IF This Then That (IFTTT) https://ifttt.com is one of the very prominent platforms for the implementation of IoT based environment. It can be integrated for smart devices and wireless integrated applications so that the real time communication can take place.
Research Tools | Open Source Technologies | Cyber Security | Data Science | Artificial Intelligence | Blockchain | Quantum Computing | Python
Thursday, November 21, 2019
Tuesday, November 5, 2019
Random Forest Approach
Random Forest Approach
- Formation of many decision trees by trying different combinations
- Best output is accepted on Voting
- Noise Automatically Removed
DOCTORS / MEDICAL
PRACTITIONERS
Every doctor tells the patient after giving medicine that come after 2-3 days. By this way, the doctors hit-and-trial different combinations. This is Random Forest Approach
Medicine-1: X Y Z
Come after 2 days
Medicine-2: X W Z
Come after 2 days
Patient OK
Another Patient: X W Z
Patient OK
Finally the doctor counts the highest occurrences of X and Z in each
Monday, November 4, 2019
Using Tabula for Extraction of Tables from PDF Files
Data Tables or Comparison Tables from PDF files can be copied or can be extracted using Tabula Software. It is free and open source software available on http://tabula.technology/
Any type of data tables can be fetched using Tabula
https://youtu.be/NvcTIZ2Je50
https://youtu.be/tJNUx1ecDqk
Sunday, November 3, 2019
Free Datasets For Research on IEEE Data Port
IEEE Provides free datasets for Research in Multiple Domains. These datasets are benchmark datasets and can be used by the researchers, academicians, data scientists and professors for the research work.
Categories of the Datasets include the following
- Computational Intelligence
- Computer Vision
- Standards Research Data
- Social Sciences
- Sensors
- Cloud Computing
- Astronomy
- IoT
- Demographic
- Ecology
- Reliability
- Signal Processing
- Other
- Financial
- Communications
- Geoscience and Remote Sensing
- Environmental
- Biomedical and Health Sciences
- Power and Energy
- Machine Learning
- Biophysiological Signals
- Security
- Image Processing
- Image Fusion
- Artificial Intelligence
Saturday, November 2, 2019
Secure Your Private Information | WhatsApp Security | E-mail Security
Now days, the privacy breach attempts are increasing globally because of opening the unknown links received on E-mail, WhatsApp or SMS.
We should not click on the unknown hyperlinks to secure the privacy and to avoid the leakage of our location, IP address and many other parameters
Friday, November 1, 2019
Writing Keywords In A Research Paper
Keywords Writing in a Research Paper is very important before sending to the conferences or journals. Here are some examples, how to write the good keywords in a research paper
Title: An Effective Approach for Liver Disease Diagnosis using Deep Learning (Computer Science)
Keywords: Approach for Liver Disease, Algorithm for Liver Disease Diagnosis, Deep Learning, Effective Algorithm for Medical Diagnosis
Title: Security Aspects with Usage of Internet Banking in North India (Management)
Keywords: Internet Banking, Security in Internet Banking, Security Mechanism in Net Banking, Security Aspects in Internet Banking
Title: Avoidance Mechanism of Wormhole Attacks using Soft Computing (Electronics)
Keywords: Avoidance of Wormhole Attack, Network Security, Wormhole Attacks, Soft Computing, Soft Computing based Wormhole Detection
Title: Socio Cultural Analysis of Literature in the Works of Munshi Premchand (English Literature)
Keywords: Munshi Premchand, Socio Cultural Analysis, Socio Cultural Literature, Works of Munshi Premchand
Subscribe to:
Posts (Atom)