Tiger Case Study

Decent Essays
III. ANALYSIS OF PROBLEM
The protection of wildlife and forests is a major responsibility of human being. Forest’s officials use to keep track of all movements by each tiger. They used radio collars on tiger shoulder and chips which is in his body to trace the tiger. These both are quite tough jobs. Another method is to track tiger is through their pugmarks. Experience Forest people can identify the tiger by identifies their pugmarks. Forest officials [1] are using radio collars to locate the tigers. These radio collars are heavy (about 1.5-2 kg) and it disturbs the normal behavior of tigers. Collaring the tiger is also a very tough task. Sometimes tigers attack on forest officials during collaring process. This process is very time consuming
…show more content…
Methodology

a. Android Camera Mobile: Android mobile phones are used by many person now a days. They provide good features. Our aim is to use the mobile camera to capture the image of tiger pugmark by mobile camera and uploaded it to server for further operations.
b. Image Uploaded To Server – After capturing the image by camera then it is uploaded to server and further operations can be done on server. We have more space on server as compare to the device so the operation and the algorithm will work efficiently on server and not affect on the processing on the mobile phone working.
c. Processing On Server- Server is the space where we can process our pugmark and the data which we are getting can be saved on server and he copy is return on the mobile phone.
d. Data Return By Server On Mobile Phone –
After performing operations on pugmark image the calculated dimensions can be saved on server and a copy for that data has been return on the mobile phone.
e. Compare With Existing Database In A Server –
After calculating dimensions on server the calculated dimensions can be comparing with the existing data on server.
f. If Exist Then Show Result Else New Entry
…show more content…
Proposed Algorithm – After doing an literature review on two algorithm[6] SIFT and SURF it is seen that the SIFT has detected more number of features compared to SURF but it is suffered with speed. The SURF is fast and has good performance as the same as SIFT. This is very useful feature of SURF algorithm thus we are implementing this algorithm for image recognition.
The feature finding method is typically composed of 2 steps; first, find the interest points within the image which could contain proposeful structures; this is often typically done by comparing the Difference of Gaussian (DoG) in every location within the image under totally different scales. A significant orientation is additionally calculated when a point is considered a feature point. The second step is to construct the scale invariant descriptor on every interest point found within the previous step. To achieve rotation invariant, we tend to align a rectangle to the main orientation. The dimension of the rectangle is proportional to the size wherever the interest point is detected. The rectangle is then cropped into a 4 by 4 grid. Totally different information’s such as gradient or definite quality of gradient are then subtracted from each of these sub square and composed into the interest point

Related Documents

  • Improved Essays

    Blood Stained Tee Shirt Collection of item: I would wear disposable latex gloves to packaged the blood stained tee shirt into a plastic or airtight container. I would store it in a cool location until it was delivered to the laboratory. Processing of item: 2. Handprint on car Collection of item: I would apply powder to the location of the handprint and then I would lift it with a broad piece of adhesive tape.…

    • 746 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Introduction Often, team members of both Apple and Microsoft convocate to ameliorate the upcoming operating system that they plan to release in a certain period of time. Many different features are added to technology each day to facilitate the use of it. For example, Cortana (the Windows Phone Assistant), the Snap Assist feature on Microsoft, and Phone Companion are qualities that aid the success of an operating system. In Apple, features such as Control center, Task manager and fingerprints contribute to the success in IOS Seven. I will be discussing the advantages of Cortana (the Windows Phone Assistant), the Snap Assist feature on Microsoft, and Phone Companion.…

    • 682 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Fig .3. Shows a sample of the evaluated values of S(x) with intensity as features F. The defined visual saliency measure S(x) gives out the contrast of the feature values between the B and K. Although visual saliency measure is related to other feature measures like the features that is discussed by Boiman and colleagues [8], but the main problem is that a posterior probability model is defined and will do the evaluation in semi-local windows, instead of one pixel at a time. By considering larger and bigger windows the algorithm will be able to be more independent to any model for the probability…

    • 105 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    The BBC (British Broadcasting Company) is a hugely popular name. You may think of it as just another news network, until you read some of these fascinating facts about them. Make sure you return for part two of this article. Number Fifteen: It's Been Around Since 1922 This network has been around since the second decade of the 1900s, and first aired in London in November of 1922.…

    • 351 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Essay On Burmese Python

    • 553 Words
    • 3 Pages

    These large snakes have a very distinctive way of living. In addition, the Burmese python’s peculiar way of hunting has an effect on the…

    • 553 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Briefcam Case Study

    • 83 Words
    • 1 Pages

    Visit BriefCam at Mobile World Congress Americas in San Francisco 9/12 – 14. We will be in the Verizon booth, along with our partner Ericcson, demonstrating our Video Synopsis® solution. Watch as we stream live video from New York and process it in San Francisco via a 5G connection! See how BriefCam turns video surveillance into actionable intelligence and delivers real-time Smart Alerts that leverage the advanced search and analytics capabilities of BriefCam’s technology. Can’t attend the show?…

