BUG BOUNTY

By: Sahil What is bug bounty?   In this current world of emerging technology, we are heading…

Patient Health Record Security

By: A. Gaurav The development of Internet technologies in recent times has brought a drastic change…

Soft Computing Techniques for Gene Prediction

By: P. K. Gujral Abstract Over the earlier decade, various genomes have been changed into the…

BITCOIN

By: A. Sharma Introduction The word ‘bitcoin’ refers to a type of cryptocurrency, that is, a…

Voice Search Optimization

By: T. Saini Voice Search Optimization (VSO) is the process in which the web pages are…

Voice over IP (VoIP)

Voice over IP

Smart Adoption of IoT in COVID-19 Pandemic paves new era of sustainable future world

By: Ruchi Bhatnagar, Deepak Sinha Background COVID-19 is now not a new term for anyone as…

Moving Object Detection System: Wi-Vi

By: Kunwardeep Singh Gujral Can Wi-Fi in our homes help us to see through walls? From…

Zero-Shot Temporal Activity Detection

By: OWAIS IQBAL Image Classification and Detection are two wide topics in the domain of Computer…

Virtual Personal Assistant

By: Deepak Mahto In the last few decades, there has been significant development in the field…

CLASSIFICATION OF FUNGI MICROSCOPIC IMAGES – Leveraging the use of AI

By: Manepalli Ratna Sri, Surya Prakash and T Karuna Normal human microbiota includes many fungi which…

Humanoid Robots: The future of mankind

By: K. T. Chui Robots and humans interact in every sphere of life regardless of whether…