archive-org.com » ORG » I » IJORCS.ORG

Total: 231

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • A Robust and Adaptable Method for Face Detection Based on Color Probabilistic Estimation Technique
    optimal threshold tuning Then from the skin region facial features have been extracted to get the face from the skin region In the results section the proposed approach is applied on FEI database and the accuracy rate reached 99 25 The proposed approach can be used for all kinds of skin using train stage which is the main advantage among the other advantages such as Low noise sensitivity and low computational complexity References Cited By S L Phung A Bouzerdoum and D Chai Skin Segmentation Using Color and Edge Information In Proc of International Symposium on Signal Processing and its Applications Vol 1 Paris France 2003 pp 525 528 P Kakumanu S Makrogiannis and N Bourbakis A Survey of Skin color Modeling and Detection Methods Pattern Recognition Vol 40 pp 1106 1122 2007 doi 10 1016 j patcog 2006 06 010 L Sigal S Sclaroff and V Athitsos Skin Color based Video Segmentation Under time varying Illumination IEEE Transaction on Pattern Analysis and Machine Intelligence Vol 26 No 6 pp 862 877 2004 doi 10 1109 TPAMI 2004 35 R L Hsu M Abdel Mottaleb and A K Jain Face detection in color Images IEEE Transaction on Pattern Analysis and Machine Intelligence Vol 24 No 5 pp 696 706 2002 Z Qiang Ch Kwang Ting W Ching Tung and W Yi Leh Adaptive learning of an accurate skin color model In Proc of the Sixth IEEE international conference on automatic face and gesture recognition Seoul Korea 2004 pp 37 42 M H Yang and N Ahuja Gaussian mixture model for human skin color and its applications in image and video databases In Proc of SPIE Storage and Retrieval for Image and Video Databases pp 458 466 Jan 1999 H Wu Q Chen and M Yachida Face detection from color images using a fuzzy pattern matching method IEEE Transaction on Pattern Analysis and Machine Intelligence Vol 21 No 6 pp 557 563 1999 Crowley J L and Coutaz J Vision for Man Machine Interaction Robotics and Autonomous Systems Vol 19 pp 347 358 1997 doi 10 1016 S0921 8890 96 00061 9 Cahi D and Ngan K N Face Segmentation Using Skin Color Map in Videophone Applications IEEE Transaction on Circuit and Systems for Video Technology Vol 9 pp 551 564 1999 Kjeldsen R and Kender J Finding Skin in Color Images Proceedings of the Second International Conference on Automatic Face and Gesture Recognition 1996 pp 312 317 doi 10 1109 AFGR 1996 557283 M A Akhloufi X Maldague and W B Larbi A New Color Texture Approach for Industrial Products Inspection Journal of multimedia Vol 3 No 3 pp 44 50 July 2008 doi 10 4304 jmm 3 3 44 50 H Y Patil S V Bharambe A G Kothari and K M Bhurchandi Face Localization and its Implementation on Embedded Platform 3rd IEEE International Advance Computing Conference IACC 2013 pp 741 745 doi 10 1109 IAdCC 2013 6514319 R Azad H R Shayegh Novel and Tuneable Method for Skin

    Original URL path: http://www.ijorcs.org/manuscript/id/72/reza-azad/a-robust-and-adaptable-method-for-face-detection-based-on-color-probabilistic-estimation-technique (2016-05-01)
    Open archived version from archive


