INFORMATION RETRIEVAL FOR IMAGE MINING
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 6
Abstract
Many areas of commerce, government, academia, and hospitals create large collections of digital images. Through digitization of data and developments in technology it is very easy to acquire and store large quantities of data, mainly multimedia data. This data will be suitable to analyse in an efficient and fast manner by the different kinds of agencies of commercial to Military. Currently, tools for mining images are insufficient and require human involvement. Feature selection and extraction is the pre-processing step of Image Mining. Obviously this is a serious step in the whole scenario of Image Mining. Our method to mine from Images – to extract patterns and derive knowledge from large collections of images, deals chiefly with identification and extraction of unique features for a specific domain. Experimental results display that the features used are sufficient to identify the patterns from the Images. An interactive system was established which allows the user to define new features and to resolve unclear regions. This paper presented a new method for image retrieval using high level semantic features. It is based on extraction of low level colour, shape and texture features and their conversion into high level semantic features using fuzzy production rules, derived with the help of an image mining technique. Dempster-Shafer theory of evidence is applied to obtain a list of structures covering information for the image high level semantic features. Johannes Itten theory is helpful for obtaining high level colour features.
Authors and Affiliations
ShashiRekha. B, Dr. K. V. N. Sunitha
Prevention of Routing Attack in Mobile Ad-Hoc Networks: A comparative study
Mobile ad hoc networks (MANET) is a wireless network where nodes work in standalone fashion. The MANET faces various security challenges due to the environment in which it is deployed. The nodes of mobile ad hoc netw...
Phishing Detection In Selected Feature Using Modified SVM-PSO
The sensitive information such as passwords, credit card number, account details, email information and credential of the external users robbed by threats such kind of threat is called phishing. So many softwareand t...
Power Optimization In Digital Circuits Using Scan-Based BIST
Technology provides smaller, faster and lower energy devices which allow more powerful and compact circuit- ry. Thermal and shot-noise estimations alone suggest that the fault rate of an individual Nano scale device...
Medium Voltage High-Power Converter Topology for the Large Permanent Magnet Wind Generator Systems
This paper proposes a modular, medium voltage, highpower converter topology for the large permanent magnet wind generator system, eliminating the grid-side step-up transformer, which is desirable for both onshore and o...
Effective Load Balancing Technique And Memory Management In Cloud
Cloud computing applications are developed using Map Reduce programming. Cloud computing distributed file system nodes perform functionality like computing as well as storage in this a file is partitioned into a numb...