IEEE PAPER 2020, ENGINEERING RESEARCH FREE DOWNLOAD
COMPUTER SCIENCE-CSE-2020 SOFTWARE ENGINEERING
augmented reality 2020
Use of Augmented Reality in Reconstructive Microsurgery: A Systematic Review and Development of the Augmented Reality Microsurgery Scorefree downloadIntroduction Augmented reality (AR) uses a set of technologies that overlays digital information into the real world, giving the user access to both digital and real-world environments in congruity. AR be specifically fruitful in reconstructive microsurgery due
quantum computing 2020
Towards exploring the potential of alternative quantum computing architectures free downloadThe recent advances in the physical realization of Noisy Intermediate Scale Quantum (NISQ) computers have motivated research on design automation that allows users to execute quantum algorithms on them. Certain physical constraints in the architectures restrict how Realizing Quantum Algorithms on Real Quantum Computing Devicesfree downloadQuantum
deep learning technology 2020
Deep Learning refers to the circumstance that we derive the output for our input by passing it through multiple layers / a hierarchy of transformations (i.e., we go through some depth of transforms), instead of having a single, linear formula that tells us the output value directly. Deep learning is a machine learning technique that
web security 2020
Web security is important to keeping hackers and cyber-thieves from accessing sensitive information. Without a proactive security strategy, businesses risk the spread and escalation of malware, attacks on other websites, networks, and other IT infrastructures. injection and authentication flaws, XSS, insecure direct object references, security misconfiguration, sensitive data exposure, a lack of function-level authorization, CSRF,
machine translation 2020
Machine Translation is software that automatically renders text from one language into another. A key benefit of RBMT over other MT approaches is that it can produce better quality for language pairs with very different word orders Neural Machine Translation with Joint Representationfree download Though early successes of Statistical Machine Translation (SMT) systems are attributed
natural language processing 2020
Natural language processing involves the reading and understanding of spoken or written language through the medium of a computer. This includes, for example, the automatic translation of one language into another, but also spoken word recognition, or the automatic answering of questions Gluoncv and gluonnlp: Deep learning in computer vision and natural language processing free
quantum technologies-2020
Quantum technologies are often described as the second quantum revolution’ or quantum 2.0’. These are generally regarded as a class of device that actively create, manipulate and read out quantum states of matter, often using the quantum effects of superposition and entanglement. Quantum Defects in Diamond: Identifying Nitrogen Isotopes of Nitrogen-Vacancy Centersfree downloadThis project aims
operating system-2020
An Operating System (OS) is an interface between a computer user and computer hardware. An operating system is a software which performs all the basic tasks like file management, memory management, process management, handling input and output, and controlling peripheral devices such as disk drives and printers Software-based methods for Operating system dependability free downloadGuaranteeing correct
ontology-2020
Ontology is the philosophical study of being. More broadly, it studies concepts that directly relate to being, in particular becoming, existence, reality, as well as the basic categories of being and their relations Results of the Ontology Alignment Evaluation Initiative 2016free downloadOntology matching consists of finding correspondences between semantically related entities of different ontologies. The
CYBER SECURITY-2020
cybersecurity or information technology security is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. A Comprehensive Tutorial and Survey of Applications of Deep Learning for Cyber Security free downloadAbstract Deep
MOBILE COMPUTING-2020
Mobile Computing is a technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link. A CASE STUDY OF TWO MOBILE COMPUTING TECHNOLOGIES: MOBILE VR AND MOBILENETSfree downloadMobile computing refers to a specific style of computing where the
Swarm Optimization Algorithm-2020
Particle swarm optimization (PSO) algorithm is a stochastic optimization technique based on swarm, which was proposed by Eberhart and Kennedy (1995) and Kennedy and Eberhart (1995). PSO algorithm simulates animal’s social behavior, including insects, herds, birds and fishes The most common term for methods that employ stochastic schemes to produce search strategies is metaheuristics. In
VANET Vehicular Adhoc Networks-2020
