Detecting Audio Steganography using Machine Learning DOI Open Access

Lai Van Duong

International Journal of Advanced Trends in Computer Science and Engineering, Journal Year: 2020, Volume and Issue: 9(4), P. 5815 - 5820

Published: Aug. 25, 2020

In recent years, steganography techniques are rapidly developing.In addition to the outstanding advantages of ability hide and transmit secret information, it has a huge disadvantage that is being easily exploited by hackers.This poses increasing serious threats challenges cyber security.Audio one most difficult detect today.Traditional methods detecting can only individual audio techniques.In this paper, we propose method many using machine learning.

Language: Английский

Knowledge Discovery Using Bayesian Network Framework for Intelligent Telecommunication Network Management DOI
Abul Bashar, Gerard Parr, Sally McClean

et al.

Lecture notes in computer science, Journal Year: 2010, Volume and Issue: unknown, P. 518 - 529

Published: Jan. 1, 2010

Language: Английский

Citations

8

Handwritten Devanagari numeral and vowel recognition using invariant moments DOI
Sanjay S. Gharde, R. J. Ramteke, Vijay A. Kotkar

et al.

Published: Dec. 1, 2016

Devanagari is an alphabetic script which used by different Indian languages such as Marathi, Hindi, Konkani and Nepali. This consists of 13 vowels, 34 consonants 10 numerals. Due to unconstrained shape variation in writing style, recognizing handwritten challenging task. paper proposed a system for numerals vowels Script. An Invariant Moment Affine techniques are extracting features from samples. 2000 samples collected 20 people having variations style. Also, 1250 taken 25 people. Each sample normalized into 40 × pixel size. As classification technique, Support Vector Machine Fuzzy Gaussian Membership function applied identifying vowels. These methods feature extraction produce more accurate results. Success rate 99.48% 94.56% respectively.

Language: Английский

Citations

6

Investment, default propensity score and cash flow sensitivity in six EU member states: evidence based on firm-level panel data DOI
Andreas Behr,

Christoph Schiwy,

Jurij Weinblat

et al.

Applied Economics, Journal Year: 2019, Volume and Issue: 51(49), P. 5345 - 5368

Published: May 20, 2019

Using a panel data set covering six European countries and 119700 firms (582153 observations) over the period 2008–2013, we analyse cash flow sensitivity of investment spending. As most are not listed at stock exchanges, balance sheet-based approximation on Tobin's Q is used to indicate opportunities. We internal external liquidity constraints their effect decisions. In literature, often indicated by simple accounting-based items/ratios. adequacy priori indicator, reflecting constraints, crucial, contribute in proposing more sophisticated approach. estimate propensities default using adapted random forests. our descriptive analysis, find strong evidence for u-shape curve. However, after controlling opportunities no increased investment, neither externally nor internally constrained firms. Hence, results hint absence constraints. attribute these towards rather expansionary monetary policy since financial crisis.

Language: Английский

Citations

5

A SURVEY ON TOOLS USED FOR MACHINE LEARNING DOI Open Access

S. Veena,

T Shankari,

S. Sowmiya

et al.

International Journal of Engineering Applied Sciences and Technology, Journal Year: 2020, Volume and Issue: 04(09), P. 116 - 119

Published: Jan. 30, 2020

In this paper, a brief introduction to Machine Learning and its Tools are studied.In the recent developments, most of learning tools more advanced efficient.The various learn machine by using training set, which predicts output correctly efficiently.Machine is applied in different applications such as Agriculture, Data Quality, Information Retrieval, Financial Market Analysis etc.., we have discussed few like Scikit learn, Pytorch, Tensor flow, Amazon Learning, KNIME, Rapid Miner, Keras, Shogun with features advantages.

Language: Английский

Citations

3

Mining Dense Patterns from Off Diagonal Protein Contact Maps DOI Open Access

M. OmSwaroopa,

K. Vani

International Journal of Computer Applications, Journal Year: 2012, Volume and Issue: 49(12), P. 36 - 41

Published: July 28, 2012

The three dimensional structure of proteins is useful to carry out the biophysical and biochemical functions in a cell.Protein contact maps are 2D representations contacts among amino acid residues folded protein structure.Proteins compounds consisting one or more polypeptides, facilitating biological function.Many researchers make note way secondary structures clearly visible where helices seen as thick bands sheets orthogonal diagonal.In this paper, we explore several machine learning algorithms data driven construction classifiers for assigning off diagonal maps.A simple computationally inexpensive algorithm based on triangle subdivision method implemented extract twenty features from maps.This successfully characterizes offdiagonal interactions map predicting specific folds.NaiveBayes, J48 REPTree classification results with Recall 76.38%, 91.66% 80.32% obtained respectively.

Language: Английский

Citations

2

A Rough Neurocomputing Approach for Illumination Invariant Face Recognition System DOI

Singh Kavita,

Zaveri Mukesh,

Raghuwanshi Mukesh

et al.

Lecture notes in computer science, Journal Year: 2014, Volume and Issue: unknown, P. 34 - 51

Published: Jan. 1, 2014

Language: Английский

Citations

0

Fraud Detection Model Based on the Discovery Symbolic Classification Rules Extracted from a Neural Network DOI

Wilfredy Santamaría Ruíz,

Elizabeth León Guzmán

Lecture notes in computer science, Journal Year: 2010, Volume and Issue: unknown, P. 290 - 302

Published: Jan. 1, 2010

Language: Английский

Citations

0

Westworld Dizisinde Makine Öğrenmesi: Cinsiyet Eşitsizliğini Yeniden Üreten Yapay Zekâ Yaratımlar DOI Open Access

Selen GÖKÇEM AKYILDIZ- Yavuz AKYILDIZ

Journal of Turkish Studies, Journal Year: 2020, Volume and Issue: Volume 15 Issue 2(Volume 15 Issue 2), P. 999 - 1010

Published: Jan. 1, 2020

The term machine learning refers to the automatic detection of meaningful patterns in data and has become a common tool almost every job that requires obtaining information from large sets recent years.This ultimately brought us be surrounded by technology based on learning.On other hand, artificial intelligence creations developed with deep methods are fed biased help internet network restructures gender inequality.Feeding through situated knowledge Internet inequality.A method enables computers learn experience, understand world terms concepts hierarchy, define each concept relation simpler concepts, saves all dependencies intelligences need human beings guide them.However, can think, create exist guidance people have until they autonomous thinking development structure.Epistemological point view theory feminist frequently benefits is attempts know socially positioned.The proxy, which provides circulation information, plays an active role creating what about sex, class, race, ethnicity, sexual physical capacity limiting know.The impact social position epistemic content not only shapes our understanding world, but also how it presented experience.This research, example Westworld series, aims examine robots program according norms service humans especially men, epistemology perspective method.It demonstrate modeling series causes consolidation prejudiced re-structuring inequality.

Language: Английский

Citations

0

Detecting Audio Steganography using Machine Learning DOI Open Access

Lai Van Duong

International Journal of Advanced Trends in Computer Science and Engineering, Journal Year: 2020, Volume and Issue: 9(4), P. 5815 - 5820

Published: Aug. 25, 2020

In recent years, steganography techniques are rapidly developing.In addition to the outstanding advantages of ability hide and transmit secret information, it has a huge disadvantage that is being easily exploited by hackers.This poses increasing serious threats challenges cyber security.Audio one most difficult detect today.Traditional methods detecting can only individual audio techniques.In this paper, we propose method many using machine learning.

Language: Английский

Citations

0