Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  IJCRT Search Xplore - Search all paper by Paper Name , Author Name, and Title

Volume 6 | Issue 1 |

Volume 6 | Issue 1 | Month  
Downlaod After Publication
1) Table of content index in PDF
2) Table of content index in HTML 2)Table of content index in HTML
3) Front Page                     3) Front Page
4) Back Page                     4) Back Page
5) Editor Board Member 5)Editor Board Member
6) OLD Style Issue 6)OLD Style Issue
Chania Chania
IJCRT Journal front page IJCRT Journal Back Page

  Paper Title: INFORMATION SECURED STEELTH STEGANOGRAPHY USING MMS (SSS IN MMS)

  Author Name(s): N.V.L.Neelima, D.Himabindu, Rambabu M

  Published Paper ID: - IJCRTNCES087

  Register Paper ID - 180584

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRTNCES087 and DOI :

  Author Country : Indian Author, 500075, India , Moinabad, India , | Research Area: Science & Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTNCES087
Published Paper PDF: download.php?file=IJCRTNCES087
Published Paper PDF: http://www.ijcrt.org/papers/IJCRTNCES087.pdf

  Your Paper Publication Details:

  Title: INFORMATION SECURED STEELTH STEGANOGRAPHY USING MMS (SSS IN MMS)

 DOI (Digital Object Identifier) :

 Pubished in Volume: 6  | Issue: 1  | Year: March 2018

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science & Technology

 Author type: Indian Author

 Pubished in Volume: 6

 Issue: 1

 Pages: 495-504

 Year: March 2018

 Downloads: 2216

  E-ISSN Number: 2320-2882

 Abstract

Steganography is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Steganography is the word derived from Greek. Stego means hiding, graphy means writing. It is the science of embedding information into the cover image viz., text, video and image without causing statistically significant modification to the cover image. If the selected image is color image, then convert the image into pixels and the pixels into cells. Read each pixel and generate the color code for that pixel. Here we use LSB(least significant bit) technique to hide the message into the image. LSB data hiding technique does not affect the visible properties of the image. For using LSB technique, we first convert the color code into binary language. Now by using LSB technique, we change the least significant bit value for the binary code generated before. So after changing the least significant bit value whatever value we get, for that number we see the color code and then we hide our text in that pixel which will contain that particular color code. Repeat this process until we hide our full message.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Steganography, Cover image, Pixels, Cells, LSBTechnique, Binary code

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: EVALUATING THE IMPACT OF STEMMING ACCURACY ON INFORMATION RETRIEVAL

  Author Name(s): MD.Afzal, Khaza.K.B.Vali Basha.SK

  Published Paper ID: - IJCRTNCES086

  Register Paper ID - 180596

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRTNCES086 and DOI :

  Author Country : Indian Author, 500075, India , Moinabad, India , | Research Area: Science & Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTNCES086
Published Paper PDF: download.php?file=IJCRTNCES086
Published Paper PDF: http://www.ijcrt.org/papers/IJCRTNCES086.pdf

  Your Paper Publication Details:

  Title: EVALUATING THE IMPACT OF STEMMING ACCURACY ON INFORMATION RETRIEVAL

 DOI (Digital Object Identifier) :

 Pubished in Volume: 6  | Issue: 1  | Year: December - 2017

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science & Technology

 Author type: Indian Author

 Pubished in Volume: 6

 Issue: 1

 Pages: 491-494

 Year: December - 2017

 Downloads: 2253

  E-ISSN Number: 2320-2882

 Abstract

In the present years, Text mining is a developing examination issue in Data Mining. Stemming is to discover stop of specific word. Stemming method is utilized to reduce words length to their resource structure, by expelling derivational and inflectional suffix. Various analysts have proposed the procedures for evaluating the quality and closeness of stemming calculations in various ways. This information the measure of the content quantity reduces by the stemming procedure however couldn't be valuable to numeral the exactness of the stemmer. In this paper, we have utilized one of them to evaluate the quality and proposed one basis for measuring the strength(WSF) and two criteria for measuring the accuracy(CSF and AWCF) of stemming calculation. The examination assesses the quality and exactness of four distinctive closes migration stemming calculations what's more, discovered that every one of the calculations allowed. in this paper are solid and heavier, yet are less precise. In any case, the precision of accurately stemmed words and conflating variation expressions of same gathering to medication source word is great, yet not edible, in Paice/Husk stemmer than alternate stemmers


