We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Improved Image Analysis Technique for Embedded System Design

by Tamanna Afroze
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 86 - Number 3
Year of Publication: 2014
Authors: Tamanna Afroze
10.5120/14962-3136

Tamanna Afroze . Improved Image Analysis Technique for Embedded System Design. International Journal of Computer Applications. 86, 3 ( January 2014), 1-4. DOI=10.5120/14962-3136

@article{ 10.5120/14962-3136,
author = { Tamanna Afroze },
title = { Improved Image Analysis Technique for Embedded System Design },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 86 },
number = { 3 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume86/number3/14962-3136/ },
doi = { 10.5120/14962-3136 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:03:13.814346+05:30
%A Tamanna Afroze
%T Improved Image Analysis Technique for Embedded System Design
%J International Journal of Computer Applications
%@ 0975-8887
%V 86
%N 3
%P 1-4
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is the primitive issue for humanity. From Paleolithic age, people are trying to secure themselves from natural calamity, furious animals and other adversities. With the advancement of technology, we get Machine gun, Nuclear Bomb, and many such powerful types of equipment for security. All these powerful equipments are used for protecting the border of a country, or in war against the enemy nation. General people cannot afford those powerful equipments. They need some simple but useful equipment necessary for protection against their enemies, which are wild enemies, cockroach, ants, and spiders. While working in a project of designing a device which will take care of the security issue for the general people, I need to design the image matching algorithm for the device named as Environment Aware Protection Device, in which whole detection mechanism of the insects is embedded in a chip of the device. An improved image analysis technique is used in this paper for detecting the bugs. Positional existence of organs within the insects is considered for image analysis

References
  1. Hamacher Carl, Vranesic Zvonko, Zaky Safwat "Computer Organization. " Mc Graw Hill, fifth edition, pp 516-549, 2002.
  2. Skroder C. John in "Using the M68HC11 Microcontroller – A Guide to Interfacing and Programming the M68HC11 Microcontroller". Willey Publication.
  3. Peatman B. John. In "Design With PIC Microcontroller", Second Edition.
  4. Mannual on PIC Microcontroller, Retrieved From www. support. microchip. com.
  5. Hubalek Z. "Coefficients of association and similarity based on binary (presence-absence) data - an evaluation," Biological Review, Vol. 57, pp. 669-689, 1982
  6. Jain A. K. , Dubes R. C. Algorithms for Clustering Data, Prentice Hall, 1988.
  7. Theodoridis S. , Koutroumbas K. Pattern Recognition, Academic Press, 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Embedded system security cluster feature set