SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 10, Issue 6 (June 2014), PP.42-46
42
Parallel string matching for image matching with prime method
Chinta Someswara Rao1
, Dr. S. Viswanadha Raju2
1
Assistant Professor, Dept of CSE, SRKR Engineering College, Bhimavaram, AP, INDIA-534 204.
2
Professor & HOD, Department of CSE, JNTU College of Engineering, JNTU Jagithyal, A.P., INDIA
Abstract:- String matching play the much more attention in the recent days because of its importance in several
areas like retrieval of large text data, image data , mining etc.,. For this purpose, several researchers proposed
solution to these problems, but still there is a scope to develop new techniques, especially in image matching.
For this purpose, in his paper, we have proposed a method for image search based on the prime method. The
adopted method uses a sliding window approach, in this approach each sub image clipped by narrow window is
converted to code vector and these code vectors are used in image matching. Our results showed that this
method performs well in spatially, computationally and efficiently.
Keywords:- String matching, parallel approach, WWW, image searching.
I. INTRODUCTION
String matching is a special case of retrieval, where the pattern is described by a finite sequence of
symbols (or alphabet). It consists of finding one or more generally all the occurrences of a short pattern
P=P[O]P[1]...P[m-1] of length min a large text T=T[O]T[1]..-T[n-1] of length n, where m, n > 0 and m<= n.
Both P and Tare built over the same alphabet. Several experiments on string matching algorithms have already
been reported[1-8]. In this paper, we have proposed a novel method for converting multi dimensional descriptor
into encoded representation. A set of integers has retrieved that can be used as the code for the purpose of sub-
image detection and hence it is called code vector of the sub image.
II. LITERATURE
In the literature we provide the different techniques proposed by several researchers, which will give
the support to develop the new methods.
Terasawa et.al [9] presents a fast appearance-based full-text search method for historical newspaper
images. Since historical newspapers differ from recent newspapers in image quality, type fonts and language
usages, optical character recognition (OCR) does not provide sufficient quality. Instead of OCR approach, we
adopted appearance-based approach, that means we matched character to character with its shapes. Assuming
proper character segmentation and proper feature description, full-text search problem is reduced to sequence
matching problem of feature vector. To increase computational efficiency, we adopted pseudo-code expression
called LSPC, which is a compact sketch of feature vector while retaining a good deal of its information.
Experimental result showed that our method can retrieve a query string from a text of over eight million
characters within a second. In addition, we predict that more sophisticated algorithm could be designed for
LSPC. As an example, we established the Extended Boyer-Moore-Horspool algorithm that can reduce the
computational cost further especially when the query string becomes longer.
Terasawa et.al [10] proposed a novel scheme for representing character string images in the scanned
document. We converted conventional multi-dimensional descriptors into pseudo-codes which have a property
that: if two vectors are near in the original space then encoded pseudo-codes are 'semi equivalent with high
probability. For this conversion, we combined locality sensitive hashing (LSH) indices and at the same time we
also developed a new family of LSH functions that is superior to earlier ones when all vectors are constrained to
lie on the surface of the unit sphere. Word spotting based on our pseudo-code becomes faster than multi-
dimensional descriptor-based method while it scarcely degrades the accuracy.
Tan et.al [11] propose a method for text retrieval from document images without the use of OCR.
Documents are segmented into character objects. Image features, namely the vertical traverse density (VTD)
and horizontal traverse density (HTD), are extracted. An n-gram-based document vector is constructed for each
document based on these features. Text similarity between documents is then measured by calculating the dot
product of the document vectors. Testing with seven corpora of imaged textual documents in English and
Chinese as well as images from the UW1 (University of Washington 1) database confirms the validity of the
proposed method Drira et.al [12] enhancing diffusion filter is proposed for which new constraints formulated
form the Perona-Malik equation are added. The new diffusion filter, driven by local tensors fields, takes benefit
from both of these approaches and avoids problems known to affect them. This filter reinforces character
Parallel string matching for image matching with prime method
43
discontinuity and eliminates the inherent problem of corner rounding while smoothing. Experiments conducted
on degraded document images illustrate the effectiveness of the proposed method compared to another
anisotropic diffusion approaches. A visual quality improvement is thus achieved on these images. Such
