value, due to plate’s candidate is too much differed with
reference plate’s object. Accuracy values in the table above also contains “x” symbol, means that vehicle license
plate’s candidate is not found on test image, so that accuracy searching can not be done.
Shooting Distance
Figure 2. Comparison graphics of difference values of character position’s height.
Graphics comparison in Figure 3 shows the average of values that concluded by using tolerance value
of 30% and the distance of image capture from 1.5 to 2 meter it gets the largest license plate area that is at 88%.
20
5. Adaptive Bounding Box Searching Method Implementation for the Character…
Motor vehicle license plate’s candidate found has different accuracy with other vehicle license plate’s
candidates, starting from 100% which means perfect (equal with reference plate) up to minus which means very
much differed with reference plate. Tolerance value of 30% provides more leniency for vehicle license plate’s
candidate, can be assumed that accuracy value of license plate’s candidate at minimum of 70% to be categorized
as a license plate. Tolerance value of 20% is smaller than tolerance value of 30% leads to the accuracy of license
plate’s candidate to be below 80% and is ignored by system, so that if there is a license plate’s candidate having
accuracy below 80% it will not being processed further (failed), as well as tolerance value of 10% where the
minimum accuracy of vehicle license plate is at 90%.
Shooting Distance
Figure 3. Graphics comparison of the system testing with values of tolerance and distance taking
Result Analysis
From several system testing that being conducted, can be concluded that some parameter values which
being used are very instrumental in the system success to detect motor vehicle license plate. System testing that
has been conducted by using good threshold value is at 127.
The value of T = 127 making character object on license plate is marked neatly, no more character
candidate which being marked in the left and right side of vehicle license plate’s object. Thus license plate’s
character object allows the mistakes or errors to be suppressed. Binary threshold value of T = 96 is seemed to
leave a lot of pixels on test image so that making considerable character candidates for vehicle license plate,
even objects behind vehicle license plate also marked as character candidates. Binary threshold value of T = 150
is seemed in the picture above too much eliminating character objects on the license plate, objects behind
vehicle license plate also being marked because the object underlining being cut off due to threshold value being
too big, so that the object which has the same criteria also being marked. Further system testing is to compare
the variation of difference value of character position’s height. The object’s position in the motor vehicle license
plate is not all being perpendicular. The tilt in vehicle license plate’s object is impacting the difference in
character position of vehicle license plate. Test result conducted by using value comparison of height
differences of character position at 5 pixels shows the highest accuracy. From the graphic of test result above
shows that with value comparison of height differences of character position at 10 pixels is less accurate.
Excessive height differences of character position is making too much non character objects in the plate takes
part to become vehicle plate’s character object candidate, so that vehicle license plate becomes long.
Meanwhile by using value comparison of height differences of character position 0 requires each
vehicle license plate’s character to be parallel in order to get motor vehicle license plate area. The last system
testing is to check tolerance value on license plate’s candidate by way of subjectively (manual reasoning). This
test is using the comparison of height and width of test plate compared to height and width of manually counted
plate. From test result that has been conducted, with tolerance of 30% system accuracy is very high compared to
tolerance value of 10% or 20%. It is due to tolerance of test plate’s candidate obtained lies over 20% or the
accuracy of license plate’s candidate lies below 80% so that the system ignores it to be processed.
B.
IV.
CONCLUSIONS
Based on discussion elaboration and result analysis can be concluded several issues suc as; this
research has successfully performing detection of motor vehicle license plate on the Nokia Lumia Windows
phone 7 devices. The processes which being conducted in detection system of vehicle license plate consisting
high-pass, binary process, character detection of motor vehicle license plate by using Adaptive size bounding
box searching, searching for the candidate of motor vehicle license plate, comparing the candidate of license
plate with reference license plate, cropping, and sending text data of vehicle license plate. For the best threshold
21
6. Adaptive Bounding Box Searching Method Implementation for the Character…
value to change an image to become good binary image is 127, the best magnitude of value for height difference
of character position is at 5 pixels, and the best tolerance value of testing the candidate of vehicle license plate is
30%.
ACKNOWLEDGMENT
A great appreciation goes to promoter, colleague and everybody who has made valuable contributions
in this study and their critical comments on this manuscript.
REFERENCES
[1].
[2].
[3].
[4].
[5].
[6].
[7].
[8].
[9].
Ardisasmita,M.S., Pengolahan Citra Digital Dan Analisis Kuanntatif Dalam Karakterisasi Citra
Mikroskopik., Journal Mikroskopi dan Mikroanalisis, Vol3 No.1, 2000, ISSN 1410-5594
Hartanto, B. 2009. Membuat Program-program Keren dengan Visual C# .Net Secara Mudah. Andi
Offset : Yogyakarta
Heerden, R. P. 2002. Hidden Markov Models for Robust Recognition of Vehicle Licence Plates. South
Africa : University of Pretoria
Petzold, C. 2010. Programming Windows Phone 7. Microsoft Press: United States of America
Pramudya, P., 2011. Membuat Aplikasi Untuk Windows Phone. Andi Offset:Yogyakarta
Simarmata, J; Chandra, T. 2007. Grafika Komputer. Andi Offset : Yogyakarta
Sutoyo, T; Mulyanto, E; Suhartono, V; Dwi Nurhayati, O; Wijanarto. 2009. Teori Pengolahan Citra
Digital. Andi Offset : Yogyakarta
http://id.wikipedia.org/wiki/Nomor_polisi, accessed : 10 July 2010.
http://pengolahancitra.com/index.php?option=com_content&task=view&id=42&Itemid=26, accessed :
14 July 2010.
22