2010
DOI: 10.4028/www.scientific.net/amr.108-111.1366
|View full text |Cite
|
Sign up to set email alerts
|

Character Recognition Based on 2-D Histogram Image Threshold Segmentation

Abstract: This paper describes the method and realization of the objective binary segmented image to obtain the goal of characteristic quantities. The target block of the binary image is formed by pixel labeling. Through using mathematical morphology image processing method to filter out binary image noise, it achieves a clear goal of extracting the boundary. With the license plate character recognition, the experiment shows that the algorithm is effective. All numerical examinations illustrate the high convergence spee… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2012
2012
2012
2012

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…The services can be remote monitored and remote managed through the Web, providing users with flexible screen monitor options and electronic map services, which makes full use of firewall/VPN, encryption, authority management, security certification and real-time clock technologies to ensure the monitoring system and video data are not unauthorized used or damage. In city joint defense systems, network congestion is extremely easy to occur when mass users concurrent access to video resources, resulting from front equipment and backbone network bandwidth limitations [2]. It can fundamentally avoid network bottleneck caused by large-scale concurrent flows to use stream media distribution technology in large-scale network monitoring system.…”
Section: Introductionmentioning
confidence: 99%
“…The services can be remote monitored and remote managed through the Web, providing users with flexible screen monitor options and electronic map services, which makes full use of firewall/VPN, encryption, authority management, security certification and real-time clock technologies to ensure the monitoring system and video data are not unauthorized used or damage. In city joint defense systems, network congestion is extremely easy to occur when mass users concurrent access to video resources, resulting from front equipment and backbone network bandwidth limitations [2]. It can fundamentally avoid network bottleneck caused by large-scale concurrent flows to use stream media distribution technology in large-scale network monitoring system.…”
Section: Introductionmentioning
confidence: 99%