In order to reduce the number of features, also known as dimensionality reduction, there are two…
Category: Research
Feature Engineering
When confronted with a fresh dataset for the first time, it can be overwhelming. It is…
Exploratory Data Analysis (EDA)
By: A. Mishra EDA is a technique for analyzing data that makes use of visual techniques.…
Recent Survey on Cross Site Scripting (XSS) Attacks
Cross-site scripting is a type of attack that occurs when one website is exploited to deliver…
IoT and its uses in Security Surveillance
By: Soumya Sharma , Sunil K. Singh Technology is tremendously transforming the way we work, where…
Evolution of the Web 3.0 : History and the Future
By: Devashish Gupta , Sunil K. Singh The internet is arguably the most significant technological revolution…
Recent Survey on Distributed Denial of Service (DDoS) Attack
A distributed denial of service attack is an attempt to make a device or network resource…
Artificial Intelligence and Machine Learning in Healthcare
By: Gopal Mengi , Sudhakar Kumar It’s only been 20 years since the twenty-first century and,…
Software Defined Network
Traditional network management has been replaced by a method known as software-defined networking (SDN), which makes…
Introduction to NoSQL
By A. Mishra NoSQL is a database management system that has seen a recent rise in…
Non Fungible Tokens: How They’re Revolutionizing Blockchain
By: A. Mishra The token economy is an emerging design paradigm that is revolutionizing how we…
Cloud Computing and IT Industry
By: A. Gaurav In this article, you will learn what makes cloud computing such a beneficial…
Log4Shell Vulnerability
By Deepak Mahto, Sudhakar Kumar A new digital robbery has appeared in the world of cybersecurity.…
Distributed Ledger Technology
By: Manraj Singh, Sudhakar Kumar Blockchain technology is frequently related with distributed databases. They did, however,…
DeepFake: A Deep Learning Approach in Artificial Content Generation
By: K. Yadav, B. B. Gupta , D. Peraković In recent times, the advancement in deep…
Developing Cyber Attacks with Machine Learning
By: K. Yadav, B. B. Gupta , D. Peraković In recent times we can see a…
The Ultimate Guide to DevOps
By: A. Mishra Technology today has evolved. The need for a personalized touch from a developer…
Digital Twins
By: Tarun Vats, Sudhakar Kumar The Digital Twin (DT) combines all data (operation data, tests, etc.),…