Tuesday, August 8, 2023

Top 10 trending AI sites

 

DeepSwap

Deepswap is one of the best ai websites. It is a web-based tool that swaps the faces of two people in a picture or video and uses deep learning techniques to produce convincing and realistic results.

Mightygpt.com

One of the most widely used AI-supported technologies in the world today is ChatGPT. Users have used the chatbot to create essays, poetry, emails, generate code, and other types of writing. Mightygpt.com is a website that uses WhatsApp to deliver the chatgpt functionality right to your smartphone.

.

D-id.com

D-id.com is a website that uses the most recent generative AI algorithms to enable users to quickly animate their photos. One can make talking avatars using the Creative Reality Studio on the website.

Soundful.com

Soundful.com is best to create music. Users can make royalty-free tracks using AI on the website Soundful.com. The platform, according to the business, offers a simple option for anyone hoping to generate music in a short amount of time

Landbot.io

Chatbots have transformed how businesses interact with their vast customer base. In lieu of direct communication with a person representative, these software tools assist businesses with online dialogue via text or text-to-speech

MidJourney AI

An artificial intelligence tool called Midjourney, developed by the independent research facility Midjourney, generates visuals from textual descriptions, much like OpenAI’s DALL-E and Stable Diffusion.

Supermeme.ai

Memes have evolved into a language in itself. Supermeme.ai is a website through which users can express their ideas while an AI engine generates original memes.

Glasp

Glasp is a free Chrome Extension. With the aid of various highlighting options, it enables you to swiftly record internet information, which is then immediately curated to your Glasp homepage.


CodeFormer

CodeFormer is a face image restoration model that takes low quality images of faces and forecast what the code for that face would be. This makes it possible to find natural faces even with substantially degraded inputs that closely resemble the target faces.

WatermarkRemover.io

WatermarkRemover.io is an AI-powered tool that automatically removes translucent watermarks from images in a matter of seconds.

Etc.....


Does Fixed matches exist ?

person who sells fix match is one who not only have matches that their outcomes had been determined, they themselves go all out to fix a match for the sole reason of not losing a bet. But actually, they usually do not have the intention of selling the games. They eventually do to a small number of people at a huge fee. One who sells real fix match does not do free trial or payment after winning with their games, they do not enquire about your personal life or financial status. Dealing with a real seller can be stressful, from my experience in dealing with a real fix match seller in vladislavnunez, I can tell you their mode of operation is very strict and not comfortable at all but when you look at the financial benefit of it, you’ll realise it does really worth the hassle. I get games through the gmail of my source and I have no reason to complain despite his uncomfortable rules. He use to be part of the gang of a now jailed Croatian manager Zoran Mami. Winning has been 100% since I’ve been buying his games. I hope you’ll found a real seller one day and not the fake ones. Goodluck to you

Tips to remove or unhide the Hidden text of painted or marked region of screenshot or photoes??


Revealing Hidden Text

 If you have a screenshot with hidden or painted text and you want to reveal it, you can try the following steps:


Use Image Editing Software:- Open the screenshot in an image editing software like Photoshop, GIMP, or any other tool that allows you to manipulate images. Look for tools that can remove or modify parts of the image.


Selection and Erasing:-  Use the selection tool to carefully select the area with hidden text and then use the eraser tool to remove the painted area. This might require some precision to avoid damaging the surrounding content.


Color Correction:- Sometimes, hidden text is painted with the same color as the background. If that's the case, try using the color correction tools in your image editing software to adjust the color balance and reveal the hidden text.


Enhance Contrast:-  Use tools to enhance contrast, brightness, and exposure in the area where the text is hidden. This might help bring out any faintly visible text.


Reverse Filters:- Some image editing software have filters or effects that might reverse the effects of hiding or painting text. Look for options like "Unsharp Mask," "Dehaze," or similar effects that can reveal hidden content.


Remember that the success of these steps depends on the quality of the screenshot, the type of hiding technique used, and your skills with image editing software. If the text was hidden using advanced techniques, it might be challenging to fully reveal it.

Tuesday, May 29, 2018

How to write report ?


