SlideShare a Scribd company logo
1 of 23
Download to read offline
 [Type the document title]                                         [Year] 
         

                  Khulna University of Engineering & Technology 
                  Department of Computer Science and Engineering 


               CSE 3100
               Report on Software Development Project – II
         


               Traffic Jam
               Detection System

               Date:
               22 June, 2008


               Authors:
               Khan Muhammad Nafee Mostafa
               0507007
               &
               Qudrat-E-Alahy Ratul
               0507037

               Supervisor:
               Rushdi Shams
               Lecturer,
               Dept of Computer Science and Engineering,
               Khulna University of Engineering & Technology,
               Bangladesh
 




    Acknowledgement    We express our gratitude to 
                       the Almighty and our family. 

                       We also thank Batch 2k5 of 
                       CSE and whole CSE 
                       department of KUET for 
                       being a beaming source of 
                       inspiration. 

                       Thousands of people have 
                       worked and been working in 
                       the field of Image 
                       Processing and Object 
                       Recognition. Our respects go 
                       to all of them. 

                       We dedicate our work to 
                       them who relate to traffic. 

                        
TRAFFIC JAM DETECTION SYSTEM 


                                                             
TRAFFIC JAM DETECTION SYSTEM 
                                                             
                                              Contents 
 

Chapter 1: Introduction…01 
1.1 Traffic Jam Detection…01 
1.2 Techniques of Traffic Jam Detection…02 
1.3 A Brief of Our Approach…03 
1.4 Outcome of the Project…04  

Chapter 2: Background…05 
2.1 About Traffic Jam…05 
2.2 About Image Processing and Object Detection…06 
2.3 Fundamental Steps in Digital Image processing…06 
2.4 Idea of Image…07 
2.5 Towards Traffic Jam Detection…07  

Chapter 3: Work Approach …08 
3.1 Approach of Image Processing and Object Detection…08 
3.2 Image Acquisition…08 
3.3 Image Enhancement…09 
3.4 Lane Masking…10 
3.5 Further Enhancement…11 
3.6 Erosion Operation…12 
3.7 Adaptive smoothing…13 
3.8 Blobs (Binary Large Objects)…14 
3.9 Object Analysis…14 
3.10 Motion Detect…15 
3.11 Showing Result…15 
 
Chapter 4: Result and Calculation…17 
 
Chapter 5: Conclusion…18 
 
 
Appendix I : Screenshot of Our  Application… A‐1 
 
 
 
 
 




                                                             
TRAFFIC JAM DETECTION SYSTEM 


                                                                                                   
                                           TRAFFIC JAM DETECTION SYSTEM 
           Chapter  
           1  
           Introduction 
            

            

           Traffic  system  is  at  the  heart  of  civilized  world  and  development  in  many 
           aspects of life relies on it. Excessive number of traffic in roads and improper 
           controls  of  that  traffic  create  traffic  jam.  It  either  hampers  or  stagnate 
           schedule,  regimen,  business,  and  commerce.  Automated  traffic  detection 
           system  is  therefore  required  to  run  the  civilization  smooth  and  safe‐  which 
           will eventually lead us towards proper analysis on traffics, proper adjustment 
           of control management, and distribution of controlling signals. 

           The  aim  of  this  project  is  to  develop  a  traffic  jam  detection  system  using 
           image processing and object detection. Besides, we developed an application 
           that uses this detection mechanism and provides instant online information 
           through  Short  Messaging  Service  (SMS)  and  e‐mail.  This  information  helps 
           the travelers to incorporate with current situation on specific roads and the 
           authority to plan and schedule load balancing on the roads. 

            

            


1.1 Traffic Jam Detection 
            

           Mostly,  automated  systems  need  the  interaction  with  a  computer  that 
           requires an algorithm to meet the specific requirements. 

           Human eye can easily detect whether there is a traffic jam or not. Within less 
           than  a  second,  human brain  processes  the  image  of  the  traffic,  detects  and 
           analyzes  objects,  and  thereafter  comes  to  a  decision.  A  programmer  also 
           detects, as being a human, traffic jam according to the analysis and detection 
           of  objects.  But  implementation  of  such  a  biological  process  requires  some 
           special treatment.  



                                                                                                      1 
TRAFFIC JAM DETECTION SYSTEM 


                                                                                                      
           Computers  can  recognize  only  binary  signals.  A  picture  of  the  road  can  be 
           represented  as  a  digital  image,  which  is  actually  binary  signal.  This  image  is 
           used  as  primary  source  of  data.  But,  an  image,  when  it  is  captured  from 
           natural  environment,  is  very  raw  and  unformatted.  Programmers  have  to 
           process  the  data  and  extract  relevant  information  from  images.  Frequent 
           need  of  extracting  information  from  images  has  led  to  the  development  of 
           several  fields  (e.g.  Image  processing,  Computer  Vision,  Object  recognition 
           etc)  in  computing  industry.    We  have  used  image  processing  and  object 
           detection to detect traffic jam. It takes several steps of image processing for 
           us to make decision about traffic jam. Key points of these steps are, 

               •   Image Analysis 
               •   Object detection 
               •   Typed object count 
               •   Motion detection 
               •   Result representation 

           We  have  integrated  these  steps  in  our  system  and  have  developed  an 
           application to simulate it. 

            

            


1.2 Techniques of Traffic Jam Detection 
            

           Several  approaches  have  been  taken  to  detect  traffic  jam.  Oldest  and  most 
           reliable approach of them is to employ a person in important traffic points. 
           But  with  the  advent  of  technology  and  increment  of  traffic  flow,  several 
           approaches with less involvement of human have been taken. 

           Magnetic Loop Detector (MLD) used to count the number of plying vehicles 
           using magnetic properties [Koller et al. 1994].  

           Light beams (IR, LASER etc) are also use. As traffic move on road light beams 
           are cut. Electronic devices can record these events and detect traffic jam. 

           In  contemporary  approaches,  image  processing,  computer  vision  etc  are 
           highly  recommended.  In  these  types  of  approaches  involvement  of 
           computers  provide  online  characteristics,  facilitate  centralized  control  over 
           distributed system and develop compact platform. Computer vision (or Robot 
           Vision) can also provide other services. In these approaches, information feed 


                                                                                                         2 
TRAFFIC JAM DETECTION SYSTEM 


                                                                                                    
           through  telephone  or  web  networks  can  easily  be  supported.  Even,  traffic 
           flow of whole city can be observed from a centre and statistics can be made. 
           Traffic  systems  design  and  urban  planning  can  be  very  efficient  by  taking 
           statistics from computer aided traffic systems. 

           We are using computer aided image processing to attain optimal support. 

            

            


1.3 A Brief of Our Approach 
            

           In our project, as mentioned earlier, we have used image processing. Major 
           steps of our work are presented next, 

            

           1.3.1 Image Analysis 
           At first we must capture the image of the traffic point where we are going to 
           detect  traffic  jam.  This  image  is  taken  using  a  good  digital  camera.  Usually 
           some  fundamental  image  enhancements  using  Gaussian  filter  and  noise 
           reductions are done by camera itself. So, we do not need to apply them again 
           and kept this step for camera. 

            

           1.3.2 Object Detection 
           This step is very crucial. We used ‘Lane Masking’ [Atkociunas et al. 2005]. After 
           masking lane, the image contains only traffic vehicles. Then ‘Euclidean Color 
           Filter’ is applied. It will fill pixels with white where the difference of color is 
           minimal. Then, the image will be converted into a binary (first ‘Grayscale’ and 
           then  ‘Black  &  White’)  image  using  a  threshold  value.  Afterwards,  ‘Erosion’ 
           operator  and  ‘Adaptive  Smoothing’  are  applied.  Finally,  ‘blobs’  are  found 
           from the image and are placed apart. We recognize these blobs as objects. 

           We will call this technique as ‘Lane Masked Erosion‐Blob Technique of Object 
           Extraction’. 

            

            




                                                                                                       3 
TRAFFIC JAM DETECTION SYSTEM 


                                                                                                     
           1.3.3 Typed Object Count  
           Object  detection  is  followed  by  object  count.  We,  classify  all  the  objects 
           found,  in  previous  step,  into  four  groups  (small,  large,  critical  and  perfect) 
           and count them. This information is provided to determine the present state 
           of traffic. 

           We will call this technique as ‘Lane Masked Erosion‐Blob Technique of Typed 
           Object Count’. 

            

           1.3.4 Motion Detection 
           To  detect  motion,  we  need  two  consecutive  captures  of  the  road.  Both 
           images undergo ‘Erosion‐Blob Technique of Object Extraction’ (section 1.3.2). 
           Then, we detect overlapped blobs. Then, we calculate the distance the same 
           blob has moved. Finally we average the result to determine speed of plying 
           traffic.   

           We  will  call  this  technique  as  ‘Lane  Masked  Erosion‐Blob‐Displacement 
           method of motion detection’. 

           1.3.5 Result Representation 
           We  simulate  our  system  with  an  application  developed  in  the  .Net 
           Framework. 

