• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Gu Mingqin, Cai Zixing. Traffic Sign Recognition Based on Parameter-free Detector and DT-CWT[J]. Journal of Computer Research and Development, 2013, 50(9): 1893-1901.
Citation: Gu Mingqin, Cai Zixing. Traffic Sign Recognition Based on Parameter-free Detector and DT-CWT[J]. Journal of Computer Research and Development, 2013, 50(9): 1893-1901.

Traffic Sign Recognition Based on Parameter-free Detector and DT-CWT

More Information
  • Published Date: September 14, 2013
  • For the traffic sign which is difficult to detect in traffic environment, a traffic sign detection and recognition algorithm is proposed. First, the main colors of the traffic sign are segmented, the region of interest is expanded and its edge is extract. Then the edge is roughly divided by drawing linear and removing miscellaneous points. Turing angle curvature is computed according to the relations among the curvatures of the vertices. Then the vertex type is classified. The standard shapes such as circular, triangle, rectangle, are detected by parameter-free detector. The candidate regions are sent into the shape classifier to classify the type and exclude the interference. Finally, the type of traffic sign is recognized by dual tree complex wavelet transform and two-dimensional independent component analysis. The experimental results show that the detection and recognition rate of the proposed algorithm is high for the conditions such as traffic signs obscured, uneven illumination, color distortion, and it can achieve the effect of real-time processing.
  • Related Articles

    [1]Luo Jun, Zhao Chuanzhi, Wang Fei. An Efficient Privilege Manage Method Based on RBAC[J]. Journal of Computer Research and Development, 2016, 53(5): 1000-1008. DOI: 10.7544/issn1000-1239.2016.20148288
    [2]Chen Lili, Shen Li, Wang Zhiying, Xiao Nong, and Yao Yiping. Computation Accelerator Virtualization for Domain Specific Applications[J]. Journal of Computer Research and Development, 2011, 48(11): 2103-2110.
    [3]Zhang Yingjun, Feng Dengguo. A Role-Based Access Control Model Based on Space, Time and Scale[J]. Journal of Computer Research and Development, 2010, 47(7): 1252-1260.
    [4]Tang Zhuo, Zhao Lin, Li Kenli, Li Ruixuan. A Dynamic Access Control Model for Inter-Operation in Multi-Domain Environment Based on Risk[J]. Journal of Computer Research and Development, 2009, 46(6): 948-955.
    [5]Xia Luning and Jing Jiwu. An Administrative Model for Role-Based Access Control Using Hierarchical Namespace[J]. Journal of Computer Research and Development, 2007, 44(12): 2020-2027.
    [6]He Yongzhong, Li Xiaofeng, Feng Dengguo. Implementing Chinese Wall Policies on RBAC[J]. Journal of Computer Research and Development, 2007, 44(4): 615-622.
    [7]Chen Ying, Yang Shoubao, Guo Leitao, and Shen Kai. A Dynamic Access Control Scheme Across Multi-Domains in Grid Environment[J]. Journal of Computer Research and Development, 2006, 43(11): 1863-1869.
    [8]Liao Junguo, Hong Fan, Zhu Xian, Xiao Haijun. Separation of Duty in Dynamic Role Translations Between Administrative Domains[J]. Journal of Computer Research and Development, 2006, 43(6): 1065-1070.
    [9]Sui Aina, Wu Wei, Chen Xiaowu, Zhao Qinping. A Assembly Constraint Semantic Model in Distributed Virtual Environment[J]. Journal of Computer Research and Development, 2006, 43(3): 542-550.
    [10]Zhang Yu, Zhang Wenyi, Li Xianxian, and Huai Jinpeng. Secure Access Control for Group Communication on Multi-Autonomous Domains Collaborative Environment[J]. Journal of Computer Research and Development, 2005, 42(9): 1558-1563.

Catalog

    Article views (892) PDF downloads (618) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return