improvement leads to a noticeable improvement of the OCR system's accuracy proven through the comparison
of OCR recognition rates before and after the diffusion process.
In this paper, we proposed approach uses code vectors that consist of four values obtained by applying modulo
division using a prime number over each row of the entire small region.
III. METHODOLOGY
The proposed work has been partitioned into several distinct steps:
 Image Segmentation
 Vector Extraction
 Code Generation
 String Searching of the Code.
 Image Matching
Among these steps, (A), (B) and (C) are the preprocessing steps and (D) and (E) are the searching and matching
phases respectively.
In phase (D) vector string is searched into the vector code of the given image and in phase (E) search image
vector is compared to the corresponding portion of the given image vector, if phase (D) has found successfully.
A. Image Segmentation:
First the image is converted into a matrix and then segmentation is done. The segmented image was divided into
small regions, which were used to form vectors, e. g. first segment contain aij for i=1, 2, 3, 4…m and j=1, 2, 3,
4….n where aij is the element of original image matrix.
B. Vector Extraction:
Each segmented image was fed to vector extraction. The method to obtain vectors is as follows: A small matrix
(segmented image) is used to generate the vector. The matrix is recomputed by dividing all of its elements by a
prime number(in our case, the prime number is 101) and then taking the remainder, e.g. aij=remainder of aij/p
for i=1, 2, 3, 4…m, and j=1, 2, 3, 4…n. .And p is the prime number. Now each row of the small matrix will
form one vector.
C. Code Generation:
In this process, each vector is converted into its relevant code. To be more exactly, suppose the segmented
image was divided into small regions, the code vector is generated corresponding to each row of the small
region. This code vector consists of the four values corresponding to the four rows of the small region. These
vector codes are obtained by taking the remainder of sum of the elements of each row vector of the small region.
i.e. if V=[v1, v2, v3, v4…….Vn] is a vector then vi= ﴾Σaij﴿/p for i=1, 2, 3, 4…m and j=1, 2, 3, 4…n. Stores
these code values into an array so that these code values can be further used in searching.
D. String Matching of the Code:
The string matching [14] can be defined as: the text is an array T[1…n] of length n and the pattern is
an array P[1…m] of length m(≤n). We further assume that the elements of P and T are the characters drawn
from a finite alphabet Σ. For example, we may have Σ = {0, 1, 2, 3, 4, 5, 6, 7, 8, 9} or Σ = {a, b, c, d, e, f} etc.
The character arrays P and T are often called strings of characters. All string matching algorithm scan the text
with the help of a window which is equal to the length of the pattern. The first process is to align the left end of
the pattern with the text window and then compares the corresponding characters of the window and the pattern.
This process is known as an attempt. After a whole match or a mismatch of the pattern, the text window is
shifted in the forward direction until the window is positioned at the (n-m+1) position of the text. This approach
is the naive brute-force algorithm. In brute force algorithm, window is shifted to the right by one character after
an attempt. This is the most primitive method of sequential scanning, which check all position in the text T
whether an occurrences of the pattern P starts there or not. This can be implemented in complexity O((n-
m+1)m). We implement it work on our code vectors. Each time the code vector of searching image is compared
against the code vector of a piece of given image, such that the size of the piece of the given image is exactly the
same as the size of the searching image. In case of a mismatch we select next piece of given image whose size is
same as the size of the searching image. In case of a match the control is passes over to next, image matching,
step.
E. Image Matching:
When the code-vector of the searching image is matched with the code-vector of a piece of the given
image, then the searching image matrix is compared to the corresponding portion of the given image matrix, and
Parallel string matching for image matching with prime method
44
each pixel of the searching image is compared with each pixel of the image. If each pixel is matched, then the
portion of the sub-image found, will contain the searching image. This step compares the images only if
previous step successfully passed.
F. Algorithm description
The algorithm makes use of elementary number-theoretic notations such as the equivalence of two
numbers modulo a third number. In our algorithm each character is a decimal number, and compute values by
modulo p(=101), where p is a prime number. The values of the image pixels lie between 0 - 255. There are 54
prime numbers between 0 and 255. And the mid prime number is 103(if lower median is selected). We selected
101 as the value of p, which is near to mid prime number. Since n modulo 101 gives a number between 0 to100,
where n is any integer ϵ [0, 255].
IV. PARALLEL APPROACH
The proposed parallel algorithm makes use of the message-passing parallelism model by using p
processors. The following assumptions for the model of communications in the parallel computer are made. The
