Volume-6 ~ Issue-6
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Multi Wavelet for Image Retrival Based On Using Texture and Color Querys |
| Country | : | India |
| Authors | : | K. Joseph Bhushanam, P. Darwin |
| : | 10.9790/0661-0661013 ![]() |
Abstract:Efficient, texture representation is important, in search and retrieval of similar texture patterns from a large image database. There has been research on texture feature extraction by finding the Spatial/frequency distribution of the patterns with tools like the Gabor filters, Pyramid-structured wavelet transform, and Multi wavelet transform. In this paper, content based image retrieval method is used, to retrieve the images from the database according to their similarity to the Query image. The aim of this project is to retrieve the images using multi wavelet. Firstly, we calculate the multi wavelet of all images in database.secondly, to calculate the energy and then distance between query and database images.
Keywords - Retrieving Images, CBIR (Content Based Image Retrieval) system, distance and energy
[1] J Eakins, M E Graham, Content-based Image Retrieval, A report to the JISC Technology Applications Programme, 1999.
[2] Thomas S. Huang, Yong Rui, and Shinh-Fu Chang, Image retrieval: Past, Present and Future, International Symposium on
Multimedia Information Processing, 1997.
[3] M. Myron Flickner, H. Sawhney, W. Niblack, J. Ashley, Q. Huang, B. Dom, M. Gorkani, J. Hafner, D. Lee, D.Petkovic, D.Steele
and P.Yanker, "Query by image content: The QBIC system", In IEEE Computer, pp. 23 -31, Sept.1995
[4] Patrick M. Kelly, Michael Cannon and Donald R. Hush, Query by Image Example: The CANDID approach. In Storage and
Retrieval for Image and Video Databases III, volume 2420, pp 238-248, SPIE, 1995
[5] Chad Carson, Serge Belongie, Hayit Greenspan, Jitendra Malik, Blobworld: Image segmentation using Expectation-Maximization
and its application to image querying, Third International Conference on Visual Information Systems, 1999
[6] M. Das, E. M. Riseman, and B. A. Draper. Focus: Searching for multi-colored objects in a diverse image database, In IEEE
Conference on Computer Vision and Pattern Recognition, pp 756-761, Jun 1997
- Citation
- Abstract
- Reference
- Full PDF
Abstract: CONTEXT- Offshore software development outsourcing (OSDO) is an important paradigm of global
software development. OSDO is a famous business strategy adopted by many organizations in developed
countries by outsourcing their software development work to low-wages countries. OSDO offers many benefits
to clients organization including high quality software products, authorized and skilled human resources at
economical cost. However outsourcing is not a risk free business. Vendor organizations need to address a
number of factors for successful outcomes of the outsourcing relationships. Likewise portfolio cost management
(PCM) plays an important role in OSDO relationships............
Keywords: Systematic Literature Review; Portfolio Cost Management; Software Development Outsourcing; Client-Vendor Relationships.
[1] M. Miozzo and D. Grimshaw, "Modularity and innovation in knowledge-intensive business services: IT outsourcing in Germany
and the UK," Research Policy, vol. 34 (2005), pp. 1419–1439, 2005.
[2] S. Khan, M. Niazi, and R. Ahmad, "Factors influencing clients in the selection of offshore software outsourcing vendors: an
exploratory study using a systematic literature review," Journal of systems and software, vol. 84(4), pp. 686-699, 2011.
[3] S. Khan, M. Niazi, and R. Ahmad, "Critical Success Factors for Offshore Software Development Outsourcing Vendors: A
Systematic Literature Review," presented at The 4th IEEE International Conference on Global Software Engineering, Ir eland,
2009.
[4] M. D. Minevich and F. Richter, "Global outsourcing report," CIO Insight, pp. 1-48, 2005.
[5] S. Betz and A. Oberweis, "Knowledge Transfer in IT Offshore Outsourcing Projects: An Analysis of the Current Stat e and
Best Practices," International Conference on Global Software Engineering, vol. .45, pp. 978-0-7695-4122-8/10, 2010.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Wireless sensor network (WSN) have diverse field of application, but it is extremely much prone to the security threats. This paper proposes a lightweight, fast, efficient and mobile agent technology based security solution against cloning attack and doline attack for wireless sensor networks (WSNs). WSN has a dynamic topology, irregular connectivity, and resource constrained device nodes. Researchers over the past years have confident the use of mobile agent to overcome these challenges. The proposed scheme is to defend next to cloning attack and doline attacks using mobile agents. Mobile agent is a program section which is selfcontrolling. They navigate from node to node not only transmitting data but also doing computation..............
Keywords: Wireless Sensor Network, Clone Attack, Doline attack, DTADA, DTADA4SCA, DTADA4DA
[1] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, ―Wireless sensor networks: a survey,‖ Computer Networks, vol. 38,
2002.
[2] H. Chan, A. Perrig, and D. Song, ―Random key redistribution schemes for sensor networks,‖ in Proceedings of the 2003Symposium
on Security and Privacy. Los Alamitos, CA: IEEE Computer Society, May 11–142003, pp. 197–215.
[3] J. Newsome, E. Shi, D. Song, and A. Perrig, ―The sybil attack in sensor networks: analysis & defenses,‖ in Proceedings of the third
international symposium on Information processing in sensor networks (IPSN-04).New York: ACM Press, Apr. 26–27 2004,
pp.259–268.
[4] Zhang Yuyong, Jingde. Mobile Agent Technology. Beijing, Tsinghua University Press, 2003.
[5] Zhu Miaoliang, Qiuyu. Mobile Agent System. Journal of Computer Research and Development, 2001, 38(1): 16-25.
[6] G. Sladic , M. Vidakovic and Z. Konjovic Agent based system for network availability and vulnerability monitoring 2011 IEEE
9thInternational Symposium on Intelligent Systems and Informatics •September 8 -10, 2011, Subotica, Serbia.
[7] L. Tong, Q. Zhao, S. Adireddy. Sensor Networks with Mobile Agents. IEEE Military Communications Conference, Boston, MA,
USA,2003:688-693.
