Upload Code
loading-left
loading loading loading
loading-right

Loading

Profile
No self-introduction
codes (8)
Segmntation image
no vote
Application background Segmentation  or contouring could be also obtained using morphological operations. Segmentation subdivides an image into its constituent regions or objects. The l
rajasekar439033
2016-08-23
1
1
SCFDMA code up
no vote
Application background The purpose of this contribution is to provide the performance of the concatenated Reed-Solomon and convolutional code that is described in Mode A of the current draft physical layer standard. This code is only applicable for the downstream channel that uses a continuous transmission stream in a frequency division duplexed (FDD) system. Key Technology The code analyzed in this contribution for the downstream channel is shown in the following block diagram. Conceptual Block diagram of the Concatenated Reed-Solomon/Convolutional Coding Scheme Following the convergence layer, systematic shortened (204,188) Reed-Solomon encoding is performed on each received 188 byte packet, with T = 8. This means that 8 erroneous bytes per transport packet can be corrected. This process adds 16 parity bytes to the transport packet to give a 204 byte codeword.
rajasekar439033
2016-08-23
1
1
serial port read using matlab
no vote
this program is used to read the serial port and display the data coming from it.  also we can use this for further procesing
rajasekar439033
2016-08-23
1
1
gsm gps based car monitoring
no vote
This systems constantly watch a moving Vehicle and report the status on demand. When the theft identified, the responsible  person send SMS to the microcontroller, then microcontroller issue the control signals to stop the engine motor. Authorized person need to send the  password to controller to restart the vehicle and open the door. This is more secured, reliable and low cost. for this we used AT89s52 microcontroller interfaced with GSM and GPS. please go through the code we clearly mentioned all the port input output considerations. also we have used to check the password to unlock the car....
rajasekar439033
2016-08-23
0
1
fundus image processing
4.0
this project is used to identify the macula in the fundus image . for that we have an fundus image and it is loaded to program and it is converted to rgb to gray and then it is applied with morphological processing. after that this output helps in getting optical disk in the fundus image. then the output is used to find
rajasekar439033
2016-08-23
0
1
retinal image processing
no vote
this source code is used to transform the fovea exactly... for that we have to upload an normal and abnormal fundus image to the code... the output will be the transformation of exact fovea/optical disk position....

rajasekar439033
2016-08-23
0
1
Retinal blood vessel detection using bifurrcation
no vote
The retinal fundus photograph is widely used in the diagnosis and treatment of various eye  diseases such as diabetic retinopathy and glaucoma. Medical image analysis and processing  has great significance in the field of medicine, especially in non-invasive treatment and  clinical study. Normally fundus images are manually graded by specially trained clinicians in  a time-consuming and resource-intensive process. A computer-aided fundus image analysis  could provide an immediate detection and characterization of retinal features prior to  specialist inspection. Segmentation in eye imaging provides an important role for calculating 
rajasekar439033
2016-08-23
0
1
Image cluster analysis of Marr's Data
no vote
Image cluster analysis of Marr's Data We improve the bitmap by closing boundaries of connected regions (bwmorph(bw1,'close')), filling in isolated empty pixels (bwmorph(bw2,'fill')), and thickening (bwmorph(bw3,'thicken',5)) connected regions. It is important that the thickening algorithm will not connected disconnected regions. 
rajasekar439033
2016-08-23
0
1
No more~