            

            


1.4 Outcome of the Project 
            

           Our  project  is  targeted  at  developing  a  tool  for  detecting  traffic  jam.  This 
           project  reaches  the  target  successfully  and  can  be  implemented  in  various 
           online systems. We can feed information about:  

               •   Number of plying vehicle 
               •   Existence of Jam 
               •   Average speed of traffic 

            

           In the next chapters we will represent details of our project. 




                                                                                                        4 
TRAFFIC JAM DETECTION SYSTEM 


                                                                                               
                                           TRAFFIC JAM DETECTION SYSTEM 
           Chapter  
           2  
           Background 

 


2.1 About Traffic Jam 
            

           It  is  said  that  road  and  transport  system  is  the  mean  by  which  we  can 
           measure  the  development  level  of  a  country.  And  Traffic  jam  is  the 
           unavoidable part of road & transport. Insufficient roads, poor urban planning 
           etc may cause traffic jam. In general sense, we say that there is a traffic jam 
           when there plies more vehicles in a road than it can hold.  

           In any one of the following cases, we say there is a traffic jam: 

               •   The vehicles are stopped 

               •   Vehicles are moving very slowly 

               •   There is an excessive number of vehicle on road 

            

           Automated traffic control system can help us to reduce traffic jam and save 
           our  valuable  time.  Again,  computer  aided  traffic  jam  detection  system  can 
           warn  people  about  traffic  points  with  traffic  jam  and  ask  people  to  try 
           alternative path. We worked on traffic jam detection to build a base of such 
           modern facilities to ensure better transport. 



            

            

            




                                                                                                  5 
TRAFFIC JAM DETECTION SYSTEM 


                                                                                                
2.2 About Image Processing and Object Detection 
            

           Recently  computing  industry  is  working  a  lot  in  both  image  processing  and 
           objects  detection.  These  two  fields  are  contributed  in  the  development  of 
           artificial intelligence and automated systems. 

           According to Nils J. Nilson [Nilson, 2002], Image processing has been proved 
           to  be  a  very  difficult  problem  for  machines.  Programmers  mainly  face 
           difficulties from  

               •   Variable and uncontrolled illumination 
               •   Complex and hard to describe objects 
               •   Objects occluding other objects 
           In  man  made  environment  difficulties  are  lessened  than  in  natural 
           environment. 

            

           Object detection is the outcome of image processing. Object recognition goes 
           far more deep in analyzing images and objects from it. 

            

            


2.3 Fundamental Steps in Digital Image processing 
            

           Some fundamental steps of image processing are, 

                       •   Image Acquisition 
                       •   Image Enhancement 
                       •   Image Restoration 
                       •   Color Image Processing 
                       •   Wavelets processing 
                       •   Compression 
                       •   Morphological Processing 
                       •   Segmentation 
                       •   Representation and Description 
                       •   Recognition 
            

           (Please look for references, [Gonzalez & Woods, 2003], [TUDelft]) 

 



                                                                                                   6 
TRAFFIC JAM DETECTION SYSTEM 


                                                                                                     
2.4 Idea of Image 
           In  most  contexts,  we  studied  and  worked  on,  the  word  ‘image’  is  used  to 
           mention  a  two  dimensional  array  (or  matrix  or  a  plane)  of  bitmaps  and  is 
           used to represent 2D vision of real‐life images.  

           Every  bitmap  contains  3  fields:  R,  G  and  B.  Respectively,  they  contain  the 
           color  values  of  red,  green  and  blue  of  a  particular  point  (pixel).  Sometimes, 
           another fourth field may contain intensity of the very point. 

            

            


2.5 Towards Traffic Jam Detection 
           Computer industry is getting enriched in image processing everyday. A lot of 
           work  of  many  individuals  throughout  the  world  has  helped  us  to  develop  a 
           traffic jam detection system. 

            

             

            

            

            

            

            

            

            

            

 

 

            

            

            



                                                                                                        7 
TRAFFIC JAM DETECTION SYSTEM 


                                                                                              
                                           TRAFFIC JAM DETECTION SYSTEM 
           Chapter  
           3  
           Work Approach 
            

           We  have  developed  this  project  as  a  part  of  a  course  named  ‘Software 
           Development  Project  ‐  II’  within  the  undergraduate  engineering  program  in 
           Computer  Science  and  Engineering.  We  were  suggested  to  use  the  .Net 
           framework as platform and C# as the language. To accomplish our project C# 
           .Net  was  a  good  tool.  Amongst  several  different  approaches  of  image 
           processing we have selected some to use. A precise description of our work is 
           presented in this chapter. 

            

            


3.1 Approach of Image Processing and Object Detection 
            

           A machine, just like a human being, requires to ‘see’ the road for detecting 
           traffic jam on it. To provide a machine the capability to see we must exactly 
           follow the process a human being does.  

           Image processing requires huge processing of data and several algorithms run 
           in order of n2 or ny. Therefore, processes involving image processing are to be 
           handled with care.  

            

            


3.2 Image Acquisition 
            

           Image acquisition is the first step of our system. A precise image of the case 
           road (traffic point) is acquired. We need to capture an image of the road with 
           no vehicle plying on it. This is called as background image (fig 3.2‐b).  



                                                                                                 8 
TRAFFIC JAM DETECTION SYSTEM 


                                                                                               
          Another  image  of  the  road  is  taken  exactly  at  the  time  when  we  need  to 
          detect traffic jam. We have a sample image next (fig 3.2‐a).   




                                                                           
                         Fig3.2‐a: Sample Image taken on road at runtime  

                                                     




                                                                           
                      Fig3.2‐b: Sample Image taken as the background image  

                                                     

                                                     


3.3 Image Enhancement 
           

          Some  noise  frequently  comes  on  images  taken  on  natural  environment. 
          Contemporary  technology  brings  cameras  integrated  with  image  enhancing 
          algorithms. So, we are not applying any enhancement separately. 

           




                                                                                                  9 
TRAFFIC JAM DETECTION SYSTEM 


                                                                                                        
3.4 Lane Masking  
           This method is intended to separate the part of the road where vehicles are 
           moving in one direction (Fig. 3.2‐a). This method simplifies the processing. As 
           we eliminate background we have only to think about the objects. So, a huge 
           amount of irrelevant information is discarded. 

            Masking algorithm is given by formula 

                   N(p) = M(p) × V (p), 

                   Where, 
                   M(p) is an image point value in primary frame,  
                   N(p) is a new image point in the output image (Fig. 3.4‐a), 
                   V(p) is mask value for point p: V (p) = 0 if corresponding pixel is eliminated,  
                   otherwise V (p) = 1. 
  

           Masking is applied to each RGB color separately. 

                                                        




                                                                                 
                         Fig3.4‐a: Image after lane masked from main image  

                                                        




                               ‐                            =                                     
                                    Fig 3.4‐b: the Lane Masking Process 




                                                                                                           10 
TRAFFIC JAM DETECTION SYSTEM 


                                                                                           
3.5 Further Enhancement 
          After lanes are masked, the images are then enhanced by turning it into 
          grayscale (fig3.5‐a).  

          Grayscale algorithm is 

                 R=G=B= (r+g+b)/3  

                 Where, 
                            R, G and B are new values of red, green and blue 
                            r, g and b are old values of red, green and blue 
                            
          Then the image is converted into black & white binary image (fig3.5‐b). This 
          requires the algorithm, 

                 If (r+g+b > threshold) { 
                                  R=G=B = white; 
                          } 
                 Else { 
                                  R=G=B=black; 
                          } 
                                                      




                                                                           
                                      Fig3.5‐a : Grayscal conversion 
                                                      




                                                                               
                                  Fig 3.5‐b : Binary Converted Image 


                                                                                              11 
TRAFFIC JAM DETECTION SYSTEM 


                                                                                          
3.6 Erosion Operation 
          The Erosion operator is defined as, 

                                            
                  




                                                                             
                                                   

                                     Fig 3.6‐a: Erosion Operator 

          In the case of object extract we can get good result by applying this operator. 
          Fig 3.6‐b depicts an image with erosion applied on it. 




                                                                         
                             Fig3.6‐a: Figure with erosion applied on it 

                                                   




                                                                                             12 
TRAFFIC JAM DETECTION SYSTEM 


                                                                                              
3.7 Adaptive smoothing 
          While traditional smoothing methods use the same window shape and size to 
          smooth  an  image  independent  of  its  content,  in  adaptive  smoothing,  the  
          window  shape  and  size  are  varied  across  the  image  domain  depending  on 
          local  image  content.  In  adaptive  smoothing  a  window  is  sized  according  to 
          the gradient magnitude locally and shaped in such a way that it has a shorter 
          side across an edge compared to along the edge. This mechanism maintains 
          edge details while smoothing random noise. 

          Fig3.7a shows the picture processed with adaptive smoothing. And fig3.7b is 
          without adaptive smoothing. 

           




                                                                         
                             Fig 3.7a: Figure after Adaptive smoothing 

                                                    




                                                                         
                            Fig 3.7b: Figure without Adaptive smoothing 

                                                    

                                                    

                                                    

                                                    


                                                                                                  13 
TRAFFIC JAM DETECTION SYSTEM 


                                                                                                    
3.8 Blobs (Binary Large Objects) 
           Blobs are the largest objects. To find blob, we blur the image to eliminate all 
           small noises. Figure below shows the largest blob found by our method, ‘Lane 
           Masked Erosion‐Blob Technique of Object Extraction’. 




