In current trends the logos are playing a vital role in industrial and all commercial applications. Fundamentally the logo is defined as it’s a graphic entity which contains colors textures, shapes and text etc., which is organized in some special visible format. But unfortunately it is very difficult thing to save their brand logos from duplicates. In practical world there are several systems available for logo reorganization and detection with different kinds of requirements. Two dimensional global descriptors are used for logo matching and reorganization. The concept of Shape descriptors based on Shape context and the global descriptors are based on the logo contours. There is an algorithm which is implemented for logo detection is based on partial spatial context and spatial spectral saliency (SSS). The SSS is able to keep away from the confusion effect of background and also speed up the process of logo detection. All such methods are useful only when the logo is visible completely without noise and not subjected to change. We contribute, through this paper, to the design of a novel variation framework able to match and recognize multiple instances of multiple reference logos in image archives. Reference logos and test images are seen as constellations of local features (interest points, regions, etc.) and matched by minimizing an energy function mixing: 1) a fidelity term that measures the quality of feature matching, 2) a neighborhood criterion that captures feature co-occurrence geometry, and 3) a regularization term that controls the smoothness of the matching solution. We also introduce a detection/recognition procedure and study its theoretical consistency
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEditor IJMTER
The accuracy of latent finger print matching compared to roll and plain finger print
matching is significantly lower due to background noise, poor ridge quality and overlapping
structured noise in latent images. In this paper the proposed algorithm is dictionary-based approach
for automatic segmentation and enhancement towards the goal of achieving “lights out” latent
identifications system. Total variation decomposition model with L1 fidelity regularization in latent
finger print image remove background noise. A coarse to fine strategy is used to improve robustness
and accuracy. It improves the computational efficiency of the algorithm.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Biometric identification with improved efficiency using sift algorithmIJARIIT
Osseo-integrated dental implants have been widely used for the rehabilitation of tooth loss. Although dental implants
are considered an available treatment in the paradigm shift from traditional dental therapies, such as fixed dental bridges and
removable dentures, the fundamental problems must be overcome prior to their clinical use in young patients who are still
undergoing jawbone growth. A bio-engineered functional bio-hybrid implant that is combined with adult-derived periodontal
tissue and attached with bone tissue can act as a substitute for cementum. This bio-hybrid implant was successfully engrafted
and it restored physiological function, including bone remodelling, regeneration and appropriate responsiveness to noxious
stimuli. Thus, this article reviews the functional bio-hybrid implant’s potential for clinical use as a next-generation dental
implant using adult-derived tissues.
A Hybrid Trademark Retrieval System Using Four-Gray-Level Zernike Moments and...CSCJournals
There are just too many trademarks out there so that a good automated retrieval system is required to help to protect them from possible infringements. However, it is from people, i.e., the general consumers' viewpoint how similar or confusing two trademarks can be. Thus, in this paper we propose a hybrid system where we patently incorporate human inputs into a computerized trademark retrieval scheme. Various surveys involving general consumers' cognition and responses are conducted, and the results are used as benchmarks in developing the automated part. The core mathematical features used in the scheme are four-gray-level Zernike moments and two new image compactness indices. Experimental results show that this hybrid system, when compared with human-generated results, is able to achieve an average accuracy rate of 95% while that of the closest competing existing method is 65%.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEditor IJMTER
The accuracy of latent finger print matching compared to roll and plain finger print
matching is significantly lower due to background noise, poor ridge quality and overlapping
structured noise in latent images. In this paper the proposed algorithm is dictionary-based approach
for automatic segmentation and enhancement towards the goal of achieving “lights out” latent
identifications system. Total variation decomposition model with L1 fidelity regularization in latent
finger print image remove background noise. A coarse to fine strategy is used to improve robustness
and accuracy. It improves the computational efficiency of the algorithm.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Biometric identification with improved efficiency using sift algorithmIJARIIT
Osseo-integrated dental implants have been widely used for the rehabilitation of tooth loss. Although dental implants
are considered an available treatment in the paradigm shift from traditional dental therapies, such as fixed dental bridges and
removable dentures, the fundamental problems must be overcome prior to their clinical use in young patients who are still
undergoing jawbone growth. A bio-engineered functional bio-hybrid implant that is combined with adult-derived periodontal
tissue and attached with bone tissue can act as a substitute for cementum. This bio-hybrid implant was successfully engrafted
and it restored physiological function, including bone remodelling, regeneration and appropriate responsiveness to noxious
stimuli. Thus, this article reviews the functional bio-hybrid implant’s potential for clinical use as a next-generation dental
implant using adult-derived tissues.
A Hybrid Trademark Retrieval System Using Four-Gray-Level Zernike Moments and...CSCJournals
There are just too many trademarks out there so that a good automated retrieval system is required to help to protect them from possible infringements. However, it is from people, i.e., the general consumers' viewpoint how similar or confusing two trademarks can be. Thus, in this paper we propose a hybrid system where we patently incorporate human inputs into a computerized trademark retrieval scheme. Various surveys involving general consumers' cognition and responses are conducted, and the results are used as benchmarks in developing the automated part. The core mathematical features used in the scheme are four-gray-level Zernike moments and two new image compactness indices. Experimental results show that this hybrid system, when compared with human-generated results, is able to achieve an average accuracy rate of 95% while that of the closest competing existing method is 65%.