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Data Mining, stemming

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: --

  Author Name(s): M. Muni Babu, K. Mamatha

  Published Paper ID: - IJCRTNCES085

  Register Paper ID - 180595

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRTNCES085 and DOI :

  Author Country : Indian Author, 500075, India , Moinabad, India , | Research Area: Science & Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTNCES085
Published Paper PDF: download.php?file=IJCRTNCES085
Published Paper PDF: http://www.ijcrt.org/papers/IJCRTNCES085.pdf

  Your Paper Publication Details:

  Title: --

 DOI (Digital Object Identifier) :

 Pubished in Volume: 6  | Issue: 1  | Year: December - 2017

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science & Technology

 Author type: Indian Author

 Pubished in Volume: 6

 Issue: 1

 Pages: 486-490

 Year: December - 2017

 Downloads: 2418

  E-ISSN Number: 2320-2882

 Abstract

The usage of buffer cache improves the system performance and throughput when buffer cache utilized very effectively. For effective use of buffer cache having many techniques in those pattern based methodology works very efficiently and enhance the system performance. Future block reference is identified from the detected pattern. Marginal gain functions are used for managing the partitions. This proposed methodology main aim is improve the buffer cache hit ratio used to enhance the performance


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Buffer Cache, Cache Partition, Replacement policies

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: TWO- FACTOR DATA SECURITY PROTECTION FOR DATA STORED IN THE CLOUD STORAGE

  Author Name(s): CH.Sangeetha, P.Prashanth Kumar, A.Ravi Kumar

  Published Paper ID: - IJCRTNCES084

  Register Paper ID - 180594

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRTNCES084 and DOI :

  Author Country : Indian Author, 500075, India , Moinabad, India , | Research Area: Science & Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTNCES084
Published Paper PDF: download.php?file=IJCRTNCES084
Published Paper PDF: http://www.ijcrt.org/papers/IJCRTNCES084.pdf

  Your Paper Publication Details:

  Title: TWO- FACTOR DATA SECURITY PROTECTION FOR DATA STORED IN THE CLOUD STORAGE

 DOI (Digital Object Identifier) :

 Pubished in Volume: 6  | Issue: 1  | Year: December - 2017

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science & Technology

 Author type: Indian Author

 Pubished in Volume: 6

 Issue: 1

 Pages: 482-485

 Year: December - 2017

 Downloads: 2187

  E-ISSN Number: 2320-2882

 Abstract

This Scheme proposed an upgrade information security system for cloud the use of two Components. In this framework sender sends an encoded message to a recipient with the help of cloud component. The sender requires to catch distinguishing proof of collector however no need of different data which joins declaration or open key. To decode the outline content, recipient wants components. The main information or is an exceptional non-open security device or some tools associated with the tablet framework. Second one is close to home key or discharge key put away inside the PC. Without having those issues outline message in no way, nature or form decoded. The critical part is the security apparatus lost or stolen, at that point form content can't be decoded and equipment device is rejected out to decode outline fictional matter. The execution and security assessment show that the device is secure not resisted for all reasons and purposes connected. The device makes utilization of another equipment tool. This paper proposes Identity Based and characteristic based encryption approach of distributed storage which might be implementable On cloud stage. The record investigations the attainability of the applying encryption set of arrangements for information security and privacy in distributed storage with all sort of present day calculations.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Two- Factor Data Security Protection

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: SECURE AND EFFICIENT KEYWORD SEARCH IN MULTIPLE CLOUD SERVERS WITH USING PKE & SSE