parallel computer comprises a number of nodes. Each node comprises one or several identical processors
interconnected by a switched communication network and it is depicted in 1. The links between two nodes are
full-duplex and single-ported. Here the proposed system use the functional decomposition, in which the initial
focus is on the computation that is to be performed rather than on the data manipulated by the computation. It
assumes that both image text t and pattern ρ are stored locally on each processor. This can be done by using a
one-to-all broadcast operation as shown in Fig 1
Fig 1. Parallel approach for extended encoding method
Distribute the partitions to processors
Partition the code, based on the
principle (T/P)+m-1
Processor-I Processor-II Processor-III Processor-IV
Read the source image and search image
YESNO
Search
pattern
Count
occurrences
Reaches the
number
PASS
Found
Searching process
Convert the image into vector code
Parallel string matching for image matching with prime method
45
V. CASE STUDY
The size of the Source image is m-by-n pixels and let the size of the searching image be x-by-y
pixels. The Pre-Processing time and the Matching time of the proposed algorithm are calculated for the variable
size of the search image and the size of the source image is fixed (size=16x16) in case of the source image. The
spurious hits are also calculated for the proposed algorithm, to obtain the accuracy of the proposed algorithm.
The spurious hits are fake code values of the search image that matches with the code values of the source
image, but in actual the search image is not matched within the source image. The results are shown in Table 1
and Table 2. From the fig 2 we clear say that the proposed approach have reaches the require criteria’s.
Table 1 Different image searching analysis
Source image Search image Result
Pass
Pass
pass
Fail
Fail
Table 2 Results of different image searching
Size of the Source
image
Size of the Search
image
Matching
Time
16x16 16x16 0.436
12x12 12x12 0.428
8x8 8x8 0.433
4x4 4x4 0.432
Parallel string matching for image matching with prime method
46
0.424
0.426
0.428
0.43
0.432
0.434
0.436
0.438
16x16 12x12 8x8 4x4
processingtime
image size
Process comparasions
Fig 2 process comparisons
VI. CONCLUSION
In this paper we proposed a novel image searching method for images has proposed with prime
approach. The source and searching image are successfully read and stored. Segmentation is done successfully
and each segment is also converted into code vectors. Parallel string search method is applied successfully and
finally image is compared. The proposed method increases the search speed with exact matching. In future we
will try to apply this approach other sources and downstream applications.
REFERENCES
[1]. Chinta Someswararao, K Butchiraju, S ViswanadhaRaju, “Recent Advancement is Parallel Algorithms
for String matching on computing models - A survey and experimental results”, LNCS,
Springer,pp.270-278, ISBN: 978-3-642-29279-8 ,2011.
[2]. Chinta Someswararao, K Butchiraju, S ViswanadhaRaju, “PDM data classification from STEP- an
object oriented String matching approach”, IEEE conference on Application of Information and
Communication Technologies, pp.1-9, ISBN: 978-1-61284-831-0, 2011.
[3]. Chinta Someswararao, K Butchiraju, S ViswanadhaRaju, “Recent Advancement is Parallel Algorithms
for String matching - A survey and experimental results”, IJAC, Vol 4 issue 4, pp-91-97, 2012.
[4]. Simon Y. and Inayatullah M., “Improving Approximate Matching Capabilities for Meta Map Transfer
Applications,” Proceedings of Symposium on Principles and Practice of Programming in Java, pp.143-
147, 2004.
[5]. Chinta Someswararao, K Butchiraju, S ViswanadhaRaju, “Parallel Algorithms for String Matching
Problem based on Butterfly Model”, pp.41-56, IJCST, Vol. 3, Issue 3, July – Sept, ISSN 2229-4333,
2012.
[6]. Chinta Someswararao, K Butchiraju, S ViswanadhaRaju, “Recent Advancement is String matching
algorithms- A survey and experimental results”, IJCIS,Vol 6 No 3, pp.56-61, 2013.
[7]. Chinta Someswararao, “ Parallel String Matching Problems with Computing Models - An Analysis of
the Most Recent Studies”, International Journal of Computer Applications , Vol.76(15),pp.7-25,
Published by Foundation of Computer Science, New York, USA, 2013.
[8]. Chinta Someswararao, “Parallel String Matching with Multi Core Processors-A Comparative Study for
Gene Sequences”, Global Journal of Computer Science and Technology, Vol-13, Issue-1, pp.27-41,
2013.
[9]. Terasawa, K, “A Fast Appearance-Based Full-Text Search Method for Historical Newspaper Images”,
International Conference on Document Analysis and Recognition (ICDAR), pp. 1379-1383, 2011
[10]. Terasawa, K. , Locality Sensitive Pseudo-Code for Document Images, International Conference on
Document Analysis and Recognition, pp.73-77, 2007.
[11]. Tan, C.L, Imaged document text retrieval without OCR, IEEE Transactions on Pattern Analysis and
Machine Intelligence, pp.838-844, 2002.
[12]. Drira, F , Document Images Restoration by a New Tensor Based Diffusion Process: Application to the
Recognition of Old Printed Documents, International Conference on Document Analysis and
Recognition, pp.321-325, 2009.