                                                                       
                                  Fig3.8a: Perfect Blob of 7 found blobs 
                                                      


3.9 Object Analysis 
 

           Blobs  found  in  previous  step  is  now  processed  mathematically  to  classify 
           them in 4 groups, 

                      •   Small 
                      •   Critical 
                      •   Perfect 
                      •   Large 
            

           Small objects are discarded as they are mostly noises. Large objects are never 
           car or bus. They can be the image itself or other large portion of image. Most 
           of  the  cars  lie  in  the  perfect  blob  group.  But  sometimes  critical  blob  hold 
           portions of car (hood, trunk etc). 

           We count the number of blobs in each class. Then the count is compared to 
           standard  conditions  and  a  decision  about  jam  status  is  then  can  be  made. 
           This  approach  can  be  called  as  ‘Lane  Masked  Erosion‐Blob  Technique  of 
           Typed Object Count’. 



                                                                                                       14 
TRAFFIC JAM DETECTION SYSTEM 


                                                                                           
3.10 Motion Detect 
            

           Motion detection is another good way of telecasting information about traffic 
           jam. To do so,  

               •   we take two  consecutive images of the road 
               •   find the blobs 
               •   detect overlapping blobs 
               •   find axis‐wise displacement 
               •   calculate the average displacement to determine speed 

           This  approach  can  be  called  as  ‘Lane  Masked  Erosion‐Blob‐Displacement 
           method of motion detection’. 

           Two images are given below showing motion detection: 




                                                                                       
                          Fig3.10a: two images for detecting traffic motion 

 


3.11 Showing Result  
            

           In  all  the  stages,  described  above,  necessary  information  for  deciding 
           whether there is a traffic jam or not is produced. Now we can display or even 
           feed this information to several systems. 

           In addition to traffic jam detection our simulation program can, 

               •   Generate string describing traffic status 
               •   Receive request through  SMS  
               •   Respond to a SMS immediately 
               •   Receive request through e‐mail  
               •   Respond to e‐mail requests 



                                                                                              15 
TRAFFIC JAM DETECTION SYSTEM 


                                                                                       
    Total integration of our application has also included set‐up features and set‐
    up data are stored with the help of filing system. 

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

 

 

 

 

 

 



                                                                                          16 
TRAFFIC JAM DETECTION SYSTEM 


                                                                                
                                 TRAFFIC JAM DETECTION SYSTEM 

Chapter  
4  
Result and Calculation 
 

Our project has been tested in several conditions. We have found that, it 
takes 3 to 4 second for our system to determine the objects and their speed 
when the image is 1024*768 pixels.  

Our system can work efficiently work in standard environment. 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 



                                                                                   17 
TRAFFIC JAM DETECTION SYSTEM 


                                                                                            
                                 TRAFFIC JAM DETECTION SYSTEM 
Chapter  
5 
Conclusion 
 

Traffic  jam  recognition  systems  have  been  developed  in  several  different 
ways.  Our  approach  is  analytical.  It  also  takes  the  advantage  of  statistical 
data. Lane masking has contributed greatly in reducing time complexity and 
has tremendously have improved performance. 

In future our work can support online centralized traffic system for a city. In 
this system, every important traffic point will be monitored with our ‘Traffic 
Jam Detection System’. Then, information will  be fed to central server. This 
server  can  analyze  all  points’  traffic  state  and  can  control  traffic  flow.  Such 
system may reduce traffic jam greatly. 

 

 




                                                                                               18 
 



    References 
    [Atkociunas et al. 2005] http://www.lana.lt/journal/19/Atkociunas.pdf

     
    [Gonzalez & Woods, 2003] Rafael C. Gonzalez, Richard E. Woods,”Digital Image 
    Processing ”2/e,2003 
     

    [Koller et al. 1994] Dieter Koller, Joseph Weber and Jitendra Malik,
    "Robust Multiple Car Tracking with Occlusion Reasoning" ECCV (1)
    1994


    [Nilson, 2002] Nils J. Nilson “Artificail Intelligence”, 2002

     
    [TUDelft]  http://www.qi.tnw.tudelft.nl/Courses/FIP/noframes/fip.html




 




 
Appendix I: Screenshots of Aour Application 

 




                                                




                                                


                                                   A‐1 

More Related Content

What's hot

Final Project Report on Image processing based intelligent traffic control sy...
Final Project Report on Image processing based intelligent traffic control sy...Final Project Report on Image processing based intelligent traffic control sy...
Final Project Report on Image processing based intelligent traffic control sy...Louise Antonio
 
Traffic control using image processing
Traffic control using image processingTraffic control using image processing
Traffic control using image processingChirag Panchal
 
Vehicle detection through image processing
Vehicle detection through image processingVehicle detection through image processing
Vehicle detection through image processingGhazalpreet Kaur
 
Vision Based Traffic Surveillance System
Vision Based Traffic Surveillance SystemVision Based Traffic Surveillance System
Vision Based Traffic Surveillance Systemmaheshwaraneee
 
74 real time-image-processing-applied-to-traffic-queue-d
74 real time-image-processing-applied-to-traffic-queue-d74 real time-image-processing-applied-to-traffic-queue-d
74 real time-image-processing-applied-to-traffic-queue-dravi247272
 
Real time-image-processing-applied-to-traffic-queue-detection-algorithm
Real time-image-processing-applied-to-traffic-queue-detection-algorithmReal time-image-processing-applied-to-traffic-queue-detection-algorithm
Real time-image-processing-applied-to-traffic-queue-detection-algorithmajayrampelli
 
Wi-Counter : Smartphone Based people counter
Wi-Counter : Smartphone Based people counterWi-Counter : Smartphone Based people counter
Wi-Counter : Smartphone Based people counterRaihan Bin-Mofidul
 
Video Surveillance Systems For Traffic Monitoring
Video Surveillance Systems For Traffic MonitoringVideo Surveillance Systems For Traffic Monitoring
Video Surveillance Systems For Traffic MonitoringMeridian Media
 
Vehicle counting without background modeling
Vehicle counting without background modelingVehicle counting without background modeling
Vehicle counting without background modelingLihguong Jang
 
Real time image processing ppt
Real time image processing pptReal time image processing ppt
Real time image processing pptashwini.jagdhane
 
Traffic Light Detection for Red Light Violation System
Traffic Light Detection for Red Light Violation SystemTraffic Light Detection for Red Light Violation System
Traffic Light Detection for Red Light Violation Systemijtsrd
 
Vehicle detection in Aerial Images
Vehicle detection in Aerial ImagesVehicle detection in Aerial Images
Vehicle detection in Aerial ImagesKoshy Geoji
 
A thesis presentation on pothole detection
A thesis presentation on pothole detectionA thesis presentation on pothole detection
A thesis presentation on pothole detectionPrimeAsia University
 
Computer Vision for Traffic Sign Recognition
Computer Vision for Traffic Sign RecognitionComputer Vision for Traffic Sign Recognition
Computer Vision for Traffic Sign Recognitionthevijayps
 
Recognition and enhancement of traffic sign for computer generated images
Recognition and enhancement of traffic sign for computer generated imagesRecognition and enhancement of traffic sign for computer generated images
Recognition and enhancement of traffic sign for computer generated imagesShailesh kumar
 
Traffic Violation Detection Using Multiple Trajectories of Vehicles
Traffic Violation Detection Using Multiple Trajectories of VehiclesTraffic Violation Detection Using Multiple Trajectories of Vehicles
Traffic Violation Detection Using Multiple Trajectories of VehiclesIJERA Editor
 
P ERFORMANCE M EASUREMENTS OF F EATURE T RACKING AND H ISTOGRAM BASED T ...
P ERFORMANCE  M EASUREMENTS OF  F EATURE  T RACKING AND  H ISTOGRAM BASED  T ...P ERFORMANCE  M EASUREMENTS OF  F EATURE  T RACKING AND  H ISTOGRAM BASED  T ...
P ERFORMANCE M EASUREMENTS OF F EATURE T RACKING AND H ISTOGRAM BASED T ...ijcsit
 
Traffic Light Controller System using Optical Flow Estimation
Traffic Light Controller System using Optical Flow EstimationTraffic Light Controller System using Optical Flow Estimation
Traffic Light Controller System using Optical Flow EstimationEditor IJCATR
 
IRJET- Automatic Traffic Sign Detection and Recognition using CNN
IRJET- Automatic Traffic Sign Detection and Recognition using CNNIRJET- Automatic Traffic Sign Detection and Recognition using CNN
IRJET- Automatic Traffic Sign Detection and Recognition using CNNIRJET Journal
 

What's hot (20)

Final Project Report on Image processing based intelligent traffic control sy...
Final Project Report on Image processing based intelligent traffic control sy...Final Project Report on Image processing based intelligent traffic control sy...
Final Project Report on Image processing based intelligent traffic control sy...
 