EVEREST ENGINEERING AND MANAGEMENT COLLEGE
(AFFILIATED TO POKHARA UNIVERSITY)
SANEPA-2, LALITPUR





A MINOR PROJECT MID-TERM REPORT ON
  “ATM MACHINE”



SUBMITTED BY
                                                      ANGEL BISTA                       [18120006]
                                                      ANISHA BASNET                  [                 ]
                                                      BASANTA POUDEL              [                 ]     
                                                      PRAYASH SHRESTHA         [                 ]

SUBMITTED TO
DEPARTMENT OF ENGINEERING
EVEREST ENGINEERING AND MANAGEMENT COLLEGE
SANEPA-2, LALITPUR NEPAL




JUNE,2018


                                           ATM MACHINE

Submitted by
                                                 ANGEL BISTA                    [ 18120006  ]
                                                ANISHA BASNET              [                    ]
                                                BASANTA POUDEL          [                   ]
                                                PRAYASH SHRESTHA     [                   ]

Under the Supervision of
                                                                      Er. RANJAN ADHIKARI
                                                                      (POST)


A MINOR PROJECT SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE DEGREE OF BACHELOR IN ENGINEERING IN INFORMATION TECHNOLOGY


Submitted to
Department Of Electronics and Computer Engineering
Everest Engineering and Management College
Sanepa, Kathamandu




JUNE,2018







SUPERVISOR’S RECOMMENDATION



  
I hereby recommend that this project prepared under my supervision by xyz1, xyz2  entitled “VENUE SELECTION SYSTEM” in partial fulfillment of the requirements for the degree of Bachelor of Computer Engineering  be processed for the evaluation.      







…………………………………………
Er. Mohan Bhandari / Er. Ranjan Adhikari / Er. Saroj Maharjan
Faculty of Computer Engineering
Everest Engineering College


////to be printed in college letter head


 

LETTER OF APPROVAL




This is to certify that this project prepared by xyz1, xyz2 entitled “VENUE SELECTION SYSTEM” in partial fulfillment of the requirements for the degree of Bachelor of Computer Engineering has been well studied.
In our opinion it is satisfactory in the scope and quality as a project for the required degree.


…………………………………                                          ………………………………
Er. Nabin Thapa                                                                     Er. Mohan Bhandari
Head of Department                                                              Supervisor
                                                                       

                                   



 

ABSTRACT


This report attempts to understand the design of an Automated Teller Machine (ATM) system, a device used by bank customers to process account transactions. Typically, a user inserts into the ATM a special plastic card that is encoded with information on a magnetic strip. The strip contains an identification code that is transmitted to the bank's central computer by modem. To prevent unauthorized transactions, a personal identification number (PIN) must also be entered by the user using a keypad. The computer then permits the ATM to complete the transaction; most machines can dispense cash, accept deposits, transfer funds, and provide information on account balances. Banks have formed cooperative, nationwide networks so that a customer of one bank can use an ATM of another for cash access. Some ATMs will also accept credit cards for cash advances. The first ATM was installed in 1969 by Chemical Bank at its branch in Rockville Centre, New York. A customer using a coded card was dispensed a package containing a set sum of money.

Keywords(                  )



                                                ACKNOWLEDGEMENT
We have taken effort in this project. However, it would not have been possible without the help and support of many individual and organization. We would like to extend our sincere thanks to all of them.
We would like to express our deepest sense of gratitude and sincere thanks to our highly respected and esteemed guide Er. Mohan Bhandari for his valuable guidance, encouragement and help for supporting the work. His useful suggestion for this work and co-operative behavior are sincerely acknowledged.
We are highly indebted to EEMC relevant to the project & also creating friendly environment to the success of our project. We are also appreciative of the effort of HOD sir, Er. Nabin Thapa for supporting us throughout this project. We also extend our gratitude to Er. Saroj Maharjan for his support.
We would also like to appreciate the help of various venue for providing us essential data required for our project as well as their time in guiding us so as to how our project will be more effective in user's prospective. 
We are also grateful to our teachers for their constant support and guidance.
At the end we would like to express our sincere thanks to all the friends and others who helped us directly or indirectly during this project work.