Weitere ähnliche Inhalte

Was ist angesagt?

Kernel based similarity estimation and real time tracking of moving
Kernel based similarity estimation and real time tracking of movingKernel based similarity estimation and real time tracking of moving
Kernel based similarity estimation and real time tracking of moving
IAEME Publication
 

Was ist angesagt? (19)

IRJET- Devnagari Text Detection
IRJET- Devnagari Text DetectionIRJET- Devnagari Text Detection
IRJET- Devnagari Text Detection
 
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
 
K2 Algorithm-based Text Detection with An Adaptive Classifier Threshold
K2 Algorithm-based Text Detection with An Adaptive Classifier ThresholdK2 Algorithm-based Text Detection with An Adaptive Classifier Threshold
K2 Algorithm-based Text Detection with An Adaptive Classifier Threshold
 
AN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHMAN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHM
 
A CHINESE CHARACTER RECOGNITION METHOD BASED ON POPULATION MATRIX AND RELATIO...
A CHINESE CHARACTER RECOGNITION METHOD BASED ON POPULATION MATRIX AND RELATIO...A CHINESE CHARACTER RECOGNITION METHOD BASED ON POPULATION MATRIX AND RELATIO...
A CHINESE CHARACTER RECOGNITION METHOD BASED ON POPULATION MATRIX AND RELATIO...
 
ANN Based POS Tagging For Nepali Text
ANN Based POS Tagging For Nepali Text ANN Based POS Tagging For Nepali Text
ANN Based POS Tagging For Nepali Text
 
SCENE TEXT RECOGNITION IN MOBILE APPLICATION BY CHARACTER DESCRIPTOR AND STRU...
SCENE TEXT RECOGNITION IN MOBILE APPLICATION BY CHARACTER DESCRIPTOR AND STRU...SCENE TEXT RECOGNITION IN MOBILE APPLICATION BY CHARACTER DESCRIPTOR AND STRU...
SCENE TEXT RECOGNITION IN MOBILE APPLICATION BY CHARACTER DESCRIPTOR AND STRU...
 
Ay32333339
Ay32333339Ay32333339
Ay32333339
 
Kernel based similarity estimation and real time tracking of moving
Kernel based similarity estimation and real time tracking of movingKernel based similarity estimation and real time tracking of moving
Kernel based similarity estimation and real time tracking of moving
 
Segmentation - based Historical Handwritten Word Spotting using document-spec...
Segmentation - based Historical Handwritten Word Spotting using document-spec...Segmentation - based Historical Handwritten Word Spotting using document-spec...
Segmentation - based Historical Handwritten Word Spotting using document-spec...
 
A smart guidance navigation robot using petri net, database location, and rad...
A smart guidance navigation robot using petri net, database location, and rad...A smart guidance navigation robot using petri net, database location, and rad...
A smart guidance navigation robot using petri net, database location, and rad...
 
IRJET- Finding Dominant Color in the Artistic Painting using Data Mining ...
IRJET-  	  Finding Dominant Color in the Artistic Painting using Data Mining ...IRJET-  	  Finding Dominant Color in the Artistic Painting using Data Mining ...
IRJET- Finding Dominant Color in the Artistic Painting using Data Mining ...
 
Text extraction using document structure features and support vector machines
Text extraction using document structure features and support vector machinesText extraction using document structure features and support vector machines
Text extraction using document structure features and support vector machines
 
Neural netorksmatching
Neural netorksmatchingNeural netorksmatching
Neural netorksmatching
 
Bangla Optical Digits Recognition using Edge Detection Method
Bangla Optical Digits Recognition using Edge Detection MethodBangla Optical Digits Recognition using Edge Detection Method
Bangla Optical Digits Recognition using Edge Detection Method
 
Different Steganography Methods and Performance Analysis
Different Steganography Methods and Performance AnalysisDifferent Steganography Methods and Performance Analysis
Different Steganography Methods and Performance Analysis
 
IRJET- Object Detection using Hausdorff Distance
IRJET-  	  Object Detection using Hausdorff DistanceIRJET-  	  Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff Distance
 
Python Application: Visual Approach of Hopfield Discrete Method for Hiragana ...
Python Application: Visual Approach of Hopfield Discrete Method for Hiragana ...Python Application: Visual Approach of Hopfield Discrete Method for Hiragana ...
Python Application: Visual Approach of Hopfield Discrete Method for Hiragana ...
 
