Traffic Violation Detection and Alertion System Review

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 22

Bahir Dar University

Bahir Dar Institute of Technology

Faculty of Electrical and Computer Engineering


Department of Computer Engineering
Final Year Project Proposal

PROJECT TITLE

TRAFFIC VIOLATION DETECTION AND REPORTING SYSTEM

Eyuel Gashaye - BDU1201637

Firaol Tolessa - BDU1201719

Natnael Adamu - BDU1202627

Natnael Birhanu - BDU1202631

Advisor: __

Date: __
Declaration

We are 5th year Computer-Engineering students of Bahir Dar University in Bahir Dar
institute of Technology (BiT), Faculty of Electrical and Computer Engineering. The
information found in this final year project proposal is our original work. And all sources
of materials that will be used for the project work will be fully acknowledged.

Name Signature

1. Eyuel Gashaye ____________

2. Firaol Tolessa ____________

3. Natnael Adamu ____________

4. Natnael Birhanu ____________

This project proposal has been submitted for examination with my approval as a
university advisor.

Advisor Signature Date

1.__________ _________ __________

This project proposal has been submitted for examination with my approval as a Faculty
head.

Faculty head Signature Date

1.__________ _________ __________

1
Acknowledgement

First and foremost, we express our heartfelt gratitude to God Almighty for granting us the
strength, wisdom, and guidance throughout the completion of our project.

We would like to thank Mr. Sultan for his valuable advice and guidance in the selection
of our final year project title. His expertise and insights provided us with a clear direction
and helped us make informed decisions regarding our project's scope and objectives.

Furthermore We would also like to extend our sincere appreciation to Mr. Molla for his
valuable assistance, unwavering support, and valuable suggestions during the
development of our final year project proposal on the Traffic Violation Detection and
Reporting System. His dedication and expertise greatly contributed to the success of our
project.

2
Executive Summery

In many urban areas, the rise in vehicle population has led to a surge in traffic violations,
presenting a significant challenge for law enforcement. Traditional traffic management
methods, reliant on manual enforcement, are struggling to cope with the growing volume
of violations. This traditional approach not only fails to keep pace with the expanding
traffic but also exposes the system to corruption and mismanagement. Our project aims to
address these shortcomings by introducing an advanced Traffic Violation Detection and
alerting System, leveraging cutting-edge technology to enhance law enforcement
capabilities and ensure safer roads for all citizens.

Due to the severity of traffic violations, particularly in densely populated urban areas,
extensive research has been undertaken to develop and deploy effective technological
solutions. These endeavors typically fall into two categories: those employing non-real-
time data analysis and those leveraging real-time data streams. Both approaches rely on a
variety of tools including cameras, sensors, and AI models to achieve their objectives.

This project will, hopefully, contribute a great deal to the reduction of traffic violations
and ensure traffic safety procedures. By the use of Flagged license plate detection
procedures, the project will make law enforcement procedures more efficient and less
demanding on human personal. And as data is key element in this age, the system will
provide valuable insights into traffic patterns and violation trends.

3
Table of Contents

Declaration...........................................................................................................................I
Acknowledgement..............................................................................................................II
Executive Summery...........................................................................................................IV
Introduction..........................................................................................................................1
Literature Review................................................................................................................3
Statement of the problem.....................................................................................................5
Objective..............................................................................................................................6
General Objectives...........................................................................................................6
Specific Objectives..........................................................................................................6
Scope....................................................................................................................................7
Significance of the Study.....................................................................................................8
Research Methods and Procedures......................................................................................9
Literature Review.............................................................................................................9
Requirement Gathering....................................................................................................9
Data Collection and pre processing.................................................................................9
Algorithm Selection and Development..........................................................................10
System Components and Architecture...........................................................................10
System Components...................................................................................................10
System Architecture...................................................................................................11
System Work Flow.....................................................................................................12
Hardware and Software Integration...............................................................................12
System Testing...............................................................................................................13
Deployment....................................................................................................................13
Work plan..........................................................................................................................14
Resources...........................................................................................................................15

