The purpose of “Image to Image Encoder†is to hide an image inside another image. Using the LSB method, which facilitates data hiding in an image. It works with JPEG and PNG formats for the cover image and always creates tiff encoded image due to its compression. Least Significant Bit Embeddings LSB are the general steganographic procedure that might be...
Showing posts with label Data Processing. Show all posts
Showing posts with label Data Processing. Show all posts
Tuesday, 29 June 2021
Sunday, 20 June 2021
Predicting the Maintenance of Aircraft Engines using LSTM
Team IJTSRD
June 20, 2021
0
What if apart of aircraft could let you know when the aircraft component needed to be replaced or repaired It can be done with continuous data collection, monitoring, and advanced analytics. In the aviation industry, predictive maintenance promises increased reliability as well as improved supply chain and operational performance. The main goal is to ensure...
Music Genre Classification using Machine Learning
Team IJTSRD
June 20, 2021
0
Music genre classification has been a toughest task in the area of music information retrieval MIR . Classification of genre can be important to clarify some genuine fascinating issues, such as, making songs references, discovering related songs, finding societies who will like that particular song. The inspiration behind the research is to find the appropriate...
Saturday, 19 June 2021
Credit Card Fraud Detection
Team IJTSRD
June 19, 2021
0
Credit card plays a very vital role in todays economy and the usage of credit cards has dramatically increased. Credit card has become one of the most common method of payment for both online and offline as well as for regular purchases of a common man. It is very necessary to distinguish fraudulent credit card transactions by the credit card organizations so...
Friday, 18 June 2021
LSTM Based Sentiment Analysis
Team IJTSRD
June 18, 2021
0
Sentimental analysis is a context based mining of text, which extracts and identify subjective information from a text or sentence provided. Here the main concept is extracting the sentiment of the text using machine learning techniques such as LSTM Long short term memory . This text classification method analyses the incoming text and determines whether the...
Amazon Product Review Sentiment Analysis with Machine Learning
Team IJTSRD
June 18, 2021
0
Users of Amazons online shopping service are allowed to leave feedback for the items they buy. Amazon makes no effort to monitor or limit the scope of these reviews. Although the amount of reviews for various items varies, the reviews provide easily accessible and abundant data for a variety of applications. This paper aims to apply and expand existing natural...
Thursday, 17 June 2021
Prediction of Car Price using Linear Regression
Team IJTSRD
June 17, 2021
0
In this paper, we look at how supervised machine learning techniques can be used to forecast car prices in India. Data from the online marketplace quikr was used to make the predictions. The predictions were made using a variety of methods, including multiple linear regression analysis, Random forest regressor and Randomized search CV. The predictions are then...
Personality Prediction using Logistic Regression
Team IJTSRD
June 17, 2021
0
Human personality has played a significant role in the growth of both individuals and organisations. Using standard questionnaires or reviewing the curriculum vitae are two ways to assess human personality CV .Recruiters used to manually shortlist filter a candidates CV based on their criteria. We present a framework in this paper that automates the eligibility...
Thursday, 8 October 2020
A Deep Analysis on Prevailing Spam Mail Filteration Machine Learning Approaches
Team IJTSRD
October 08, 2020
0
In this work, we have reviewed the issue of spam mail which is a big problem in the area of Internet. The growing size of uncalled mass e mail or spam has produced the requirement of a dependable anti spam filter. Now a days the Machine learning ML proedures are being employed to spontaneously filter the spam e mail in an effective manner. In this work, we have...
Wednesday, 7 October 2020
A Deep Analysis on Prevailing Spam Mail Filteration Machine Learning Approaches
Team IJTSRD
October 07, 2020
0
In this work, we have reviewed the issue of spam mail which is a big problem in the area of Internet. The growing size of uncalled mass e mail or spam has produced the requirement of a dependable anti spam filter. Now a days the Machine learning ML proedures are being employed to spontaneously filter the spam e mail in an effective manner. In this work, we have...
