Comparision Of Traditional Method of Histogram Equalisation with HSV and Kekre Transform for Content Based Image Retrieval
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 7
Abstract
Content-based image retrieval system based on an efficient combination of both colours and features is explained in this paper. According to Kekre’s Transform, feature vectors are formed using a combination of row mean and column mean of both query as well as database images, to measure the extent of similarity using Euclidian distance. Similarly, HSV colour space quantifies the colour space into different regions and thereby calculating its mean and Euclidian distance the colour vector can be derived. Taking mean of the Euclidian distances of both the algorithms better accuracy of the image retrieval process can be attained.
Authors and Affiliations
Ms. Venu Shah , Ms. Archana Choudhary , Prof. Kavita Tewari
Three-Dimensional Optimal Sliding-Mode Guidance for Homing Missiles Against Maneuvering Target
A new missile guidance law is proposed for highly maneuvering target by integrating optimal and sliding-mode control theories based on state dependent Riccati equation (SDRE) to achieve robustness against external distur...
Optimized Query Plan Algorithm for the Nested Query
The SQL language allows users to express the queries that have nested sub-queries in them. Optimization of nested queries has received considerable attention over the last few years. Most of the previous optimization wor...
Differential Evolution for Optimization of PID Gains in Automatic Generation Control
Automatic generation control (AGC) of a multi area power system provides power demand signals for AGC power generators to control frequency and tie-line power flow due to the large load changes or other disturbances. Occ...
GUI BASED REMOTE ON/OFF CONTROL AND MONITORING SINGLE PHASE LAMP USING MICROCONTROLLER
Microcontrollers are very popular in electronics and computer-controlled systems worldwide. This paper presents the control of a microcontroller-based system using the omputer and explains comprehensively the hardware a...
Rapid and Proactive Approach on Exploration of Database Vulnerabilities
In today's complicated computing environment, managing data has become the primary concern of all industries. Information security is the greatest challenge and it has become essential to secure the enterprise system res...