  Author Name(s): Nagarapu Urmila, P.Prashanth Kumar, A.Ravi Kumar

  Published Paper ID: - IJCRTNCES083

  Register Paper ID - 180593

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRTNCES083 and DOI :

  Author Country : Indian Author, 500075, India , Moinabad, India , | Research Area: Science & Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTNCES083
Published Paper PDF: download.php?file=IJCRTNCES083
Published Paper PDF: http://www.ijcrt.org/papers/IJCRTNCES083.pdf

  Your Paper Publication Details:

  Title: SECURE AND EFFICIENT KEYWORD SEARCH IN MULTIPLE CLOUD SERVERS WITH USING PKE & SSE

 DOI (Digital Object Identifier) :

 Pubished in Volume: 6  | Issue: 1  | Year: December - 2017

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science & Technology

 Author type: Indian Author

 Pubished in Volume: 6

 Issue: 1

 Pages: 478-481

 Year: December - 2017

 Downloads: 2184

  E-ISSN Number: 2320-2882

 Abstract

we explore the security of an outstanding cryptographic primitive, in particular Public Key Encryption with Keyword Search which is exceptionally valuable in numerous uses of distributed storage. Unfortunately, it has been demonstrated that the normal PEKS structure experiences a natural weakness called inside Keyword Guessing Attack forced by the harmful server. Distributed computing, huge scope of clients and measurements administrators are affected to outsource their realities to cloud servers for enormous accommodation and diminished cost required for data administration. In any case, vital actualities should be scrambled sooner than outsourcing for security necessities, which utilizes records use method like catchphrase fundamentally, based record recovery. Accessible encryption is of expanding excitement for ensuring the information insurance in quiet accessible circulated carport. In this paper, we thinks about the security of a remarkable cryptographic primitive, especially, Public Key Encryption with Keyword Search (PEKS) that is very profitable in a few usages of distributed storage. The customary PEKS structure reports an unavoidable precariousness known as inside Brute Force catchword guesses attack moved through the cruel server. To address this security helplessness, we recommend some other PEKS framework named Dual Server PEKS (DS-PEKS). Through this propose framework, we can enhance the security for distributed storage frameworks.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: IMAGE PROCESSING IN DATA MINING BY USING COLOR K-MEANS CLUSTERING

  Author Name(s): KRISHNA MOORTHY, KANNEDARI GOPIKRISHNA, RAMBABU M

  Published Paper ID: - IJCRTNCES082

  Register Paper ID - 180592

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRTNCES082 and DOI :

  Author Country : Indian Author, 500075, India , Moinabad, India , | Research Area: Science & Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTNCES082
Published Paper PDF: download.php?file=IJCRTNCES082
Published Paper PDF: http://www.ijcrt.org/papers/IJCRTNCES082.pdf

  Your Paper Publication Details:

  Title: IMAGE PROCESSING IN DATA MINING BY USING COLOR K-MEANS CLUSTERING

 DOI (Digital Object Identifier) :

 Pubished in Volume: 6  | Issue: 1  | Year: December - 2017

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science & Technology

 Author type: Indian Author

 Pubished in Volume: 6

 Issue: 1

 Pages: 473-477

 Year: December - 2017

 Downloads: 2330

  E-ISSN Number: 2320-2882

 Abstract

Now-a-days people are interested in using digital images. There is a great need for developing an efficient technique for finding an image. Image mining is a vital technique which is used to mine knowledge straight forwardly from image. Image segmentation is the primary phase in image mining. It has been a difficult task in computer vision. The role of image segmentation is to decompose an image into parts that are meaningful with respect to the particular applications. The goal of data mining process is to extract information from a data set and transform it into an understandable structure for further use. The pixel discovery is critical issue for any specialists. In this work a strategy to recognize pixels by utilizing picture preparing methods with incorporates picture pre-handling , picture division, extraction, morphological operations and grouping system is used. Abnormal pixels are identified in filtered image by using marker controlled watershed segmentation and gradient magnitude. This present work proposes a technique to identify the pixel point adequately from the filter pictures. It will minimize blunder made by the human exposed eye. MATLAB is broadly utilized programming for the investigation of data mining identification from filtered pictures. We utilized MATLAB 2017b for building up this anticipate.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

picture identification, Gaussian mixture, watershed transform, morphological functions, L*a*b color based, k-means clustering, Thresholding, MATLAB 2017b