Traffic control using image processing
Traffic control using image processingTraffic control using image processing
Traffic control using image processing
 
Vehicle detection through image processing
Vehicle detection through image processingVehicle detection through image processing
Vehicle detection through image processing
 
Vision Based Traffic Surveillance System
Vision Based Traffic Surveillance SystemVision Based Traffic Surveillance System
Vision Based Traffic Surveillance System
 
FINAL YEAR PROJECT1_3
FINAL YEAR PROJECT1_3FINAL YEAR PROJECT1_3
FINAL YEAR PROJECT1_3
 
74 real time-image-processing-applied-to-traffic-queue-d
74 real time-image-processing-applied-to-traffic-queue-d74 real time-image-processing-applied-to-traffic-queue-d
74 real time-image-processing-applied-to-traffic-queue-d
 
Real time-image-processing-applied-to-traffic-queue-detection-algorithm
Real time-image-processing-applied-to-traffic-queue-detection-algorithmReal time-image-processing-applied-to-traffic-queue-detection-algorithm
Real time-image-processing-applied-to-traffic-queue-detection-algorithm
 
Wi-Counter : Smartphone Based people counter
Wi-Counter : Smartphone Based people counterWi-Counter : Smartphone Based people counter
Wi-Counter : Smartphone Based people counter
 
Video Surveillance Systems For Traffic Monitoring
Video Surveillance Systems For Traffic MonitoringVideo Surveillance Systems For Traffic Monitoring
Video Surveillance Systems For Traffic Monitoring
 
Vehicle counting without background modeling
Vehicle counting without background modelingVehicle counting without background modeling
Vehicle counting without background modeling
 
Real time image processing ppt
Real time image processing pptReal time image processing ppt
Real time image processing ppt
 
Traffic Light Detection for Red Light Violation System
Traffic Light Detection for Red Light Violation SystemTraffic Light Detection for Red Light Violation System
Traffic Light Detection for Red Light Violation System
 
Vehicle detection in Aerial Images
Vehicle detection in Aerial ImagesVehicle detection in Aerial Images
Vehicle detection in Aerial Images
 
A thesis presentation on pothole detection
A thesis presentation on pothole detectionA thesis presentation on pothole detection
A thesis presentation on pothole detection
 
Computer Vision for Traffic Sign Recognition
Computer Vision for Traffic Sign RecognitionComputer Vision for Traffic Sign Recognition
Computer Vision for Traffic Sign Recognition
 
Recognition and enhancement of traffic sign for computer generated images
Recognition and enhancement of traffic sign for computer generated imagesRecognition and enhancement of traffic sign for computer generated images
Recognition and enhancement of traffic sign for computer generated images
 
Traffic Violation Detection Using Multiple Trajectories of Vehicles
Traffic Violation Detection Using Multiple Trajectories of VehiclesTraffic Violation Detection Using Multiple Trajectories of Vehicles
Traffic Violation Detection Using Multiple Trajectories of Vehicles
 
P ERFORMANCE M EASUREMENTS OF F EATURE T RACKING AND H ISTOGRAM BASED T ...
P ERFORMANCE  M EASUREMENTS OF  F EATURE  T RACKING AND  H ISTOGRAM BASED  T ...P ERFORMANCE  M EASUREMENTS OF  F EATURE  T RACKING AND  H ISTOGRAM BASED  T ...
P ERFORMANCE M EASUREMENTS OF F EATURE T RACKING AND H ISTOGRAM BASED T ...
 
Traffic Light Controller System using Optical Flow Estimation
Traffic Light Controller System using Optical Flow EstimationTraffic Light Controller System using Optical Flow Estimation
Traffic Light Controller System using Optical Flow Estimation
 
IRJET- Automatic Traffic Sign Detection and Recognition using CNN
IRJET- Automatic Traffic Sign Detection and Recognition using CNNIRJET- Automatic Traffic Sign Detection and Recognition using CNN
IRJET- Automatic Traffic Sign Detection and Recognition using CNN
 

Viewers also liked

Advanced java-applications-projects-ocular systems.in-
Advanced java-applications-projects-ocular systems.in-Advanced java-applications-projects-ocular systems.in-
Advanced java-applications-projects-ocular systems.in-Ocular Systems
 
Enhancing Intrusion Detection System with Proximity Information
Enhancing Intrusion Detection System with Proximity InformationEnhancing Intrusion Detection System with Proximity Information
Enhancing Intrusion Detection System with Proximity InformationZhenyun Zhuang
 
Marketing Stage Traffic Jam Car Assistant
Marketing Stage Traffic Jam Car AssistantMarketing Stage Traffic Jam Car Assistant
Marketing Stage Traffic Jam Car AssistantChristiana Joan
 
iCarpool - ITS Congestion Challenge
iCarpool - ITS Congestion ChallengeiCarpool - ITS Congestion Challenge
iCarpool - ITS Congestion ChallengeiCarpool.com
 
Hala Mohtasseb - ecologic solutions for urban transit systems
Hala Mohtasseb - ecologic solutions for urban transit systemsHala Mohtasseb - ecologic solutions for urban transit systems
Hala Mohtasseb - ecologic solutions for urban transit systemsimadhammoud
 
Pune's Traffic Issue & Solutions
Pune's Traffic Issue & SolutionsPune's Traffic Issue & Solutions
Pune's Traffic Issue & SolutionsRushal Heena
 
Sonar Project Report
Sonar Project ReportSonar Project Report
Sonar Project ReportSumit Sapra
 
L8 issues for people living in urban areas in rich countries traffic
L8 issues for people living in urban areas in rich countries   trafficL8 issues for people living in urban areas in rich countries   traffic
L8 issues for people living in urban areas in rich countries traffictudorgeog
 
Solution To Pune Traffic Final (3)
Solution To Pune Traffic   Final (3)Solution To Pune Traffic   Final (3)
Solution To Pune Traffic Final (3)Vipul P. Karnik
 
Rf congestion control measures heavy traffic special events
Rf congestion control measures heavy traffic special eventsRf congestion control measures heavy traffic special events
Rf congestion control measures heavy traffic special eventspintor63
 
No dues management system prepared by HRITIKA RAJ (Shivalik College of engg.,...
No dues management system prepared by HRITIKA RAJ (Shivalik College of engg.,...No dues management system prepared by HRITIKA RAJ (Shivalik College of engg.,...
No dues management system prepared by HRITIKA RAJ (Shivalik College of engg.,...Hritika Raj
 
Congestion Control in Computer Networks - ATM and TCP
Congestion Control in Computer Networks - ATM and TCPCongestion Control in Computer Networks - ATM and TCP
Congestion Control in Computer Networks - ATM and TCPAttila Balazs
 
Smarter Traffic Management and Smarter Transportation Systems
Smarter Traffic Management and Smarter Transportation SystemsSmarter Traffic Management and Smarter Transportation Systems
Smarter Traffic Management and Smarter Transportation SystemsAlejandro Melchor III
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Eng. Mohammed Ahmed Siddiqui
 
SMART MOBILITY IN SMART CITIES
SMART MOBILITY IN SMART CITIESSMART MOBILITY IN SMART CITIES
SMART MOBILITY IN SMART CITIESWebSylvieFaucheux
 
Intelligent Traffic Control System for Congestion Control, Emergency Vehicle ...
Intelligent Traffic Control System for Congestion Control, Emergency Vehicle ...Intelligent Traffic Control System for Congestion Control, Emergency Vehicle ...
Intelligent Traffic Control System for Congestion Control, Emergency Vehicle ...Associate Professor in VSB Coimbatore
 

Viewers also liked (20)

Syrup and jam
Syrup and jamSyrup and jam
Syrup and jam
 
Advanced java-applications-projects-ocular systems.in-
Advanced java-applications-projects-ocular systems.in-Advanced java-applications-projects-ocular systems.in-
Advanced java-applications-projects-ocular systems.in-
 
Enhancing Intrusion Detection System with Proximity Information
Enhancing Intrusion Detection System with Proximity InformationEnhancing Intrusion Detection System with Proximity Information
Enhancing Intrusion Detection System with Proximity Information
 
Marketing Stage Traffic Jam Car Assistant
Marketing Stage Traffic Jam Car AssistantMarketing Stage Traffic Jam Car Assistant
Marketing Stage Traffic Jam Car Assistant
 
Session 7 Karolina Isaksson
Session 7 Karolina IsakssonSession 7 Karolina Isaksson
Session 7 Karolina Isaksson
 
iCarpool - ITS Congestion Challenge
iCarpool - ITS Congestion ChallengeiCarpool - ITS Congestion Challenge
iCarpool - ITS Congestion Challenge
 
Hala Mohtasseb - ecologic solutions for urban transit systems
Hala Mohtasseb - ecologic solutions for urban transit systemsHala Mohtasseb - ecologic solutions for urban transit systems
Hala Mohtasseb - ecologic solutions for urban transit systems
 
Pune's Traffic Issue & Solutions
Pune's Traffic Issue & SolutionsPune's Traffic Issue & Solutions
Pune's Traffic Issue & Solutions
 
Sonar Project Report
Sonar Project ReportSonar Project Report
Sonar Project Report
 
L8 issues for people living in urban areas in rich countries traffic
L8 issues for people living in urban areas in rich countries   trafficL8 issues for people living in urban areas in rich countries   traffic
L8 issues for people living in urban areas in rich countries traffic
 
Solution To Pune Traffic Final (3)
Solution To Pune Traffic   Final (3)Solution To Pune Traffic   Final (3)
Solution To Pune Traffic Final (3)
 
Rf congestion control measures heavy traffic special events
Rf congestion control measures heavy traffic special eventsRf congestion control measures heavy traffic special events
Rf congestion control measures heavy traffic special events
 
No dues management system prepared by HRITIKA RAJ (Shivalik College of engg.,...
No dues management system prepared by HRITIKA RAJ (Shivalik College of engg.,...No dues management system prepared by HRITIKA RAJ (Shivalik College of engg.,...
No dues management system prepared by HRITIKA RAJ (Shivalik College of engg.,...
 