  • Text Independent Biometric Speaker Recognition System
    in MATLAB References Cited By Alexander A Botti F Dessimoz D Drygajlo A The effect of mismatched recording conditions on human and automatic speaker recognition in forensic applications Forensic Science International 146S December 2004 pp 95 99 doi 10 1016 j forsciint 2004 09 078 Gonzalez Rodriguez J Garcia Gomar D G R M Ramos Castro D Ortega Garcia J Robust likelihood ratio estimation in Bayesian forensic speaker recognition In Proc 8th European Conf on Speech Communication and Technology Eurospeech 2003 Geneva Switzerland September 2003 pp 693 696 Niemi Laitinen T Saastamoinen J Kinnunen T Fränti P 2005 Applying MFCC based automatic speaker recognition to GSM and forensic data In Proc Second Baltic Conf on Human Language Technologies HLT 2005 Tallinn Estonia April 2005 pp 317 322 doi 10 1016 j specom 2009 08 009 Pfister B Beutler R 2003 Estimating the weight of evidence in forensic speaker verification In Proc Eighth European Conf on Speech Communication and Technology Eurospeech 2003 Geneva Switzerland September 2003 pp 701 704 Thiruvaran T Ambikairajah E Epps J 2008 FM features for automatic forensic speaker recognition In Proc Interspeech 2008 Brisbane Australia September 2008 pp 1497 1500 Palden Lama and Mounika Namburu Speech Recognition with Dynamic Time Warping using MATLAB CS 525 SPRING 2010 PROJECT REPORT B H Juang L R Rabiner Automatic Speech Recognition A Brief History of the Technology Development Elsevier Encyclopedia of Language and Linguistics 2005 R P Lippmann Review of Neural Networks for Speech Recognition Readings in Speech Recognition A Waibel and K F Lee Editors Morgan Kaufmann Publishers pp 374 392 1990 B H Juang C H Lee and Wu Chou Minimum Classification Error Rate Methods for Speech Recognition IEEE Trans Speech Audio Processing T SA vo 5 No 3 pp 257 265 May 1997 doi 10 1109 89 568732 L R Bahl P F Brown P V deSouza and L R Mercer Maximum Mutual Information Estimation of Hidden Markov Model Parameters for Speech Recognition Proc ICASSP 86 Tokyo Japan pp 49 52 April 1986 doi 10 1109 ICASSP 1986 1169179 S Furui Fifty years of progress in speech and speaker recognition Proc 148th ASA Meeting 2004 doi 10 1121 1 4784967 S K Singh Prof P C Pandey Features and Techniques for Speaker Recognition M Tech Credit Seminar Report Electronic Systems Group EE Dept IIT Bombay submitted Nov 03 Davis S Mermelstein P Comparison of Parametric Representations for Monosyllabic Word Recognition in Continuously Spoken Sentences In IEEE Transactions on Acoustics Speech and Signal Processing Vol 28 No 4 pp 357 366 1980 doi 10 1109 TASSP 1980 1163420 Vector Quantizer Encoder Blocks Signal Processing Blockset The Mathworks incorporation 1982 2008 ITU T Recommendation G 711 Pulse Code Modulation PCM of Voice Frequencies General Aspects of Digital Transmission Systems Terminal Equipments International Telecommunication Union ITU 1993 Beigi Homayoon 2011 Fundamentals of Speaker Recognition Online Available http www wikipedia org wiki speaker recognition Course project Fall 2009 Voice Recognition Using MATLAB California State University Northridge during the semester Online Available

    Original URL path: http://www.ijorcs.org/manuscript/id/73/luqman-gbadamosi/text-independent-biometric-speaker-recognition-system (2016-05-01)
    Open archived version from archive