Thursday, 3 September 2020
Diabetes Prediction Model
Team IJTSRD
September 03, 2020
0
My mother has been a diabetic for the last 15 years of her life. I have known the difference between the Fasting and BP sugar levels for a long time. Therefore, when I found a public data set of the diabetes levels against age, blood pressure, and BMI, it got me thinking if I could map the relationship between the multiple factors and figure out how these factors...
Monday, 22 June 2020
Market Index Forecasting Model
Team IJTSRD
June 22, 2020
0
In this paper, I attempt to pull back the curtains from the Stock Market and figure out how the High Value in the stock market is dependent on the Open Value, Low Value, Close Value. Once that has been done, we will attempt to forecast a model of how the market would act over the next few cycles. We will convert that model into a time series and create the...
Saturday, 2 May 2020
Extract the Analyzed Information from Dark Data
Team IJTSRD
May 02, 2020
0
The world is surrounded by data and data, the data may be structured, unstructured, or semi structured every organization generates enormous data daily, only the tip of data is analyzed, and the larger the data is ignored from the utilizable analysis. This paper focuses on a particularly unstructured and bothersome class of data, termed Dark data. Dark data...
Monday, 27 January 2020
Data Analytics Features and Concepts
Team IJTSRD
January 27, 2020
0
Data analytics is a qualitative and quantitative features and process used to enhance the productivity and business gain. Data is extracted and categories identity analyzes behavior data and patterns according to organization requirement. Analytics is an interpretation and communication of meaningful patterns or summary in data. Data integration is a precursor...
Tuesday, 27 August 2019
Key Frame Extraction in Video Stream using Two Stage Method with Colour and Structure
Team IJTSRD
August 27, 2019
0
Key Frame Extraction is the summarization of videos for different applications like video object recognition and classification, video retrieval and archival and surveillance is an active research area in computer vision. In this paper describe a new criterion for well presentative key frames and correspondingly, create a key frame selection algorithm based...
Sunday, 25 August 2019
Application of Fuzzy Analytic Hierarchy Process and TOPSIS Methods for Destination Selection
Team IJTSRD
August 25, 2019
0
Destination selection is one of the most become an extremely popular. Sometimes the terms tourism and tourism are used pejoratively to indicate a shallow interest in the societies or islands that traveler's tour. This system presents the use of fuzzy AHP and TOPSIS for deciding on the selection of destination as like the selection of island. In this system,...
Thursday, 8 August 2019
Pest Classification and Pesticide Recommendation System
Team IJTSRD
August 08, 2019
0
Myanmar is an agricultural country and agriculture constitutes the largest sector of the economy. Recognizing of pests is a vital problem especially for farmers, agricultural researchers, and environmentalists. The proposed system is to classify the types of pest using the CNN model, which is often used when applying deep learning to image processing, and...
Tuesday, 6 August 2019
ANN Based Handwritten Signature Recognition System
Team IJTSRD
August 06, 2019
0
Handwritten Signature Veri cation HSV is an automated method of verifying a signature by capturing features about a signature's shape i.e., static features and the characteristics of how the person signs his her name in real time i.e., dynamic features . This system provides a method of handwritten signature recognition and verification using the shapes of...
Friday, 17 May 2019
The Concept of Cloud Accounting and its Adoption in Bangladesh
Team IJTSRD
May 17, 2019
0
This paper discusses the theoretical concepts behind cloud accounting and its adoption in a developing country like Bangladesh. The field of accounting has improved significantly with the introduction of cloud computing. In cloud accounting, a client outsources the accounting services of the entity using the service of a third party vendor. There are three...
Tuesday, 16 April 2019
Implementation of Combinatorial Algorithms using Optimization Techniques
Team IJTSRD
April 16, 2019
0
In theoretical computer science, combinatorial optimization problems are about finding an optimal item from a finite set of objects. Combinatorial optimization is the process of searching for maxima or minima of an unbiased function whose domain is a discrete and large configuration space. It often involves determining the way to efficiently allocate resources...