2023
DOI: 10.11591/ijece.v13i1.pp347-357
|View full text |Cite
|
Sign up to set email alerts
|

A computer vision-based lane detection technique using gradient threshold and hue-lightness-saturation value for an autonomous vehicle

Abstract: <span lang="EN-US">Automatic lane detection for driver assistance is a significant component in developing advanced driver assistance systems and high-level application frameworks since it contributes to driver and pedestrian safety on roads and highways. However, due to several limitations that lane detection systems must rectify, such as the uncertainties of lane patterns, perspective consequences, limited visibility of lane lines, dark spots, complex background, illuminance, and light reflections, it … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 26 publications
0
0
0
Order By: Relevance
“…Account and Service Hijacking: This threat arises from various tactics such as phishing, fraud, exploiting software vulnerabilities, and credential reuse. Attackers can illicitly acqu unauthorized access to services [55][56][57].…”
Section: Artificial Intelligence General Science (Jaigs)168mentioning
confidence: 99%
See 3 more Smart Citations
“…Account and Service Hijacking: This threat arises from various tactics such as phishing, fraud, exploiting software vulnerabilities, and credential reuse. Attackers can illicitly acqu unauthorized access to services [55][56][57].…”
Section: Artificial Intelligence General Science (Jaigs)168mentioning
confidence: 99%
“…The severity of the repercussions depends on the level of access, as individuals with higher privileges can access sensitive data and services. Malicious insiders pose significant risks, including theft of confidential data, reputational damage, financial losses, and productivity disruptions [55][56][57].…”
Section: Artificial Intelligence General Science (Jaigs)168mentioning
confidence: 99%
See 2 more Smart Citations
“…Account and Service Hijacking: This threat arises from various tactics such as phishing, fraud, exploiting software vulnerabilities, and credential reuse. Attackers can illicitly acquire user credentials, thus ga unauthorized access to services [55][56][57].…”
Section: Artificial Intelligence General Science (Jaigs)310mentioning
confidence: 99%