  • LB2CO: A Semantic Ontology Framework for B2C eCommerce Transaction on the Internet
    sharing and the ease of communication between every entity in the domain Through human semantic interaction with the web resources machines to interpret the data published in a machine interpretable form under web However the theoretical practice of business ontology in eCommerce domain is quite a few especially in the section of electronic transaction and the various techniques used to obtain efficient communication across spheres are error prone and are not always guaranteed to be efficient in obtaining desired result due to poor semantic integration between entities To overcome the poor semantic integration this research focuses on proposed ontology called LB2CO which combines the framework of IDEF5 SNAP as an analysis tool for automated recommendation of product and services and create effective ontological framework for B2C transaction communication across different business domains that facilitates the interoperability integration of B2C transactions over the web References Cited By Oscar Corcho Asunción Gómez pérez Facultad De Informática Solving Integration Problems of E Commerce Standards and Initiatives Through Ontological Mappings International Journal of Intelligent Systems vol 16 no 16 2001 Mike Uschold Martin King Stuart Moralee and Yannis Zorgios The Enterprise Ontology The Knowledge Engineering Review vol 13 no 1 pp 31 89 1998 doi 10 1017 S0269888998001088 T Berners Lee J Hendler and O Lassila The semantic web The Scientific American 284 5 pp 29 37 2001 T Berners Lee and J Hendler 2001 Scientific Publishing on the semantic web Nature Science Journals Online Available http www nature com nature debates e access Articles bernerslee html M Uschold M Gruninger Ontologies Principles Methods and Applications In Knowledge Engineering Review vol 11 no 2 pp 93 155 1996 Deborah L McGuinness Ontologies Come of Age Spinning the Semantic Web Bringing the World Wide Web to Its Full Potential MIT Press 2003 Decker Stefan Brickley D Saarela J Angele J A query and inference service for RDF Proceedings of the W3C Query Language Workshop QL 98 vol 96 1998 Elena Simperl Christoph Tempich Tobias Bürger Methodologies for the creation of semantic data Miguel Angel Sicilia ed Handbook of Metadata Semantics and Ontologies World Scientific Publishing Co 2011 Online Available http www ksl svc stanford edu 5915 doc frame editor glossary of terms html Knowledge Based Systems Inc KBSI IDEF5 Ontology Description Capture Overview IDEF5 Overview Online Available http www idef com idef5 html Zhang Pengyi Yan Qu Chen Huang Designing a Multi Layered Ontology for the Science and Technology Innovation Concept Knowledge Base 44th Hawaii International Conference on System Sciences HICSS pp 1 10 2011 doi 10 1109 HICSS 2011 147 T R Gruber A translation approach to portable ontology specifications Knowledge Acquisition vol 5 no 2 pp 199 220 1993 doi 0 1006 knac 1993 1008 Adam Farquhar Richard Fikes James Rice The Ontolingua Server a Tool for Collaborative Ontology Construction Online Available http ksi cpsc ucalgary ca KAW KAW96 farquhar farquhar html Hongbing Wang Joshua Zhexue Huang Yuzhong Qu Junyuan Xie Web services problems and future directions Web Semantics Science Services and Agents

    Original URL path: http://www.ijorcs.org/manuscript/id/75/akanbi-adeyinka-k/lb2co-a-semantic-ontology-framework-for-b2c-ecommerce-transaction-on-the-internet (2016-05-01)
    Open archived version from archive

