augmented reality 2020
Use of Augmented Reality in Reconstructive Microsurgery: A Systematic Review and Development of the Augmented Reality Microsurgery Scorefree downloadIntroduction Augmented reality (AR) uses a set of technologies that overlays digital information into the real world, giving the user access to both digital and real-world environments in congruity. AR be specifically fruitful in reconstructive microsurgery due

quantum computing 2020
Towards exploring the potential of alternative quantum computing architectures free downloadThe recent advances in the physical realization of Noisy Intermediate Scale Quantum (NISQ) computers have motivated research on design automation that allows users to execute quantum algorithms on them. Certain physical constraints in the architectures restrict how Realizing Quantum Algorithms on Real Quantum Computing Devicesfree downloadQuantum

deep learning technology 2020
Deep Learning refers to the circumstance that we derive the output for our input by passing it through multiple layers / a hierarchy of transformations (i.e., we go through some depth of transforms), instead of having a single, linear formula that tells us the output value directly. Deep learning is a machine learning technique that

web security 2020
Web security is important to keeping hackers and cyber-thieves from accessing sensitive information. Without a proactive security strategy, businesses risk the spread and escalation of malware, attacks on other websites, networks, and other IT infrastructures. injection and authentication flaws, XSS, insecure direct object references, security misconfiguration, sensitive data exposure, a lack of function-level authorization, CSRF,

machine translation 2020
Machine Translation is software that automatically renders text from one language into another. A key benefit of RBMT over other MT approaches is that it can produce better quality for language pairs with very different word orders Neural Machine Translation with Joint Representationfree download Though early successes of Statistical Machine Translation (SMT) systems are attributed

natural language processing 2020
Natural language processing involves the reading and understanding of spoken or written language through the medium of a computer. This includes, for example, the automatic translation of one language into another, but also spoken word recognition, or the automatic answering of questions Gluoncv and gluonnlp: Deep learning in computer vision and natural language processing free

quantum technologies-2020
Quantum technologies are often described as the second quantum revolution’ or quantum 2.0’. These are generally regarded as a class of device that actively create, manipulate and read out quantum states of matter, often using the quantum effects of superposition and entanglement. Quantum Defects in Diamond: Identifying Nitrogen Isotopes of Nitrogen-Vacancy Centersfree downloadThis project aims

operating system-2020
An Operating System (OS) is an interface between a computer user and computer hardware. An operating system is a software which performs all the basic tasks like file management, memory management, process management, handling input and output, and controlling peripheral devices such as disk drives and printers Software-based methods for Operating system dependability free downloadGuaranteeing correct

Ontology is the philosophical study of being. More broadly, it studies concepts that directly relate to being, in particular becoming, existence, reality, as well as the basic categories of being and their relations Results of the Ontology Alignment Evaluation Initiative 2016free downloadOntology matching consists of finding correspondences between semantically related entities of different ontologies. The

cybersecurity or information technology security is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. A Comprehensive Tutorial and Survey of Applications of Deep Learning for Cyber Security free downloadAbstract Deep

Mobile Computing is a technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link. A CASE STUDY OF TWO MOBILE COMPUTING TECHNOLOGIES: MOBILE VR AND MOBILENETSfree downloadMobile computing refers to a specific style of computing where the

Swarm Optimization Algorithm-2020
Particle swarm optimization (PSO) algorithm is a stochastic optimization technique based on swarm, which was proposed by Eberhart and Kennedy (1995) and Kennedy and Eberhart (1995). PSO algorithm simulates animal’s social behavior, including insects, herds, birds and fishes The most common term for methods that employ stochastic schemes to produce search strategies is metaheuristics. In

VANET Vehicular Adhoc Networks-2020
Vehicular ad-hoc networks are created by applying the principles of mobile ad hoc networks – the spontaneous creation of a wireless network of mobile devices – to the domain of vehicles. Development of Secure Transport System Using VANET free downloadAbstract The Ad-Hoc Network for vehicle ( VANET ) is expected to necessarily develop the secure

