International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 106 | Views: 225

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014 | Popularity: 6.8 / 10


     

Improvised MATLAB Techniques and Applications in Image Processing

R. S. Aarthi


Abstract: This is about the improvised techniques and applications of image processing in the field of MATLAB. We focus on the most capable and well braced techniques with an prominence in SIP. These methods necessitate writing precise codes to execute inter-processing communications where others hide the difficulties of communication; computation and correlations by using high level program interface. We have analyzed each and every approach with special importance to produce accurate results.


Keywords: shared computing, Circulated algorithms, Processing of the image, Processing of array signal


Edition: Volume 3 Issue 5, May 2014


Pages: 749 - 750



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
R. S. Aarthi, "Improvised MATLAB Techniques and Applications in Image Processing", International Journal of Science and Research (IJSR), Volume 3 Issue 5, May 2014, pp. 749-750, https://www.ijsr.net/getabstract.php?paperid=20131913

Similar Articles

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, Sudan, Volume 5 Issue 12, December 2016

Pages: 1653 - 1660

Cloud Computing Strategy in Sudan

Yousif Eltahir Sharaf Eldin Ahmed

Share this Article

Downloads: 113

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1065 - 1068

Enhancing Cloud Security and Integrity byUsing multiple Encryption Algorithms and Stripping

Shelna Valsan K. P., Varshap

Share this Article
Top