  • A Two-Level Autonomous Intrusion Detection Model Inspired by the Immune System
    system whose autonomous agents do not need maintenance and detects intrusions without relying on any other central elements just by using their own learning and interaction capability References Cited By U A Sandhu A Haider S Naseer O U Ateeb A Survey of Intrusion Detection Prevention Techniques 16th Singapore International Conference on Information Communication and Management 2011 pp 66 71 M Roesch Snort Lightweight Intrusion Detection for Networks 13th Washington USENIX conference on System administration 1999 pp 229 238 L Panait S Luke Cooperative Multi Agent Learning The State of the Art Autonomous Agents and Multi Agent Systems 11 3 pp 387 434 November 2005 doi 10 1007 s10458 005 2631 2 L N de Castro F J Von Zuben Learning and Optimization using the Clonal Selection Principles IEEE Transactions on Evolutionary Computation 6 3 pp 239 251 June 2002 doi 10 1109 TEVC 2002 1011539 L N de Castro F J Von Zuben aiNet an Artificial Immune Network for Data Analysis In Abbass H A Sarker R A Newton C S Eds Data Mining A Heuristic Approach pp 231 259 Idea Group Publishing USA 2001 P K Harmer P D Williams G H Gunsch G B Lamont A Artificial Immune System Architecture for Computer Security Applications IEEE Transactions on Evolutionary Computation 6 3 pp 252 280 June 2002 doi 10 1109 TEVC 2002 1011540 G Funk A Barbour H Hengartner U Kalinke Mathematical Model of a Virus Neutralizing Immunglobulin Response Journal of theoretical biology 195 1 pp 41 52 November 1998 doi 10 1006 jtbi 1998 0779 S Forrest C Beauchemin Computer Immunology Immunological Reviews 216 1 pp 176 197 April 2007 doi 10 1111 j 1600 065X 2007 00499 x D E Kirschner G F Webb A Mathematical Model of Combined Drug Therapy of HIV Infection Journal of Theoretical Medicine 1 1 pp 25 34 1997 doi 10 1080 10273669708833004 R J DeBoer P Hogeweg H F J Dullens Macrophage T Lymphocyte Interactions in the Anti Tumor Immune Response A Mathematical Model Journal of Immunology 134 1 pp 2748 2758 1985 S Bandini Hyper Cellular Automata for the Simulation of Complex Biological Systems a Model for the Immune System International Journal of Applied Science and Computation 3 pp 1 1996 N Fachada SimulIm an Application for the Modelling and Simulation of Complex Systems Using the Immune System as an Example Graduation project report Higher Technical Institute Technical University of Lisbon 2005 A Emerson E Rossi ImmunoGrid The Virtual Human Immune System Project Stud Health Technol Inform 126 pp 87 92 2007 C Bianca M Pennisi Immune system modelling by top down and bottom up approaches International Mathematical Forum 7 3 pp 109 128 2012 C M Ou Host based Intrusion Detection Dystems Adapted from Agent based Artificial Immune Systems Neurocomputing 88 pp 78 86 July 2012 doi 10 1016 j neucom 2011 07 031 R B Machado A Boukerche J B M Sobral K R L Juc a M S M A Notare A Hybrid Artificial Immune and

    Original URL path: http://www.ijorcs.org/manuscript/id/76/elnaz-b-noeparast/a-two-level-autonomous-intrusion-detection-model-inspired-by-the-immune-system (2016-05-01)
    Open archived version from archive

  • Optimized Method for Iranian Road Signs Detection and Recognition System
    Recognition Using Color Shape and Motion Information Proceedings of the 2005 IEEE Intelligent Vehicles Symposium Las Vegas USA June 6 8 2005 doi 10 1109 IVS 2005 1505111 M Benallal and J Meunier Real time color segmentation of road signs Electrical and Computer Engineering 2003 IEEE CCECE 2003 Canadian Conference on vol 3 pp 1823 1826 vol 3 May 2003 doi 10 1109 CCECE 2003 1226265 L Estevez and N Kehtarnavaz A real time histographic approach to road sign recognition Image Analysis and Interpretation 1996 Proceedings of the IEEE Southwest Symposium on pp 95 100 Apr 1996 doi 10 1109 IAI 1996 493734 S Varun S Singh R S Kunte R D S Samuel and B Philip A road traffic signal recognition system based on template matching employing tree classifier in ICCIMA 07 Proceedings of the International Conference on Computational Intelligence and Multimedia Applications ICCIMA 2007 Washington DC USA IEEE Computer Society 2007 pp 360 365 doi 10 1109 ICCIMA 2007 190 A Broggi P Cerri P Medici P Porta and G Ghisio Real time road signs recognition Intelligent Vehicles Symposium 2007 IEEE pp 981 986 June 2007 doi 10 1109 IVS 2007 4290244 A Ruta Y Li and X Liu Detection tracking and recognition of traffic signs from video input Oct 2008 pp 55 60 doi 10 1109 ITSC 2008 4732535 W J Kuo and C C Lin Two stage road sign detection and recognition Multimedia and Expo 2007 IEEE International Conference on pp 1427 1430 July 2007 doi 10 1109 ICME 2007 4284928 G Piccioli E D Micheli P Parodi and M Campani Robust method for road sign detection and recognition Image and Vision Computing vol 14 no 3 pp 209 223 1996 doi 10 1016 0262 8856 95 01057 2 P Pacl ık J Novoviˇcov a P Pudil and P Somol Road sign classification using laplace kernel classifier Pattern Recogn Lett vol 21 no 13 14 pp 1165 1173 2000 C Y Fang S W Chen and C S Fuh Road sign detection and tracking vol 52 no 5 pp 1329 1341 Sep 2003 A D L Escalera J M A Armingol and M Mata Traffic sign recognition and analysis for intelligent vehicles Image and Vision Computing vol 21 pp 247 258 2003 X Gao L Podladchikova D Shaposhnikov K Hong and N Shevtsova Recognition of traffic signs based on their colour and shape features extracted using human vision models Journal of Visual Communication and Image Representation vol 17 no 4 pp 675 685 2006 doi 10 1016 j jvcir 2005 10 003 G Loy Fast shape based road sign detection for a driver assistance system in In IEEE RSJ International Conference on Intelligent Robots and Systems IROS 2004 pp 70 75 doi 10 1109 IROS 2004 1389331 C Paulo and P Correia Automatic detection and classification of traffic signs in Image Analysis for Multimedia Interactive Services 2007 WIAMIS 07 Eighth International Workshop on June 2007 doi 10 1109 WIAMIS 2007 24 D Gavrila Traffic sign recognition

