Enhancing Adaptive Content Based Face Image Retrieval in Database
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 10, Issue 1
Abstract
To address one of the important and challenging problems – large-scale content-based face image retrieval. Given a query face image, content-based face image retrieval tries to find similar face images from a large image database.Large-scale content-based face image retrieval is an enabling technology for many emerging applications. In this method, to utilize automatically detected human attributes that contain semantic cues of the face photos to improve content based face retrieval by constructing semantic codeword’s for efficient large scale face retrieval. By leveraging human attributes in a scalable and systematic framework, it use two orthogonal methods named attribute-enhanced sparse coding and attribute embedded inverted indexing to improve the face retrieval in the offline and online stages. Then SVM classifier is used to classify and predict about the image. This will calculate the Euclidean distance of the both the query and the dataset image. To investigate the effectiveness of different attributes and vital factors essential for face retrieval.By further enhancing, the accuracy of image retrieval can be improved
Authors and Affiliations
M. Manimegalai , K. Sankar
A Review of Cyber Attack Classification Technique Based on Data Mining and Neural Network Approach
Cyber attack detection and classification is major challenge for web and network security. The increasing data traffic in network and web invites multiple cyber attack. The dynamic nature and large number of attribute of...
Study of TCP Packet Labeling to Alleviate Time-Out
Many applications (e.g., cluster based storage and Map Reduce) in modern data centers require a high fan-in, many- to-one type of data communication (known as TCP in cast), which could cause severe in cast congestion in...
Adaptive Integration of P2P and Mobile-Ad-hoc-Networks by a Cross Modeled CHORD Protocol
We set DHT (Distributed Hash Table) centered P2P (Peer to Peer) program-Chord in to MANET (Mobile Ad-hoc Network) in this paper. Then, we propose a new routing modified scheme Cross Modeled Chord(CM-Chord) which bases on...
Requirement and Result of Verifying the Program Code
The verification of Java/C++ codes is critical, especially for special projects where human life will be at stake. A system is required that uses integrated reasoning to split each verification condition into a conjuncti...
An Effective Cloud Service Reservation Through Negotiation
When making reservations for Cloud services, the consumer should provide with price and time slot for the service. The provider gives the price and time slot which are available, then the particular service will be provi...