    • 83 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    ADHD In Advertising

    • 114 Words
    • 1 Pages

    Hi Prof. and Classmates! Well lets see, this web page gave me an impression of an advertisement for a preschool and the professor correcting papers in bed. But then the "AHA" moment mad it all clear for me. The signs were allover the web page, literally jumping out at me.…

    • 114 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The paradoxical role of photography in contemporary life is explored by Teju Cole in his essay “Memories of Things Unseen.” When a photograph is the last trace we have of a destroyed work of art, it becomes something more, or so it seems. Photography in its purest form is simply a method of storytelling without the need for words. Many factors go into taking a photo. You don't simply take a photo using just your eyes, but rather with your emotions, experience, and heart.…

    • 950 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Bledsoe Case Study

    • 960 Words
    • 4 Pages

    • During 1964 and 1965, Bledsoe, along with Helen Chan and Charles Bisson, worked on using the computer to recognize human faces (Bledsoe 1966a, 1966b; Bledsoe and Chan 1965). He was proud of this work, but because the funding was provided by an unnamed intelligence agency that did not allow much publicity, little of the work was published. Given a large database of images (in effect, a book of mug shots) and a photograph, the problem was to select from the database a small set of records such that one of the image records matched the photograph. The success of the method could be measured in terms of the ratio of the answer list to the number of records in the database. Bledsoe (1966a) described the following difficulties: • • This recognition…

    • 960 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Title: Application of Self-Organization Neural Network Technique (SOM) to Optimize Finite- Element Partial Differential Equation (PDEs) Results in Square-Shaped Structures Analysis. The finite-element method (FEM) is a computationally method for solving partial differential equations (PDEs) with specific boundary conditions over a domain. When we applying the FEM to a domain, it has to divide to a finite number of elements and nodes. The collections of the elements and nodes form the finite-element mesh, whose quality is an important part in achieving exact numeric result for all finite-element codes.…

    • 1393 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Executive summary With the change in economic environment, technology is also changing. In the recent few years, the number of smart phone users has increased rapidly. The Smartphone has created a different image in the minds of people and became a part of their life. The Smartphone is not only the mode of communication, but also best medium of entertainment. Its different qualities and features have made it popular worldwide.…

    • 3878 Words
    • 16 Pages
    Improved Essays
  • Great Essays

    Remote lock for andriod smartphone Manjiri M. Bole, Yogini S. Chavan, Arif J. Shaikh, Saurabh D. Chikhale Computer Department, K.J.C.O.E.M.R Computer Department, K.J.C.O.E.M.R Computer Department, K.J.C.O.E.M.R Computer Department, K.J.C.O.E.M.R. Abstract — In this paper, we propose a MAC-based remote lock and wipe system through the SMS push notification to protect against the private data disclosure when smart phone is lost or stolen. The proposed system provides the integrity checking mechanism so that the malicious users are unable to launch denialof- service attacks which send the lock or wipe commands to the normal users on purpose. Also, it satisfies the SMS length limitation of 80 bytes long without downgrading the security level.…

    • 2041 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    Endangered Tiger Essay

    • 1751 Words
    • 8 Pages

    They are the top predator in every ecosystem they inhabit. Until the 20th Century there were nine tiger subspecies that probably numbered over 100,000 animals. They included the giant 660-pound, or 300 kilo, Siberian (Panthera tigris altaica) and Caspian (Panthera tigris virgata; now extinct) tigers as well as the relatively small—and now also extinct—200-pound (90 kilo) Balinese tiger. Depending on whether there are any remaining South China tigers—nobody has seen one in years—there are either 5 or 6 tiger subspecies remaining in existence; all are endangered.…

    • 1751 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Abstract— Bag of words model (BOW),which was originally used for document classification has been introduced to computer vision field recently and used in object recognition successfully. The bag of words model to the face recognition which can robustly give excellent performance in recognizing the face under various conditions like illumination, pose variation ,facial expression and occlusions. The scale Invariant Feature Transform is used for extracting the features from the face and SVM classifiers are used for accurate classification of the gender. Experimental results shows that using this model can obtain the accurate classification of the gender which are invariant to illumination, occlusions ,pose variation and facial expression. Keywords—component; Bag Of Words; SIFT; SVM classifier I. INTRODUCTION…

    • 882 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    1. Get some soft claws for your little tiger. Soft claws are nail caps that effectively blunt their claws. It is a humane alternative to declawing. Your little tiger can still perform scratching actions but the caps prevent any damage to happen.…

    • 829 Words
    • 4 Pages
    Improved Essays