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: ENHANCING THE BUG TOSSING GRAPHS AND CHARACTERISTICS OF BUG SIMILARITIES

  Author Name(s): T.L.N.Varaprasad, Rambabu M

  Published Paper ID: - IJCRTNCES081

  Register Paper ID - 180591

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRTNCES081 and DOI :

  Author Country : Indian Author, 500075, India , Moinabad, India , | Research Area: Science & Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTNCES081
Published Paper PDF: download.php?file=IJCRTNCES081
Published Paper PDF: http://www.ijcrt.org/papers/IJCRTNCES081.pdf

  Your Paper Publication Details:

  Title: ENHANCING THE BUG TOSSING GRAPHS AND CHARACTERISTICS OF BUG SIMILARITIES

 DOI (Digital Object Identifier) :

 Pubished in Volume: 6  | Issue: 1  | Year: December - 2017

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science & Technology

 Author type: Indian Author

 Pubished in Volume: 6

 Issue: 1

 Pages: 467-472

 Year: December - 2017

 Downloads: 2212

  E-ISSN Number: 2320-2882

 Abstract

A bug report is typically assigned to a single developer who is then responsible for fixing the bug. Development a new bug firstly is found by developers or users. Then the bug is described as a bug report, which is submitted to a bug repository. Finally the bug trigger checks the bug report and typically assigns a developer to fix the bug. The assignment process is time-consuming and error-prone. Furthermore, a large number of bug reports are tossed (reassigned) to other developers, which increases bug-fix time. In order to quickly identify the fixer to bug reports we present an approach based on the bug tossing history and textual similarities between bug reports. This proposed approach is evaluated on Eclipse and Mozilla. The results show that our approach can significantly improve the efficiency of bug assignment: the bug fixer is often identified with fewer tossing events.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

bug assignment, bug reports, bug tossing, information retrieval, software engineering

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: A COMPARATIVE STUDY ON BIGDATA WITH DTA MINING AND ITS APPLICATIONS

  Author Name(s): Ganga Patur

  Published Paper ID: - IJCRTNCES080

  Register Paper ID - 180590

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRTNCES080 and DOI :

  Author Country : Indian Author, 500075, India , Moinabad, India , | Research Area: Science & Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTNCES080
Published Paper PDF: download.php?file=IJCRTNCES080
Published Paper PDF: http://www.ijcrt.org/papers/IJCRTNCES080.pdf

  Your Paper Publication Details:

  Title: A COMPARATIVE STUDY ON BIGDATA WITH DTA MINING AND ITS APPLICATIONS

 DOI (Digital Object Identifier) :

 Pubished in Volume: 6  | Issue: 1  | Year: December - 2017

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science & Technology

 Author type: Indian Author

 Pubished in Volume: 6

 Issue: 1

 Pages: 462-466

 Year: December - 2017

 Downloads: 2188

  E-ISSN Number: 2320-2882

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Big data, big data architecture, Data mining issues

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: IMPROVING DATA SECURITY IN AUDIO STEGANOGRAPHY WITH PADDING LSB TECHNIQUES AND AUDIO FILES

  Author Name(s): G.Srikanth, K.Ganesh Kumar, K.Shivangini Reddy, Rambabu M

  Published Paper ID: - IJCRTNCES079

  Register Paper ID - 180589

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRTNCES079 and DOI :

  Author Country : Indian Author, 500075, India , Moinabad, India , | Research Area: Science & Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTNCES079
Published Paper PDF: download.php?file=IJCRTNCES079
Published Paper PDF: http://www.ijcrt.org/papers/IJCRTNCES079.pdf

