Design of a new search engine for the information search using image as an input key
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 6
Abstract
It’s a long time we didn’t actually think about this. Whenever we need an image or the information regarding an image to be searched, we have to give a hint or the keyword related to the image. But think of a situation when you don’t have any idea of an image which is in your hand; what the image is.? This paper deals with above situation. The proposed search engine is designed such a way that the unknown image will be given as an input to the search engine. The image is been processed and the relevant information and the similar images are fetched. Here most of the functions are accomplished in c, c++ platform where as few complicated process such as ecognition may need higher platform.
Authors and Affiliations
K. Suresh Kumar , Mrs. N. Suganthi
Resource Scheduling in Hybrid Grid Environment
This paper deals with the resource scheduling algorithm for multi cluster hybrid grid environment. The combination of both the centralized and decentralized grid environments is collectively called as the hybrid grid env...
Data Warehouse Schema Evolution and Adaptation Framework Using Ontology
Data Warehouse systems aim at integrating data from multiple heterogeneous, distributed, autonomous data sources. Due to changing business needs the data warehouse systems are never meant to be static. Changes in the dat...
Estimation of worst case latency of periodic tasks in a real time distributed environment
Real-time computations require exact bounded response times. For relatively simple models of computation, it is possible to determine conditions under which it is theoretically possible to guarantee that an invocation of...
A Zero-Watermarking algorithm on multiple occurrences of letters for text tampering detection
Electronic publishing has gained importance with the widespread use of Internet. It involves transmission of digital data in bulk from one place to another. It brings various threats to the data in form of illegal copyin...
Schedule Risk Analysis Simulator using Beta Distribution
This paper describes an application of simulation and Modelling in Software risk management. This paper describes a simulation based software risk management tool which helps manager to identify high risk areas of softwa...