MultiModal Retrieval Image
MultiModal Retrieval ImageMultiModal Retrieval Image
MultiModal Retrieval Image
 

Andere mochten auch

Andere mochten auch (20)

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
H1085863
H1085863H1085863
H1085863
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Design patterns
Design patternsDesign patterns
Design patterns
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
E1062530
E1062530E1062530
E1062530
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
G1054048
G1054048G1054048
G1054048
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 

Ähnlich wie International Journal of Engineering Research and Development

Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdfHandwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
Sachin414679
 
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
neeraj7svp
 
Dominating set based arbitrary oriented bilingual scene text localization
Dominating set based arbitrary oriented bilingual scene text  localizationDominating set based arbitrary oriented bilingual scene text  localization
Dominating set based arbitrary oriented bilingual scene text localization
IJECEIAES
 

Ähnlich wie International Journal of Engineering Research and Development (20)

A1804010105
A1804010105A1804010105
A1804010105
 
C04741319
C04741319C04741319
C04741319
 
One dimensional vector based pattern
One dimensional vector based patternOne dimensional vector based pattern
One dimensional vector based pattern
 
Customized mask region based convolutional neural networks for un-uniformed ...
Customized mask region based convolutional neural networks  for un-uniformed ...Customized mask region based convolutional neural networks  for un-uniformed ...
Customized mask region based convolutional neural networks for un-uniformed ...
 
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
 
Text Extraction of Colour Images using Mathematical Morphology & HAAR Transform
Text Extraction of Colour Images using Mathematical Morphology & HAAR TransformText Extraction of Colour Images using Mathematical Morphology & HAAR Transform
Text Extraction of Colour Images using Mathematical Morphology & HAAR Transform
 
An Application of Pattern matching for Motif Identification
An Application of Pattern matching for Motif IdentificationAn Application of Pattern matching for Motif Identification
An Application of Pattern matching for Motif Identification
 
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdfHandwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
 
Dimensionality Reduction and Feature Selection Methods for Script Identificat...
Dimensionality Reduction and Feature Selection Methods for Script Identificat...Dimensionality Reduction and Feature Selection Methods for Script Identificat...
Dimensionality Reduction and Feature Selection Methods for Script Identificat...
 
TEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCUMENT IMAGES
TEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCUMENT IMAGESTEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCUMENT IMAGES
TEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCUMENT IMAGES
 
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
 
Dominating set based arbitrary oriented bilingual scene text localization
Dominating set based arbitrary oriented bilingual scene text  localizationDominating set based arbitrary oriented bilingual scene text  localization
Dominating set based arbitrary oriented bilingual scene text localization
 
40120140501009
4012014050100940120140501009
40120140501009
 
A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVAL
A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVALA COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVAL
A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVAL
 
A comparative analysis of retrieval techniques in content based image retrieval
A comparative analysis of retrieval techniques in content based image retrievalA comparative analysis of retrieval techniques in content based image retrieval
A comparative analysis of retrieval techniques in content based image retrieval
 
TEXTS CLASSIFICATION WITH THE USAGE OF NEURAL NETWORK BASED ON THE WORD2VEC’S...
TEXTS CLASSIFICATION WITH THE USAGE OF NEURAL NETWORK BASED ON THE WORD2VEC’S...TEXTS CLASSIFICATION WITH THE USAGE OF NEURAL NETWORK BASED ON THE WORD2VEC’S...
TEXTS CLASSIFICATION WITH THE USAGE OF NEURAL NETWORK BASED ON THE WORD2VEC’S...
 
Texts Classification with the usage of Neural Network based on the Word2vec’s...
Texts Classification with the usage of Neural Network based on the Word2vec’s...Texts Classification with the usage of Neural Network based on the Word2vec’s...
Texts Classification with the usage of Neural Network based on the Word2vec’s...
 
Optical Character Recognition from Text Image
Optical Character Recognition from Text ImageOptical Character Recognition from Text Image
Optical Character Recognition from Text Image
 
Scene text recognition in mobile applications by character descriptor and str...
Scene text recognition in mobile applications by character descriptor and str...Scene text recognition in mobile applications by character descriptor and str...
Scene text recognition in mobile applications by character descriptor and str...
 