Detecting Irregularities in the Shape of Coloured BottleIJERA Editor
Digital image processing is used for various purposes like image enhancement, compression of images. Uncompressed image needs more storage capacity. So the images are compressed. In this research paper we aim to detect the irregularities in the shape of bottle. This paper is to review and study of the different methods of object detection. It includes many methods for the shape recognition. This paper discuss the methods like Robert operator, Sobel Operator, Laplacian and Fourier Descriptor. As we have gone through many research papers it was of mostly detecting mangoes, flower, leaf, face, etc but none was for detecting bottle shape recognition. We also compared accuracy and limitations of these methods and from all the methods we found the best result for fourier descriptor for shape recognition.
BAG OF VISUAL WORDS FOR WORD SPOTTING IN HANDWRITTEN DOCUMENTS BASED ON CURVA...ijcsit
In this paper, we present a segmentation-based word spotting method for handwritten documents using
Bag of Visual Words (BoVW) framework based on curvature features. The BoVW based word spotting
methods extract SIFT or SURF features at each keypoint using fixed sized window. The drawbacks of these
techniques are that they are memory intensive; the window size cannot be adapted to the length of the
query and requires alignment between the keypoint sets. In order to overcome the drawbacks of SIFT or
SURF local features based existing methods, we proposed to extract curvature feature at each keypoint of
word image in BoVW framework. The curvature feature is scalar value describes the geometrical shape of
the strokes and requires less memory space to store. The proposed method is evaluated using mean
Average Precision metric through experimentation conducted on popular datasets such as GW, IAM and
Bentham datasets. The yielded performances confirmed that our method outperforms existing word spotting
techniques.
Optical character recognition (OCR) is process of classification of optical patterns contained in a digital image. The process of OCR Recognition involves several steps including pre-processing, segmentation, feature extraction, classification. Pre-processing is for done the basic operation on input image like noise reduction which remove the noisy signal from image. Segmentation stage for segment the given image into line by line and segment each character from segmented line. Future extraction calculates the characteristics of character. A Radial Basis Function Neural Network (RBFNN) is used to classification contains the database and does the comparison.
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
This paper is the implementation of fingerprint recognition system in which the matching is done using the
Minutiae points. The methodology is the extracting & applying matching procedure on the Minutiae points
between the sample fingerprint & fingerprint under question. The main functional blocks of this system
follows steps of Image Thinning, Image Segmentation, Minutiae (feature) point Extraction, & Minutiae
point Matching. The procedure of Enhanced Thinning included for the purpose of decreasing the size of the
memory space used by the fingerprint image database.
Face Recognition for Human Identification using BRISK Feature and Normal Dist...ijtsrd
Face recognition is a kind of automatic human identification from face images has been performed widely research in image processing and machine learning. Face image, facial information of the person is presented and unique information for each person even two person possessed the same face. We propose a methodology for automatic human classification based on Binary Robust Invariant Scalable Keypoints BRISK feature of face images and the normal distribution model. In our proposed methodology, the normal distribution model is used to represent the statistical information of face image as a global feature. The human name is the output of the system according to the input face image. Our proposed feature is applied with Artificial Neural Networks to recognize face for human identification. The proposed feature is extracted from the face image of the Extended Yale Face Database B to perform human identification and highlight the properties of the proposed feature. Khin Mar Thi "Face Recognition for Human Identification using BRISK Feature and Normal Distribution Model" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26589.pdfPaper URL: https://www.ijtsrd.com/computer-science/multimedia/26589/face-recognition-for-human-identification-using-brisk-feature-and-normal-distribution-model/khin-mar-thi
CONTENT RECOVERY AND IMAGE RETRIVAL IN IMAGE DATABASE CONTENT RETRIVING IN TE...Editor IJMTER
Digital Images are used in magazines, blogs, website, television and more. Digital image processing
techniques are used for feature selection, pattern extraction classification and retrieval requirements. Color, texture
and shape features are used in the image processing. Digital images processing also supports computer graphics
and computer vision domains. Scene text recognition is performed with two schemes. They are character
recognizer and binary character classifier models. A character recognizer is trained to predict the category of a
character in an image patch. A binary character classifier is trained for each character class to predict the existence
of this category in an image patch. Scene text recognition is performed on detected text regions. Pixel-based layout
analysis method is adopted to extract text regions and segment text characters in images. Text character
segmentation is carried out with color uniformity and horizontal alignment of text characters. Discriminative
character descriptor is designed by combining several feature detectors and descriptors. Histogram of Oriented
Gradients (HOG) is used to identify the character descriptors. Character structure is modeled at each character
class by designing stroke configuration maps. The scene text extraction scheme is also supports for smart mobile
devices. Text recognition methods are used with text understanding and text retrieval applications. The text
recognition scheme is enhanced with content based image retrieval process. The system is integrated with
additional representative and discriminative features for text structure modeling process. The system is enhanced to
perform text and word level recognition using lexicon analysis. The training process is included with word
database update task.
