All Stories

  1. Navigating the Economic Challenges of the Russia-Ukraine Conflict on India
  2. The Nexus of War, Violence, and Rights
  3. Yoga
  4. Shrinkable Cryptographic Technique Using Involutory Function for Image Encryption
  5. Yoga
  6. Skin Cancer Lesion Detection Using Improved CNN Techniques
  7. An Analysis and Detection of Misleading Information on Social Media Using Machine Learning Techniques
  8. Right to Correct Information in the Cyber World
  9. An Improved Pseudorandom Sequence Generator and its Application to Image Encryption
  10. A New Framework for Politics, Law, and Government in the Digital Era
  11. Policies and Social Work Against Women Violence
  12. Randomized Block Size (RBS) Model for Secure Data Storage in Distributed Server
  13. Network Security Approaches in Distributed Environment
  14. Network Security Approaches in Distributed Environment
  15. A Study on Evolutionary Technique to Predict the Sales During COVID-19
  16. A Study on Supervised Machine Learning Technique to Detect Anomalies in Networks
  17. Automated Detection of SQL Injection Attack on Blockchain-Based Database
  18. Impact of Information and Communication Technology in the Indian Education System During COVID-19
  19. Policies and Social Work Against Women Violence
  20. IoT and Its Real-Time Application in Agriculture
  21. The Environmental Impact of 5G Technology on Humans and Animals
  22. Voice-Based Speaker Identification and Verification
  23. The Detection of SQL Injection on Blockchain-Based Database
  24. K-RSA: Secure data storage technique for multimedia in cloud data server
  25. Selection on Traditional Cryptographic Algorithm for Real-Time Video Transmission and Storage: A Study
  26. Selection on Various Traditional Image Encryption Techniques: A Study
  27. A Computer Vision-Based Gesture Recognition Using Hidden Markov Model
  28. Network Security Approaches in Distributed Environment
  29. Image Denoising Technique Using Various Filters Models: A Survey
  30. Security of Multimedia in Cloud using Secret Shared Key
  31. An Underground Mine Safety of Personnel’s Using IoT
  32. A Novel Multimedia Encryption and Decryption Technique Using Binary Tree Traversal
  33. An Evolutionary Computing Based Model (GA) implementation for Budget Optimization and Allocation
  34. Introduction
  35. Literature Review
  36. Research Methodology
  37. Result and Discussion
  38. Appendix A: Allocation Ocba
  39. Appendix B: Simulation Of Mean And Standard Deviation
  40. Appendix C: Budget Allocation Using Genetic Algorithm Approach Fitness Calculation
  41. Literature Review
  42. A Framework for Budget Allocation and Optimization Using Particle Swarm Optimization