Book
Licensed
Unlicensed
Requires Authentication
Algorithms
Big Data, Optimization Techniques, Cyber Security
-
Edited by:
Sushil C. Dimri
Language:
English
Published/Copyright:
2024
About this book
Algorithms are ubiquitous in the contemporary technological world, and they ultimately consist of finite sequences of instructions used to accomplish tasks with necessary input values. This book analyses the top performing algorithms in areas as diverse as Big Data, Artificial Intelligence, Optimization Techniques and Cloud & Cyber Security Systems in order to explore their power and limitations.
- Explores the power and possibilities of algorithms across different areas of the digital world.
- Offers an interdisciplinary approach to one of the building blocks of contemporary technology.
Author / Editor information
B. Unhelkar, USF, USA; S. C. Dimri, A. Kumar, Graphic Era Hill University; A. Saxena, Dev Sanskriti Vishwavidyalaya, India.
Topics
Publicly Available Download PDF |
I |
Publicly Available Download PDF |
V |
Publicly Available Download PDF |
VII |
Rajiv Ranjan Giri, Richa Indu and Sushil Chandra Dimri Requires Authentication Unlicensed Licensed |
1 |
Akash Dogra, Shiv Ashish Dhondiyal and Sushil Chandra Dimri Requires Authentication Unlicensed Licensed |
21 |
Chandrashekhar Patel, Bhanu Priya Yadav and Aditi Saxena Requires Authentication Unlicensed Licensed |
41 |
Bhawnesh Kumar, Ashwani Kumar, Harendra Singh Negi and Ishwari Singh Rajput Requires Authentication Unlicensed Licensed |
55 |
Deonarain Brijlall, Tauqeer Ahmed Usmani and Richa Indu Requires Authentication Unlicensed Licensed |
69 |
Megha Shah, Akshay Kumar, Shristi Kharola and Mangey Ram Requires Authentication Unlicensed Licensed |
87 |
Harendra Singh Negi, Aditya Bhatt and Vandana Rawat Requires Authentication Unlicensed Licensed |
119 |
Rahul Bijalwan, Vandana Rawat, Akshita Patwal and Sudhanshu Maurya Requires Authentication Unlicensed Licensed |
137 |
Parth Gautam, Apurva Omer, Jeetendra Pande and Devesh Bora Requires Authentication Unlicensed Licensed |
149 |
Bhawnesh Kumar, Aditya Bhatt and Neeraj Panwar Requires Authentication Unlicensed Licensed |
167 |
Requires Authentication Unlicensed Licensed |
179 |
Publishing information
Pages and Images/Illustrations in book
eBook published on:
June 17, 2024
eBook ISBN:
9783111229157
Hardcover published on:
June 17, 2024
Hardcover ISBN:
9783111228006
Pages and Images/Illustrations in book
Front matter:
8
Main content:
181
Illustrations:
11
Coloured Illustrations:
64
Tables:
21
Coloured Tables:
1
Keywords for this book
Security Mechanism; Algorithms; Cyber security; Malwares; Optimization; Limitations
Audience(s) for this book
Academic libraries, researchers, graduate students.
Safety & product resources
-
Manufacturer information:
Walter de Gruyter GmbH
Genthiner Straße 13
10785 Berlin
productsafety@degruyterbrill.com