Image Search Reranking
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 5
Abstract
The existing methods for image search re ranking suffer from the unfaithfulness of the as sumptions under which the text-based images search result. The resulting images contain more irrelevant images. Hence the re ranking concept arises to re rank the retrieved images based on the text around the image and data of data of image and visual feature of image. A number of methods are differentiated for this re-ranking. The high-ranked images are used as noisy data and a k-means algorithm for classification is learned to rectify the ranking further. We are study the affectability of the cross validation method to this training data. The preeminent originality of the overall method is in collecting text/metadata of image and visual features in order to achieve an automatic ranking of the images. Supervision is initiated to learn the model weights offline, previous to reranking process. While model learning needs manual labeling of the results for a some limited queries, the resulting model is query autonomous and therefore applicable to any other query .Examples are given for a selection of other classes like vehicles, animals and other classes.
Authors and Affiliations
V Rajakumar , Vipeen V Bopche
Securing Web Accounts Using Graphical Password Authentication through Watermarking
Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user-friendly password-based method has been on the agenda of security research...
Analysis of Email Fraud Detection Using WEKA Tool
Data mining is also being useful to give solutions for invasion finding and auditing. While data mining has several applications in protection, there are also serious privacy fears. Because of email mining, even inexperi...
Facial Image Noise Removal Via a Trained Dictionary
In this project we address that, sparsity has shown to be useful in source separation. In most cases, the sources are not sparse currently and needs to sparsify them using a known dictionary. The problem here is that, if...
Software Platforms for Mobile Distributed Systems
As a result of the computing technology that becomes ever smaller and cheaper it is now possible to integrate it into everyday material objects. This advanced integration of technology allows the underlying computer to d...
An Approach for Load Balancing Among Multi-Agents to Protect Cloud Against DDos Attack
Cloud Computing is widely used technology in present era. Cloud Computing is mainly used for on demand services over the distributed servers. So it is necessary to manage the working load of participating servers for uni...