Detecting Irregularities in the Shape of Coloured BottleIJERA Editor
Digital image processing is used for various purposes like image enhancement, compression of images. Uncompressed image needs more storage capacity. So the images are compressed. In this research paper we aim to detect the irregularities in the shape of bottle. This paper is to review and study of the different methods of object detection. It includes many methods for the shape recognition. This paper discuss the methods like Robert operator, Sobel Operator, Laplacian and Fourier Descriptor. As we have gone through many research papers it was of mostly detecting mangoes, flower, leaf, face, etc but none was for detecting bottle shape recognition. We also compared accuracy and limitations of these methods and from all the methods we found the best result for fourier descriptor for shape recognition.
BAG OF VISUAL WORDS FOR WORD SPOTTING IN HANDWRITTEN DOCUMENTS BASED ON CURVA...ijcsit
In this paper, we present a segmentation-based word spotting method for handwritten documents using
Bag of Visual Words (BoVW) framework based on curvature features. The BoVW based word spotting
methods extract SIFT or SURF features at each keypoint using fixed sized window. The drawbacks of these
techniques are that they are memory intensive; the window size cannot be adapted to the length of the
query and requires alignment between the keypoint sets. In order to overcome the drawbacks of SIFT or
SURF local features based existing methods, we proposed to extract curvature feature at each keypoint of
word image in BoVW framework. The curvature feature is scalar value describes the geometrical shape of
the strokes and requires less memory space to store. The proposed method is evaluated using mean
Average Precision metric through experimentation conducted on popular datasets such as GW, IAM and
Bentham datasets. The yielded performances confirmed that our method outperforms existing word spotting
techniques.
Optical character recognition (OCR) is process of classification of optical patterns contained in a digital image. The process of OCR Recognition involves several steps including pre-processing, segmentation, feature extraction, classification. Pre-processing is for done the basic operation on input image like noise reduction which remove the noisy signal from image. Segmentation stage for segment the given image into line by line and segment each character from segmented line. Future extraction calculates the characteristics of character. A Radial Basis Function Neural Network (RBFNN) is used to classification contains the database and does the comparison.
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
This paper is the implementation of fingerprint recognition system in which the matching is done using the
Minutiae points. The methodology is the extracting & applying matching procedure on the Minutiae points
between the sample fingerprint & fingerprint under question. The main functional blocks of this system
follows steps of Image Thinning, Image Segmentation, Minutiae (feature) point Extraction, & Minutiae
point Matching. The procedure of Enhanced Thinning included for the purpose of decreasing the size of the
memory space used by the fingerprint image database.
Face Recognition for Human Identification using BRISK Feature and Normal Dist...ijtsrd
Face recognition is a kind of automatic human identification from face images has been performed widely research in image processing and machine learning. Face image, facial information of the person is presented and unique information for each person even two person possessed the same face. We propose a methodology for automatic human classification based on Binary Robust Invariant Scalable Keypoints BRISK feature of face images and the normal distribution model. In our proposed methodology, the normal distribution model is used to represent the statistical information of face image as a global feature. The human name is the output of the system according to the input face image. Our proposed feature is applied with Artificial Neural Networks to recognize face for human identification. The proposed feature is extracted from the face image of the Extended Yale Face Database B to perform human identification and highlight the properties of the proposed feature. Khin Mar Thi "Face Recognition for Human Identification using BRISK Feature and Normal Distribution Model" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26589.pdfPaper URL: https://www.ijtsrd.com/computer-science/multimedia/26589/face-recognition-for-human-identification-using-brisk-feature-and-normal-distribution-model/khin-mar-thi
CONTENT RECOVERY AND IMAGE RETRIVAL IN IMAGE DATABASE CONTENT RETRIVING IN TE...Editor IJMTER
Digital Images are used in magazines, blogs, website, television and more. Digital image processing
techniques are used for feature selection, pattern extraction classification and retrieval requirements. Color, texture
and shape features are used in the image processing. Digital images processing also supports computer graphics
and computer vision domains. Scene text recognition is performed with two schemes. They are character
recognizer and binary character classifier models. A character recognizer is trained to predict the category of a
character in an image patch. A binary character classifier is trained for each character class to predict the existence
of this category in an image patch. Scene text recognition is performed on detected text regions. Pixel-based layout
analysis method is adopted to extract text regions and segment text characters in images. Text character
segmentation is carried out with color uniformity and horizontal alignment of text characters. Discriminative
character descriptor is designed by combining several feature detectors and descriptors. Histogram of Oriented
Gradients (HOG) is used to identify the character descriptors. Character structure is modeled at each character
class by designing stroke configuration maps. The scene text extraction scheme is also supports for smart mobile
devices. Text recognition methods are used with text understanding and text retrieval applications. The text
recognition scheme is enhanced with content based image retrieval process. The system is integrated with
additional representative and discriminative features for text structure modeling process. The system is enhanced to
perform text and word level recognition using lexicon analysis. The training process is included with word
database update task.