4
Introduction

Traffic safety is a paramount concern for every society, and Ethiopia is no exception.
With the increasing number of vehicles on the roads, ensuring compliance with traffic
regulations has become a significant challenge. Traffic violations not only endanger the
lives of road users but also contribute to congestion and delays, hampering the efficiency
of transportation systems [1]. In response to these challenges, the development of a
Traffic Violation Detection and Reporting System, coupled with Flagged Car Detection,
emerges as a crucial initiative to mitigate risks and improve overall road safety standards
in Ethiopia.

The Traffic Violation Detection and Reporting System aims to leverage advanced
technologies, such as computer vision and data analytics, to monitor and detect various
traffic violations in real-time. These violations may include, running red lights, wrong
way driving and improper lane usage. The system can automatically identify instances of
non-compliance with traffic regulations.

Furthermore, the integration of Flagged Car Detection capability adds another layer of
security and enforcement. This feature enables the system to identify vehicles that have
been flagged for specific reasons, such as involvement in previous accidents, outstanding
fines, stolen vehicles, or other criminal activities. By promptly detecting and flagging
these vehicles, law enforcement agencies can take immediate action to mitigate potential
risks and ensure public safety.

In Ethiopia, where rapid urbanization and infrastructure development are driving an


increase in vehicular traffic, the implementation of such a comprehensive Traffic
Violation Detection and Reporting System is imperative [2]. Not only does it serve as a
proactive measure to prevent accidents and promote responsible driving behavior, but it
also supports law enforcement efforts by providing valuable data and evidence for legal
proceedings against offenders.

In this project, we will delve deeper into the design, implementation, and potential impact
of the Traffic Violation Detection and Reporting System, with a specific focus on its
integration with Flagged Car Detection technology. Through an analysis of relevant case

1
studies, technological frameworks, and policy implications, we aim to provide insights
into how such systems can be tailored to the unique context and challenges of Ethiopia's
traffic management landscape. Ultimately, our goal is to contribute to the advancement of
road safety initiatives and the promotion of responsible driving practices for the benefit
of all road users in Ethiopia.

2
Literature Review

Traffic violations have been on the rise lately according to a study carried out by Gadisa
Layo in the Urban city center. The violations have been increasing in percentage yearly
due to different factors. Management of these issues has long been carried out with
traditional traffic management, which is heavily reliant on manual enforcement and is
struggling to keep pace with the growing volume of traffic and violations. These
management strategies have resulted in an ease of susceptibility to corruption and
mismanagement due to there being no advanced technology-based traffic law
enforcement [1].

Due to the severity of traffic violations, especially in urban city centers, different research
has been conducted on the best ways to design and implement these technologies.
Some researches as proposed by Hirnaik et al. [3] have designed a simplistic data flow
model on how different layers can be implemented to process video data with distinct
separation of layers for step-by-step processing and the utilization of YOLO for fast
vehicle detection but lacking an effective way of managing real-time data. Others such as
Jin su [4] utilized edge detection and blurring filters to detect features and expanded the
range of their violation detected to encompass issues such as no helmet and seatbelt while
suffering the same problem as the previous and not having a feature for night time
violation detection procedure.

To tackle issues with real-time tracking of vehicles in a dynamic environment Xiaoling et


al [5] have used Uses wavelet transform and dynamical background to track objects in
real time. However, the model efficiency is not outlined in contrast to other techniques
outlined in the document. Furthermore, the studies conducted by Dr. S. Raj Anand and
his colleges [6] have shown that real-time processing can be achieved and optimized
further. By using techniques such as adaptive differential imaging [4]for detecting object
movement real-time processing can be considered as being possible.

However, detecting violations without an effective means of tracing and recording the
license plate of the vehicle for reporting procedures won't make the system robust. Tao

3
Zhang and Yong qi Qi [7]have done research on license plate recognition systems that
track and report license plates of vehicles in real time. A study by Saman Rajebi and
colleagues [8] also optimized the recognition system by implementing mechanisms for
removing environmental effects and uses Hopfields neural network for pattern
recognition.

