Explore the Performance of the ARM Processor<br /> Using JPEG
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 1
Abstract
Recently, the evolution of embedded systems has shown a strong trend towards application- specific, single- chip solutions. The ARM processor core is a leading RISC processor architecture in the embedded domain. The ARM family of processors supports a unique feature of code size reduction. In this paper it is illustrated using an embedded platform trying to design an image encoder, more specifically a JPEG encoder using ARM7TDMI processor. Here gray scale image is used and it is coded by using keil software and same procedure is repeated by using MATLAB software for compare the results with standard one. Successfully putting a new application of JPEG on ARM7 processor.
Authors and Affiliations
N. N. Ganvir , A. D. Jadhav
Modelisation of the maintenanceproduction couple by a graph of scheduling
The problem of scheduling, both maintenance and production, was a work of many articles. The algorithms genetics, ant, and multi-agent, gives solutions approaches with this problem. Modelled the problem in a simple and c...
Betel Leaf Area Measurement Using Image Processing
The deep green heart shaped leaves of betel vine are popularly known as a Paan in India. It is used in a number of traditional remedies. Now a day’s customer’s lifestyles and needs have gone through tremendous changes. T...
Quantitative evaluation of Segmentation algorithms based on level set method for ISL datasets
The enormous potential research efforts have been taken for sophisticated and natural human computer interaction using gestures. This work has got motivated from long ago as 1980’s since sign language is the only communi...
A Hybrid System for Fingerprint Identification
Fingerprint-based identification is one of the core methodologies for person identification. It remains a reliable, efficient and commonly accepted biometric. The most popular and extensively used method for fingerprint...
An Efficient Protocol for Resource Constrained Platforms Using ECC
At present, most of e-commerce applications are developed using asymmetric cryptography to guarantee the authentication of the involved parties. On the other hand, a growing demand for mobile devices has geared a shift t...