LICENSE PLATE CHARACTER RECOGNITION USING BACK PROPAGATION ALGORITHM
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 5
Abstract
License Plate Recognition (LPR) technology is one of the most important parts in Intelligent Transport System (ITS), including License Plate Location, Characters Segmentation and Characters Recognition. The neural network pattern recognition is one of the important research areas in the field of pattern recognition recently. The non-linear and ability of self-study and self-organization make it have unique prevalence. The project chooses the recognition method based on Back Propagation (BP) neural network, and character recognition. In this consultancy project, a smart and simple algorithm is proposed for all kinds of license plate recognition system. The proposed algorithm consists of three major stages: License Plate Localization, Segmentation of Characters and Recognition of segmented characters. In order to recognize the license plate, the number plate area has to be first located in the image. The goal of localization is to eliminate all the background and preserve only the number plate area from the input image. From this number plate area, the individual characters are then segmented out and recognized.
Authors and Affiliations
T. Selvakani, , Dr. N. Krishnan,
Mitigating Denial of Service Attacks in Wireless Networks
The open nature of the wireless media becomes a root cause for denial of service attack. Denial of Service (DOS) can be different types and disrupt multiple layers. The idea here is to prevent the cyberspace from DOS att...
Quantify the intersection of behavior in the work environment
—This is the study of intersection of behaviour to analyze the behaviour of users in the social networking environment. We have so many opportunities and challenges to analyze the behaviour on a large scale. A so...
EVALUATE FAKE OBJECTS TO PREDICTS UNAUTHENTICATED DEVELOPERS
Abstract: Modern business activities rely on extensive email exchange. Email leakages have become widespread, and the severe damage caused by such leakages constitutes a disturbing problem for organizations. In t...
Optimizing Web Mining using Multi-agent System
Data mining concepts and techniques when applied to world-wide web with its existing technologies are termed as web mining. With flooding of information on World-wide web it has become necessary to apply some strateg...
A SURVEY ON AD-HOC IN WIRELESS SENSOR NETWORKS
- This paper says the performance of wireless ad hoc network. A wireless network has several types in it. For more expedient usage in the wireless trait ad hoc network is introduced. Ad-hoc network is a collection...