Speeded-up and Compact Visual Codebook for Object RecognitionCSCJournals
The well known framework in the object recognition literature uses local information extracted at several patches in images which are then clustered by a suitable clustering technique. A visual codebook maps the patch-based descriptors into a fixed-length vector in histogram space to which standard classifiers can be directly applied. Thus, the construction of a codebook is an important step which is usually done by cluster analysis. However, it is still difficult to construct a compact codebook with reduced computational cost. This paper evaluates the effectiveness and generalisation performance of the Resource-Allocating Codebook (RAC) approach that overcomes the problem of constructing fixed size codebooks that can be used at any time in the learning process and the learning patterns do not have to be repeated. It either allocates a new codeword based on the novelty of a newly seen pattern, or adapts the codebook to fit that observation. Furthermore, we improve RAC to yield codebooks that are more compact. We compare and contrast the recognition performance of RAC evaluated with two distinctive feature descriptors: SIFT and SURF and two clustering techniques: K-means and Fast Reciprocal Nearest Neighbours (fast-RNN) algorithms. SVM is used in classifying the image signatures. The entire visual object recognition pipeline has been tested on three benchmark datasets: PASCAL visual object classes challenge 2007, UIUC texture, and MPEG-7 Part-B silhouette image datasets. Experimental results show that RAC is suitable for constructing codebooks due to its wider span of the feature space. Moreover, RAC takes only one-pass through the entire data that slightly outperforms traditional approaches at drastically reduced computing times. The modified RAC performs slightly better than RAC and gives more compact codebook. Future research should focus on designing more discriminative and compact codebooks such as RAC rather than focusing on methods tuned to achieve high performance in classification.
Multilabel Image Annotation using Multimodal Analysisijtsrd
Image Annotation is one of the most important powerful tools in the field of Computer Vision applications. It has potential application in Face recognition, Robotics, Text recognition, Image retrieval, Image analysis etc. Also, Neural network gains a massive attention in the field of computer science recently. In neural networks, Convolutional neural network ConvNets or CNNs is one of the main categories to do images recognition, images classifications, Objects detections, recognition faces etc., are some of the areas where CNNs are widely used. The existing approaches obtain the information cues needed for annotation from Input Images only. This results in lack of context understanding of the post. In order to overcome this issue, Multimodal Image Annotation using Deep Learning MIADL approach is proposed. This approach makes use of Multimodal data i.e. Image along with its textual description content in Automatic Image Annotation. Incorporating Image along with its textual description content Multimodal data gives the better understanding of the context of the post. This will also reduce irrelevant images in image retrieval systems. It is done by using Convolution Neural network to classify and assign multiple labels for the image. It is mainly is for multi label classification problem that aims at associating a set of textual with an image that describe its semantics. Also using Multimodal data to annotate an Image significantly boost performance than the existing methods. Pavithra S S | Chitrakala S "Multilabel Image Annotation using Multimodal Analysis" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33002.pdf Paper Url :https://www.ijtsrd.com/computer-science/data-miining/33002/multilabel-image-annotation-using-multimodal-analysis/pavithra-s-s
A Texture Based Methodology for Text Region Extraction from Low Resolution Na...CSCJournals
Automated systems for understanding display boards are finding many applications useful in guiding tourists, assisting visually challenged and also in providing location aware information. Such systems require an automated method to detect and extract text prior to further image analysis. In this paper, a methodology to detect and extract text regions from low resolution natural scene images is presented. The proposed work is texture based and uses DCT based high pass filter to remove constant background. The texture features are then obtained on every 50x50 block of the processed image and potential text blocks are identified using newly defined discriminant functions. Further, the detected text blocks are merged and refined to extract text regions. The proposed method is robust and achieves a detection rate of 96.6% on a variety of 100 low resolution natural scene images each of size 240x320.
A UTOMATIC L OGO E XTRACTION F ROM D OCUMENT I MAGESIJCI JOURNAL
Logo extraction plays an important role in logo ba
sed document image retrieval. Here we present a
method for automatic logo extraction from the docum
ent images that works for scanned documents
containing a logo. Proposed method uses morphologic
al operations for logo extraction. It supports
extraction of a logo with its gray level and color
information
2D FEATURES-BASED DETECTOR AND DESCRIPTOR SELECTION SYSTEM FOR HIERARCHICAL R...gerogepatton
Detection and description of keypoints from an image is a well-studied problem in Computer Vision. Some methods like SIFT, SURF or ORB are computationally really efficient. This paper proposes a solution for a particular case study on object recognition of industrial parts based on hierarchical classification. Reducing the number of instances leads to better performance, indeed, that is what the use of the hierarchical classification is looking for. We demonstrate that this method performs better than using just one method
like ORB, SIFT or FREAK, despite being fairly slower.
2D FEATURES-BASED DETECTOR AND DESCRIPTOR SELECTION SYSTEM FOR HIERARCHICAL R...ijaia
Detection and description of keypoints from an image is a well-studied problem in Computer Vision. Some methods like SIFT, SURF or ORB are computationally really efficient. This paper proposes a solution for a particular case study on object recognition of industrial parts based on hierarchical classification. Reducing the number of instances leads to better performance, indeed, that is what the use of the hierarchical classification is looking for. We demonstrate that this method performs better than using just one method like ORB, SIFT or FREAK, despite being fairly slower
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Logo Matching for Document Image Retrieval Using SIFT Descriptors
1. Akasha, N, M et al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 2, ( Part -2) February 2017, pp.55-60
www.ijera.com DOI: 10.9790/9622- 0702025560 55 | P a g e
Logo Matching for Document Image Retrieval Using SIFT
Descriptors
Boyapati Bharathidevi1
, Lakshmi Prasad Chennamsetty2
,
Ammeti Raghava Prasad3
, Ashok Kumar Balijepalli4
1
Asst.Professor, Dept of ECE, Universal College Of Engineering & Technology, Perecherla, Guntur(dt), A.P,
India-522438
2
Asst.Professor, Dept of ECE, Universal College Of Engineering & Technology, Perecherla, Guntur(dt), A.P,
India-522438.