4
Statement of the problem

Urban centers worldwide are facing an unprecedented surge in the number of vehicles,
leading to a corresponding increase in traffic violations. These violations not only
contribute significantly to road accidents but also cause major inefficiencies in the traffic
management system. Conventional methods of traffic management, which heavily rely on
limited manpower for monitoring and enforcement, struggle to keep up with this growing
volume. Manual enforcement is prone to human error and potential corruption, creating a
critical gap between the occurrence of violations and their proper reporting. This gap
undermines efforts to ensure road safety and maintain smooth traffic flow. Additionally,
it is challenging to promptly identify and track vehicles associated with crimes
throughout the city.

The Traffic Violation Detection and Reporting System aims to address these challenges
by proposing an automated, AI-based solution. This system efficiently and accurately
monitors, detects, and reports traffic violations, thereby bridging the critical gap caused
by the surge in vehicle numbers

5
Objective

General Objectives
Implement a comprehensive traffic violation detection and reporting system to improve
traffic efficiency and safety.

Specific Objectives

• Real-Time Monitoring: To continuously monitor traffic conditions using and


providing up-to-date information on traffic flow. Up to date info?
• Violation Detection: To automatically detect various traffic violations such as
red light running, wrong way and Lane Violation using cameras.
• Police Watch List Hit: Identify vehicles matching a database of stolen cars, or
Suspicious vehicles which are tied up with wanted individuals such as
individuals connected to crimes by capturing and identifying flagged license
plates. Alert law enforcement personnel immediately.
• Evidence Capture: To record evidence of violations that can be used for
issuing citations and legal proceedings.
• Automated Reporting and Alerting: Generate automatic reports for detected
violations, including time, location, type of violation, and captured evidence.
Alert law enforcement personnel in real-time about high-priority violations
like police watch list hits or dangerous driving behaviors.
• Secure Database: To store evidence for detected violations and police watch
list.
• User interface: Provide a user-friendly interface for government bodies to
submit capture requests and for system administrators to navigate and manage
violations records effectively
We said the organization report a flagged plate yes?

6
Scope

In this final year project we hope to build a robust and real-time operational traffic
violation detection and alerting system with the goal of enhancing road safety and crime
prevention.

Based on the resources, material and cash, we have put together this scope guideline to
outline the extent of the projects reach. This project scope will focus on the following key
areas:

1. AI Based Violation Detection


By utilization of modern advanced AI models and algorithm design ,the project will
incorporate AI models for violation detection and License Plate recognition, which
are optimized for various lighting and weather conditions , to detect violations in
traffic rules such as wrong way driving , red light violation and lane violation.
2. Flagged license plate detection
Based on the AI model of the system, the project will also detect suspicious vehicles
which are tied up with wanted individuals such as individuals connected to crimes by
capturing and identifying flagged license plates.
How they are tied with individuals?
3. Secure Reporting System Can or will?
In this age of digital supremacy the concept of security is highly valued. As such the
project will utilize security protocols such as JWT(JSON Web Token) for data
integration checking and encryption procedures for data privacy while generating and
sending reports of violations. This report procedure includes:
 Internal reporting – whereby the system sends internal messages /packets/ to
be delivered to internal system components such as the centralized server.
 External reporting – sending responses for incoming requests and receiving
request from shareholders of the system such as government organizations
4. Centralized Database and request management
As there is a huge amount of data, management of data is key in this system. The
project utilizes database management systems based on database programs such as
MYSQL and MongoDB to deliver fast data handling.

7
Also the system will have centralized request management procedures to help
coordinate and manage various requests that come to the system.
5. Real-time processing

Traffic violations occur at a fraction of a second hence need special consideration on


detection and duration of the response. To maximize the response time the system will
utilize the concept of temporary memory for violation analysis. Due to heavy burden
placed on the system by the real-time demand techniques such as object tracking and
optimized video handling will be used to tackle this issue.

