Dimensionality Reduction: Feature Extraction and Feature Selection

In order to reduce the number of features, also known as dimensionality reduction, there are two…

Feature Engineering

When confronted with a fresh dataset for the first time, it can be overwhelming. It is…

Exploratory Data Analysis (EDA)

By: A. Mishra EDA is a technique for analyzing data that makes use of visual techniques.…

Recent Survey on Cross Site Scripting (XSS) Attacks

Cross-site scripting is a type of attack that occurs when one website is exploited to deliver…

IoT and its uses in Security Surveillance

By: Soumya Sharma , Sunil K. Singh Technology is tremendously transforming the way we work, where…

Evolution of the Web 3.0 : History and the Future

By: Devashish Gupta , Sunil K. Singh The internet is arguably the most significant technological revolution…

Recent Survey on Distributed Denial of Service (DDoS) Attack

A distributed denial of service attack is an attempt to make a device or network resource…

Artificial Intelligence and Machine Learning in Healthcare

By: Gopal Mengi , Sudhakar Kumar It’s only been 20 years since the twenty-first century and,…

Software Defined Network

Traditional network management has been replaced by a method known as software-defined networking (SDN), which makes…

Introduction to NoSQL

By A. Mishra NoSQL is a database management system that has seen a recent rise in…

Social And Web Analytics

By: A. Mishra When it comes to content optimization, social and web analytics are two of…

Non Fungible Tokens: How They’re Revolutionizing Blockchain

By: A. Mishra The token economy is an emerging design paradigm that is revolutionizing how we…

Cloud Computing and IT Industry

By: A. Gaurav In this article, you will learn what makes cloud computing such a beneficial…

Machine Learning Research Topics 2022

Machine learning

Log4Shell Vulnerability

By Deepak Mahto, Sudhakar Kumar A new digital robbery has appeared in the world of cybersecurity.…

Distributed Ledger Technology

By: Manraj Singh, Sudhakar Kumar Blockchain technology is frequently related with distributed databases. They did, however,…

DeepFake: A Deep Learning Approach in Artificial Content Generation

By: K. Yadav, B. B. Gupta , D. Peraković In recent times, the advancement in deep…

Developing Cyber Attacks with Machine Learning

By: K. Yadav, B. B. Gupta , D. Peraković In recent times we can see a…

The Ultimate Guide to DevOps

By: A. Mishra Technology today has evolved. The need for a personalized touch from a developer…

Digital Twins

By: Tarun Vats, Sudhakar Kumar The Digital Twin (DT) combines all data (operation data, tests, etc.),…