3
Asst.Professor,Dept of ECE, Universal College Of Engineering & Technology, Perecherla, Guntur(dt), A.P,
India-522438
4
Asst.Professor,Dept of ECE, Universal College Of Engineering & Technology, Perecherla, Guntur(dt), A.P,
India-522438
ABSTRACT
In current trends the logos are playing a vital role in industrial and all commercial applications. Fundamentally
the logo is defined as it’s a graphic entity which contains colors textures, shapes and text etc., which is
organized in some special visible format. But unfortunately it is very difficult thing to save their brand logos
from duplicates. In practical world there are several systems available for logo reorganization and detection with
different kinds of requirements. Two dimensional global descriptors are used for logo matching and
reorganization. The concept of Shape descriptors based on Shape context and the global descriptors are based on
the logo contours. There is an algorithm which is implemented for logo detection is based on partial spatial
context and spatial spectral saliency (SSS). The SSS is able to keep away from the confusion effect of
background and also speed up the process of logo detection. All such methods are useful only when the logo is
visible completely without noise and not subjected to change. We contribute, through this paper, to the design
of a novel variation framework able to match and recognize multiple instances of multiple reference logos in
image archives. Reference logos and test images are seen as constellations of local features (interest points,
regions, etc.) and matched by minimizing an energy function mixing: 1) a fidelity term that measures the quality
of feature matching, 2) a neighborhood criterion that captures feature co-occurrence geometry, and 3) a
regularization term that controls the smoothness of the matching solution. We also introduce a
detection/recognition procedure and study its theoretical consistency.
Index Terms: Context-dependent kernel, logo detection, logo recognition.
I. I.INTRODUCTION
Logos are often used pervasively as
declaration of document source and ownership in
business and government documents. The problem
of logo detection and recognition is of great interest
to the document image analysis and retrieval
communities because it enables immediate
identification of the source of documents based on
the originating organization. Logos are graphic
productions that either recall some real world
objects, or emphasize a name, or simply display
some abstract signs that have strong perceptual
appeal [see Fig. 1(a)]. Color may have some
relevance to assess the logo identity. But the
distinctiveness of logos is more often given by a
few details carefully studied by graphic designers,
semiologists and experts of social communication.
The graphic layout is equally important to attract
the attention of the customer and convey the
message appropriately and permanently.
Fig. 1. (a) Examples of popular logos depicting real
world objects, text, graphic signs, and complex
layouts with graphic details. (b) Pairs of logos with
malicious small changes in details or spatial
arrangements. (c) Examples of logos displayed in
real world images in bad light conditions, with
partial occlusions and deformations.
RESEARCH ARTICLE OPEN ACCESS
2. Akasha, N, M et al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 2, ( Part -2) February 2017, pp.55-60
www.ijera.com DOI: 10.9790/9622- 0702025560 56 | P a g e
The detection of near-duplicate logos and
unauthorized uses [8], [9]. Special applications of
social utility have also been reported such as the
recognition of groceries in stores for assisting the
blind [10]. Different logos may have similar layout
with slightly different spatial disposition of the
graphic elements, localized differences in the
orientation, size and shape, or in the case of
malicious tampering – differ by the
presence/absence of one or few traits [see Fig.
1(b)]. Logos however often appear in
images/videos of real world indoor or outdoor
scenes superimposed on objects of any geometry,
shirts of persons or jerseys of players, boards of
shops or billboards and posters in sports playfields.
In most of the cases they are subjected to
perspective transformations and deformations,
often corrupted by noise or lighting effects, or
partially occluded. Such images – and logos
thereafter have often relatively low resolution and
quality. Regions that include logos might be small
and contain few information [see Fig. 1(c)]. Logo
detection and recognition in these scenarios has
become important for a number of applications.
Among them, several examples have been reported
in the literature, such as the automatic identification
of products on the web to improve commercial
search-engines [4], the verification of the visibility
of advertising logos in sports events [5]–[7].
II. LITERATURE SURVEY
Kato’s system [8], was among the earliest
ones. It mapped a normalized logo image to a 64
pixel grid, and calculated a global feature vector
from the frequency distributions of edge pixels.
