Vehicle Detection and Tracking Using Machine Learning Techniques

被引:3
|
作者
Dimililer, Kamil [1 ,3 ,4 ]
Ever, Yoney Kirsal [2 ,3 ,4 ]
Mustafa, Sipan Masoud [5 ]
机构
[1] Near East Univ, Fac Engn, Dept Elect & Elect Engn, Mersin 10, Nicosia, North Cyprus, Turkey
[2] Near East Univ, Fac Engn, Dept Software Engn, Mersin 10, Nicosia, North Cyprus, Turkey
[3] Near East Univ, Res Ctr Expt Hlth Sci, Mersin 10, Nicosia, North Cyprus, Turkey
[4] Near East Univ, Appl Artificial Intelligence Res Ctr, Mersin 10, Nicosia, North Cyprus, Turkey
[5] Duhok Polytech Univ, 61 Zakho Rd,1006 Mazi Qr, Duhok, Iraq
关键词
Vehicle detection; Vehicle tracking; SVM; Decision tree; Image detection; Object detection and tracking;
D O I
10.1007/978-3-030-35249-3_48
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
More than two decades machine learning techniques have been applied in multidisciplinary fields in order to find more accurate, efficient and effective solutions. This research tries to detect vehicles in images and videos. It deploys a dataset from Udacity in order to train the developed machine learning algorithms. Support Vector Machine (SVM) and Decision Tree (DT) algorithms have been developed for the detection and tracking tasks. Python programming language have been utilized as the development language for the creation and training of both models. These two algorithms have been developed, trained, tested, and compared to each other to specify the weaknesses and strengths of each of them, although to present and suggest the best model among these two. For the evaluation purpose multiple techniques are used in order to compare and identify the more accurate model. The primary goal and target of the paper is to develop a system in which the system should be able to detect and track the vehicles automatically whether they are static or moving in images and videos.
引用
收藏
页码:373 / 381
页数:9
相关论文
共 50 条
  • [41] Web Application Attacks Detection Using Machine Learning Techniques
    Betarte, Gustavo
    Martinez, Rodrigo
    Pardo, Alvaro
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2018, : 1065 - 1072
  • [42] Security intrusion detection using quantum machine learning techniques
    Maxim Kalinin
    Vasiliy Krundyshev
    Journal of Computer Virology and Hacking Techniques, 2023, 19 : 125 - 136
  • [43] Survey of review spam detection using machine learning techniques
    Crawford M.
    Khoshgoftaar T.M.
    Prusa J.D.
    Richter A.N.
    Al Najada H.
    Journal of Big Data, 2 (1)
  • [44] Detection of High Impedance Fault using Machine Learning Techniques
    Shihabudheen, K., V
    Kunju, Bijuna
    Ahammed, Imthias
    Guruvarurappan, Akshay
    Jose, Jibin
    Keerthana, D.
    Revathi, P. B.
    PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 2117 - 2122
  • [45] Misfeasor Classification and Detection Models Using Machine Learning Techniques
    Sameh, Nesrine
    El Gayar, Neamat
    Abdelbaki, Nashwa
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2011, 6 (06): : 469 - 477
  • [46] Fraud detection in textile trade using machine learning techniques
    Dhanalakshmi, R.V.
    Guru Basava Aradhya, S.
    Meera, C.
    Sireesha, B.
    Asian Textile Journal, 2024, 33 (3-4): : 35 - 38
  • [47] Cybersecurity Attack Detection Model, Using Machine Learning Techniques
    Avci, Isa
    Koca, Murat
    ACTA POLYTECHNICA HUNGARICA, 2023, 20 (07) : 29 - 44
  • [48] An investigation in detection and mitigation of smishing using machine learning techniques
    Shoaib, Mohd
    Umar, Mohammad Sarosh
    SOCIAL NETWORK ANALYSIS AND MINING, 2023, 13 (01)
  • [49] Approach for shadow detection and removal using machine learning techniques
    Shilpa, Mohankumar
    Gopalakrishna, Madigondanahalli Thimmaiah
    Naveena, Chikkaguddaiah
    IET IMAGE PROCESSING, 2020, 14 (13) : 2998 - 3005
  • [50] Security intrusion detection using quantum machine learning techniques
    Kalinin, Maxim
    Krundyshev, Vasiliy
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023, 19 (01) : 125 - 136