Influencing Parameters Of Image Display Acceleration

N. Harathi*, V. Meenakshi**, C.H. Suneetha***
*-** Assistant Professor, Department of EIE, Sree Vidyanikethan Engineering College Tirupati.
*** Associate Professor, Department of ECE, Vignana Bharathi Institute of Technology, Aushapur.
Periodicity:November - January'2014
DOI : https://doi.org/10.26634/jes.2.4.2804

Abstract

Based on the idea of combining Embedded system with Image processing, this paper designs an embedded system which simulates the weapon mode. In this a background picture should be moved quickly by S3C2440 processor which is based on ARM9.Due to the limitation of hardware resources in embedded systems, it is difficult to realize high speed image processing with conventional solution. In this paper, the authors discussed about the DMA technology and Software Algorithm that provides smooth, stable and fast moving images. It provides good reference for graphic development on embedded systems.

Keywords

Image Processing, ARM, Embedded Systems, DMA.

How to Cite this Article?

Harathi.N., Meenakshi.V., and Suneetha.CH. (2014).Influencing Parameters Of Image Display Acceleration. i-manager’s Journal on Embedded Systems, 2(4), 20-30. https://doi.org/10.26634/jes.2.4.2804

References

[1]. Samsung Electronics Co.,Ltd. S3C2440A 32-Bit RISC Microprocessor User' s Manual[Z]. 2007.
[2]. Aylor A P. (2004). Intelligent transport systems: emerging technologies and methods in transportation and traffic [J].Transportation Research Part C: Emerging Technologies, 6, (6) :167-169.
[3]. SHEN X S,LIU J Y,SUN Y R,et al. (2005). Research on multi-function vehicle navigation and monitoring system for urban vehicle[J]. Transactions of Nanjing University of Aeronautics & Astronautics, 22 (2) :183-187.
[4]. Video Acceleration API,(http://freedesktop.org/wiki/ Software/vaapi).
[5]. Windows Embedded (http://go.microsoft.com/ fwlink/? LinkId=192020).
[6]. Lin, C. Y. Chang, S. F. A robust (2001). image authentication method distinguishing JPEG compression from malicious manipulation, Source: IEEE Transactions on Circuits and Systems for Video Technology, vol 11, no 2, February, 153-168.
[7]. Stephen Balacco, S. Lanfear, Linuxs (2002). Future in the Embedded Systems Market, Industry analysis, Venture Development Corporation.
[8]. Haritaoglu I, Harwood D and Davis L. (2002). Realtime surveillance of people and their activities, IEEE Trans Pattern Analysis and Machine Intelligence, 22(8).
[9]. Jue Sun, Ham Hua Ng, Peter Ryser, (2006). Minimal Footprint Tri - Mode Ethernet MAC Processing Engine.www.xilinx.com.2.
[10]. Li Hui, Bai Lin, Ji Yuefeng. Building Network Management System for Video conference
[11]. System in Intranet, Proceedings of SPIE- (2004). The International Society for Optical Engineering, 868-876.
[12]. ZhanJun Sun, XiaoWu Luo, Shengen Luo. (2005), USB Device Driver Development Based on the Embedded Linux System, ICEMI, (1) 668.
[13]. Stringa E. (2000), Morphological change detection algorithms for surveillance applications. In: British Machine Vision Conference, Bristol, UK, 402-411.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.