All Stories

  1. Optimizing Agricultural Productivity in Response to Population Growth
  2. Blockchain 6G-Based Wireless Network Security Management with Optimization Using Machine Learning Techniques
  3. Enhancing Academic Integrity: An Analysis of Advanced Techniques for Plagiarism Detection using LESK, Word Sense Disambiguation, and SVM
  4. Climate Change on Our Plates
  5. Fortifying Data Security in the Evolving Digital Landscape
  6. The Metaverse and Digital Libraries
  7. Navigating the Economic Challenges of the Russia-Ukraine Conflict on India
  8. The Nexus of War, Violence, and Rights
  9. Community Detection in Networks: A Comparative study
  10. Yoga
  11. Shrinkable Cryptographic Technique Using Involutory Function for Image Encryption
  12. Yoga
  13. Skin Cancer Lesion Detection Using Improved CNN Techniques
  14. An Analysis and Detection of Misleading Information on Social Media Using Machine Learning Techniques
  15. Right to Correct Information in the Cyber World
  16. An Improved Pseudorandom Sequence Generator and its Application to Image Encryption
  17. A New Framework for Politics, Law, and Government in the Digital Era
  18. Policies and Social Work Against Women Violence
  19. Randomized Block Size (RBS) Model for Secure Data Storage in Distributed Server
  20. Network Security Approaches in Distributed Environment
  21. Network Security Approaches in Distributed Environment
  22. A Study on Evolutionary Technique to Predict the Sales During COVID-19
  23. A Study on Supervised Machine Learning Technique to Detect Anomalies in Networks
  24. Automated Detection of SQL Injection Attack on Blockchain-Based Database
  25. Impact of Information and Communication Technology in the Indian Education System During COVID-19
  26. Policies and Social Work Against Women Violence
  27. IoT and Its Real-Time Application in Agriculture
  28. The Environmental Impact of 5G Technology on Humans and Animals
  29. Voice-Based Speaker Identification and Verification
  30. The Detection of SQL Injection on Blockchain-Based Database
  31. K-RSA: Secure data storage technique for multimedia in cloud data server
  32. Selection on Traditional Cryptographic Algorithm for Real-Time Video Transmission and Storage: A Study
  33. Selection on Various Traditional Image Encryption Techniques: A Study
  34. A Computer Vision-Based Gesture Recognition Using Hidden Markov Model
  35. Network Security Approaches in Distributed Environment
  36. Image Denoising Technique Using Various Filters Models: A Survey
  37. Security of Multimedia in Cloud using Secret Shared Key
  38. An Underground Mine Safety of Personnel’s Using IoT
  39. A Novel Multimedia Encryption and Decryption Technique Using Binary Tree Traversal
  40. An Evolutionary Computing Based Model (GA) implementation for Budget Optimization and Allocation
  41. Introduction
  42. Literature Review
  43. Research Methodology
  44. Result and Discussion
  45. Appendix A: Allocation Ocba
  46. Appendix B: Simulation Of Mean And Standard Deviation
  47. Appendix C: Budget Allocation Using Genetic Algorithm Approach Fitness Calculation
  48. Literature Review
  49. A Framework for Budget Allocation and Optimization Using Particle Swarm Optimization