Significance of the Study

This project will, hopefully, contribute a great deal to the reduction of traffic violations
and ensure traffic safety procedures. By the use of Flagged license plate detection
procedures we are making law enforcement procedures more efficient and less
demanding on human personal. And as data is key element in this age, the system will
provide valuable insights into traffic patterns and violation trends.

Also through leveraging the power of AI we are not only showing how AI based
solutions can be used to solve problems we as a community face, but also on how to push
the boundaries of traffic management to the modern age.

8
Research Methods and Procedures

This project will employ a multi-pronged approach that leverages various research
methodologies to achieve its objectives:
Inline space 1.5
Literature Review

We conduct systematic and comprehensive literature review to gain valuable insights


into AI-powered traffic violation detection systems. The review encompasses academic
journals, conference proceedings, technical reports, and industry publications. The
primary objectives of the review are as follows:

o To investigate existing AI algorithms and techniques used for traffic violation detection.
o Bullet
To be aware of the best consistency
practices for system design, and components interactions .

Requirement Gathering

Identification of functional and nonfunctional requirements based on the literature


review and current road traffic incidences Are done in the next step of the Research
Method and Presentation and presented as follows:

Functional Requirements Non Functional Requirements


Plate Detection Performance
License Plate Recognition Accuracy
Violation Detection Security
Violation Reporting User Friendly Interface
Flagged Plate Detection
Alert

Data Collection and pre processing

In this step we focuses on the gathering and pre processing the data specifically used
for training the AI model. The data collection phase involves identifying and acquiring
relevant data sources, such as video footage from surveillance cameras and historical

9
records of traffic violations at the Pre processing phase Normalization, Labeling and
Datasets Splinting are done to the data to ensure its quality and suitability for AI
training.

Algorithm Selection and Development

In this section of the research method procedure we analyze and compare different AI
models like OpenCV ,CNN ,Yolo, Haar Cascade regarding their Speed of Detection
accuracy ,Good generalization ,Open-source .YOLO is extremely fast because it does not
deal with complex pipelines. It can process images at 45 Frames Per Second (FPS). In
addition, YOLO reaches more than twice the mean Average Precision (mAP) compared
to other real-time systems it also works for real time detection of specific traffic
violations (e.g., red light running, illegal parking). and EasyOcr for plate detection.

System Components and Architecture

System Components

The system architecture consists of the following components

Camera: A camera is installed at strategic locations to capture real time traffic scenes.

Processing Module: This unit is responsible for the following tasks

 Car Plate Detection: The captured video frames are processed using the object
detection algorithm. Which detects vehicles plate in the video frames by
identifying bounding boxes around them.

 Plate Recognition: Within the detected vehicle bounding boxes, the system
applies OCR to perform optical character recognition on the car plates. OCR
recognizes the characters on the plates, extracting the plate number for further
analysis.

 Violation Detection: The system analyzes the extracted plate numbers to


identify violations, such as red light violations and speeding.

10
 Flagged plate Detection: The system also analyze the extracted plate number
to checks if the plate number matches any reported or flagged vehicles, such as
stolen cars, for further action.

Central Repository/Database: Detected violation videos, along with relevant


timestamps and plate numbers, Violation Categories,Reported/Flagged
Plates,Locations,Regions ,Traffic police contact details and others are stored in a
centralized repository or database. This allows easy access and retrieval of violation
records ,for legal reference and analysis as well as to refer traffic details for alerting
violation and flagged plate issues

Alerting Modules: When a violation or flagged plates detected, the system may utilizes
Micro controller connected to GSM module to Alert the near by traffic police
authorities.

User Interface: The system may include a user interface accessible by traffic police
officers and other Organizations To report a flagged car plate.

11
System Architecture

Fig will be visible when we print it?

