Friday, November 8, 2019

Learn About Sudan - Geography, History, and More

Learn About Sudan - Geography, History, and More Population: 43,939,598 (July 2010 estimate)Capital: KhartoumBordering Countries: Central African Republic, Chad, Democratic Republic of the Congo, Egypt, Eritrea, Ethiopia, Kenya, Libya, South Sudan, and UgandaLand Area: 967,500 square miles (2,505,813 sq km)Coastline: 530 miles (853 km)Sudan is located in northeastern Africa and it is the largest country in Africa. It is also the tenth largest country in the world based on area. Sudan is bordered by nine different countries and it is located along the Red Sea. It has a long history of civil wars as well as political and social instability. Most recently Sudan has been in the news because South Sudan seceded from Sudan on July 9, 2011. The elections for secession began on January 9, 2011 and the referendum to secede passed strongly. South Sudan seceded from Sudan because it is mostly Christian and it has been engaged in a civil war with the Muslim north for several decades.History of SudanSudan has a long history that begins with its being a collection of small kingdoms until Egypt conquered the area in the early 1800s. At this time however, Egypt only controlled the northern portions, while the south was made up of independent tribes. In 1881, Muhammad ibn Abdalla, also known as Mahdi, began a crusade to unify western and central Sudan which created the Umma Party.In 1885, Mahdi led a revolt but he died soon after and in 1898, Egypt and Great Britain regained joint control of the area.In 1953, however, Great Britain and Egypt gave Sudan the powers of self-government and put it on a path to independence. On January 1, 1956, Sudan gained full independence. According to the United States Department of State, once it gained independence Sudans leaders began to renege on promises to create a federal system which began a long period of civil war in the country between the northern and southern areas as the north has long tried to implement Muslim policies and customs.As a result of the long civil wars, Sudans economic and political progress has been slow and a large part of its population has been displ aced to neighboring countries over the years. Throughout the 1970s, 1980s and 1990s, Sudan underwent several changes in government and suffered from high levels of political instability along with the continuing civil war. Beginning in the early 2000s though, the government of Sudan and the Sudan Peoples Liberation Movement/Army (SPLM/A) came up with several agreements that would give South Sudan more autonomy from the rest of the country and put it on a path to becoming independent.In July 2002 steps to end the civil war began with the Machakos Protocol and on November 19, 2004, the Government of Sudan and the SPLM/A worked with the United Nations Security Council and signed a declaration for a peace agreement that would be enacted by the end of 2004. On January 9, 2005 the Government of Sudan and the SPLM/A signed the Comprehensive Peace Agreement (CPA).Government of SudanBased on the CPA, Sudans government today is called a Government of National Unity. This is a power sharing type of government that exists between the Nation al Congress Party (NCP) and the SPLM/A. The NCP however, carries most of the power. Sudan also has an executive branch of government with a president and a legislative branch that is made up of the bicameral National Legislature. This body consists of the Council of States and the National Assembly. Sudans judicial branch is made up of several different high courts. The country is also divided into 25 different states.Economics and Land Use in SudanRecently, Sudans economy has begun to grow after many years of instability due to its civil war. There are a number of different industries in Sudan today and agriculture also plays a large role in its economy. The main industries of Sudan are oil, cotton ginning, textiles, cement, edible oils, sugar, soap distilling, shoes, petroleum refining, pharmaceuticals, armaments and automobile assembly. Its main agricultural products include cotton, peanuts, sorghum, millet, wheat, gum arabic, sugarcane, tapioca, mangos, papaya, bananas, sweet potatoes, sesame and livestock.Geography a nd Climate of SudanSudan is a very large country with a total land area of 967,500 square miles (2,505,813 sq km). Despite the countrys size, most of Sudans topography is relatively flat with a featureless plain according to the CIA World Factbook. There are some high mountains in the far south and along the countrys northeast and western areas however. Sudans highest point, Kinyeti at 10,456 feet (3,187 m), is located on its far southern border with Uganda. In the north, most of Sudans landscape is desert and desertification is a serious issue in nearby areas.The climate of Sudan varies with location. It is tropical in the south and arid in the north. Parts of Sudan also have a rainy season which varies. Sudans capital Khartoum, which is located in the central part of the country where the White Nile and the Blue Nile rivers (both of which are tributaries of the Nile River) meet, has a hot, arid climate. The January average low for that city is 60ËšF (16ËšC) while the June average high is 106ËšF (41ËšC).To learn more about Sudan, visit the Geography and Maps section on Sudan on this web site.References Central Intelligence Agency. (27 December 2010). CIA - The World Factbook - Sudan. Retrieved from: https://www.cia.gov/library/publications/the-world-factbook/geos/su.htmlInfoplease.com. (n.d.). Sudan: History, Geography, Government, and Culture- Infoplease.com. Retrieved from: infoplease.com/ipa/A0107996.htmlUnited States Department of State. (9 November 2010). Sudan. Retrieved from: state.gov/r/pa/ei/bgn/5424.htmWikipedia.com. (10 January 2011). Sudan - Wikipedia, the Free Encyclopedia. Retrieved from: http://en.wikipedia.org/wiki/Sudan

Wednesday, November 6, 2019

10 Useful Apps You’re Not Using That You Need to Download

10 Useful Apps You’re Not Using That You Need to Download You’re already tethered to your smartphone, why not start making the best of it? You might think you know everything there is to know about your phone, and possibly that it knows everything it needs to know about you, but there are still plenty of ways it can surprise you- and even help to make your work and play run that much more smoothly. Here are a few amazing apps you may have overlooked. Check out some of these hidden gems to unlock even more potential in your person-to-smartphone relationship.1. ClipsFree! Like the idea of Snapchat sometimes, but can’t commit? Apple’s Clips lets you shoot still and video shots with wacky filters. Add in Live Titles, which are subtitles you create simply by speaking, and you’re in business. It’s Snapchat for grown-ups and the terminally ironic.2. ProshotWant to improve your photography skills? No matter your skill level, this app can help you unlock advanced features in your device to help you take higher qual ity photos with better focus and light.3. GoodlookNever know what to wear? Keep up with the trends with daily looks and useful fashion and beauty tips. Figure out what to shop for and how to combine the clothing you already have to stay on trend.4. Remote MouseTurn your phone into a remote for your computer. Say your keyboard is low on battery, but you want to watch a movie or give a presentation? No problem!5. App DetoxWe all have that app- or those 10  apps- that eat up all of our time. Android users, you’re in luck. This app helps you distance yourself from your smart phone by blocking access to certain apps for a time period of your choosing. Very useful when you need to study or work and can’t be checking Twitter every five minutes.6. Moleskine TimepageLove having everything on your device, but miss the stylish days of your old Moleskine planner? Now you can have it all. A smart calendar/planner that is as stylish as it is functional and sexier than its counterp arts. Works with existing calendars like iCloud, Facebook, and Google.7. Just Press RecordNot impressed with Voice Memos anymore? Try this one-tap recording app that works across Apple products and even boasts built-in transcription for note taking- in multiple languages. You can even search your recordings for specific terms. You’re welcome.8. PatronusA personal security app named after a spell in Harry Potter? Yes please. With mobile 911 service (much more accurate than cell tower locations!) and location sharing, plus an â€Å"On My Way† feature that lets you share your location, destination, and progress with your contacts. It takes a village!9. SignalMove to fully encrypted communication in this scary world. WhatsApp is a bit behind the ball on this, so go straight to the source with Signal. It’s free all-in-one messaging with voice call functionality. You can even send media with the same protections. This one is very easy to use and is open source.10. Cla p! Phone FinderLose your phone a lot, only to find it by your toaster where you left it? This combines the find-your-phone technology with the old clap-on-clap-off satisfaction. Simply clap your hands to activate your phone to produce a customizable sound. Bonus? This app consumes very low amounts of battery power, so it won’t drain you while it runs.

Monday, November 4, 2019

The English Disease, an explanation of how and why people become Essay

The English Disease, an explanation of how and why people become involved in football hooliganism, and how the state deals with it - Essay Example The research also evaluated the current state of laws and measures and found them to be both insufficient and at times redundant to curb football hooliganism. The research recommends that the state move away from treating football hooliganism as just another crime. Instead, there is a need to undertake an exhaustive study into the reasons why football hooligans operate. Once these reasons are know, the state needs to build up partnership with local communities, schools and families in both preventing and reporting incidences of football hooliganism. There has been an increased in the incidences of football fans creating havoc and indulging in fights before, during and after the matches of their favourite teams. These incidences are seen as a revival of what had come to be known as football hooliganism and had plagued the game in the 1960s through the 1980s. The term, ‘football hooliganism’, itself is defined in various ways and includes several different acts of vandalism. Football hooliganism has largely been described in the media as acts of violence and chaos created by the fans of football clubs during the matches. The term is also inclusive of acts of violence and even gang wars that may occur at a much later period after the matches are over or before they have begun, and would include fan clubs and gangs. Though, football hooliganism is recognized by the state as a crime that leads to arrests and punishments, the term itself has not been clearly defined in legal terms. The current paper endeavours to arrive at a conclusive understanding of the term football hooliganism and to develop a holistic definition for the same. With this, it is expected that insights could be gained for developing better prevention and penal programs. Moreover, the phenomenon of football hooliganism that had originally been noticed in the early 18th century has

Saturday, November 2, 2019

PET HOUSE Coursework Example | Topics and Well Written Essays - 2750 words

PET HOUSE - Coursework Example This report aims at conducting an analysis of Mungo and Maud with respect to its mission, vision and team structure, along with other factors that may impose considerable effects on its adopted process of New Product Development (NPD). The report also presents a reflection upon the structure, performance, innovation and creativity of Mungo and Maud during the process of NPD with due significance towards the benchmarking techniques used by the company. Vision is a statement about what or how a team would like the things to be. It can be regarded as a brief picture of future possibilities and attainments that the team shall be striving to create in due course of time (Grusenmeyer, 2014). Correspondingly, the vision considered developing the NPD process of Mungo and Maud, and accordingly for the team will be concentrated on preserving the uniqueness of the company and its brand image among the worldwide customers that are suitable for the pets’ comfort. Hence, three key elements will be considered as important in the vision of the team, i.e. uniqueness, quality and availability. A mission statement, in general, can be defined as the strategic direction to achieve the determined goals with proper usage of the available resources, in combination with the pre-defined vision of the team and the organisation (Grusenmeyer, 2014). Accordingly, in the context of Mungo and Maud, the mission of the team will be to ensure that the customers are served with superior quality of products, which are diversified in various market segments and product lines including human clothing and stationeries, pet products and gift items for humans and pets. Moreover, the team will also strive to offer its products in a quality assured by reasonable price to satisfy customer affordability. Team structure is referred as the group of professionals with various

Thursday, October 31, 2019

Law of Trusts Essay Example | Topics and Well Written Essays - 2500 words

Law of Trusts - Essay Example Since the repeal of the Preamble, the law has progressed on the back of judicial decisions arrived at in the light of the Preamble. The traditional definition of such trusts came from Commissioners for Special Purposes of Income Tax v Pemsel (1891), which divided charitable trusts into four categories: trusts for 'Relief of Poverty', for 'Advancement of Education', for 'Advancement of Religion' and, trusts for 'Purposes Beneficial to the Community'. Trusts for the advancement of education, includes conventional education and training. Thus trusts for schools, colleges, universities and other institutions of learning are valid. But this head extends to any mode of acquiring useful knowledge from literary learning to scientific researches etc. In the case of Re Shaw (1957) it was held that a gift by George Bernard Shaw in his will for research of a forty letter alphabet and translation of one of his plays into it was not charitable. It is arguable whether the same result would have been reached under the principle laid down in the later case of Re Hopkins (1965). It concerned a gift to Francis Bacon Society to be used to find manuscripts proving that the plays of Shakespeare were written by Francis Bacon. The gift was held charitable. The result of research must also enter the public ... Therefore research carried out by companies and kept for their exclusive commercial use is not charitable. Although far from the concerns of the Preamble, trusts for animal welfare such as that of the preservation of wildlife through animal sanctuaries have been held to be charitable, this has been due to a change in the general approach that was adopted by the courts in the mid-nineteenth century, where charities of this kind were likely to be held to be a failure because of various reasons. Trusts for animals would be charitable if they 'tend to promote and encourage kindness towards animals and to stimulate humane and generous sentiments in man towards lower animals': Re Wedgewood. However in Re Grove Grady (1929), the Court of Appeal held that a gift for an animal sanctuary which specifically excluded humans so that the animals would not be molested was not charitable, for such a gift produced no public benefit. If it is found that the charitable purpose would be a failure because the means for its implementation as chosen by the testator are either impractical or impossible to carry out then the doctrine of cy-pres or ss13 and 14 of the Charities Act 1993, can be applied so that it would not fail. The cy-pres doctrine allows the courts to direct that the trust property be applied to a purpose as close as possible to the one intended by the settler. Cy-pres can save charitable trusts from failure at the outset or from subsequent failure when carrying out the purpose becomes impossible or impractical. The doctrine only applies to a purpose which already counts as a charitable purpose. In order for the courts to re-direct trust money intended for charitable purposes, the courts must find that the donor

Monday, October 28, 2019

Behavioural Skills for Business Essay Example for Free

Behavioural Skills for Business Essay When looking at what a manager should be doing and what Richard has been doing it is easy to see that he is struggling to properly understand what being a manager actually entails. While there have been many theorists over the years all trying to show what being a manager truly means I think that Rosemary Stewart’s theory fits Richards situation perfectly. Stewart recommended a three part classification for the analysis of jobs. She focused on; Job Demands – What you must do Job Choices – The freedoms you have. Job Constraints – The limit on what you can do. When looking at Job Demands you need to look at certain things; What routine job activities must not be neglected or delegated without a penalty being incurred. When looking at Richards situation you can see that Conflict There can be many causes of conflict within a business these can include; the formation of cliques; group pressure; patterns of communication; personality clashes; assumptions about others; misuse of authority; power tactics and manipulation; general expectations and beliefs; misunderstandings; understandable beliefs and assumptions. With regards to Carole’s situation the biggest causes of conflict are due to the fact that there were personality clashes between herself and Joanne due to the fact that they couldn’t work out a way to effectively to distribute the workload and then fell out due to â€Å"bitter words were exchanged†. It doesn’t help that the patterns of communication are weak within the company when she was put in charge, an example of this is when she found out that both Joanne and Ian had taken to leaving work early via an administration officer.

Saturday, October 26, 2019

Edge Detection Using Kirsch Algorithms

Edge Detection Using Kirsch Algorithms Image processing is the study of representation and manipulation of pictorial information. In Image Processing, an edge is the boundary between an object and its background. Therefore, if the edges of images objects can be identified with precision, all the objects can be located and their properties such as area, perimeter and shape can be calculated. Edge detection is an essential tool for image processing. Edge detection is the process of locating the edge pixels. Then an edge enhancement will increase the contrast between the edges and the background in such a way that edges become more visible. In the edge function, the Sobel method uses the derivative approximation to find edges. Therefore, it returns edges at those points where the gradient of the considered image is maximum. The Kirsch Edge module detects edges using eight compass filters. All eight filters are applied to the image with the maximum being retained for the final image. The eight filters are a rotation of a basic compass convolution filter (RoboRealm, 2006). The proposal is organized as follows. First, describe the research problems statement, Research Objective, Hypothesis, Delimitations, Assumptions, Terms, significant of the Research Problem, Literature Review session. Lastly the Research Methodology and Conclusion sections respectively. Research Problem Problem Statements As a human being, we could not notice the petite lines of an image. We could only recognize an enormous range of objects from just line images such cartoons. Besides, in Malaysian, it is acknowledge that there is no system to identify the edges of the local cars. They prefer to choose the human faces, geometric shapes or the environment image as their image research. So, by using edge detection techniques, the result of detected edges image could show us the lines or edges from the obvious lines to the tiniest lines of that certain image (Brendan McCane, 2001). For example, Prewit Edge Detector for detection of edges in digital images corrupted with different kinds of noise (Raman Maini, 2005). In the edge function, the Sobel method uses the derivative approximation to find edges where it returns edges at those points where the gradient of the considered image is maximum. The Kirsch Edge module detects edges using eight compass filters. All eight filters are applied to the image with the maximum being retained for the final image. The eight filters are a rotation of a basic compass convolution filter (RoboRealm, 2006). Research Objectives The objectives of this study are: 1) To identify edge detection of image processing system on Malaysian cars. 2) To be able to draw a bitmap result where edges are either in gray scaled or colored for enhancement of edges in an image. 3) To compare the edge detection methods to one another by using the Prewit Edge Detector, Sobel Edge Detector and Kirsch Edge Detector. 2.3 Hypothesis Believe that by implementing different edge detecting algorithms, verified images will be more exact and precise in terms of image accuracy and clarity. 2.4 Delimitations The edge detections will only be analyzing between Sobel, Prewit and Kirsch algoritms. The image processing edge detection does not contain any hierarchical structure but only groups of local cars images. 2.5 Assumptions The participants are familiar the basic knowledge of edge detection to ensure they realize what is happening during the experimental session. They are not trained to identify the difference between the 3 algorithms given to them All participants are at least two year experience in image processing activities to make sure that they could determine what the purpose of this research is. Terms Noise = amount of distortion of a pixel value against the frequency of images Thresholding = separates the pixels in ways that tend to preserve the boundaries Filter = Process by which we can enhance or otherwise modify images. 2.6 Research Significance The image of Malaysian cars will be captured as the input. The each of the images edges will be detected either by using the Prewit Edge Detector, Sobel Edge Detector or Kirsch Edge Detector. If the user chooses to see the output of Prewit Edge Detector, the result of detected edges will be appear on the panel and same goes to if they choose the Sobel Edge Detector or the Kirsch Edge Detector. They could choose all of the three edge detectors for more precise observation. The result also will be compare with the human views to get the similarity of edge detecting against it. Literature Review Introduction to Image Processing Edge Detection In Image Processing, an edge is the boundary between an object and its background. They represent the frontier for single objects. Therefore, if the edges of images objects can be identified with precision, all the objects can be located and their properties such as area, perimeter and shape can be calculated. Edge detection is an essential tool for image processing. Edge detection is the process of locating the edge pixels. Then an edge enhancement will increase the contrast between the edges and the background in such a way that edges become more visible. In addition, edge tracing is the process of following the edges, usually collecting the edge pixels into a list. In the edge function, the Sobel method uses the derivative approximation to find edges. Therefore, it returns edges at those points where the gradient of the considered image is maximum. The horizontal and vertical gradient matrices whose dimensions are 3-3 for the Sobel method has been generally used in the edge detection operations. In this work, a function is developed to find edges using the matrices whose dimensions are 5-5 in matlab (Shigeru A, 2000). Since edge detection is in the forefront of image processing for object detection, it is crucial to have a good understanding of edge detection algorithms. Prewit Edge Detector for detection of edges in digital images corrupted with different kinds of noise. Different kinds of noise are studied in order to evaluate the performance of the Prewitt Edge Detector (Raman Maini, 2005). The Kirsch Edge module detects edges using eight compass filters. All eight filters are applied to the image with the maximum being retained for the final image. The eight filters are a rotation of a basic compass convolution filter (RoboRealm, 2006). 3.2 Comparisons of Edge Detection Techniques a) Sobel Sobel edge detector using convolutions with row and column edge gradient masks (Percy S, 2001). Applies a 3-3 convolution filter row-wise in order to determine the gradient of the surrounding pixels. Pixel is a member of an edge if the intensity of it is greater than that of the members of its surrounding pixels. The Sobel edge detection filter uses the two 3-3 templates to calculate the gradient value. 1 2 1 -1 0 1 -1 -2 1 1 1 1 0 0 1 1 -1 -1 Figure 1: Sobel Algorithm X Y Original image Sobel Edge Detection Original image Figure 1.1: Sobel Edge Detection Output b) Prewit Prewit Edge Detector for detection of edges in digital images corrupted with different kinds of noise. Different kinds of noise are studied in order to evaluate the performance of the Prewit Edge Detector (Raman Maini, 2005). This is similar to the Sobel detector Operates under the same principle except that it uses a different (simpler) convolution kernel. -1 0 1 -1 0 1 -1 0 1The Prewitt edge detection filter uses the two 3-3 templates to calculate the gradient value. -1 -1 -1 0 0 0 1 1 1 Figure 2: Prewit Algorithm X Y Original image Prewitt Edge Detection Original image Figure 2.1: Prewit Edge Detection Output c) Kirsch The Kirsch Edge module detects edges using eight compass filters. All eight filters are applied to the image with the maximum being retained for the final image. The eight filters are a rotation of a basic compass convolution filter (Mike Heath, 2001).The filters are of the form: 5 5 5 -3 -3 -3 -3 -3 -3 5 -3 -3 5 -3 -3 5 -3 -3 Figure 3: Kirsch Algorithm X Y Original image Kirsch Edge Detection Original image Figure 3.1: Kirsch Edge Detection Output 3.3 Thresholding The idea of thresholding is to apply a boundary-finding method (such as edge detection), sample of the histogram that are only near where the boundary probability is high. The benefit of thresholding is to separates the pixels in ways that tend to preserve the boundaries. Besides that, other scattered distributions within the object or the background are irrelevant. But, the problems if the characteristics change along the boundary, it still no guarantee you wont have extraneous pixels or holes (IgorPro, 2006). The advantages of thresholding can be declared that it is simple to implement, fast especially if repeating on similar images and it is good for some kinds of images such as documents, controlled set-ups. The disadvantages of thresholding can be assume that it is usually not very good segmentation, there are no guarantees of object coherency such as they may have holes, extraneous pixels, and so on and there are connected component labeling can then be used to label separate foreground regions. METHODOLOGY This chapter provides methodology that used to develop text search engine prototype. Methodology is a study of methods, a set of procedures and selecting data. All of workflow involved in the implementation of this project is explained from the beginning to the end. Project Formulation Framework Figure 4: Overview of Project Formulation Framework Project Framework Summary Phase Objectives Deliverables Planning 1) To identify and understand potential problems. 2) Ensure goals, scope, budget, schedule, methods and tools are in place. 1) Define the problem statement, objectives, scope and contribution of study. 2) Collecting images of Malaysian cars. Analysis 1) Analyzing the system requirement. 2) Analyze the edge detection algorithms used for the system (Sobel, Prewit and Kirsch). 1) Prototype requirement and requirement model. 2) Identify the comparison of the algorithms chosen. Design 1) Design the prototype interface and the coding (classes and object). 2) Design function and algorithms. 1) System and Detailed design. 2)GUI interface Implementation 1) Translate design into code New application Testing 1)Pre-test and pro-test the application Test the application Data Collection The data collection is the most critical process in this project. As mentioned earlier, this study will only focus on Malaysian cars. Before developed the application tool, all information must be collected first. This stages involved data collection about sample of Malaysian car images and project requirements which are hardware and software requirements. The sample images of the car will be captured by using digital camera. The main hardware system in order to capture an image is the camera to grab the image of the cars. The images are in a bitmapped or digital image format. Besides that, this study also gathered information from internet. It was the greatest finding for this project. From internet, more information can be explored in detail such as about bitmapped image model, journals and articles about previous researches which related to this project the Malaysian cars itself and many more. 4.4 Prototype Development Throughout the development of the application, there were involving some steps. After all the information gathered, the development processes take place. Firstly, as an input the image of the Malaysian cars must be captured. A digital camera was used to acquire the images. There were 10 images of different category of Malaysian cars as samples for this project. In capturing the images, hardware system also involved. The camera will use to grab the image and the computer system will do the image processing and data analysis for the images. The images were scanned to convert them into digital form. Experiment and Procedure In the experimental task, the participants will be given the Malaysian car images. They will run the application by choosing different car images and test all the images to the different edge detection algorithm provided to them. The output which is the result of comparison between those 3 algorithms (Sobel, Prewitt and Kirsch) will be recorded. The user, based on his/her experience will determine the sharp, sharper and sharpest result of edge detected images from system. Here, they might recognize which edge detector is more accurate in image clarity capturing. The summary of the experiment is as follows; Pretest Participants choose Malaysian cars images and tryout them using the algorithms provided. Posttest /Treatment Participants evaluate the result which edge detection algorithm is the sharp, sharper or sharpest. Observation My experiment used one-group pretest and posttest design.7. The group participated in both pre-experiment evaluation and post-experiment evaluation sequentially. The design is represented as follows: Group Time Æ’Â   Group 1 Observation 1 (using Sobel Algorithm with and without thresholding) Observation 2 (using Prewit Algorithm with and without thresholding) Observation 3 (using Kirsch Algoritm with and without thresholding) Figure 5: Experimental design 7 Experimental Design Number 7: pretest and posttest design. Data Analyses After collecting all the data from their query results from the participants, we use the following standard criteria for evaluating retrieval for effectiveness of search are used . The keyword-based search and the ontology-based search have been evaluated using the following formula: Comparison of Edge Detectors Image Sharpness Based on Thresholding Value Bil Type of Malaysian Cars Sobel Prewit Kirsch 1 Perodua Kelisa Sharpest Sharper Sharp 2 Perodua Kenari Sharpest Sharper Sharp 3 Perodua Kembara Sharpest Sharper Sharp 4 Proton Wira Sharpest Sharper Sharp 5 Proton Waja Sharpest Sharp Sharper 6 Proton Satria Neo Sharpest Sharper Sharp 7 Perodua Kancil Sharpest Sharper Sharp 8 Proton Saga Aeroback Sharpest Sharp Sharper 9 Proton Satria Sharper Sharpest Sharp 10 Perodua Myvi Sharpest Sharper Sharp Table 1: Approximate image sharpness of the algorithms based on 10 of Malaysian car images Sharp Result (Percentage) Edge Detectors Sobel Prewit Kirsch 0/10*100 = 0% 2/10*100 = 20% 8/10*100 = 80% Table 2: Percentage for the Malaysian Cars Sharpness for sharp category Sharper Result (Percentage) Edge Detectors Sobel Prewit Kirsch 1/10*100 = 10% 7/10*100 = 70% 2/10*100 = 20% Table 3: Percentage for the Malaysian Cars Sharpness for sharper category Sharpest Result (Percentage) Edge Detectors Sobel Prewit Kirsch 9/10*100 = 90% 1/10*100 = 10% 0/10*100 =0% Table 4: Percentage for the Malaysian Cars Sharpness for sharpest category Figure 6: Histogram for the comparison result for precision According to the Figure 6, based on Table 2, Table 3 and Table 4, the sharp, sharper and sharpest result is based from the thresholding value of 60. In making this research, some important lesson or experience has been learned. After the project successfully developed and tested, the result from the testing is analyzed. The results are between human viewing and prototype viewing. By analysis and compare the results the accuracy of the project is determined. It also use as a measurement to the third objective of the project. If the project result is accurate, the third objective is successfully achieved. 5.3 Recommendation There are also some future expansions that can be done in order to improve this prototype. This prototype developed for computer platform only. This prototype can be developed in the PDA or handheld hand phone. Recommendation for future is the samples of Malaysian cars should be various because from that the result can be more accurate. 5.4 Conclusion There are many ways to perform edge detection. Various edge detection algorithms have been developed in the process of finding the perfect edge detector. Some of the edge detection operators that are discussed in this thesis are Prewitt, Sobel, and Kirsch operators. In this case, there are three criteria for optimal edge detections. First good detection where the optimal detector must minimize the probability of false positives, as well as that of false negatives. Second, good localization where the edges detected must be as close as possible to the true edges and finally, single response constraint where the detector must return one point only for each true edge point; that is, minimize the number of local maxima around the true edge (Trucco, 2006).