By: Sahil What is bug bounty? In this current world of emerging technology, we are heading…
Category: Featured Articles
Patient Health Record Security
By: A. Gaurav The development of Internet technologies in recent times has brought a drastic change…
Soft Computing Techniques for Gene Prediction
By: P. K. Gujral Abstract Over the earlier decade, various genomes have been changed into the…
BITCOIN
By: A. Sharma Introduction The word ‘bitcoin’ refers to a type of cryptocurrency, that is, a…
Voice Search Optimization
By: T. Saini Voice Search Optimization (VSO) is the process in which the web pages are…
Voice over IP (VoIP)
Voice over IP
Smart Adoption of IoT in COVID-19 Pandemic paves new era of sustainable future world
By: Ruchi Bhatnagar, Deepak Sinha Background COVID-19 is now not a new term for anyone as…
Moving Object Detection System: Wi-Vi
By: Kunwardeep Singh Gujral Can Wi-Fi in our homes help us to see through walls? From…
Zero-Shot Temporal Activity Detection
By: OWAIS IQBAL Image Classification and Detection are two wide topics in the domain of Computer…
Virtual Personal Assistant
By: Deepak Mahto In the last few decades, there has been significant development in the field…
CLASSIFICATION OF FUNGI MICROSCOPIC IMAGES – Leveraging the use of AI
By: Manepalli Ratna Sri, Surya Prakash and T Karuna Normal human microbiota includes many fungi which…
Humanoid Robots: The future of mankind
By: K. T. Chui Robots and humans interact in every sphere of life regardless of whether…