Log4Shell Vulnerability

By Deepak Mahto, Sudhakar Kumar A new digital robbery has appeared in the world of cybersecurity.…

Distributed Ledger Technology

By: Manraj Singh, Sudhakar Kumar Blockchain technology is frequently related with distributed databases. They did, however,…

DeepFake: A Deep Learning Approach in Artificial Content Generation

By: K. Yadav, B. B. Gupta , D. Peraković In recent times, the advancement in deep…

Developing Cyber Attacks with Machine Learning

By: K. Yadav, B. B. Gupta , D. Peraković In recent times we can see a…

The Ultimate Guide to DevOps

By: A. Mishra Technology today has evolved. The need for a personalized touch from a developer…

Digital Twins

By: Tarun Vats, Sudhakar Kumar The Digital Twin (DT) combines all data (operation data, tests, etc.),…

All about Geographic Information System (GIS)

By: Anish Khan Geographical information system (GIS) is used for storing, managing, analyzing, manipulating, and displaying…

How does Computer Science influence Medical Research

Computer Science influence Medical Research

Artificial Intelligence of Things: The Future of IoT Operations

By: B.B. Gupta Experts in the field of IoT are predicting that soon there will be…

Advance Machine Learning and Related Technologies in 2022

By: A. Gaurav and Kwok Tai Chui Automated learning and improvement is a key feature of…

Extreme Abstractive Summarization of Scientific Documents

Text Summarization

Computer Science’s Highly Cited Researchers in 2021 by Clarivate (Web of Science)

The Institute for Scientific Information’s specialists exclusively disclose the list of 2021 Highly Cited Researchers [1].…

Metaverse Technology and the Current Market

By: M. Kaur, B. Gupta Metaverse technology is being called the next big revolution of the…

Captcha Improvement: Security from DDoS Attack

BY: DHANANJAY SINGH CAPTCHA stands for “Completely Automated Public Turing test to tell Computers and Humans…

Blockchain for IoT Security

By: K. Yadav IoT security becomes an important research topic in recent times, due to the…

Phishing Attack in Modern World

By: R. S. Pal While the size and sophistication of cybersecurity threats continue to rise, social…

Knowledge Graph: Applications with ML and AI and Open-Source Database Links in 2022

By: A. Khan, F. Colace Introduction With every passing year, machine learning attracts researchers towards a…

Beyond Classical Cryptography: A Technical View Cultivating Quantum Cryptography

By: Megha Quamara The most important application of quantum computing in the future is likely to…

Metaverse Technologies and Its Applications

By: Mavneet Kaur, B. Gupta The Metaverse [1] is a virtual shared area that is open…

Australian Top 40 Eminent Scientists and Lifetime Achievers in their Research Fields

The Australian newspaper [1] prepares the list of Australia’s top 40 researchers that have been recognized…