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
 

Mehr von IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
IJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
IJERD Editor
 

Mehr von IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 10, Issue 6 (June 2014), PP.42-46 42 Parallel string matching for image matching with prime method Chinta Someswara Rao1 , Dr. S. Viswanadha Raju2 1 Assistant Professor, Dept of CSE, SRKR Engineering College, Bhimavaram, AP, INDIA-534 204. 2 Professor & HOD, Department of CSE, JNTU College of Engineering, JNTU Jagithyal, A.P., INDIA Abstract:- String matching play the much more attention in the recent days because of its importance in several areas like retrieval of large text data, image data , mining etc.,. For this purpose, several researchers proposed solution to these problems, but still there is a scope to develop new techniques, especially in image matching. For this purpose, in his paper, we have proposed a method for image search based on the prime method. The adopted method uses a sliding window approach, in this approach each sub image clipped by narrow window is converted to code vector and these code vectors are used in image matching. Our results showed that this method performs well in spatially, computationally and efficiently. Keywords:- String matching, parallel approach, WWW, image searching. I. INTRODUCTION String matching is a special case of retrieval, where the pattern is described by a finite sequence of symbols (or alphabet). It consists of finding one or more generally all the occurrences of a short pattern P=P[O]P[1]...P[m-1] of length min a large text T=T[O]T[1]..-T[n-1] of length n, where m, n > 0 and m<= n. Both P and Tare built over the same alphabet. Several experiments on string matching algorithms have already been reported[1-8]. In this paper, we have proposed a novel method for converting multi dimensional descriptor into encoded representation. A set of integers has retrieved that can be used as the code for the purpose of sub- image detection and hence it is called code vector of the sub image. II. LITERATURE In the literature we provide the different techniques proposed by several researchers, which will give the support to develop the new methods. Terasawa et.al [9] presents a fast appearance-based full-text search method for historical newspaper images. Since historical newspapers differ from recent newspapers in image quality, type fonts and language usages, optical character recognition (OCR) does not provide sufficient quality. Instead of OCR approach, we adopted appearance-based approach, that means we matched character to character with its shapes. Assuming proper character segmentation and proper feature description, full-text search problem is reduced to sequence matching problem of feature vector. To increase computational efficiency, we adopted pseudo-code expression called LSPC, which is a compact sketch of feature vector while retaining a good deal of its information. Experimental result showed that our method can retrieve a query string from a text of over eight million characters within a second. In addition, we predict that more sophisticated algorithm could be designed for LSPC. As an example, we established the Extended Boyer-Moore-Horspool algorithm that can reduce the computational cost further especially when the query string becomes longer. Terasawa et.al [10] proposed a novel scheme for representing character string images in the scanned document. We converted conventional multi-dimensional descriptors into pseudo-codes which have a property that: if two vectors are near in the original space then encoded pseudo-codes are 'semi equivalent with high probability. For this conversion, we combined locality sensitive hashing (LSH) indices and at the same time we also developed a new family of LSH functions that is superior to earlier ones when all vectors are constrained to lie on the surface of the unit sphere. Word spotting based on our pseudo-code becomes faster than multi- dimensional descriptor-based method while it scarcely degrades the accuracy. Tan et.al [11] propose a method for text retrieval from document images without the use of OCR. Documents are segmented into character objects. Image features, namely the vertical traverse density (VTD) and horizontal traverse density (HTD), are extracted. An n-gram-based document vector is constructed for each document based on these features. Text similarity between documents is then measured by calculating the dot product of the document vectors. Testing with seven corpora of imaged textual documents in English and Chinese as well as images from the UW1 (University of Washington 1) database confirms the validity of the proposed method Drira et.al [12] enhancing diffusion filter is proposed for which new constraints formulated form the Perona-Malik equation are added. The new diffusion filter, driven by local tensors fields, takes benefit from both of these approaches and avoids problems known to affect them. This filter reinforces character
