All Stories

  1. Climate Change on Our Plates
  2. Fortifying Data Security in the Evolving Digital Landscape
  3. The Metaverse and Digital Libraries
  4. Navigating the Economic Challenges of the Russia-Ukraine Conflict on India
  5. The Nexus of War, Violence, and Rights
  6. Community Detection in Networks: A Comparative study
  7. Yoga
  8. Shrinkable Cryptographic Technique Using Involutory Function for Image Encryption
  9. Yoga
  10. Skin Cancer Lesion Detection Using Improved CNN Techniques
  11. An Analysis and Detection of Misleading Information on Social Media Using Machine Learning Techniques
  12. Right to Correct Information in the Cyber World
  13. An Improved Pseudorandom Sequence Generator and its Application to Image Encryption
  14. A New Framework for Politics, Law, and Government in the Digital Era
  15. Policies and Social Work Against Women Violence
  16. Randomized Block Size (RBS) Model for Secure Data Storage in Distributed Server
  17. Network Security Approaches in Distributed Environment
  18. Network Security Approaches in Distributed Environment
  19. A Study on Evolutionary Technique to Predict the Sales During COVID-19
  20. A Study on Supervised Machine Learning Technique to Detect Anomalies in Networks
  21. Automated Detection of SQL Injection Attack on Blockchain-Based Database
  22. Impact of Information and Communication Technology in the Indian Education System During COVID-19
  23. Policies and Social Work Against Women Violence
  24. IoT and Its Real-Time Application in Agriculture
  25. The Environmental Impact of 5G Technology on Humans and Animals
  26. Voice-Based Speaker Identification and Verification
  27. The Detection of SQL Injection on Blockchain-Based Database
  28. K-RSA: Secure data storage technique for multimedia in cloud data server
  29. Selection on Traditional Cryptographic Algorithm for Real-Time Video Transmission and Storage: A Study
  30. Selection on Various Traditional Image Encryption Techniques: A Study
  31. A Computer Vision-Based Gesture Recognition Using Hidden Markov Model
  32. Network Security Approaches in Distributed Environment
  33. Image Denoising Technique Using Various Filters Models: A Survey
  34. Security of Multimedia in Cloud using Secret Shared Key
  35. An Underground Mine Safety of Personnel’s Using IoT
  36. A Novel Multimedia Encryption and Decryption Technique Using Binary Tree Traversal
  37. An Evolutionary Computing Based Model (GA) implementation for Budget Optimization and Allocation
  38. Introduction
  39. Literature Review
  40. Research Methodology
  41. Result and Discussion
  42. Appendix A: Allocation Ocba
  43. Appendix B: Simulation Of Mean And Standard Deviation
  44. Appendix C: Budget Allocation Using Genetic Algorithm Approach Fitness Calculation
  45. Literature Review
  46. A Framework for Budget Allocation and Optimization Using Particle Swarm Optimization