Zernike- logos were described by global Zernike
moments, local curvature and distance to
centroid.Sivic and Zisserman-bag[8], of visual
words approach to represent affine covariant local
regions from a codebook of SIFT descriptors;
visual words were weighted with tf-idffor large-
scale retrieval. Joly,Buisson and Costantinopoulos
[7]. To discard the outliers they performed
geometric consistency checking, assuming the
presence of affine geometric transformation
between query and target images. Particularly, in
the authors applied the standard RANSAC
algorithm[5], to refine the initial set of feature
matches.Fergus. The joint distribution of the
geometry of object parts was considered.Carneiro
and Jepson - suggested to group local image
features in flexible spatial models to improve
matching accuracy between image. Chumac
counted for spatial proximity between visual words
by performing spatial geometric hashing.Chum and
Matas considered a special case where feature
appearance is ignored and only spatial relations
between pairs of features are used. Pantofaru
introduced a method for object detection and
localization which combines regions generated by
image segmentation with local patches. Mortensen
combined SIFT descriptors with the shape
descriptor of the point neighborhood very similar to
shape context. Bronstein-defined spatially sensitive
bags of pairs of features the distribution of near
pairs of features. In this approach, the
representation is only affine covariant and has a
very high dimensionality. Gao proposed a two-
stage algorithm that accounts for local contexts of
key points. They considered spatial-spectral
saliency to avoid the impact of cluttered
background and speed up the logo detection and
localization. Kleban-employed a more complex
approach that considers association rules between
frequent spatial configuration of quantized SIFT
features at multiple resolutions
III. EXISTING SYSTEM
The previous work on ―Shape matching
and object recognition using shape contexts,‖ and
―ANSIG—An analytic signature for permutation-
invariant two-dimensional shape representation,‖
have used different global descriptors of the full
logo image either accounting for logo contours or
exploiting shape descriptors such as shape context.
A two-stage algorithm proposed in ―Logo detection
based on spatial-spectral saliency and partial spatial
context,‖ that accounts for local contexts of key
points. They considered spatial-spectral saliency to
avoid the impact of cluttered background and speed
up the logo detection and localization. These
methods assume that a logo picture is fully visible
in the image, is not corrupted by noise and is not
subjected to transformations. According to this,
they cannot be applied to real world images. The
major limitation of this approach is image
resolution and their solution has revealed to be very
sensitive to occlusions.
IV. PROPOSED SYSTEM
Figure: Block Diagram of Proposed Method.
3. Akasha, N, M et al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 2, ( Part -2) February 2017, pp.55-60
www.ijera.com DOI: 10.9790/9622- 0702025560 57 | P a g e
In this paper, we present a novel solution
for logo detection and recognition which is based
on the definition of a ―Context-Dependent
Similarity‖ (CDS) kernel that directly incorporates
the spatial context of local features.
The proposed method is model-free, i.e. it
is not restricted to any a priori alignment model. In
this paper, we present a novel solution for logo
detection and recognition which is based on the
definition of a ―Context Dependent Similarity‖
(CDS) kernel that directly incorporates the spatial
context of local features. The proposed method is
model-free, i.e. it is not restricted to any a priori
alignment model. Context is considered with
respect to each single SIFT key point and its
definition recalls shape context with some
important differences: given a set of SIFT interest
points X, the context of x ∈ X is defined as the set
of points spatially close to x with particular
geometrical constraints. Formally, the CDS
function is defined as the fixed-point of three terms:
(i) an energy function which balances a fidelity
term; (ii) a context criterion; (iii) an entropy term.
The fidelity term is inversely proportional to the
expectation of the Euclidean distance between the
most likely aligned interest points. The context
criterion measures the spatial coherence of the
alignments: given a pair of interest points ( fp, fq )
respectively in the query and target image with a
high alignment score, the context criterion is
proportional to the alignment scores of all the pairs
close to ( f p, fq ) but with a given spatial
configuration. The ―entropy‖ term acts as a
smoothing factor, assuming that with no a priori
knowledge, the joint probability distribution of
alignment scores is flat. It acts as a regularizer that
controls the entropy of the conditional probability
of matching, hence the uncertainty and decision
thresholds so helping to find a direct analytic
solution. Using the CDS kernel, the geometric
layout of local regions can be compared across
images which show contiguous and repeating local
structures as often in the case of graphic logos. The
solution is proved to be highly effective and
responds to the requirements of logo detection and
recognition in real world images.
V. FEATURE SELECTION AND
EXTRACTION
Extracting robust and generic features that
can be detected reliably is essential for matching as
logos often appear as complex mixtures of graphics
and formatted text. We extract corner features from
detected logos as follows. We first extract the
object contours from the edge image computed by
the Canny edge detector [4] and fill in the gaps
along the contours. We then use the corner detector
of He and Yung [10]. It has shown excellent
performance in applications involving real-world
scenes compared to other popular feature detectors.
It identifies an initial set of corner candidates from
local curvature maxima and uses adaptive local
thresholds and dynamic support regions to
eliminate false corners .Measures of Shape
Dissimilarity Several measures of shape
dissimilarity have demonstrated success in object
recognition and retrieval.
VI. CONTEXT-DEPENDENT
SIMILARITY
Let SX = {x1, . . . , xn}, SY = {y1, . . . ,
ym} be respectively the list of interest points taken
from a reference logo and a test image (the value of
n, m may vary with SX , SY ). We borrow the
definition of context and similarity design from, in
order to introduce a new matching procedure
applied to logo detection. The main differences
with respect to reside in the following.
1) The use of context for matching: Context is
used to find interest point correspondences between
two images in order to tackle logo detection while
in , context was used for kernel design in order to
handle object classification using support vector
machines.
2) The update of the design model: Adjacency
matrices are defined in order to model spatial and
geometric relationships (context) between interest
points belonging to two images (a reference logo
and a test image). These adjacency matrices model
interactions between interest points at different
orientations and locations resulting into an
anisotropic context, while in, context was isotropic.
3) The similarity diffusion process: Resulting from
the definition of context, similarity between interest
points is recursively and anisotropically diffused.