  • 2. Parallel string matching for image matching with prime method 43 discontinuity and eliminates the inherent problem of corner rounding while smoothing. Experiments conducted on degraded document images illustrate the effectiveness of the proposed method compared to another anisotropic diffusion approaches. A visual quality improvement is thus achieved on these images. Such improvement leads to a noticeable improvement of the OCR system's accuracy proven through the comparison of OCR recognition rates before and after the diffusion process. In this paper, we proposed approach uses code vectors that consist of four values obtained by applying modulo division using a prime number over each row of the entire small region. III. METHODOLOGY The proposed work has been partitioned into several distinct steps:  Image Segmentation  Vector Extraction  Code Generation  String Searching of the Code.  Image Matching Among these steps, (A), (B) and (C) are the preprocessing steps and (D) and (E) are the searching and matching phases respectively. In phase (D) vector string is searched into the vector code of the given image and in phase (E) search image vector is compared to the corresponding portion of the given image vector, if phase (D) has found successfully. A. Image Segmentation: First the image is converted into a matrix and then segmentation is done. The segmented image was divided into small regions, which were used to form vectors, e. g. first segment contain aij for i=1, 2, 3, 4…m and j=1, 2, 3, 4….n where aij is the element of original image matrix. B. Vector Extraction: Each segmented image was fed to vector extraction. The method to obtain vectors is as follows: A small matrix (segmented image) is used to generate the vector. The matrix is recomputed by dividing all of its elements by a prime number(in our case, the prime number is 101) and then taking the remainder, e.g. aij=remainder of aij/p for i=1, 2, 3, 4…m, and j=1, 2, 3, 4…n. .And p is the prime number. Now each row of the small matrix will form one vector. C. Code Generation: In this process, each vector is converted into its relevant code. To be more exactly, suppose the segmented image was divided into small regions, the code vector is generated corresponding to each row of the small region. This code vector consists of the four values corresponding to the four rows of the small region. These vector codes are obtained by taking the remainder of sum of the elements of each row vector of the small region. i.e. if V=[v1, v2, v3, v4…….Vn] is a vector then vi= ﴾Σaij﴿/p for i=1, 2, 3, 4…m and j=1, 2, 3, 4…n. Stores these code values into an array so that these code values can be further used in searching. D. String Matching of the Code: The string matching [14] can be defined as: the text is an array T[1…n] of length n and the pattern is an array P[1…m] of length m(≤n). We further assume that the elements of P and T are the characters drawn from a finite alphabet Σ. For example, we may have Σ = {0, 1, 2, 3, 4, 5, 6, 7, 8, 9} or Σ = {a, b, c, d, e, f} etc. The character arrays P and T are often called strings of characters. All string matching algorithm scan the text with the help of a window which is equal to the length of the pattern. The first process is to align the left end of the pattern with the text window and then compares the corresponding characters of the window and the pattern. This process is known as an attempt. After a whole match or a mismatch of the pattern, the text window is shifted in the forward direction until the window is positioned at the (n-m+1) position of the text. This approach is the naive brute-force algorithm. In brute force algorithm, window is shifted to the right by one character after an attempt. This is the most primitive method of sequential scanning, which check all position in the text T whether an occurrences of the pattern P starts there or not. This can be implemented in complexity O((n- m+1)m). We implement it work on our code vectors. Each time the code vector of searching image is compared against the code vector of a piece of given image, such that the size of the piece of the given image is exactly the same as the size of the searching image. In case of a mismatch we select next piece of given image whose size is same as the size of the searching image. In case of a match the control is passes over to next, image matching, step. E. Image Matching: When the code-vector of the searching image is matched with the code-vector of a piece of the given image, then the searching image matrix is compared to the corresponding portion of the given image matrix, and
  • 3. Parallel string matching for image matching with prime method 44 each pixel of the searching image is compared with each pixel of the image. If each pixel is matched, then the portion of the sub-image found, will contain the searching image. This step compares the images only if previous step successfully passed. F. Algorithm description The algorithm makes use of elementary number-theoretic notations such as the equivalence of two numbers modulo a third number. In our algorithm each character is a decimal number, and compute values by modulo p(=101), where p is a prime number. The values of the image pixels lie between 0 - 255. There are 54 prime numbers between 0 and 255. And the mid prime number is 103(if lower median is selected). We selected 101 as the value of p, which is near to mid prime number. Since n modulo 101 gives a number between 0 to100, where n is any integer ϵ [0, 255]. IV. PARALLEL APPROACH The proposed parallel algorithm makes use of the message-passing parallelism model by