An Algorithm to Detect the Automobiles Using the Copied Vehicle License

  • Chaofan BiEmail author
  • Wei Yuan
  • Biying Yan
  • Pan Deng
  • Feng Chen
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 142)


Due to fast development of technology and enhanced global connection, the number of vehicle running on the road in China increases with an amazing speed, while related illegal behavior appears and increases as well. One of them is copied vehicle license (CVL), in which the driver uses a fake license to avoid relevant punishment, to save annual tax and to commit crimes. To better maintain healthy traffic operation environment, a spatial distance based method is put forward in this paper to detect possible vehicles with CVL. With big data mining skill and parallel technology, the work can be done automatically by the computer with a good speed and accuracy. The results turn out to be clear and can be used directly by the police department, which improves the processing efficiency in this field. Both the government and public drivers benefit from this.


Big data mining Copied vehicle license Spatial distance Traffic operation 



The work was supported by the National Natural Science Foundation of China (No. 61100066).


  1. 1.
    Qi, G., Pan, G., Li, S., Zhang, D.: When intelligent transportation meets taxi trajectory mining. China Comput. Fed. 9(8), 30–37 (2013)Google Scholar
  2. 2.
  3. 3.
    Jin, Y., Wang, J.: Investigation about how to govern vehicles with copied vehicle licenses based on traffic flow collection. China Water Transp. 7(9), 173–176 (2007)Google Scholar
  4. 4.
    Xiaochun, L., Zhou, X., Jiang, X., Pan, W., Wang, F.: Fake plate detection system based on grid monitoring. J. Comput. Appl. 29(10), 2847–2848 (2009)Google Scholar
  5. 5.
  6. 6.
  7. 7.
  8. 8.
    Deng, P., Zhang, J.W., Rong, X.H., Chen, F.: A model of large-scale device collaboration system based on PI-calculus for green communication. Telecommun. Syst. 52, 1313–1326 (2013)Google Scholar
  9. 9.
    Deng, P., Zhang, J.W., Rong, X.H., Chen, F.: Modeling the large scale device control system based on PI-calculus. Adv. Sci. Lett. 4, 2374–2379 (2011)CrossRefGoogle Scholar
  10. 10.
    Zhang, J.W., Deng, P., Wan, J.F., Yan, B.Y., Rong, X.H., Chen, F.: A novel multimedia device ability matching technique for ubiquitous computing environments. EURASIP J. Wirel. Commun. Netw. 2013, 1–12 (2013)CrossRefGoogle Scholar
  11. 11.
    Rong, X.H., Deng, P., Chen, F.: A large-scale device collaboration resource selection method with multi-Qos constraint supported. Adv. Mater. Res. 143, 894–898 (2011)Google Scholar
  12. 12.
    Rong, X.H., Chen, F., Deng, P., Ma, S.L.: A large scale device collaboration mechanism. J. Comput. Res. Dev. 9, 1589–1596 (2011)Google Scholar
  13. 13.
    Chen, F., Rong, X.H., Deng, P., Ma, S.L.: A survey of device collaboration technology and system software. Acta Electronica Sin. 39, 440–447 (2011)Google Scholar

Copyright information

© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015

Authors and Affiliations

  • Chaofan Bi
    • 1
    Email author
  • Wei Yuan
    • 1
  • Biying Yan
    • 1
  • Pan Deng
    • 1
  • Feng Chen
    • 1
  1. 1.Institute of Software Chinese Academy of SciencesBeijingChina

Personalised recommendations