Skip to main content
Production of digital images from cameras, mobile phones, camcorders, video films and scanned images has increased exponentially in the past decade. Increasing number of digital devices have influenced human to an extent of taking the... more
    • by 
    • Data Mining
Semantic analysis is a method of representing knowledge. The goal is to reduce the syntactic structures and provide the meaning. English is a language that is geographically accepted all over the world. This is a boon as English is... more
    • by 
    • Data Mining
As websites on the Internet in the Web 2.0 era have become more interactive, there has been an explosion of new user-generated content. The goal of Summarization Pipeline for Online Repositories of Knowledge (SPORK) is to be able to... more
    • by 
    • Data Mining
Phonetic analysis is a branch of natural language processing (NLP) which deals with how the sounds are produced when we talk and how words are related to sounds. Applying phonetic analysis to natural language is a challenging task as it... more
    • by 
    • Data Mining
Implementing phonetics to Natural language is a Herculean task. The first step for the phonetic implementation is to generate a phonetic dictionary. Phonetic dictionary is very important as it plays a vital role in identifying the... more
    • by 
    • Big Data / Analytics / Data Mining
India has 22 officially recognized languages: Assamese, Bengali, English, Gujarati, Hindi, Kannada, Kashmiri, Konkani, Malayalam, Manipuri, Marathi, Nepali, Oriya, Punjabi, Sanskrit, Tamil, Telugu, and Urdu. Clearly, India owns the... more
    • by 
    • Data mining (Data Analysis)
Speaking and writing effectively is probably more important today than never before. Yet while the importance of communication skills increases, many people find it difficult to set about acquiring them. Dictionaries and thesauruses... more
    • by 
    • Data Mining
    • by 
    • Data Mining
Uninhabited mistakes while writing happens are unstoppable. There are certain common errors that occur during writing such as missing letters, extra letters, disordered letters, and misspelled letters. These kind of common spelling errors... more
    • by 
    • Data Mining
For years now, writing efficiently adapts professional, innovative, unique skills with grammatical knowledge being impeccable. The field of linguistic has its conventional importance especially among anthropologists. In this regard, the... more
    • by 
    • Data Mining
Security in network is based on cryptography, the science and art of transforming the messages to make them secure and immune to attack. Cryptography is the most important aspect of communications security, where integrity,... more
    • by 
Security in network is based on cryptography, the science and art of transforming the messages to make them secure and immune to attack. Cryptography is the most important aspect of communications security, where integrity,... more
    • by 
    • Cyber Security
The greatest threats against computer systems around the world come from the cyberspace in the form of cyber-attacks and the zero-day attack is one of such threats faced by computer systems around the world. A vulnerability in system... more
    • by 
    •   2  
      Cyber SecurityZero day attack detection
The greatest threats against computer systems around the world come from the cyberspace in the form of cyber-attacks and the zero-day attack is one of such threats faced by computer systems around the world. A vulnerability in system... more
    • by 
    •   2  
      Cyber SecurityZero day attack detection
The obtained images are frequently flawed because of a variety of environmental issues, particularly at night, such as inside illumination, cloudy weather, etc. The dark image has a compressed dynamic range that can be improved in order... more
    • by 
    •   10  
      Image ProcessingWatermarkingDigital Image CorrelationDigital Watermarking
Digital data including photographs, audio, and video are now readily available because to the development of the Internet. The ease of access to multimedia raises concerns about ownership identification, authentication of content,... more
    • by 
    •   10  
      Image ProcessingDigital Image CorrelationDigital Image ProcessingDigital Signal and Image Processing
In this work, we present a novel fuzzy picture segmentation-based watermarking strategy for image copyright protection in the geographical domain. In order to find the best places to hide a watermark, the fuzzy image method uses a... more
    • by 
    •   14  
      Sound and ImageImage ProcessingFuzzy LogicData Compression
Data security has recently become a big concern. Watermarking digital images is viewed as a potential approach for ensuring image data integrity. The existence of various attacks on photos can be detected using watermarking methods. The... more
    • by 
    •   8  
      Image ProcessingImage AnalysisWatermarkingDigital Watermarking
Digital data including photographs, audio, and video are now readily available because to the development of the Internet. The ease of access to multimedia raises concerns about ownership identification, authentication of content,... more
    • by 
    •   14  
      Computer ScienceImage ProcessingDigital Image CorrelationDigital Watermarking
The obtained images are frequently flawed because of a variety of environmental issues, particularly at night, such as inside illumination, cloudy weather, etc. The dark image has a compressed dynamic range that can be improved in order... more
    • by 
    •   16  
      Computer ScienceArtificial IntelligenceComputer VisionImage Processing