Vehicular ad-hoc networks are created by applying the principles of mobile ad hoc networks – the spontaneous creation of a wireless network of mobile devices – to the domain of vehicles. Development of Secure Transport System Using VANET free downloadAbstract The Ad-Hoc Network for vehicle ( VANET ) is expected to necessarily develop the secure
DATA SCIENCE-2020
Data science is an inter-disciplinary field that uses scientific methods, processes, algorithms and systems to extract knowledge and insights from structured and unstructured data. Data science is related to data mining and big data. The Belmont Report in the Age of Big Data : Ethics at the Intersection of Psychological Science and Data Science free
SPEECH RECOGNITION-2020
Speech recognition is the ability of a machine or program to identify words and phrases in spoken language and convert them to a machine-readable format. Rudimentary speech recognition software has a limited vocabulary of words and phrases, and it may only identify these if they are spoken very clearly. SCALING UP ONLINE SPEECH RECOGNITION USING
DB-DATABASE-2020
A database is a collection of information that is organized so that it can be easily accessed, managed and updated. Computer databases typically contain aggregations of data records or files, containing information about sales transactions or interactions with specific customers. snoDB: An Interconnected Online Database of Human snoRNAfree downloadRNA is more than just a transitory
TEXT MINING-2020
Text mining, also referred to as text data mining, roughly equivalent to text analytics, is the process of deriving high-quality information from text. High-quality information is typically derived through the devising of patterns and trends through means such as statistical pattern learning. Scientific Literature Information Extraction Using Text Mining Techniques for Human Health Risk Assessment
DEEP NEURAL NETWORK-2020
A deep neural network (DNN) is an artificial neural network (ANN) with multiple layers between the input and output layers. The DNN finds the correct mathematical manipulation to turn the input into the output, whether it be a linear relationship or a non-linear relationship. Deep ReLU Neural Network Expression Rates for Data-to-QoI Maps in Bayesian
INFORMATION SECURITY-2020
Information Security refers to the processes and methodologies which are designed and implemented to protect print, electronic, or any other form of confidential, private and sensitive information or data from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption. Research on Security of Mobile Communication Information Transmission Based on Heterogeneous Networkfree downloadThe popularity of the
MANET Mobile Ad hoc Network-2020
A mobile ad hoc network (MANET) is a collection of mobile nodes that act as both routers and hosts in an ad hoc wireless network and that dynamically self-organize in a wireless network without using any pre-established infrastructure. Nodes typically transmit in broadcast messages that reach only nearby nodes. A Survey of Attacker Identification and
big data 2020
quantum technologies 2020
operating system 2020
ontology 2020
cyber security 2020
mobile computing 2020
swarm 2020
vanet 2020
data science 2020
speech recognition 2020
DB database 2020
text mining 2020
deep neural network 2020
information security 2020
manet 2020
face recognition technology 2020
java 2020
linux 2020
genetic algorithm 2020
fuzzy logic 2020
network security 2020
neural network 2020
software engineering 2020
software system 2020
steganography 2020
video streaming 2020
agile software development 2020
ann artificial neural network 2020
cryptography 2020
data security 2020
data mining 2020
ddos distributed denial of service 2020
3d printing 2020
machine learning 2020
deep learning 2020
image processing 2020
distributed system 2020
e commerce 2020
ai artificial intelligence 2020
computer algorithm 2020
android operating system 2020
cyber security 2020
iot internet of things 2020
cloud computing 2020
ELECTRONICS-ECE 2020
robot 2020
mobile phone 2020
raspberry pi 2020
photonics 2020
wireless sensor 2020
uwb ultra wideband 2020
microwave technology 2020
wifi wireless fidelity 2020
wireless 2020
wireless network 2020
wsn wireless sensor networks 2020
LTE long term evolution 2020
bluetooth 2020
rf radio frequency 2020
antenna 2020
nanotechnology 2020
cmos 2020
fpga field programmable gate array 2020
vlsi very large scale integration 2020
dsp digital signal processor 2020
satellite 2020
detection system 2020
intrusion detection system 2020
camera 2020
automation 2020
electronics 2020
GPU 2020
sensor 2020
GPS 2020
microcontroller 2020
DSP 2020
biometrics 2020
mobile 2020
arduino 2020
cognitive radio 2020
5G 2020
robotics 2020
EEE-ELECTRICAL-ELECTRONICS-ENGINEERING 2020
microgrid 2020
smart grid 2020
PID 2020
fuzzy logic controller 2020
PLC 2020
power system 2020
SCADA 2020
high voltage 2020
inverter 2020
power management 2020
renewable energy 2020
solar energy 2020
wind energy 2020
mems 2020
control system 2020
VLSI RESEARCH PAPERS 2020
WIRELESS AND RF RADIO FRQUENCY RESEARCH PAPERS 2020
EMBEDDED SYSTEM 2020
MEDICAL 2020
biomedical 2020ALL MEDICAL
MBA RESEARCH PAPERS