Congestion Control in Computer Networks - ATM and TCP
Congestion Control in Computer Networks - ATM and TCPCongestion Control in Computer Networks - ATM and TCP
Congestion Control in Computer Networks - ATM and TCP
 
Intelligent Transportation System
Intelligent Transportation SystemIntelligent Transportation System
Intelligent Transportation System
 
Library management system
Library management systemLibrary management system
Library management system
 
Smarter Traffic Management and Smarter Transportation Systems
Smarter Traffic Management and Smarter Transportation SystemsSmarter Traffic Management and Smarter Transportation Systems
Smarter Traffic Management and Smarter Transportation Systems
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...
 
SMART MOBILITY IN SMART CITIES
SMART MOBILITY IN SMART CITIESSMART MOBILITY IN SMART CITIES
SMART MOBILITY IN SMART CITIES
 
Intelligent Traffic Control System for Congestion Control, Emergency Vehicle ...
Intelligent Traffic Control System for Congestion Control, Emergency Vehicle ...Intelligent Traffic Control System for Congestion Control, Emergency Vehicle ...
Intelligent Traffic Control System for Congestion Control, Emergency Vehicle ...
 

Similar to Traffic Jam Detection System by Ratul, Sadh, Shams

VEHICLES AND TOURIST FREQUENCY TRACKING USING OPENCV
VEHICLES AND TOURIST FREQUENCY TRACKING USING OPENCVVEHICLES AND TOURIST FREQUENCY TRACKING USING OPENCV
VEHICLES AND TOURIST FREQUENCY TRACKING USING OPENCVIRJET Journal
 
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET-  	  Criminal Recognization in CCTV Surveillance VideoIRJET-  	  Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance VideoIRJET Journal
 
IRJET- Traffic Sign Recognition for Autonomous Cars
IRJET- Traffic Sign Recognition for Autonomous CarsIRJET- Traffic Sign Recognition for Autonomous Cars
IRJET- Traffic Sign Recognition for Autonomous CarsIRJET Journal
 
Accident Precaution System For Vehicle In Motion Using Machine Learning
Accident Precaution System For Vehicle In Motion Using Machine LearningAccident Precaution System For Vehicle In Motion Using Machine Learning
Accident Precaution System For Vehicle In Motion Using Machine LearningIRJET Journal
 
TRAFFIC FORECAST FOR INTELLECTUAL TRANSPORTATION SYSTEM USING MACHINE LEARNING
TRAFFIC FORECAST FOR INTELLECTUAL TRANSPORTATION SYSTEM USING MACHINE LEARNINGTRAFFIC FORECAST FOR INTELLECTUAL TRANSPORTATION SYSTEM USING MACHINE LEARNING
TRAFFIC FORECAST FOR INTELLECTUAL TRANSPORTATION SYSTEM USING MACHINE LEARNINGIRJET Journal
 
Feature Extraction and Gesture Recognition_978-81-962236-3-2.pdf
Feature Extraction and Gesture Recognition_978-81-962236-3-2.pdfFeature Extraction and Gesture Recognition_978-81-962236-3-2.pdf
Feature Extraction and Gesture Recognition_978-81-962236-3-2.pdfTIRUMALAVASU3
 
Feature Extraction and Gesture Recognition Book.pdf
Feature Extraction and Gesture Recognition Book.pdfFeature Extraction and Gesture Recognition Book.pdf
Feature Extraction and Gesture Recognition Book.pdfSAMREENFIZA3
 
Artificial Intelligent System to detect Pit holes using HSV in Open CV
Artificial Intelligent System to detect Pit holes using HSV in Open CVArtificial Intelligent System to detect Pit holes using HSV in Open CV
Artificial Intelligent System to detect Pit holes using HSV in Open CVIRJET Journal
 
A Traffic Sign Classifier Model using Sage Maker
A Traffic Sign Classifier Model using Sage MakerA Traffic Sign Classifier Model using Sage Maker
A Traffic Sign Classifier Model using Sage Makerijtsrd
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET Journal
 
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...IRJET Journal
 
Driver Dormant Monitoring System to Avert Fatal Accidents Using Image Processing
Driver Dormant Monitoring System to Avert Fatal Accidents Using Image ProcessingDriver Dormant Monitoring System to Avert Fatal Accidents Using Image Processing
Driver Dormant Monitoring System to Avert Fatal Accidents Using Image ProcessingIRJET Journal
 
Driver Dormant Monitoring System to Avert Fatal Accidents Using Image Processing
Driver Dormant Monitoring System to Avert Fatal Accidents Using Image ProcessingDriver Dormant Monitoring System to Avert Fatal Accidents Using Image Processing
Driver Dormant Monitoring System to Avert Fatal Accidents Using Image ProcessingIRJET Journal
 
Traffic Management system using Deep Learning
Traffic Management system using Deep LearningTraffic Management system using Deep Learning
Traffic Management system using Deep LearningIRJET Journal
 
IRJET- Traffic Sign Classification and Detection using Deep Learning
IRJET- Traffic Sign Classification and Detection using Deep LearningIRJET- Traffic Sign Classification and Detection using Deep Learning
IRJET- Traffic Sign Classification and Detection using Deep LearningIRJET Journal
 
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...ijitcs
 
project complete - Copy
project complete - Copyproject complete - Copy
project complete - CopyMilan Mahadani
 
Intelligent Transportation System Based On Machine Learning For Vehicle Perce...
Intelligent Transportation System Based On Machine Learning For Vehicle Perce...Intelligent Transportation System Based On Machine Learning For Vehicle Perce...
Intelligent Transportation System Based On Machine Learning For Vehicle Perce...IRJET Journal
 
IRJET- Traffic Sign Detection, Recognition and Notification System using ...
IRJET-  	  Traffic Sign Detection, Recognition and Notification System using ...IRJET-  	  Traffic Sign Detection, Recognition and Notification System using ...
IRJET- Traffic Sign Detection, Recognition and Notification System using ...IRJET Journal
 
Automatic Detection of Unexpected Accidents Monitoring Conditions in Tunnels
Automatic Detection of Unexpected Accidents Monitoring Conditions in TunnelsAutomatic Detection of Unexpected Accidents Monitoring Conditions in Tunnels
Automatic Detection of Unexpected Accidents Monitoring Conditions in TunnelsIRJET Journal
 

Similar to Traffic Jam Detection System by Ratul, Sadh, Shams (20)

VEHICLES AND TOURIST FREQUENCY TRACKING USING OPENCV
VEHICLES AND TOURIST FREQUENCY TRACKING USING OPENCVVEHICLES AND TOURIST FREQUENCY TRACKING USING OPENCV
VEHICLES AND TOURIST FREQUENCY TRACKING USING OPENCV
 
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET-  	  Criminal Recognization in CCTV Surveillance VideoIRJET-  	  Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance Video
 
IRJET- Traffic Sign Recognition for Autonomous Cars
IRJET- Traffic Sign Recognition for Autonomous CarsIRJET- Traffic Sign Recognition for Autonomous Cars
IRJET- Traffic Sign Recognition for Autonomous Cars
 
Accident Precaution System For Vehicle In Motion Using Machine Learning
Accident Precaution System For Vehicle In Motion Using Machine LearningAccident Precaution System For Vehicle In Motion Using Machine Learning
Accident Precaution System For Vehicle In Motion Using Machine Learning
 
TRAFFIC FORECAST FOR INTELLECTUAL TRANSPORTATION SYSTEM USING MACHINE LEARNING
TRAFFIC FORECAST FOR INTELLECTUAL TRANSPORTATION SYSTEM USING MACHINE LEARNINGTRAFFIC FORECAST FOR INTELLECTUAL TRANSPORTATION SYSTEM USING MACHINE LEARNING
TRAFFIC FORECAST FOR INTELLECTUAL TRANSPORTATION SYSTEM USING MACHINE LEARNING
 
Feature Extraction and Gesture Recognition_978-81-962236-3-2.pdf
Feature Extraction and Gesture Recognition_978-81-962236-3-2.pdfFeature Extraction and Gesture Recognition_978-81-962236-3-2.pdf
Feature Extraction and Gesture Recognition_978-81-962236-3-2.pdf
 
Feature Extraction and Gesture Recognition Book.pdf
Feature Extraction and Gesture Recognition Book.pdfFeature Extraction and Gesture Recognition Book.pdf
Feature Extraction and Gesture Recognition Book.pdf
 
