Saturday, November 2, 2019
Now days, the privacy breach attempts are increasing globally because of opening the unknown links received on E-mail, WhatsApp or SMS.
We should not click on the unknown hyperlinks to secure the privacy and to avoid the leakage of our location, IP address and many other parameters
Friday, November 1, 2019
Keywords Writing in a Research Paper is very important before sending to the conferences or journals. Here are some examples, how to write the good keywords in a research paper
Title: An Effective Approach for Liver Disease Diagnosis using Deep Learning (Computer Science)
Keywords: Approach for Liver Disease, Algorithm for Liver Disease Diagnosis, Deep Learning, Effective Algorithm for Medical Diagnosis
Title: Security Aspects with Usage of Internet Banking in North India (Management)
Keywords: Internet Banking, Security in Internet Banking, Security Mechanism in Net Banking, Security Aspects in Internet Banking
Title: Avoidance Mechanism of Wormhole Attacks using Soft Computing (Electronics)
Keywords: Avoidance of Wormhole Attack, Network Security, Wormhole Attacks, Soft Computing, Soft Computing based Wormhole Detection
Title: Socio Cultural Analysis of Literature in the Works of Munshi Premchand (English Literature)
Keywords: Munshi Premchand, Socio Cultural Analysis, Socio Cultural Literature, Works of Munshi Premchand
For research in machine learning, deep learning, statistical analytics, there is need to work on the datasets.
For actual corporate or social research, the data should be collected from primary sources.
For Academic Research, in most of the cases, the Benchmark Datasets are used so that the authenticity can be proved.
Actual Datasets from Primary Data Collection: (CORPORATE / SOCIAL RESEARCH)
- Academic Research generally it is not acceptable.
- X Ray Images taken from hospital
- Flowers Images from Rose Gardens or any other location
- No benchmarking / testing is done
Pre-Built Benchmark Datasets (ONLY FOR ACADEMIC)
o IRIS, Titanic Ship
Thursday, October 31, 2019
There are many web portals which provide the E-Books in free distribution for the students and research scholars.
Following are the web links from where the E-Books of different subjects can be downloaded
Literature Review can be prepared from research papers without reading the complete paper from beginning to end. The extracts and main key points of the research paper including its keywords can be used to write the statements for the literature review.
Sample Literature Review of a Paper without reading complete paper from beginning to end
Wu et al. (2019)
The work in this paper is focusing on fatty liver disease prediction using classification model in machine learning with specific implementations of Random Forest Approach. The methods in this paper include the screening of datasets from New Taipei City Hospital with the sample size of 577. The methods in this paper included the segments of Study Population, Clinical Data and Outcomes, Data Preprocessing, Variable Selection, Model Building and many others. The limitations or research gaps in the research manuscript is focusing on the single dataset from one medical centers. It can be elevated to multiple datasets from multiple locations or regions. The data set is small and it can be escalated.
Wu, C.C., Yeh, W.C., Hsu, W.D., Islam, M.M., Nguyen, P.A.A., Poly, T.N., Wang, Y.C., Yang, H.C. and Li, Y.C.J., 2019. Prediction of fatty liver disease using machine learning algorithms. Computer methods and programs in biomedicine, 170, pp.23-29.
In current scenario, it is very common trend to install the Webcams or CCTVs in Homes or Offices for the security and overall privacy. By simply installation of CCTV or Webcams, the security and privacy cannot be integrated.
These Webcams and CCTVs are indexed on the Internet of Things (IoT) based Search Engines which can be viewed by anybody on Internet. Shodan is one of the prominent IoT Search Engine.
We should be aware that if the passwords are not implemented in secured mechanism, the CCTVs and Webcams can be accessed by anybody. In this way, it will not be security rather it will be the invitation to the criminals.