Figure 1 System Architecture

12
System Work Flow

Figure 2 Flow Diagram

13
Hardware and Software Integration Spaceing consistency

In the Hardware and Software Integration phase, the will be focusing is on


combining the software components developed for traffic violation detection with
the necessary hardware infrastructure. This phase involves integrating the AI model
for violation detection and recognition , and other software modules with the
hardware components, such as cameras, processing module and central server . The
integration ensures seamless communication and interaction between the software
and hardware components, allowing them to work together harmoniously.

System Testing
The System Testing phase will be dedicated to evaluating the performance and
reliability of the traffic violation detection and reporting system as a whole. This
phase involves comprehensive testing of the integrated system, including its
software, hardware, and their interactions. Various testing techniques, such as
functional testing,and performance testing, are employed to verify the system's
behavior under different conditions and scenarios. The AI model's accuracy,
detection speed, and robustness are assessed through extensive testing using real
world traffic data and simulated scenarios. Any issues or

Deployment
The Deployment phase marks the final stage of the system development process,
where the traffic violation detection and reporting system is made ready for
operational use. This phase involves installing the system at the target deployment
locations, which may include traffic intersections, highways, or other relevant areas.
During deployment, the hardware components are physically installed and
configured, and the software components are deployed and configured on the
appropriate computing infrastructure. Additionally, any necessary network
connectivity, data storage, and user interfaces are set up.

14
Work plan

2024
Activities March April May June July

Weeks 4 1 2 3 4 1 2 3 4 1 2 3 4 1 2 3 4

Requirement     
gathering

Literature review      

Installing necessary 
software

Data Collection     

Project proposal  

Data Analysis and 


per-processing

Analyzing Choosing   
AI model

Train the model   

Hardware    
implementation

Documentation  

Presentation 

15
Resources

To develop and implement a comprehensive Traffic Violation Detection and Reporting


System, including Flagged Car Detection we should have range of resources. These
resources encompass technological infrastructure, hardware, software, human resources,
and ongoing operational costs. Here's the resources needed along with their estimated
prices:

Resources Estimated Price(ETB)

SIM800L GSM module 1,250


Detection algorithms/software Free

File server free

Raspberry pi 4 16,000

ESP32 CAM WiFi + bluetooth Camera Module 14,000

Total price 31,250

16
References

[1] G. L. MOSISA, “ANALYSIS OF ROAD TRAFFIC VIOLATIONS IN ADDIS ABABA CITY,” Addis Ababa
University, Addis Ababa, 2018.

[2] E. E. Dube, “Urbanization in Ethiopia: Challenges, opportunities and Future Research


Directions,” Dilla, 2019.

[3] M. G. P. R. O. R. A. H. S. ,. V. G. P. D. S. B. Hirnaik Ashlesha Padmakar, “Traffic Rules Violation


Detection System,” International Journal of Innovative Science and Research Technology, vol.
8, no. 6, p. 6, 2023.

[4] M. K. S. B. P. Jin Su Kim, “A study on implementation of real-time intelligent video


surveillance system based on embedded module,” EURASIP Journal on Image and Video
Processing , p. 22, 2021.

[5] L.-M. M. B. Z. ,. K.-L. D. Xiaoling Wang, “A Video-based Traffic Violation Detection System,”
Hangzhou, China, 2013.

[6] D. N. K. D. D. U. S. R. K. ,. S. N. T. Dr. S. Raj Anand, “TRAFFIC SIGNAL VIOLATION DETECTION


USING ARTIFICIAL INTELLIGENCE AND DEEP LEARNING,” International Journal of Advanced
Research in Engineering and Technology (IJARET), vol. 12, no. 2, p. 11, 2021.

[7] Y. q. Q. Tao Zhang, “Research and Application of License Plate Recognition System”.

[8] S. P. R. M. Saman Rajebi, “A License Plate Recognition System with Robustness against
Adverse Environmental Conditions Using Hopfield’s Neural Network,” Axioms, p. 12, 2023.

17

You might also like