Content Based Image Retrieval: Survey and Comparison between RGB and HSV model
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 4
Abstract
Content based image Retrieval is an active research field in past decades. Against the traditional system where the images are retrieved based on the keyword search, CBIR system retrieve the images based on the visual content. In this paper the performance of HSV color space is evaluated on the basis of accuracy, precision and Recall. We present HSV based color space image retrieval method, based on the color distribution of the images.
Authors and Affiliations
Simardeep Kaur
Investigation of the Anomalous Dry Berth Track Corrosion
Severe corrosion rates were observed in a relatively new track rail system used in Dubai Maritime City. Similar track system in a nearby location, Gaddaf, with similar temperature and humidity profile did not exhibit sim...
Optimized Multiple Word Radix-2 Montgomery Multiplication Algorithm
Montgomery multiplication algorithm is used in the implementation of RSA and other cryptosystems based on modular arithmetic. Several improvements have been suggested to increase its suitability for hardware implem...
A Review on Classical and Modern Encryption Techniques
Over the centuries, an elaborate set of protocols and mechanisms has been created to deal with information security issues when the information is conveyed by physical documents. Often the objectives of information secur...
Design and Development of a Small Heat Exchanger as Auxiliary Cooling System for Domestic and Industrial Applications
The epileptic supply of power from the national grid in Nigeria has made many industries to engage Internal Combustion Engine generators as alternative to providing energy required for production. The excessive use of th...
A Review on some aspects of Black Hole Attack in MANET
A Mobile Ad-Hoc Network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on continual basis. Due to security vu...