Artificial Intelligent System to detect Pit holes using HSV in Open CV
Artificial Intelligent System to detect Pit holes using HSV in Open CVArtificial Intelligent System to detect Pit holes using HSV in Open CV
Artificial Intelligent System to detect Pit holes using HSV in Open CV
 
A Traffic Sign Classifier Model using Sage Maker
A Traffic Sign Classifier Model using Sage MakerA Traffic Sign Classifier Model using Sage Maker
A Traffic Sign Classifier Model using Sage Maker
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language Interpreter
 
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
 
Driver Dormant Monitoring System to Avert Fatal Accidents Using Image Processing
Driver Dormant Monitoring System to Avert Fatal Accidents Using Image ProcessingDriver Dormant Monitoring System to Avert Fatal Accidents Using Image Processing
Driver Dormant Monitoring System to Avert Fatal Accidents Using Image Processing
 
Driver Dormant Monitoring System to Avert Fatal Accidents Using Image Processing
Driver Dormant Monitoring System to Avert Fatal Accidents Using Image ProcessingDriver Dormant Monitoring System to Avert Fatal Accidents Using Image Processing
Driver Dormant Monitoring System to Avert Fatal Accidents Using Image Processing
 
Traffic Management system using Deep Learning
Traffic Management system using Deep LearningTraffic Management system using Deep Learning
Traffic Management system using Deep Learning
 
IRJET- Traffic Sign Classification and Detection using Deep Learning
IRJET- Traffic Sign Classification and Detection using Deep LearningIRJET- Traffic Sign Classification and Detection using Deep Learning
IRJET- Traffic Sign Classification and Detection using Deep Learning
 
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...
 
project complete - Copy
project complete - Copyproject complete - Copy
project complete - Copy
 
Intelligent Transportation System Based On Machine Learning For Vehicle Perce...
Intelligent Transportation System Based On Machine Learning For Vehicle Perce...Intelligent Transportation System Based On Machine Learning For Vehicle Perce...
Intelligent Transportation System Based On Machine Learning For Vehicle Perce...
 
IRJET- Traffic Sign Detection, Recognition and Notification System using ...
IRJET-  	  Traffic Sign Detection, Recognition and Notification System using ...IRJET-  	  Traffic Sign Detection, Recognition and Notification System using ...
IRJET- Traffic Sign Detection, Recognition and Notification System using ...
 
Automatic Detection of Unexpected Accidents Monitoring Conditions in Tunnels
Automatic Detection of Unexpected Accidents Monitoring Conditions in TunnelsAutomatic Detection of Unexpected Accidents Monitoring Conditions in Tunnels
Automatic Detection of Unexpected Accidents Monitoring Conditions in Tunnels
 

More from Khan Mostafa

Graph-based Analysis and Opinion Mining in Social Network
Graph-based Analysis and Opinion Mining in Social NetworkGraph-based Analysis and Opinion Mining in Social Network
Graph-based Analysis and Opinion Mining in Social NetworkKhan Mostafa
 
Research in the Computing Industry
Research in the Computing IndustryResearch in the Computing Industry
Research in the Computing IndustryKhan Mostafa
 
Semantic matchmaking Local Closed-World Reasoning
Semantic matchmaking Local Closed-World ReasoningSemantic matchmaking Local Closed-World Reasoning
Semantic matchmaking Local Closed-World ReasoningKhan Mostafa
 
Survey on real media paint simulation in Computer Graphics
Survey on real media paint simulation in Computer GraphicsSurvey on real media paint simulation in Computer Graphics
Survey on real media paint simulation in Computer GraphicsKhan Mostafa
 
Seminal works on watercolor painting simulation
Seminal works on watercolor painting simulation Seminal works on watercolor painting simulation
Seminal works on watercolor painting simulation Khan Mostafa
 
Reaction Paper Discussing Articles in Fields of Outlier Detection & Sentiment...
Reaction Paper Discussing Articles in Fields of Outlier Detection & Sentiment...Reaction Paper Discussing Articles in Fields of Outlier Detection & Sentiment...
Reaction Paper Discussing Articles in Fields of Outlier Detection & Sentiment...Khan Mostafa
 
Project Presentation: Graph-based Analysis and Opinion Mining in Social Network
Project Presentation: Graph-based Analysis and Opinion Mining in Social NetworkProject Presentation: Graph-based Analysis and Opinion Mining in Social Network
Project Presentation: Graph-based Analysis and Opinion Mining in Social NetworkKhan Mostafa
 
A Survey on Sentiment Mining Techniques
A Survey on Sentiment Mining TechniquesA Survey on Sentiment Mining Techniques
A Survey on Sentiment Mining TechniquesKhan Mostafa
 
RDF by Structured Reference to Semantics, the RS2 framework
RDF by Structured Reference to Semantics, the RS2 frameworkRDF by Structured Reference to Semantics, the RS2 framework
RDF by Structured Reference to Semantics, the RS2 frameworkKhan Mostafa
 
Study Tour (KUET CSE 2k5) Poster
Study Tour (KUET CSE 2k5) PosterStudy Tour (KUET CSE 2k5) Poster
Study Tour (KUET CSE 2k5) PosterKhan Mostafa
 
Open Document Format
Open Document FormatOpen Document Format
Open Document FormatKhan Mostafa
 
An Approach To Emerge Web 3.0
An Approach To Emerge Web 3.0An Approach To Emerge Web 3.0
An Approach To Emerge Web 3.0Khan Mostafa
 

More from Khan Mostafa (14)

Graph-based Analysis and Opinion Mining in Social Network
Graph-based Analysis and Opinion Mining in Social NetworkGraph-based Analysis and Opinion Mining in Social Network
Graph-based Analysis and Opinion Mining in Social Network
 
Research in the Computing Industry
Research in the Computing IndustryResearch in the Computing Industry
Research in the Computing Industry
 
Semantic matchmaking Local Closed-World Reasoning
Semantic matchmaking Local Closed-World ReasoningSemantic matchmaking Local Closed-World Reasoning
Semantic matchmaking Local Closed-World Reasoning
 
Survey on real media paint simulation in Computer Graphics
Survey on real media paint simulation in Computer GraphicsSurvey on real media paint simulation in Computer Graphics
Survey on real media paint simulation in Computer Graphics
 
Seminal works on watercolor painting simulation
Seminal works on watercolor painting simulation Seminal works on watercolor painting simulation
Seminal works on watercolor painting simulation
 
Reaction Paper Discussing Articles in Fields of Outlier Detection & Sentiment...
Reaction Paper Discussing Articles in Fields of Outlier Detection & Sentiment...Reaction Paper Discussing Articles in Fields of Outlier Detection & Sentiment...
Reaction Paper Discussing Articles in Fields of Outlier Detection & Sentiment...
 
Project Presentation: Graph-based Analysis and Opinion Mining in Social Network
Project Presentation: Graph-based Analysis and Opinion Mining in Social NetworkProject Presentation: Graph-based Analysis and Opinion Mining in Social Network
Project Presentation: Graph-based Analysis and Opinion Mining in Social Network
 
A Survey on Sentiment Mining Techniques
A Survey on Sentiment Mining TechniquesA Survey on Sentiment Mining Techniques
A Survey on Sentiment Mining Techniques
 
The Career (CSE)
The Career (CSE)The Career (CSE)
The Career (CSE)
 
RDF by Structured Reference to Semantics, the RS2 framework
RDF by Structured Reference to Semantics, the RS2 frameworkRDF by Structured Reference to Semantics, the RS2 framework
RDF by Structured Reference to Semantics, the RS2 framework
 
Study Tour (KUET CSE 2k5) Poster
Study Tour (KUET CSE 2k5) PosterStudy Tour (KUET CSE 2k5) Poster
Study Tour (KUET CSE 2k5) Poster
 
Open Document Format
Open Document FormatOpen Document Format
Open Document Format
 
GPU Computing
GPU ComputingGPU Computing
GPU Computing
 
An Approach To Emerge Web 3.0
An Approach To Emerge Web 3.0An Approach To Emerge Web 3.0
An Approach To Emerge Web 3.0
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Traffic Jam Detection System by Ratul, Sadh, Shams

