Introduction to 3D Biometrics

by Gayatri Kattimani   |   July 21, 2022

3D Biometrics Abstract With the development in technology, automatic personal authentication is being used in many fields such as security, forensics, banking, etc. Many kinds of authentications techniques are available based on the different biometric characteristics. Mostly all the developed...

Text Generation using RNN

by Chinmaya Sharma   |   July 15, 2022

Text Generation using RNN Long-short-term memory models, or LSTMs, employ gates to control the flow of information to tackle the problem of short-term memory. These models feature procedures for deciding whether or not to maintain the information, allowing them to...

Exploring Web Exploitation Techniques

by Kavya Bhat   |   July 15, 2022

What is Web Exploitation? Web exploitation involves taking advantage of flaws or weaknesses that are present in a web application. When an application uses data inputs that are not sanitized or validated, a hacker can easily exploit it and compromize...

Cosmic Bit Flip

by Harish R Kale   |   July 15, 2022

Cosmic Bit Flip Abstract Has your laptop or PC ever crashed into a blue screen,just like the one shown below. Have you ever wondered what the reason behind the system crash could be. Computers are employed everywhere today, and in...

ZigBee Technology

by Ashrith D R   |   July 07, 2022

What is ZigBee Technology? ZigBee is a wireless standard technology developed to enable low cost and low power wireless transmission in machine-to-machine and internet of things (IOT) networks. ZigBee is specifically designed for control and sensor networks based on the...