ANGEL BISTA                     [                     ]
ANISHA BASNET                [                     ]
BASANTA POUDEL            [                     ]
PRAYASH SHRESTHA        [                     ]

 
                                                                                                           
                                                           
Table of Contents


























List of Figures
// List all the figures
FIGURE                                                                                PAGE
Figure 1.1: --------------------------------------------------------------------------          –----------2
Figure 1.2: ------------------------------------------------------------------------------------- 3
Figure 2.1: -----------------------------------------------------------------------------7
























List of Tables
//List All the Tables
TABLE                                                                                  PAGE
Table 1.1: --------------------------------------------------------------------------           –----------2
Table 1.2: ------------------------------------------------------------------------------------          3
Table 2.1: -----------------------------------------------------------------------------7















Abbreviation


//List the abbreviation in ascending order,  used in your project
CSS     = Cascading Style Sheets
ERD    = Entity Relationship Diagram
HTML = Hyper Text Markup Language






Chapter 1: Introduction


1.1. Problem Definition


// Explain the difficulties that are faced and why you need to develop the project

In the past, people obtained suggestions for venues from friends or other conventional sources or sites. Although this method is straightforward and user-friendly, it has some severe limitations. First, the recommendations from friends or other common people are limited to those places they have visited before. Thus, the user is not able to gain information about places less visited by their friends. Besides that, there is a chance of users not liking the place recommended by their friends.
Second, the information provided by the site can often be biased; thus the information provided cannot always consider being accurate.
Even though user may be able to hold the event, they may feel unsatisfied about the services provided about catering, event decorations, audio-video aids, lighting etc.

1.2  Objective

// Explain the object of your project… explain why need to develop this.
The Objective of our project are:
1.        To develop a application to facilitate customers get information about various venues.
2.       To help customer to choose appropriate party venue as per their budget to hold an event.
3.       To recommend one of the appropriate venue as per the customers specifications.

1.3. Scope

            // Explain the scope of your Project
1.    Our project will help customers to get information about party venues.
2.    Helps in comparison and contrast party venues attributes.
3.    Helps customers to decide appropriate venue as per their budget.

Chapter 2: Requirement study and Analysis

2.1 Literature Review

// Explain about what you learned when going through the documentation of related works ands papers
Andrew Keen, author of The Cult of the Amateur wrote in his book, “How the Democratization of the Digital World is Assaulting Our Economy, Our Culture, and Our Values” that, the history of the web so far says that we are highly motivated to come up with ways to make sense of a world richer and more interesting than the constrained resources of the traditional media let on. True indeed, with the rapid growth and development of the Internet, sharing of knowledge, information and opinions became more comfortable. This increase has played a vital role in the development of social networking sites like Facebook, Twitter, and YouTube, etc. The growth of the internet, especially after web 2.0 has brought a lot of exposure for the business, armature artists, writers, etc. Now, authors can share their works with thousands of readers around the world. Amateur-musicians can get famous faster than ever before just to uploading their tracks. The business community has found more customers and profit from the internet. The variety of online shops, auctions or flea markets opened up on the web [1]. // here [1] states that the context is taken from reference 1. This is the method for showing the references.
Nevertheless, the popularity of WWW has introduced a new problem i.e. the amount of information and items got extremely huge, leading to information overload. The Web is a vast collection of completely uncontrolled heterogeneous documents. There are tremendous amounts of information on the internet which often becomes overwhelming for the user, and can be difficult for them to find the exact information they are searching for [2].
Recommender systems are tools used for filtering and sorting items and information. They are efficient tools that overcome the information overload, by providing users with the most relevant information by their interest. These systems are usually based on the user preference and rating. The ratings can either be acquired explicitly by filling up form, providing ratings or implicitly. Since the goal of a recommender system is to generate a meaningful recommendation to a group of users, the blueprint of the system depends on upon the domain and particular characteristics of data available. Additionally, the system may have access to user-specific and item-specific profile attributes such as demographics and product descriptions respectively.
Recommender systems differ in the way they analyze these data sources to develop notions of affinity between users and items which can be used to identify well-matched pairs [3].
There are various approaches used in recommender systems. The most common procedures used for recommender system are content based filtering and collaborative filtering. 

