By Deepak Mahto, Sudhakar Kumar A new digital robbery has appeared in the world of cybersecurity.…
Category: Research
Distributed Ledger Technology
By: Manraj Singh, Sudhakar Kumar Blockchain technology is frequently related with distributed databases. They did, however,…
DeepFake: A Deep Learning Approach in Artificial Content Generation
By: K. Yadav, B. B. Gupta , D. Peraković In recent times, the advancement in deep…
Developing Cyber Attacks with Machine Learning
By: K. Yadav, B. B. Gupta , D. Peraković In recent times we can see a…
The Ultimate Guide to DevOps
By: A. Mishra Technology today has evolved. The need for a personalized touch from a developer…
Digital Twins
By: Tarun Vats, Sudhakar Kumar The Digital Twin (DT) combines all data (operation data, tests, etc.),…
All about Geographic Information System (GIS)
By: Anish Khan Geographical information system (GIS) is used for storing, managing, analyzing, manipulating, and displaying…
Artificial Intelligence of Things: The Future of IoT Operations
By: B.B. Gupta Experts in the field of IoT are predicting that soon there will be…
Advance Machine Learning and Related Technologies in 2022
By: A. Gaurav and Kwok Tai Chui Automated learning and improvement is a key feature of…
Computer Science’s Highly Cited Researchers in 2021 by Clarivate (Web of Science)
The Institute for Scientific Information’s specialists exclusively disclose the list of 2021 Highly Cited Researchers [1].…
Captcha Improvement: Security from DDoS Attack
BY: DHANANJAY SINGH CAPTCHA stands for “Completely Automated Public Turing test to tell Computers and Humans…
Blockchain for IoT Security
By: K. Yadav IoT security becomes an important research topic in recent times, due to the…
Phishing Attack in Modern World
By: R. S. Pal While the size and sophistication of cybersecurity threats continue to rise, social…
Knowledge Graph: Applications with ML and AI and Open-Source Database Links in 2022
By: A. Khan, F. Colace Introduction With every passing year, machine learning attracts researchers towards a…
Beyond Classical Cryptography: A Technical View Cultivating Quantum Cryptography
By: Megha Quamara The most important application of quantum computing in the future is likely to…
Australian Top 40 Eminent Scientists and Lifetime Achievers in their Research Fields
The Australian newspaper [1] prepares the list of Australia’s top 40 researchers that have been recognized…