  • 1.  [Type the document title]  [Year]                Khulna University of Engineering & Technology              Department of Computer Science and Engineering  CSE 3100 Report on Software Development Project – II   Traffic Jam Detection System Date: 22 June, 2008 Authors: Khan Muhammad Nafee Mostafa 0507007 & Qudrat-E-Alahy Ratul 0507037 Supervisor: Rushdi Shams Lecturer, Dept of Computer Science and Engineering, Khulna University of Engineering & Technology, Bangladesh
  • 2.   Acknowledgement  We express our gratitude to  the Almighty and our family.  We also thank Batch 2k5 of  CSE and whole CSE  department of KUET for  being a beaming source of  inspiration.  Thousands of people have  worked and been working in  the field of Image  Processing and Object  Recognition. Our respects go  to all of them.  We dedicate our work to  them who relate to traffic.   
  • 3. TRAFFIC JAM DETECTION SYSTEM    TRAFFIC JAM DETECTION SYSTEM    Contents    Chapter 1: Introduction…01  1.1 Traffic Jam Detection…01  1.2 Techniques of Traffic Jam Detection…02  1.3 A Brief of Our Approach…03  1.4 Outcome of the Project…04   Chapter 2: Background…05  2.1 About Traffic Jam…05  2.2 About Image Processing and Object Detection…06  2.3 Fundamental Steps in Digital Image processing…06  2.4 Idea of Image…07  2.5 Towards Traffic Jam Detection…07   Chapter 3: Work Approach …08  3.1 Approach of Image Processing and Object Detection…08  3.2 Image Acquisition…08  3.3 Image Enhancement…09  3.4 Lane Masking…10  3.5 Further Enhancement…11  3.6 Erosion Operation…12  3.7 Adaptive smoothing…13  3.8 Blobs (Binary Large Objects)…14  3.9 Object Analysis…14  3.10 Motion Detect…15  3.11 Showing Result…15    Chapter 4: Result and Calculation…17    Chapter 5: Conclusion…18      Appendix I : Screenshot of Our  Application… A‐1             
  • 4. TRAFFIC JAM DETECTION SYSTEM    TRAFFIC JAM DETECTION SYSTEM  Chapter   1   Introduction      Traffic  system  is  at  the  heart  of  civilized  world  and  development  in  many  aspects of life relies on it. Excessive number of traffic in roads and improper  controls  of  that  traffic  create  traffic  jam.  It  either  hampers  or  stagnate  schedule,  regimen,  business,  and  commerce.  Automated  traffic  detection  system  is  therefore  required  to  run  the  civilization  smooth  and  safe‐  which  will eventually lead us towards proper analysis on traffics, proper adjustment  of control management, and distribution of controlling signals.  The  aim  of  this  project  is  to  develop  a  traffic  jam  detection  system  using  image processing and object detection. Besides, we developed an application  that uses this detection mechanism and provides instant online information  through  Short  Messaging  Service  (SMS)  and  e‐mail.  This  information  helps  the travelers to incorporate with current situation on specific roads and the  authority to plan and schedule load balancing on the roads.      1.1 Traffic Jam Detection    Mostly,  automated  systems  need  the  interaction  with  a  computer  that  requires an algorithm to meet the specific requirements.  Human eye can easily detect whether there is a traffic jam or not. Within less  than  a  second,  human brain  processes  the  image  of  the  traffic,  detects  and  analyzes  objects,  and  thereafter  comes  to  a  decision.  A  programmer  also  detects, as being a human, traffic jam according to the analysis and detection  of  objects.  But  implementation  of  such  a  biological  process  requires  some  special treatment.     1 
  • 5. TRAFFIC JAM DETECTION SYSTEM    Computers  can  recognize  only  binary  signals.  A  picture  of  the  road  can  be  represented  as  a  digital  image,  which  is  actually  binary  signal.  This  image  is  used  as  primary  source  of  data.  But,  an  image,  when  it  is  captured  from  natural  environment,  is  very  raw  and  unformatted.  Programmers  have  to  process  the  data  and  extract  relevant  information  from  images.  Frequent  need  of  extracting  information  from  images  has  led  to  the  development  of  several  fields  (e.g.  Image  processing,  Computer  Vision,  Object  recognition  etc)  in  computing  industry.    We  have  used  image  processing  and  object  detection to detect traffic jam. It takes several steps of image processing for  us to make decision about traffic jam. Key points of these steps are,  • Image Analysis  • Object detection  • Typed object count  • Motion detection  • Result representation  We  have  integrated  these  steps  in  our  system  and  have  developed  an  application to simulate it.      1.2 Techniques of Traffic Jam Detection    Several  approaches  have  been  taken  to  detect  traffic  jam.  Oldest  and  most  reliable approach of them is to employ a person in important traffic points.  But  with  the  advent  of  technology  and  increment  of  traffic  flow,  several  approaches with less involvement of human have been taken.  Magnetic Loop Detector (MLD) used to count the number of plying vehicles  using magnetic properties [Koller et al. 1994].   Light beams (IR, LASER etc) are also use. As traffic move on road light beams  are cut. Electronic devices can record these events and detect traffic jam.  In  contemporary  approaches,  image  processing,  computer  vision  etc  are  highly  recommended.  In  these  types  of  approaches  involvement  of  computers  provide  online  characteristics,  facilitate  centralized  control  over  distributed system and develop compact platform. Computer vision (or Robot  Vision) can also provide other services. In these approaches, information feed    2 
  • 6. TRAFFIC JAM DETECTION SYSTEM    through  telephone  or  web  networks  can  easily  be  supported.  Even,  traffic  flow of whole city can be observed from a centre and statistics can be made.  Traffic  systems  design  and  urban  planning  can  be  very  efficient  by  taking  statistics from computer aided traffic systems.  We are using computer aided image processing to attain optimal support.      1.3 A Brief of Our Approach    In our project, as mentioned earlier, we have used image processing. Major  steps of our work are presented next,    1.3.1 Image Analysis  At first we must capture the image of the traffic point where we are going to  detect  traffic  jam.  This  image  is  taken  using  a  good  digital  camera.  Usually  some  fundamental  image  enhancements  using  Gaussian  filter  and  noise  reductions are done by camera itself. So, we do not need to apply them again  and kept this step for camera.    1.3.2 Object Detection  This step is very crucial. We used ‘Lane Masking’ [Atkociunas et al. 2005]. After  masking lane, the image contains only traffic vehicles. Then ‘Euclidean Color  Filter’ is applied. It will fill pixels with white where the difference of color is  minimal. Then, the image will be converted into a binary (first ‘Grayscale’ and  then  ‘Black  &  White’)  image  using  a  threshold  value.  Afterwards,  ‘Erosion’  operator  and  ‘Adaptive  Smoothing’  are  applied.  Finally,  ‘blobs’  are  found  from the image and are placed apart. We recognize these blobs as objects.  We will call this technique as ‘Lane Masked Erosion‐Blob Technique of Object  Extraction’.        3 
  • 7. TRAFFIC JAM DETECTION SYSTEM    1.3.3 Typed Object Count   Object  detection  is  followed  by  object  count.  We,  classify  all  the  objects  found,  in  previous  step,  into  four  groups  (small,  large,  critical  and  perfect)  and count them. This information is provided to determine the present state  of traffic.  We will call this technique as ‘Lane Masked Erosion‐Blob Technique of Typed  Object Count’.    1.3.4 Motion Detection  To  detect  motion,  we  need  two  consecutive  captures  of  the  road.  Both  images undergo ‘Erosion‐Blob Technique of Object Extraction’ (section 1.3.2).  Then, we detect overlapped blobs. Then, we calculate the distance the same  blob has moved. Finally we average the result to determine speed of plying  traffic.    We  will  call  this  technique  as  ‘Lane  Masked  Erosion‐Blob‐Displacement  method of motion detection’.  1.3.5 Result Representation  We  simulate  our  system  with  an  application  developed  in  the  .Net  Framework.      1.4 Outcome of the Project    Our  project  is  targeted  at  developing  a  tool  for  detecting  traffic  jam.  This  project  reaches  the  target  successfully  and  can  be  implemented  in  various  online systems. We can feed information about:   • Number of plying vehicle  • Existence of Jam  • Average speed of traffic    In the next chapters we will represent details of our project.    4 
  • 8. TRAFFIC JAM DETECTION SYSTEM    TRAFFIC JAM DETECTION SYSTEM  Chapter   2   Background    2.1 About Traffic Jam    It  is  said  that  road  and  transport  system  is  the  mean  by  which  we  can  measure  the  development  level  of  a  country.  And  Traffic  jam  is  the  unavoidable part of road & transport. Insufficient roads, poor urban planning  etc may cause traffic jam. In general sense, we say that there is a traffic jam  when there plies more vehicles in a road than it can hold.   In any one of the following cases, we say there is a traffic jam:  • The vehicles are stopped  • Vehicles are moving very slowly  • There is an excessive number of vehicle on road    Automated traffic control system can help us to reduce traffic jam and save  our  valuable  time.  Again,  computer  aided  traffic  jam  detection  system  can  warn  people  about  traffic  points  with  traffic  jam  and  ask  people  to  try  alternative path. We worked on traffic jam detection to build a base of such  modern facilities to ensure better transport.          5 
