International Journal of Advanced Trends in Computer Science and Engineering,
Journal Year:
2020,
Volume and Issue:
9(4), P. 5815 - 5820
Published: Aug. 25, 2020
In
recent
years,
steganography
techniques
are
rapidly
developing.In
addition
to
the
outstanding
advantages
of
ability
hide
and
transmit
secret
information,
it
has
a
huge
disadvantage
that
is
being
easily
exploited
by
hackers.This
poses
increasing
serious
threats
challenges
cyber
security.Audio
one
most
difficult
detect
today.Traditional
methods
detecting
can
only
individual
audio
techniques.In
this
paper,
we
propose
method
many
using
machine
learning.
Devanagari
is
an
alphabetic
script
which
used
by
different
Indian
languages
such
as
Marathi,
Hindi,
Konkani
and
Nepali.
This
consists
of
13
vowels,
34
consonants
10
numerals.
Due
to
unconstrained
shape
variation
in
writing
style,
recognizing
handwritten
challenging
task.
paper
proposed
a
system
for
numerals
vowels
Script.
An
Invariant
Moment
Affine
techniques
are
extracting
features
from
samples.
2000
samples
collected
20
people
having
variations
style.
Also,
1250
taken
25
people.
Each
sample
normalized
into
40
×
pixel
size.
As
classification
technique,
Support
Vector
Machine
Fuzzy
Gaussian
Membership
function
applied
identifying
vowels.
These
methods
feature
extraction
produce
more
accurate
results.
Success
rate
99.48%
94.56%
respectively.
Applied Economics,
Journal Year:
2019,
Volume and Issue:
51(49), P. 5345 - 5368
Published: May 20, 2019
Using
a
panel
data
set
covering
six
European
countries
and
119700
firms
(582153
observations)
over
the
period
2008–2013,
we
analyse
cash
flow
sensitivity
of
investment
spending.
As
most
are
not
listed
at
stock
exchanges,
balance
sheet-based
approximation
on
Tobin's
Q
is
used
to
indicate
opportunities.
We
internal
external
liquidity
constraints
their
effect
decisions.
In
literature,
often
indicated
by
simple
accounting-based
items/ratios.
adequacy
priori
indicator,
reflecting
constraints,
crucial,
contribute
in
proposing
more
sophisticated
approach.
estimate
propensities
default
using
adapted
random
forests.
our
descriptive
analysis,
find
strong
evidence
for
u-shape
curve.
However,
after
controlling
opportunities
no
increased
investment,
neither
externally
nor
internally
constrained
firms.
Hence,
results
hint
absence
constraints.
attribute
these
towards
rather
expansionary
monetary
policy
since
financial
crisis.
International Journal of Engineering Applied Sciences and Technology,
Journal Year:
2020,
Volume and Issue:
04(09), P. 116 - 119
Published: Jan. 30, 2020
In
this
paper,
a
brief
introduction
to
Machine
Learning
and
its
Tools
are
studied.In
the
recent
developments,
most
of
learning
tools
more
advanced
efficient.The
various
learn
machine
by
using
training
set,
which
predicts
output
correctly
efficiently.Machine
is
applied
in
different
applications
such
as
Agriculture,
Data
Quality,
Information
Retrieval,
Financial
Market
Analysis
etc..,
we
have
discussed
few
like
Scikit
learn,
Pytorch,
Tensor
flow,
Amazon
Learning,
KNIME,
Rapid
Miner,
Keras,
Shogun
with
features
advantages.
International Journal of Computer Applications,
Journal Year:
2012,
Volume and Issue:
49(12), P. 36 - 41
Published: July 28, 2012
The
three
dimensional
structure
of
proteins
is
useful
to
carry
out
the
biophysical
and
biochemical
functions
in
a
cell.Protein
contact
maps
are
2D
representations
contacts
among
amino
acid
residues
folded
protein
structure.Proteins
compounds
consisting
one
or
more
polypeptides,
facilitating
biological
function.Many
researchers
make
note
way
secondary
structures
clearly
visible
where
helices
seen
as
thick
bands
sheets
orthogonal
diagonal.In
this
paper,
we
explore
several
machine
learning
algorithms
data
driven
construction
classifiers
for
assigning
off
diagonal
maps.A
simple
computationally
inexpensive
algorithm
based
on
triangle
subdivision
method
implemented
extract
twenty
features
from
maps.This
successfully
characterizes
offdiagonal
interactions
map
predicting
specific
folds.NaiveBayes,
J48
REPTree
classification
results
with
Recall
76.38%,
91.66%
80.32%
obtained
respectively.
Journal of Turkish Studies,
Journal Year:
2020,
Volume and Issue:
Volume 15 Issue 2(Volume 15 Issue 2), P. 999 - 1010
Published: Jan. 1, 2020
The
term
machine
learning
refers
to
the
automatic
detection
of
meaningful
patterns
in
data
and
has
become
a
common
tool
almost
every
job
that
requires
obtaining
information
from
large
sets
recent
years.This
ultimately
brought
us
be
surrounded
by
technology
based
on
learning.On
other
hand,
artificial
intelligence
creations
developed
with
deep
methods
are
fed
biased
help
internet
network
restructures
gender
inequality.Feeding
through
situated
knowledge
Internet
inequality.A
method
enables
computers
learn
experience,
understand
world
terms
concepts
hierarchy,
define
each
concept
relation
simpler
concepts,
saves
all
dependencies
intelligences
need
human
beings
guide
them.However,
can
think,
create
exist
guidance
people
have
until
they
autonomous
thinking
development
structure.Epistemological
point
view
theory
feminist
frequently
benefits
is
attempts
know
socially
positioned.The
proxy,
which
provides
circulation
information,
plays
an
active
role
creating
what
about
sex,
class,
race,
ethnicity,
sexual
physical
capacity
limiting
know.The
impact
social
position
epistemic
content
not
only
shapes
our
understanding
world,
but
also
how
it
presented
experience.This
research,
example
Westworld
series,
aims
examine
robots
program
according
norms
service
humans
especially
men,
epistemology
perspective
method.It
demonstrate
modeling
series
causes
consolidation
prejudiced
re-structuring
inequality.
International Journal of Advanced Trends in Computer Science and Engineering,
Journal Year:
2020,
Volume and Issue:
9(4), P. 5815 - 5820
Published: Aug. 25, 2020
In
recent
years,
steganography
techniques
are
rapidly
developing.In
addition
to
the
outstanding
advantages
of
ability
hide
and
transmit
secret
information,
it
has
a
huge
disadvantage
that
is
being
easily
exploited
by
hackers.This
poses
increasing
serious
threats
challenges
cyber
security.Audio
one
most
difficult
detect
today.Traditional
methods
detecting
can
only
individual
audio
techniques.In
this
paper,
we
propose
method
many
using
machine
learning.