4) The interpretation of the model: Our designed
similarity may be interpreted as a joint distribution
(pdf) which models the probability that two interest
points taken from SX × SY match. In order to
guarantee that this similarity is actually a pdf, a
partition function is used as a normalization factor
taken through all the interest points in SX × SY.
VII. LOGO DETECTION AND
RECOGNITION
Application of CDS to logo detection and
recognition requires establishing a matching
criterion and verifying its probability of success.
Let R ⊂ R2
× R128
× [−π,+π] × R+
denote the set of
interest points extracted from all the possible
reference logo images and X a random variable
standing for interest points in R. Similarly, we
define T ⊂ R2
× R128
×[−π,+π] × R + as the set of
interest points extracted from all the possible test
images (either including logos or not) and Y a
random variable standing for interest points in T . X
4. Akasha, N, M et al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 2, ( Part -2) February 2017, pp.55-60
www.ijera.com DOI: 10.9790/9622- 0702025560 58 | P a g e
and Y are assumed drawn from existing (but
unknown) probability distributions. Let’s consider
SX = {X1, . . . , Xn}, SY = {Y1, . . . , Ym} as n and m
realizations with the same distribution as X and Y
respectively. To avoid false matches we have
assumed that matching between YJ and X is
assessed iff
The intuition behind the strong criterion
above comes from the fact that when KYJ |X >> KYj
|X , the entropy of the conditional probability
distribution K.|X will be close to 0, so the
uncertainty about the possible matches of X will be
reduced. The reference logo SX is declared as
present into the test image if, after that the match in
SY has been found for each interest point of SX , the
number of matches is sufficiently large (at least τ
|SX | for a fixed τ ∈ [0, 1], being 1 − τ the occlusion
factor tolerated). We summarize the full procedure
for logo detection and recognition.
VIII. RESULTS AND DISCUSSION
Firstly, we compare our proposed CDS
matching and detection procedure against nearest-
neighbor SIFTS matching and nearest-neighbor
matching with RANSAC verification. SIFT based
logo detection follows the idea in where a reference
logo is detected, in a test image, if the overall
number of SIFT matches is above a fixed threshold.
SIFT matches are obtained by computing for each
interest point in SX its Euclidean distance to all
interest points in SY , and keeping only the nearest-
neighbors. RANSAC based logo detection follows
the same idea but it introduces a model
(transformation) based criterion not necessarily
consistent in practice. This criterion selects only the
matches that satisfy an affine transformation
between reference logos and test images. The
(iterative) RANSAC matching process, is applied
as a ―refinement‖ of SIFT matching (a similar
approach is used in. In both cases a match is
declared as present if Lowe’s second nearest
neighbor test is satisfied. Secondly, we also
compare our CDS logo detection algorithm to two
relevant methods that use context in their matching
procedure. The Video Google approach is closely
related to our method as it introduces a spatial
consistency criterion, according to which only the
matches which share similar spatial layouts are
selected. The spatial layout (context) of a given
interest point includes 15 nearest neighbors that are
spatially close to it. Given X ∈ SX , Y ∈ SY , points
in the layouts of X and Y which also match casts a
vote for the final matching score between X and Y .
The basic idea is therefore similar to ours, but the
main difference resides in the definition of context
in Video Google which is strictly local.2 In our
method the context is also local but recursive; two
interest points match if their local neighbors match,
and if the neighbors of their local neighbors match
too, etc, resulting into a recursive diffusion of the
similarity through the context. Partial Spatial
Context (PSC) logo matching relies on a similar
context definition. Given a set of matching interest
points, it formulates the spatial distribution for this
set (i) by selecting a circular region that contains all
these points, (ii) by computing the scale and
orientation of the set as the average value of,
respectively, all the scales and orientations of the
points, (iii) by partitioning the distribution of these
points in 9 cells. Starting from this context
definition, PSC histograms are computed for both
reference logos and test images. A PSC histogram
is defined as the number of matches lying in each
cell, and logo matching is performed by computing
the similarity between two PSC histograms. This
schema is efficient and quick to be computed, but
its spatial (context) definition is rough and is very
sensible to outliers.
(A)
(B)
Figure: Some examples of logo detection results.
Computational Cost of our logo detection
procedure is mainly dominated by CDS evaluation.
In particular, the key part of the algorithm is the
computation of the context term. Assuming K(t−1)
known for a given pair of points (x, y), the
complexity is O(max(N2, s)); here s is the
dimension of ψf (x) (i.e. 128 since we use SIFT
features) and N is given by the maxx,θ,ρ #{Nθ,ρ
(x)}
(i.e. the max number of points in all the
neighborhoods).
5. Akasha, N, M et al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 2, ( Part -2) February 2017, pp.55-60
www.ijera.com DOI: 10.9790/9622- 0702025560 59 | P a g e
When N < √s, evaluating our CDS is
equivalent to efficient kernels such as linear or
intersection. In worst cases N >>√s and the
evaluation of CDS should be prohibitive. In
practice it may only happen when the context is too
large.
Anyway, using the same setting for CDS
used in the previous experiments, our method is
able to process images and checks for the existence
of a reference logo in less than 1 s. This running
time is achieved, on average on our MICC-Logos
dataset, on a standard 2.6 GHZ PC with 2 GB
memory.
