C Patel, D Shah, A Patel - International Journal of Computer …, 2013 - researchgate.net
Traffic control and vehicle owner identification has become major problem in every country. Sometimes it becomes difficult to identify vehicle owner who violates traffic rules and drives …
R Panahi, I Gholampour - IEEE Transactions on intelligent …, 2016 - ieeexplore.ieee.org
This paper presents an online highly accurate system for automatic number plate recognition (ANPR) that can be used as a basis for many real-world ITS applications. The …
This paper aims to identify the license plates under difficult image conditions, such as low/high contrast, foggy, distorted, and dusty conditions. This paper proposes an efficient …
H Paruchuri - ABC Journal of Advanced Research, 2015 - i-proclaim.my
Vehicle owner documentation and traffic flow mechanism have contributed to a major issue in each country. From time to time it turns out to be challenging to detect car owners who …
Data compression techniques allow data size to be reduced prior to data transmission and involve decompression upon transfer. This study shows for the first time that license plate …
MH Dashtban, Z Dashtban… - International Journal of …, 2011 - researchgate.net
In this paper, a general approach for international vehicle license plate localization and recognition is proposed. A hybrid solution is presented with combining basic machine vision …
Traffic car images suffer immensely from various degrading factors that make it hard to localize license plates. Each license plate localization (LPL) method has its own advantages …
L Zhu, S Wang, C Li, Z Yang - Journal of Intelligent Systems, 2019 - degruyter.com
Multiple surveillance cameras provide huge video resources that need further mining to collect traffic stream data such as license plate recognition (LPR). However, these …
M Wafy, AMM Madbouly - IET Intelligent Transport Systems, 2016 - Wiley Online Library
The detection and identification of license plates from captured images have been widely studied over the past two decades. The demand for this technology in security and …