2.2 Related Works

// List the related works to your project
Recommender system has been widely used in recent days, especially in the field of ecommerce. Listed below are some of the popular application based which uses recommendation algorithm.  

2.2.1 Amazon

Amazon.com is the largest internet- based retailer of US. It uses recommendations as a targeted marketing tool in many email campaigns and on most of its websites’ pages. Clicking on “Your Recommendations” link clients are directed to a page where they can filter their recommendations by product line and subject area, rate recommended products and rate their previous purchase. Our shopping cart recommendations offer product suggestions to the clients based on the items in their shopping cart [1].

//You can list many related to your project

2.3 Requirement study and Analysis

// Explain the requirement  that you researched to your project
The requirements are the major part in the system development. Once the requirements are collected they determine the structure, functionalities and operational constraints of the system. The requirements are hard to determine due to their dynamic and dependent nature. During system development the requirements may change by the system user. One requirement may depend on another requirement thus making changes to lower requirement leads to change of upper requirements and vice-versa.

2.4 Feasibility study

2.4.1 Technical feasibility

// focus on gaining an understanding of the present technical resources of the organization and their applicability to the expected needs of the proposed system. It is an evaluation of the hardware and software and how it meets the need of the proposed system
The application uses HTML to display content in the browser, CSS to beautify the HTML content, and jQuery is used for making the web page interactive. At the server side, it uses C# to implement the logic, ASP.NET framework for dynamic web page generation and to display the predicted result in the browser as well as to handle page requests. It requires a server, client, and internet connection to function properly. It supports Windows platform for its operation. All of the technology required by the application are available and can be accessed freely, hence it was determined technically feasible.  The system is supported by all kind of web browsers.

2.4.2 Economical feasibility

// explain about your cost and explain if your client financial afford it or not, how?
The system is economically feasible. It only requires Internet Access. There is no any cost associated for using the system.

2.4.3 Operational feasibility

// Explain how well a proposed system solves the problems, and takes advantage of the opportunities identified during scope definition and how it satisfies the requirements identified in the requirements analysis phase of system development.
……………..








Chapter 3: System Design


3.1 Design

Designing is the most important phase of software development. It requires a careful planning and thinking on the part of the system designer. Designing software means to plan how the various parts of the software are going to achieve the desired goal. It should be done with utmost care because if the phase contains any error then that will affect the performance of the system, as a result it may take more processing time, more response time, extra workload, etc.

3.2 System Algorithm

3.2.1 Algorithm 1

            // write your algorithm here

3.2 System Diagram

3.2.1 Flowchart 1

// Draw your flow charts here


 
3.2.3 Context diagram

// Click here to learn more about Context Diagram
Figure 1 : Context diagram of Venue Selection System

Chapter 4: Implementation

4.1 Application  

       Since this project named as Contact Management

4.2 Gantt Chart

// Click here for gantt chart

4.3 Tools Used

// list and describe the software tools that you have used in your project

4.4 Description of main modules 

// describe your main modules of your project

 






 




 

 








                                               Chapter 5: Testing

Testing is performed at every phase of the SDLC.  It helps to determine whether an input given to the system provides correct output or not. It mainly ensures that the system performs as planned. Following are some of the test carried out in this project.
//Explain how you tested your project and the snap shot of your results

























Chapter 6: Limitation


// List what your project lacks and cannot do

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Chapter 7: Conclusion and future work

7.1 Conclusion

// Explain about the project conclusion you have found (about its hindrances on developing, its advantages and how it is effective)

 

7.2 Future work

// List what you are planning to include in your project to make it better
Our future work includes following:
1.    SMS notification
2.    Online financial transaction


 












 



Appendix

Appendix 1: Pseudo code

// Place the key C codes of your project

Appendix 2: Snapshot

Figure 2 : Login

// you can have many of your snapshot

 

 

 

 

 

 

 


 


 

References

// list the papers and important websites that you have taken for support in IEEE format. Click here
for more details.
[1]. D. Asanov(2011) ‘Algorithms and Methods in Recommender System’,pp.2-5.
[2]. S.B Larry Page (1994) ‘The Anatomy of a Large-Scale Hyper-textual Web Search Engine’.