    Original URL path: http://www.ijorcs.org/manuscript/id/77/reza-azad/optimized-method-for-iranian-road-signs-detection-and-recognition-system (2016-05-01)
    Open archived version from archive

  • Scalable Honeynet Based on Artificial Intelligence Utilizing Cloud Computing
    view of cloud computing Communications of the ACM 53 4 pp 50 58 2010 doi 10 1145 1721654 1721672 Qi Zhang Lu Cheng Raouf Boutaba Cloud computing state of the art and research challenges Journal of Internet Services and Applications vol 1 issue1 pp 7 18 2010 doi 10 1007 s13174 010 0007 6 Rajkumar Buyya Chee Shin Yeo Srikumar Venugopal James Broberg Ivona Brandic Cloud computing and emerging IT platforms Vision hype and reality for delivering computing as the 5th utility Future Generation computer systems vol 25 issue 6 pp 599 616 doi 10 1016 j future 2008 12 001 Peter Mell Timothy Grance The NIST definition of cloud computing NIST special publication 800 145 2011 Katarina Stanoevska Slabeva Thomas Wozniak Cloud basics an introduction to cloud computing Grid and Cloud Computing Springer Berlin Heidelberg pp 47 61 2010 doi 10 1007 978 3 642 05193 7 4 Hui Jie Ding Traffic Flow Data Collection and Signal Control System Based on Internet of Things and Cloud Computing Advanced Materials Research vol 846 pp 1608 1611 2013 doi 10 4028 www scientific net AMR 846 847 1608 Nuno Santos Krishna P Gummadi Rodrigo Rodrigues Towards trusted cloud computing Conference on Hot topics in cloud computing pp 3 2009 doi Peter Mell Tim Grance Effectively and securely using the cloud computing paradigm NIST Information Technology Lab 2009 L Wang J Tao M Kunze A C Castellanos D Kramer W Karl Scientific cloud computing Early definition and experience 10th IEEE International Conference on High Performance Computing and Communications HPCC 08 pp 830 2008 doi 10 1109 HPCC 2008 38 Bernd Grobauer Thomas Schreck Towards incident handling in the cloud challenges and approaches ACM workshop on Cloud computing security workshop pp 77 86 2010 doi 1 0 1145 1866835 1866850 Chang Lung Tsai Uei Chin Lin A Y Chang Chun Jung Chen Information security issue of enterprises adopting the application of cloud computing Sixth International Conference Networked Computing and Advanced Information Management pp 645 649 2010 Sean Carlin Kevin Curran Cloud computing security International Journal of Ambient Computing and Intelligence IJACI vol 3 no 1 pp 14 19 2011 Yanpei Chen Vern Paxson Randy H Katz What s new about cloud computing security University of California Berkeley Report No UCB EECS 2010 5 2010 Borko Furht Armando J Escalante Handbook of cloud computing Springer Publishing Company Incorporated 2010 Brendan Cully Geoffrey Lefebvre Dutch Meyer Mike Feeley Norm Hutchinson Andrew Warfield Remus High availability via asynchronous virtual machine replication Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation pp 161 174 2008 K Nance B Hay M Bishop Investigating the implications of virtual machine introspection for digital forensics International Conference on Availability Reliability and Security ARES 09 pp 1024 1029 2009 doi 10 1109 ARES 2009 173 Avi Kivity Yaniv Kamay Dor Laor Uri Lublin Anthony Liguori KVM the Linux virtual machine monitor Proceedings of the Linux Symposium vol 1 pp 225 230 2007 F Lombardi R Di Pietro Secure virtualization

