Powering EV in India

by Himanshu S Garud   |   July 21, 2022

Powering EV in India Background If it is one fact that the entire world has understood in the last few years, it is the fact that we need to start making amends so that the environment that we have destroyed...

Introduction to 3D Biometrics

by Gayatri Kattimani   |   July 21, 2022

3D Biometrics Abstract With the development in technology, automatic personal authentication is being used in many fields such as security, forensics, banking, etc. Many kinds of authentications techniques are available based on the different biometric characteristics. Mostly all the developed...

Text Generation using RNN

by Chinmaya Sharma   |   July 15, 2022

Text Generation using RNN Long-short-term memory models, or LSTMs, employ gates to control the flow of information to tackle the problem of short-term memory. These models feature procedures for deciding whether or not to maintain the information, allowing them to...

Exploring Web Exploitation Techniques

by Kavya Bhat   |   July 15, 2022

What is Web Exploitation? Web exploitation involves taking advantage of flaws or weaknesses that are present in a web application. When an application uses data inputs that are not sanitized or validated, a hacker can easily exploit it and compromize...

Cosmic Bit Flip

by Harish R Kale   |   July 15, 2022

Cosmic Bit Flip Abstract Has your laptop or PC ever crashed into a blue screen,just like the one shown below. Have you ever wondered what the reason behind the system crash could be. Computers are employed everywhere today, and in...