Data science is an inter-disciplinary field that uses scientific methods, processes, algorithms and systems to extract knowledge and insights from structured and unstructured data. Data science is related to data mining and big data. The Belmont Report in the Age of Big Data : Ethics at the Intersection of Psychological Science and Data Science free

Speech recognition is the ability of a machine or program to identify words and phrases in spoken language and convert them to a machine-readable format. Rudimentary speech recognition software has a limited vocabulary of words and phrases, and it may only identify these if they are spoken very clearly. SCALING UP ONLINE SPEECH RECOGNITION USING

A database is a collection of information that is organized so that it can be easily accessed, managed and updated. Computer databases typically contain aggregations of data records or files, containing information about sales transactions or interactions with specific customers. snoDB: An Interconnected Online Database of Human snoRNAfree downloadRNA is more than just a transitory

Text mining, also referred to as text data mining, roughly equivalent to text analytics, is the process of deriving high-quality information from text. High-quality information is typically derived through the devising of patterns and trends through means such as statistical pattern learning. Scientific Literature Information Extraction Using Text Mining Techniques for Human Health Risk Assessment

A deep neural network (DNN) is an artificial neural network (ANN) with multiple layers between the input and output layers. The DNN finds the correct mathematical manipulation to turn the input into the output, whether it be a linear relationship or a non-linear relationship. Deep ReLU Neural Network Expression Rates for Data-to-QoI Maps in Bayesian

Information Security refers to the processes and methodologies which are designed and implemented to protect print, electronic, or any other form of confidential, private and sensitive information or data from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption. Research on Security of Mobile Communication Information Transmission Based on Heterogeneous Networkfree downloadThe popularity of the

MANET Mobile Ad hoc Network-2020
A mobile ad hoc network (MANET) is a collection of mobile nodes that act as both routers and hosts in an ad hoc wireless network and that dynamically self-organize in a wireless network without using any pre-established infrastructure. Nodes typically transmit in broadcast messages that reach only nearby nodes. A Survey of Attacker Identification and

big data 2020

quantum technologies 2020

operating system 2020

ontology 2020

cyber security 2020

mobile computing 2020

swarm 2020

vanet 2020

data science 2020

speech recognition 2020

DB database 2020

text mining 2020

deep neural network 2020

information security 2020

manet 2020

face recognition technology 2020

java 2020

linux 2020

genetic algorithm 2020

fuzzy logic 2020

network security 2020

neural network 2020

software engineering 2020

software system 2020

steganography 2020

video streaming 2020

agile software development 2020

ann artificial neural network 2020

cryptography 2020

data security 2020

data mining 2020

ddos distributed denial of service 2020

3d printing 2020

machine learning 2020

deep learning 2020

image processing 2020

distributed system 2020

e commerce 2020

ai artificial intelligence 2020

computer algorithm 2020

android operating system 2020

cyber security 2020

iot internet of things 2020

cloud computing 2020


robot 2020

mobile phone 2020

raspberry pi 2020

photonics 2020

wireless sensor 2020

uwb ultra wideband 2020

microwave technology 2020

wifi wireless fidelity 2020

wireless 2020

wireless network 2020

wsn wireless sensor networks 2020

LTE long term evolution 2020

bluetooth 2020

rf radio frequency 2020

antenna 2020

nanotechnology 2020

cmos 2020

fpga field programmable gate array 2020

vlsi very large scale integration 2020

dsp digital signal processor 2020

satellite 2020

detection system 2020

intrusion detection system 2020

camera 2020

automation 2020

electronics 2020

GPU 2020

sensor 2020

GPS 2020

microcontroller 2020

DSP 2020

biometrics 2020

mobile 2020

arduino 2020

cognitive radio 2020

5G 2020

robotics 2020


microgrid 2020

smart grid 2020

PID 2020

fuzzy logic controller 2020

PLC 2020

power system 2020

SCADA 2020

high voltage 2020

inverter 2020

power management 2020

renewable energy 2020

solar energy 2020

wind energy 2020

mems 2020

control system 2020





biomedical 2020