    Original URL path: http://www.ijorcs.org/manuscript/id/78/nogol-memari/scalable-honeynet-based-on-artificial-intelligence-utilizing-cloud-computing (2016-05-01)
    Open archived version from archive

  • Algebraic Fault Attack on the SHA-256 Compression Function
    Rounds of DES European Smart Card Security Conference eSmart 10 2010 pp 22 24 R Li C Li C Gong Differential fault analysis on SHACAL 1 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography FDTC 2009 pp 120 126 doi 10 1109 FDTC 2009 41 P Dusart G Letourneux O Vivolo Differential Fault Analysis on A E S 1st International Conference of Applied Cryptography and Network Security ACNS 03 Springer Berlin Heidelberg 2003 LNCS 2846 pp 293 306 doi 10 1007 978 3 540 45203 4 23 J Hoch and A Shamir Fault Analysis of Stream Ciphers 6th International Workshop on Cryptographic Hardware and Embedded Systems CHES 04 Springer Berlin Heidelberg 2004 LNCS 3156 pp 41 51 doi 10 1007 978 3 540 28632 5 18 E Biham L Granboulan P Q Nguyen Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4 12th International Workshop of Fast Software Encryption FSE 05 Springer Berlin Heidelberg 2005 LNCS 3557 pp 359 367 doi 10 1007 11502760 24 M Agoyan J M Dutertre D Naccache B Robisson A Tria When clocks fail On critical paths and clock faults the ninth Smart Card Research and Advanced Application IFIP Conference CARDIS 10 Springer Berlin Heidelberg 2010 LNCS 6035 pp 182 193 doi 10 1007 978 3 642 12510 2 13 H Bar El H Choukri D Naccache M Tunstall C Whelan The Sorcerer s Apprentice Guide to Fault Attacks Proceedings of the IEEE vol 94 issue 2 pp 370 382 doi 10 1109 JPROC 2005 862424 A Barenghi L Breveglieri I Koren D Naccache Fault injection attacks on cryptographic devices Theory practice and countermeasures Proceedings of the IEEE vol 100 issue 11 pp 3056 3076 doi 10 1109 JPROC 2012 2188769 O Dunkelman N Keller A Shamir ALRED blues New attacks on AES based MACs Cryptology ePrint Archive Report 2011 095 Online Available http eprint iacr org 2011 095 M Soos K Nohl C Castelluccia Extending SAT Solvers to Cryptographic Problems Twelfth International Conference on Theory and Applications of Satisfiability Testing SAT 09 Springer Berlin Heidelberg 2009 LNCS 5584 pp 244 257 doi 10 1007 978 3 642 02777 2 24 Y Sasaki Cryptanalyses on a Merkle Damgård Based MAC Almost Universal Forgery and Distinguishing H Attacks 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques EUROCRYPT 12 Springer Berlin Heidelberg 2012 LNCS 7237 pp 411 427 doi 10 1007 978 3 642 29011 4 25 J Kang K Jeong J Sung S Hong Differential Fault Analysis on HAS 160 Compression Function The 4th FTRA International Conference on Computer Science and its Applications CSA 12 Springer Berlin Heidelberg 2012 LNEE 203 PP 97 105 doi 10 1007 978 94 007 5699 1 11 L Wei T Zhi G Dawu W Yi L Zhiqiang L Ya Differential Fault Analysis on the MD5 Compression Function Journal of Computers 8 11 pp 2888 2894 Nov 2013 doi 10 4304 jcp 8 11 2888 2894 M Hojsik and B Rudolf Floating fault analysis

    Original URL path: http://www.ijorcs.org/manuscript/id/79/ronglin-hao/algebraic-fault-attack-on-the-sha-256-compression-function (2016-05-01)
    Open archived version from archive

  • Real-Time Multiple License Plate Recognition System
    License plate automatic detection and recognition using level sets and neural networks 1st International Conference on Communications Signal Processing and their Applications IEEE 2013 pp 1 5 doi 10 1109 ICCSPA 2013 6487280 C N E Anagnostopoulos I E Anagnostopoulos I D Psoroulas V Loumos and E Kayafas License plate recognition from still images and video sequences A survey IEEE Trans Intell Transp Syst ol 9 no 3 2008 pp 377 391 doi 10 1109 TITS 2008 922938 R Azad B Azad and H R Shayegh Real Time and Efficient Method for Accuracy Enhancement of Edge Based License Plate Recognition System International Conference on Computer Information Technology and Digital Media 2013 pp 1 10 B Hongliang and L Changping A hybrid license plate extraction method based on edge statistics and morphology in Proc ICPR pp 831 834 2004 doi 10 1109 ICPR 2004 1334387 H J Lee S Y Chen and S Z Wang Extraction and recognition of license plates of motorcycles and vehicles on highways in Proc ICPR pp 356 359 2004 doi 10 1109 ICPR 2004 1333776 A Broumandnia and M Fathy Application of pattern recognition for Farsi license plate recognition presented at the ICGST Int Conf Graphics Vision and Image Processing GVIP Dec 2005 C T Hsieh Y S Juan and K M Hung Multiple license plate detection for complex background in Proc Int Conf AINA vol 2 pp 389 392 2005 doi 10 1109 AINA 2005 257 D S Kim and S I Chien Automatic car license plate extraction using modified generalized symmetry transform and image warping in Proc ISIE 2001 pp 2022 2027 doi 10 1109 ISIE 2001 932025 K Deb M K Hossen M I Khan and M R Alam Bangladeshi vehicle license plate detection method based on HSI color model and geometrical properties IEEE 7th International Forum Strategic Technology IFOST pp 1 5 2013 doi 10 1109 IFOST 2012 6357650 R Azad F Davami and B Azad novel and robust method for automatic license plate recognition system based on pattern recognition Advances in Computer Science an International Journal Vol 2 Issue 3 No 4 July 2013 pp 64 70 F Aghdasi and H Ndungo Automatic license plate recognition system in Proc AFRICON Conf Africa vol 1 2004 pp 45 50 doi 10 1109 AFRICON 2004 1406631 T Nukano M Fukumi and M Khalid Vehicle license plate character recognition by neural networks in Proc Int Symp Intell Signal Process Commun Syst 2004 pp 771 775 doi 10 1109 ISPACS 2004 1439164 R Juntanasub and N Sureerattanan A simple OCR method from strong perspective view in Proc Appl Imagery Pattern Recognit Workshop 2004 pp 235 240 doi 10 1109 AIPR 2004 8 K Kanayama Y Fujikawa K Fujimoto and M Horino Development of vehicle license number recognition system using real time image processing and its application to travel time measurement in Proc IEEE Veh Tech Conf May 1991 pp 798 804 doi 10 1109 VETEC 1991 140605 K Miyamoto K Nagano M Tamagawa I Fujita

    Original URL path: http://www.ijorcs.org/manuscript/id/80/babak-azad/real-time-multiple-license-plate-recognition-system (2016-05-01)
    Open archived version from archive



  •