using p processors. The following assumptions for the model of communications in the parallel computer are made. The parallel computer comprises a number of nodes. Each node comprises one or several identical processors interconnected by a switched communication network and it is depicted in 1. The links between two nodes are full-duplex and single-ported. Here the proposed system use the functional decomposition, in which the initial focus is on the computation that is to be performed rather than on the data manipulated by the computation. It assumes that both image text t and pattern ρ are stored locally on each processor. This can be done by using a one-to-all broadcast operation as shown in Fig 1 Fig 1. Parallel approach for extended encoding method Distribute the partitions to processors Partition the code, based on the principle (T/P)+m-1 Processor-I Processor-II Processor-III Processor-IV Read the source image and search image YESNO Search pattern Count occurrences Reaches the number PASS Found Searching process Convert the image into vector code
  • 4. Parallel string matching for image matching with prime method 45 V. CASE STUDY The size of the Source image is m-by-n pixels and let the size of the searching image be x-by-y pixels. The Pre-Processing time and the Matching time of the proposed algorithm are calculated for the variable size of the search image and the size of the source image is fixed (size=16x16) in case of the source image. The spurious hits are also calculated for the proposed algorithm, to obtain the accuracy of the proposed algorithm. The spurious hits are fake code values of the search image that matches with the code values of the source image, but in actual the search image is not matched within the source image. The results are shown in Table 1 and Table 2. From the fig 2 we clear say that the proposed approach have reaches the require criteria’s. Table 1 Different image searching analysis Source image Search image Result Pass Pass pass Fail Fail Table 2 Results of different image searching Size of the Source image Size of the Search image Matching Time 16x16 16x16 0.436 12x12 12x12 0.428 8x8 8x8 0.433 4x4 4x4 0.432
  • 5. Parallel string matching for image matching with prime method 46 0.424 0.426 0.428 0.43 0.432 0.434 0.436 0.438 16x16 12x12 8x8 4x4 processingtime image size Process comparasions Fig 2 process comparisons VI. CONCLUSION In this paper we proposed a novel image searching method for images has proposed with prime approach. The source and searching image are successfully read and stored. Segmentation is done successfully and each segment is also converted into code vectors. Parallel string search method is applied successfully and finally image is compared. The proposed method increases the search speed with exact matching. In future we will try to apply this approach other sources and downstream applications. REFERENCES [1]. Chinta Someswararao, K Butchiraju, S ViswanadhaRaju, “Recent Advancement is Parallel Algorithms for String matching on computing models - A survey and experimental results”, LNCS, Springer,pp.270-278, ISBN: 978-3-642-29279-8 ,2011. [2]. Chinta Someswararao, K Butchiraju, S ViswanadhaRaju, “PDM data classification from STEP- an object oriented String matching approach”, IEEE conference on Application of Information and Communication Technologies, pp.1-9, ISBN: 978-1-61284-831-0, 2011. [3]. Chinta Someswararao, K Butchiraju, S ViswanadhaRaju, “Recent Advancement is Parallel Algorithms for String matching - A survey and experimental results”, IJAC, Vol 4 issue 4, pp-91-97, 2012. [4]. Simon Y. and Inayatullah M., “Improving Approximate Matching Capabilities for Meta Map Transfer Applications,” Proceedings of Symposium on Principles and Practice of Programming in Java, pp.143- 147, 2004. [5]. Chinta Someswararao, K Butchiraju, S ViswanadhaRaju, “Parallel Algorithms for String Matching Problem based on Butterfly Model”, pp.41-56, IJCST, Vol. 3, Issue 3, July – Sept, ISSN 2229-4333, 2012. [6]. Chinta Someswararao, K Butchiraju, S ViswanadhaRaju, “Recent Advancement is String matching algorithms- A survey and experimental results”, IJCIS,Vol 6 No 3, pp.56-61, 2013. [7]. Chinta Someswararao, “ Parallel String Matching Problems with Computing Models - An Analysis of the Most Recent Studies”, International Journal of Computer Applications , Vol.76(15),pp.7-25, Published by Foundation of Computer Science, New York, USA, 2013. [8]. Chinta Someswararao, “Parallel String Matching with Multi Core Processors-A Comparative Study for Gene Sequences”, Global Journal of Computer Science and Technology, Vol-13, Issue-1, pp.27-41, 2013. [9]. Terasawa, K, “A Fast Appearance-Based Full-Text Search Method for Historical Newspaper Images”, International Conference on Document Analysis and Recognition (ICDAR), pp. 1379-1383, 2011 [10]. Terasawa, K. , Locality Sensitive Pseudo-Code for Document Images, International Conference on Document Analysis and Recognition, pp.73-77, 2007. [11]. Tan, C.L, Imaged document text retrieval without OCR, IEEE Transactions on Pattern Analysis and Machine Intelligence, pp.838-844, 2002. [12]. Drira, F , Document Images Restoration by a New Tensor Based Diffusion Process: Application to the Recognition of Old Printed Documents, International Conference on Document Analysis and Recognition, pp.321-325, 2009.