نتایج جستجو برای: vehicle logo recognition
تعداد نتایج: 365562 فیلتر نتایج به سال:
One of the main research issues in forensic computing is to protect intellectual properties. Logo images, one type of intellectual properties, are posted in the Internet and widely available. Logo image plagiarism and theft are not unusual. Detection and localization of logo image plagiarism are crucial to protect logo intellectual property. In recent years, logo images that are written in Scal...
We propose a method for localizing and recognizing brand logos in natural images. The task is extremely challenging, due to the various changes in the appearance of the logos. We construct class templates by matching features between examples of the same class to build homographies. An interconnections graph is developed for each class and the representative points are added to the class model....
In this paper we address the problem of what parts of an image can be used to well perform content-based image retrieval system. Local parts are selected and refined based on the clustering of interest points obtained by Harris corners and minimum bounding box detectors. Global features such as invariant moments and color histograms of the extracted local regions are combined to find similar lo...
In this paper a wavelet-based logo watermarking scheme is presented. The logo watermark is embedded into all sub-blocks of the LLn sub-band of the transformed host image, using quantization technique. Extracted logos from all sub-blocks are merged to make the extracted watermark from distorted watermarked image. Knowing the quantization step-size, dimensions of logo and the level of wavelet tra...
In vehicle surveillance systems, one of the appropriate methods for recognition are 3-D models. Several methods have been proposed for this purpose. Feature based methods are most significant and widely used. In this paper, is proposed an algorithm within recognition framework. Proposed algorithm is considered information of image and model edges as feature. A block descriptor has been used ext...
Phishing website creators and anti-phishing defenders are in an arms race. Cloning a website is fairly easy and can be automated by any junior programmer. Attempting to recognize numerous phishing links posted in the wild e.g. on social media sites or in email is a constant game of escalation. Automated phishing website detection systems need both speed and accuracy to win. We present a new met...
The license plate recognition system is part of the intelligent transportation system. In the intelligent transportation system, the vehicle image is used as the system input. The first step is to improve the image, after the edge detection, a series of morphological operations are performed to identify the plaque. The main purpose of this research was to increase the importance of plate re...
Dependency is a concept whose importance for learning is strongly suggested by – amongst other things – the wide range of applications that spreadsheets have found in education. Given the prominent role that Logo has played in research into computer support for constructionist learning, there is a natural motivation for studying the relationship between spreadsheets and Logo programming. The te...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید