An overview of content-based image retrieval techniques (CBIR)
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 4
Abstract
Abstract: In the current situation, the image plays a vital role in any aspect of life such as commercial images, satellite images, and medical images and so on. By analyzing this data, useful information can be obtaining for future uses. Image retrieval methods are divided into two general categories: 1. text-based image retrieval. 2 - content-based image retrieval (CBIR). The overall system performance in content-based image retrieval is: 1. Features extraction 2. Measuring the similarity.
Authors and Affiliations
Narjes Fathi , Behrouz Vaseghi , masoud Shemshadi
Scalable Image Classification Using Compression
The increasing rate of data growth has led to finding techniques for faster processing of data. Big Data analytics has recently emerged as a promising field for examining huge volume of datasets containing differen...
LEXIMET: A Lexical Analyzer Generator including McCabe's Metrics.
Due to the complexity of designing a lexical analyzer for programming languages, this paper presents, LEXIMET, a lexical analyzer generator. This generator is designed for any programming language and involves...
Mining High Utility Itemsets from its Concise and Lossless Representations
Abstract: Mining high utility items from databases using the utility of items is an emerging technology.Recent algorithms have a drawback in the performance level considering memory and time.Novel strategy proposed here...
Semantic Based Amalgamation of Pulverized Components Using Ontology
Abstract: The problem faced by both software developers and user in development environment and user environment is finding compatible and complementary components in large set of different applications. Different...
An Efficient Topology Search Mechanism for Unstructured Peer-To-Peer Networks
Unstructured peer-to-peer (P2P) file-sharing networks are popular in the mass market. As the peers participating in unstructured networks interconnect randomly, they rely on flooding query messages to discover obje...