Image Search Reranking

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - December Issue 2013 by IJCTT Journal
Volume-6 Issue-5                           
Year of Publication : 2013
Authors :V Rajakumar , Vipeen V Bopche

MLA

V Rajakumar , Vipeen V Bopche"Image Search Reranking"International Journal of Computer Trends and Technology (IJCTT),V6(5):242-247 December Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract:- -The existing methods for image search re ranking suffer from the unfaithfulness of the assumptions under which the text-based images search result. The resulting images contain more irrelevant images. Hence the re ranking concept arises to re rank the retrieved images based on the text around the image and data of data of image and visual feature of image. A number of methods are differentiated for this re-ranking. The high-ranked images are used as noisy data and a k-means algorithm for classification is learned to rectify the ranking further. We are study the affectability of the cross validation method to this training data. The preeminent originality of the overall method is in collecting text/metadata of image and visual features in order to achieve an automatic ranking of the images. Supervision is initiated to learn the model weights offline, previous to reranking process. While model learning needs manual labeling of the results for a some limited queries, the resulting model is query autonomous and therefore applicable to any other query .Examples are given for a selection of other classes like vehicles, animals and other classes.

References:-

[1] L. Yang and A. Hanjalic, “Supervised reranking for web image search,” in Proc. ACM Multimedia, 2010.
[2] R. Fergus, L. Fei-Fei, P. Perona, and A. Zisserman, “Learning object categories from Google’s image search,” in Proc. ICCV, 2005, IEEEComputer Society.
[3] L.-J. Li and L. Fei-Fei, “OPTIMOL: Automatic online picture collec- Tion via incremental MOdel learning,” Int. J. Comput. Vision, 2009.
[4] W. H. Hsu, L. S. Kennedy, and S.-F. Chang, “Video search reranking via information bottleneck principle,” in Proc. ACMMultimedia, 2006.
[5] M. Fritz and B. Schiele, “Decomposition, discovery and detection of visual categories using topic models,” in Proc. CVPR, 2008.
[6] [Online]. Available: http://en.Wikipedia.org/.
[7] [Online]. Available: www.google.co.in/.

Keywords:-vulnerability (or) security flows, vulnerability discovery Attack Injection, attack generator, proactive Protocol