  • 9. TRAFFIC JAM DETECTION SYSTEM    2.2 About Image Processing and Object Detection    Recently  computing  industry  is  working  a  lot  in  both  image  processing  and  objects  detection.  These  two  fields  are  contributed  in  the  development  of  artificial intelligence and automated systems.  According to Nils J. Nilson [Nilson, 2002], Image processing has been proved  to  be  a  very  difficult  problem  for  machines.  Programmers  mainly  face  difficulties from   • Variable and uncontrolled illumination  • Complex and hard to describe objects  • Objects occluding other objects  In  man  made  environment  difficulties  are  lessened  than  in  natural  environment.    Object detection is the outcome of image processing. Object recognition goes  far more deep in analyzing images and objects from it.      2.3 Fundamental Steps in Digital Image processing    Some fundamental steps of image processing are,  • Image Acquisition  • Image Enhancement  • Image Restoration  • Color Image Processing  • Wavelets processing  • Compression  • Morphological Processing  • Segmentation  • Representation and Description  • Recognition    (Please look for references, [Gonzalez & Woods, 2003], [TUDelft])      6 
  • 10. TRAFFIC JAM DETECTION SYSTEM    2.4 Idea of Image  In  most  contexts,  we  studied  and  worked  on,  the  word  ‘image’  is  used  to  mention  a  two  dimensional  array  (or  matrix  or  a  plane)  of  bitmaps  and  is  used to represent 2D vision of real‐life images.   Every  bitmap  contains  3  fields:  R,  G  and  B.  Respectively,  they  contain  the  color  values  of  red,  green  and  blue  of  a  particular  point  (pixel).  Sometimes,  another fourth field may contain intensity of the very point.      2.5 Towards Traffic Jam Detection  Computer industry is getting enriched in image processing everyday. A lot of  work  of  many  individuals  throughout  the  world  has  helped  us  to  develop  a  traffic jam detection system.                                   7 
  • 11. TRAFFIC JAM DETECTION SYSTEM    TRAFFIC JAM DETECTION SYSTEM  Chapter   3   Work Approach    We  have  developed  this  project  as  a  part  of  a  course  named  ‘Software  Development  Project  ‐  II’  within  the  undergraduate  engineering  program  in  Computer  Science  and  Engineering.  We  were  suggested  to  use  the  .Net  framework as platform and C# as the language. To accomplish our project C#  .Net  was  a  good  tool.  Amongst  several  different  approaches  of  image  processing we have selected some to use. A precise description of our work is  presented in this chapter.      3.1 Approach of Image Processing and Object Detection    A machine, just like a human being, requires to ‘see’ the road for detecting  traffic jam on it. To provide a machine the capability to see we must exactly  follow the process a human being does.   Image processing requires huge processing of data and several algorithms run  in order of n2 or ny. Therefore, processes involving image processing are to be  handled with care.       3.2 Image Acquisition    Image acquisition is the first step of our system. A precise image of the case  road (traffic point) is acquired. We need to capture an image of the road with  no vehicle plying on it. This is called as background image (fig 3.2‐b).     8 
  • 12. TRAFFIC JAM DETECTION SYSTEM    Another  image  of  the  road  is  taken  exactly  at  the  time  when  we  need  to  detect traffic jam. We have a sample image next (fig 3.2‐a).      Fig3.2‐a: Sample Image taken on road at runtime       Fig3.2‐b: Sample Image taken as the background image       3.3 Image Enhancement    Some  noise  frequently  comes  on  images  taken  on  natural  environment.  Contemporary  technology  brings  cameras  integrated  with  image  enhancing  algorithms. So, we are not applying any enhancement separately.      9 
  • 13. TRAFFIC JAM DETECTION SYSTEM    3.4 Lane Masking   This method is intended to separate the part of the road where vehicles are  moving in one direction (Fig. 3.2‐a). This method simplifies the processing. As  we eliminate background we have only to think about the objects. So, a huge  amount of irrelevant information is discarded.   Masking algorithm is given by formula  N(p) = M(p) × V (p),  Where,  M(p) is an image point value in primary frame,   N(p) is a new image point in the output image (Fig. 3.4‐a),  V(p) is mask value for point p: V (p) = 0 if corresponding pixel is eliminated,   otherwise V (p) = 1.     Masking is applied to each RGB color separately.       Fig3.4‐a: Image after lane masked from main image     ‐  =    Fig 3.4‐b: the Lane Masking Process    10 
  • 14. TRAFFIC JAM DETECTION SYSTEM    3.5 Further Enhancement  After lanes are masked, the images are then enhanced by turning it into  grayscale (fig3.5‐a).   Grayscale algorithm is  R=G=B= (r+g+b)/3   Where,   R, G and B are new values of red, green and blue   r, g and b are old values of red, green and blue    Then the image is converted into black & white binary image (fig3.5‐b). This  requires the algorithm,    If (r+g+b > threshold) {        R=G=B = white;  }        Else {            R=G=B=black;          }      Fig3.5‐a : Grayscal conversion      Fig 3.5‐b : Binary Converted Image    11 
  • 15. TRAFFIC JAM DETECTION SYSTEM    3.6 Erosion Operation  The Erosion operator is defined as,            Fig 3.6‐a: Erosion Operator  In the case of object extract we can get good result by applying this operator.  Fig 3.6‐b depicts an image with erosion applied on it.    Fig3.6‐a: Figure with erosion applied on it      12 
  • 16. TRAFFIC JAM DETECTION SYSTEM    3.7 Adaptive smoothing  While traditional smoothing methods use the same window shape and size to  smooth  an  image  independent  of  its  content,  in  adaptive  smoothing,  the   window  shape  and  size  are  varied  across  the  image  domain  depending  on  local  image  content.  In  adaptive  smoothing  a  window  is  sized  according  to  the gradient magnitude locally and shaped in such a way that it has a shorter  side across an edge compared to along the edge. This mechanism maintains  edge details while smoothing random noise.  Fig3.7a shows the picture processed with adaptive smoothing. And fig3.7b is  without adaptive smoothing.      Fig 3.7a: Figure after Adaptive smoothing       Fig 3.7b: Figure without Adaptive smoothing            13 
  • 17. TRAFFIC JAM DETECTION SYSTEM    3.8 Blobs (Binary Large Objects)  Blobs are the largest objects. To find blob, we blur the image to eliminate all  small noises. Figure below shows the largest blob found by our method, ‘Lane  Masked Erosion‐Blob Technique of Object Extraction’.    Fig3.8a: Perfect Blob of 7 found blobs    3.9 Object Analysis    Blobs  found  in  previous  step  is  now  processed  mathematically  to  classify  them in 4 groups,  • Small  • Critical  • Perfect  • Large    Small objects are discarded as they are mostly noises. Large objects are never  car or bus. They can be the image itself or other large portion of image. Most  of  the  cars  lie  in  the  perfect  blob  group.  But  sometimes  critical  blob  hold  portions of car (hood, trunk etc).  We count the number of blobs in each class. Then the count is compared to  standard  conditions  and  a  decision  about  jam  status  is  then  can  be  made.  This  approach  can  be  called  as  ‘Lane  Masked  Erosion‐Blob  Technique  of  Typed Object Count’.    14 
  • 18. TRAFFIC JAM DETECTION SYSTEM    3.10 Motion Detect    Motion detection is another good way of telecasting information about traffic  jam. To do so,   • we take two  consecutive images of the road  • find the blobs  • detect overlapping blobs  • find axis‐wise displacement  • calculate the average displacement to determine speed  This  approach  can  be  called  as  ‘Lane  Masked  Erosion‐Blob‐Displacement  method of motion detection’.  Two images are given below showing motion detection:                  Fig3.10a: two images for detecting traffic motion    3.11 Showing Result     In  all  the  stages,  described  above,  necessary  information  for  deciding  whether there is a traffic jam or not is produced. Now we can display or even  feed this information to several systems.  In addition to traffic jam detection our simulation program can,  • Generate string describing traffic status  • Receive request through  SMS   • Respond to a SMS immediately  • Receive request through e‐mail   • Respond to e‐mail requests    15 
  • 19. TRAFFIC JAM DETECTION SYSTEM    Total integration of our application has also included set‐up features and set‐ up data are stored with the help of filing system.                                                    16 
  • 20. TRAFFIC JAM DETECTION SYSTEM     TRAFFIC JAM DETECTION SYSTEM  Chapter   4   Result and Calculation    Our project has been tested in several conditions. We have found that, it  takes 3 to 4 second for our system to determine the objects and their speed  when the image is 1024*768 pixels.   Our system can work efficiently work in standard environment.                                      17 
  • 21. TRAFFIC JAM DETECTION SYSTEM    TRAFFIC JAM DETECTION SYSTEM  Chapter   5  Conclusion    Traffic  jam  recognition  systems  have  been  developed  in  several  different  ways.  Our  approach  is  analytical.  It  also  takes  the  advantage  of  statistical  data. Lane masking has contributed greatly in reducing time complexity and  has tremendously have improved performance.  In future our work can support online centralized traffic system for a city. In  this system, every important traffic point will be monitored with our ‘Traffic  Jam Detection System’. Then, information will  be fed to central server. This  server  can  analyze  all  points’  traffic  state  and  can  control  traffic  flow.  Such  system may reduce traffic jam greatly.        18 
  • 22.   References  [Atkociunas et al. 2005] http://www.lana.lt/journal/19/Atkociunas.pdf   [Gonzalez & Woods, 2003] Rafael C. Gonzalez, Richard E. Woods,”Digital Image  Processing ”2/e,2003    [Koller et al. 1994] Dieter Koller, Joseph Weber and Jitendra Malik, "Robust Multiple Car Tracking with Occlusion Reasoning" ECCV (1) 1994 [Nilson, 2002] Nils J. Nilson “Artificail Intelligence”, 2002   [TUDelft]  http://www.qi.tnw.tudelft.nl/Courses/FIP/noframes/fip.html