  Your Paper Publication Details:

  Title: IMPROVING DATA SECURITY IN AUDIO STEGANOGRAPHY WITH PADDING LSB TECHNIQUES AND AUDIO FILES

 DOI (Digital Object Identifier) :

 Pubished in Volume: 6  | Issue: 1  | Year: December - 2017

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science & Technology

 Author type: Indian Author

 Pubished in Volume: 6

 Issue: 1

 Pages: 456-461

 Year: December - 2017

 Downloads: 2200

  E-ISSN Number: 2320-2882

 Abstract

The project entitled Audio Steganography is the application developed to embed an audio file in another audio signal. It is concerned with embedding information in an innocuous cover Speech in a secure and robust manner. This system makes the Files more secure by using the concepts Steganography and Cryptography. Steganography, poor cousin of Cryptography is the art of hiding messages inside other messages such that the very existence of the message is unknown to third party. The goal of cryptography is to make data unreadable by a third party, the goal of stenography is to hide the data from a third party Through the use of advanced computer software, authors of images and software can place a hidden trademark in their product, allowing them to keep a check on piracy. This is commonly known as watermarking. Hiding serial numbers or a set of characters that distinguishes an object from a similar object is known as finger printing. Together, these two are intended to fight piracy. The latter is used to detect copyright violators and the former is used to prosecute them. But these are only examples of the much wider field of stenography.The cover data should not be significantly degraded by the embedded data, and the embedded data should be as imperceptible as possible. The embedded data should be as immune as possible to modifications from intelligent attacks or anticipated manipulations .Thus it is necessary that the hidden message should be encrypted.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Audio Steganography , Padding LSB Techniques

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: DESIGNING OF CONTENT BASED IMAGE RETRIEVAL USING BOTH COLOR AND SHAPE FEATURES

  Author Name(s): Raghu Kumar Lingamallu

  Published Paper ID: - IJCRTNCES078

  Register Paper ID - 180587

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRTNCES078 and DOI :

  Author Country : Indian Author, 500075, India , Moinabad, India , | Research Area: Science & Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTNCES078
Published Paper PDF: download.php?file=IJCRTNCES078
Published Paper PDF: http://www.ijcrt.org/papers/IJCRTNCES078.pdf

  Your Paper Publication Details:

  Title: DESIGNING OF CONTENT BASED IMAGE RETRIEVAL USING BOTH COLOR AND SHAPE FEATURES

 DOI (Digital Object Identifier) :

 Pubished in Volume: 6  | Issue: 1  | Year: December - 2017

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science & Technology

 Author type: Indian Author

 Pubished in Volume: 6

 Issue: 1

 Pages: 451-455

 Year: December - 2017

 Downloads: 2180

  E-ISSN Number: 2320-2882

 Abstract

Content-Based image acts to get back (CBIR) uses the seeing what is in of an image such as color, form, feeling of a material, and spatial general design to represent and list of words in a book the image. action-bound make observations in CBIR is geared in the direction of the development of methodologies for getting at details, interpreting price listing and giving pointer image knowledge-bases. In addition to their development, efforts are also being made to value the operation of image acts to get back systems. The quality of move is heavily dependent on the good quality of the careful way used to produce point gives directions to be taken and likeness measure for comparison of points. In this paper we offered an algorithm which makes into company the more chances of different other algorithms to get well the having no error and doing a play of acts to get back. The having no error of color histogram based matching can be increased by using Color soundness guide (CCV) for coming one after another polish. The rate of motion of form based acts to get back can be gave greater value to by giving thought to as rough form rather than the certain, errorless form. In addition to this a mix of color and form based acts to get back is also included to get well the having no error of the outcome


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CBIR, Shape, Color Coherence Vector, Centroid

  License

Creative Commons Attribution 4.0 and The Open Definition



Call For Paper July 2024
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A Free digital object identifier by DOI.one How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer