Web Image Search Reranking Using CBIR
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 4
Abstract
The existing image retrieval process is based on text-based approach where the input to the search engine is given as the text. Typically, in the development of an image requisition system, semantic image retrieval relies heavily on the related captions, e.g., file-names, categories, annotated keywords, and other manual descriptions. Unfortunately, this kind of textual-based image retrieval always suffers from two problems: high-priced manual annotation and inappropriate automated annotation. To overcome this drawback the proposed work is defined based on CBIR system. The mission of this work is to present an image conceptually, with a set of low-level visual features such as color, texture, and shape and retrieve similar kind of images from the database based on features extracted from the query image. Input to the search engine is given as “Image” itself and this method serves to visually represent the query. Subsequently based on the multi-feature image extraction, Rerankers are constructed which are used to rank the top N output based on the query image. This ensures high accuracy and reliability with less noise in the displayed result.
Authors and Affiliations
V. Vinitha , Dr. J. Jagadeesan , R. Augustian Isaac
Performance Analysis of Ad Hoc Routing Protocols in WSNs
The field of communications networks continues to emerge, thus leading to the rapid growth in the field of wireless sensor networks (WSNs). WSNs are noticeably different from traditional Ad hoc networks. The conspicuous...
INTRUSION AWARE GROUP MANAGEMENT SCHEME FOR MANET
MANET security has long been an issue for its infrastructure-less nature. The sort of networks gives rise to authentication and key-management problems in MANETs. The absolute TTP based schemes seem to be infeasible for...
A Survey of Cyber Crimes
Now a days Cyber Crime is the most significant challenges in India .Cyber Crimes are generally referred as criminal activities that use computers or networks. It can range from fraud to unsolicited emails (spam). It can...
Applications of ANNs in Stock Market Prediction: A Survey
This paper surveys recent literature in the domain of machine learning techniques and artificial intelligence used to predict stock market movements. Artificial Neural Networks (ANNs) are identified to be the dominant ma...
MINING ALGORITHM FOR XML QUERY-ANSWERING SUPPORT
In this current world, we come across digital information available on the web like e-business transaction, e-shopping, e-learning etc., These XML documents are outsized and so the datasets returned as a answer query is...