Bangalore University
Department of Computer Science & Applications
Production of digital images from cameras, mobile phones, camcorders, video films and scanned images has increased exponentially in the past decade. Increasing number of digital devices have influenced human to an extent of taking the... more
Semantic analysis is a method of representing knowledge. The goal is to reduce the syntactic structures and provide the meaning. English is a language that is geographically accepted all over the world. This is a boon as English is... more
As websites on the Internet in the Web 2.0 era have become more interactive, there has been an explosion of new user-generated content. The goal of Summarization Pipeline for Online Repositories of Knowledge (SPORK) is to be able to... more
Phonetic analysis is a branch of natural language processing (NLP) which deals with how the sounds are produced when we talk and how words are related to sounds. Applying phonetic analysis to natural language is a challenging task as it... more
Implementing phonetics to Natural language is a Herculean task. The first step for the phonetic implementation is to generate a phonetic dictionary. Phonetic dictionary is very important as it plays a vital role in identifying the... more
India has 22 officially recognized languages: Assamese, Bengali, English, Gujarati, Hindi, Kannada, Kashmiri, Konkani, Malayalam, Manipuri, Marathi, Nepali, Oriya, Punjabi, Sanskrit, Tamil, Telugu, and Urdu. Clearly, India owns the... more
Speaking and writing effectively is probably more important today than never before. Yet while the importance of communication skills increases, many people find it difficult to set about acquiring them. Dictionaries and thesauruses... more
Uninhabited mistakes while writing happens are unstoppable. There are certain common errors that occur during writing such as missing letters, extra letters, disordered letters, and misspelled letters. These kind of common spelling errors... more
For years now, writing efficiently adapts professional, innovative, unique skills with grammatical knowledge being impeccable. The field of linguistic has its conventional importance especially among anthropologists. In this regard, the... more
Security in network is based on cryptography, the science and art of transforming the messages to make them secure and immune to attack. Cryptography is the most important aspect of communications security, where integrity,... more
- by kalai selvi
Security in network is based on cryptography, the science and art of transforming the messages to make them secure and immune to attack. Cryptography is the most important aspect of communications security, where integrity,... more
The greatest threats against computer systems around the world come from the cyberspace in the form of cyber-attacks and the zero-day attack is one of such threats faced by computer systems around the world. A vulnerability in system... more
The greatest threats against computer systems around the world come from the cyberspace in the form of cyber-attacks and the zero-day attack is one of such threats faced by computer systems around the world. A vulnerability in system... more
The obtained images are frequently flawed because of a variety of environmental issues, particularly at night, such as inside illumination, cloudy weather, etc. The dark image has a compressed dynamic range that can be improved in order... more
Digital data including photographs, audio, and video are now readily available because to the development of the Internet. The ease of access to multimedia raises concerns about ownership identification, authentication of content,... more
In this work, we present a novel fuzzy picture segmentation-based watermarking strategy for image copyright protection in the geographical domain. In order to find the best places to hide a watermark, the fuzzy image method uses a... more
Data security has recently become a big concern. Watermarking digital images is viewed as a potential approach for ensuring image data integrity. The existence of various attacks on photos can be detected using watermarking methods. The... more
Digital data including photographs, audio, and video are now readily available because to the development of the Internet. The ease of access to multimedia raises concerns about ownership identification, authentication of content,... more
The obtained images are frequently flawed because of a variety of environmental issues, particularly at night, such as inside illumination, cloudy weather, etc. The dark image has a compressed dynamic range that can be improved in order... more