IX. CONCLUSION
We introduced in this work a novel logo
detection and localization approach based on a new
class of similarities referred to as context
dependent. The strength of the proposed method
resides in several aspects: (i) the inclusion of the
information about the spatial configuration in
similarity design as well as visual features, (ii) the
ability to control the influence of the context and
the regularization of the solution via our energy
function, (iii) the tolerance to different aspects
including partial occlusion, makes it suitable to
detect both near-duplicate logos as well as logos
with some variability in their appearance, and (iv)
the theoretical groundedness of the matching
framework which shows that under the hypothesis
of existence of a reference logo into a test image,
the probability of success of matching and
detection is high.
REFERENCES
[1]. A. Smeulders, M. Worring, S. Santini, A.
Gupta, and R. Jain, ―Contentbased image
retrieval at the end of the early years,‖
IEEE Trans. Pattern Anal. Mach. Intell.,
vol. 22, no. 12, pp. 1349–1380, Dec. 2000.
[2]. R. Datta, D. Joshi, J. Li, and J. Z. Wang,
―Image retrieval: Ideas, influences, and
trends of the new age,‖ ACM Comput.
Surv., vol. 40, no. 2, pp. 1–60, 2008.
[3]. L. Ballan, M. Bertini, A. Del Bimbo, L.
Seidenari, and G. Serra, ―Event detection
and recognition for semantic annotation of
video,‖ Multimedia Tools Appl., vol. 51,
no. 1, pp. 279–302, 2011.
[4]. Y. Jing and S. Baluja, ―Pagerank for
product image search,‖ in Proc.WWW,
Beijing, China, 2008, pp. 307–316.
[5]. L. Ballan, M. Bertini, and A. Jain, ―A
system for automatic detection and
recognition of advertising trademarks in
sports videos,‖ in Proc. ACM Multimedia,
Vancouver, BC, Canada, 2008, pp. 991–
992.
[6]. A. Watve and S. Sural, ―Soccer video
processing for the detection of
advertisement billboards,‖ Pattern
Recognit. Lett., vol. 29, no. 7, pp.994–
1006, 2008.
[7]. C. Constantinopoulos, E. Meinhardt-
Llopis, Y. Liu, and V. Caselles, ―A robust
pipeline for logo detection,‖ in Proc. IEEE
Int. Conf. Multimedia Expo, Barcelona,
Spain, Jul. 2011, pp. 1–6.
[8]. J.-L. Shih and L.-H. Chen, ―A new system
for trademark segmentation and retrieval,‖
Image Vis. Comput., vol. 19, no. 13, pp.
1011–1018, 2001.
[9]. C.-H. Wei, Y. Li, W.-Y. Chau, and C.-T.
Li, ―Trademark image retrieval using
synthetic features for describing global
shape and interior structure,‖ Pattern
Recognit., vol. 42, no. 3, pp. 386–394,
2009.
[10]. M. Merler, C. Galleguillos, and S.
Belongie, ―Recognizing groceries in situ
using in vitro training data,‖ in Proc. IEEE
Comput. Vis. Pattern Recognit. SLAM
Workshop, Minneapolis, MN, May 2007,
pp. 1–8.
[11]. Y. S. Kim and W. Y. Kim, ―Content-based
trademark retrieval system using visually
salient feature,‖ in Proc. IEEE Conf.
Comput. Vis. Pattern Recognit., San Juan,
Puerto Rico, Mar. 1997, pp. 307–312.
[12]. A. Jain and A. Vailaya, ―Shape-based
retrieval: A case study with trademark
image databases,‖ Pattern Recognit., vol.
31, no. 9, pp. 1369– 1390, 1998.
[13]. J. P. Eakins, J. M. Boardman, and M. E.
Graham, ―Similarity retrieval of trademark
images,‖ IEEE Multimedia, vol. 5, no. 2,
pp. 53–63, Apr.–Jun. 1998.
[14]. J. Schietse, J. P. Eakins, and R. C.
Veltkamp, ―Practice and challenges in
trademark image retrieval,‖ in Proc. ACM
Int. Conf. Image Video Retr., Amsterdam,
The Netherlands, 2007, pp. 518–524.
[15]. T. Kato, ―Database architecture for
content-based image retrieval,‖ Proc.
SPIE, Image Storage Retr. Syst., vol.
1662, no. 1, pp. 112–123, Jan. 1992.
6. Akasha, N, M et al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 2, ( Part -2) February 2017, pp.55-60
www.ijera.com DOI: 10.9790/9622- 0702025560 60 | P a g e
[16]. S. Belongie, J. Malik, and J. Puzicha,
―Shape matching and object recognition
using shape contexts,‖ IEEE Trans.
Pattern Anal. Mach. Intell., vol. 24, no. 4,
pp. 509–522, Apr. 2002.
[17]. J. Rodriguez, P. Aguiar, and J. Xavier,
―ANSIG—An analytic signature for
permutation-invariant two-dimensional
shape representation,‖ in Proc. IEEE Conf.
Comput. Vis. Pattern Recognit.,
Anchorage, AK, Jun. 2008, pp. 1–8.
[18]. J. Luo and D. Crandall, ―Color object
detection using spatial-color joint
probability functions,‖ IEEE Trans. Image
Process., vol. 15, no. 6, pp. 1443–1453,
Jun. 2006.