Algorithms

Höfundur Sushil C. Dimri, Abhay Saxena, Bhuvan Unhelkar, Akshay Kumar

Útgefandi De Gruyter

Snið ePub

Print ISBN 9783111228006

Útgáfa 1

Útgáfuár 2024

15.190 kr.

Description

Efnisyfirlit

  • Preface
  • Rajiv Ranjan Giri, Richa Indu, Sushil Chandra Dimri Machine learning-enabled techniques for speech categorization
  • 1 Introduction
  • 2 Recent trends in speech categorization
  • 3 Proposed methodology
  • 3.1 Categorizing comments
  • 3.2 Data acquisition and preprocessing
  • 3.3 The proposed algorithm
  • 4 Results and discussion
  • 4.1 Hijab case (Karnataka)
  • 4.2 Boycott movies dataset
  • 4.3 Dharamsansad (Haridwar)
  • 5 Conclusion
  • Akash Dogra, Shiv Ashish Dhondiyal, Sushil Chandra Dimri Comprehensive study of cybersecurity issues and challenges
  • 1 Introduction
  • 2 Cybercrime
  • 3 Cyberspace threats
  • 4 Notable recent cybercrime
  • 5 Cybersecurity
  • 6 Cybersecurity policy
  • 7 Future direction
  • 8 Conclusion
  • Chandrashekhar Patel, Bhanu Priya Yadav, Aditi Saxena An energy-efficient FPGA-based implementation of AES algorithm using HSTL IO standards for new digital age technologies
  • 1 Introduction
  • 1.1 The Advanced Encryption Standard (AES)
  • 1.2 FPGA
  • 1.3 HSTL (high-speed transceiver logic) IO standard
  • 2 Literature review
  • 3 Design methodology
  • 3.1 Simulation
  • 3.2 RTL analysis
  • 3.3 Synthesis
  • 3.4 Implementation
  • 3.5 Program and debug
  • 4 Results and analysis
  • 4.1 Computing total power consumption of HSTL_I_18
  • 4.2 Computing total power consumption of HSTL_II
  • 4.3 Computing total power consumption of HSTL_II_18
  • 5 Conclusion
  • 6 Future scope
  • Bhawnesh Kumar, Ashwani Kumar, Harendra Singh Negi, Ishwari Singh Rajput A comparative study on security issues and clustering of wireless sensor networks
  • 1 Introduction
  • 1.1 Popular research areas of WSNs
  • 1.2 Comparison of clustering objectives and energy consumption of node
  • 1.3 Security and privacy issues in WSN
  • 2 Critical literature review
  • 3 Research gaps identified
  • 4 Conclusion
  • Deonarain Brijlall, Tauqeer Ahmed Usmani, Richa Indu Heuristic approach and its application to solve NP-complete traveling salesman problem
  • 1 Introduction
  • 2 Related work
  • 3 Techniques and mathematical models
  • 3.1 The traveling salesman problem
  • 3.2 Nearest neighbor approach
  • 3.3 Greedy approach
  • 3.4 The proposed heuristic solution
  • 4 Results and discussion
  • 4.1 Identifying the optimal route of a milk van for 10 houses
  • 4.2 Identifying the optimal route of a milk van for 20 houses
  • 5 Conclusion
  • Megha Shah, Akshay Kumar, Shristi Kharola, Mangey Ram Assessment of fake news detection from machine learning and deep learning techniques
  • 1 Introduction
  • 2 Literature survey
  • 3 Methodology
  • 3.1 Natural language processing (NLP)
  • 3.2 Machine learning (ML)
  • 3.3 Deep learning (DL)
  • 3.4 Study framework
  • 3.5 Datasets
  • 3.6 Data cleaning steps (preprocessing the dataset)
  • 3.7 Models utilized in the study
  • 4 Results and analysis of datasets
  • 4.1 Results for dataset 1
  • 4.2 Result for dataset 2
  • 5 Conclusion and future work
  • Harendra Singh Negi, Aditya Bhatt, Vandana Rawat Spam mail detection various machine learning methods and their comparisons
  • 1 Introduction
  • 2 Related works
  • 3 Purposed work
  • 4 Implementation and result
  • 4.1 Performance metrics
  • 4.2 Time elapsed
  • 4.3 AUC-ROC
  • 4.4 PR curve
  • 5 Conclusion
  • Rahul Bijalwan, Vandana Rawat, Akshita Patwal, Sudhanshu Maurya Cybersecurity threats in modern digital world
  • 1 Introduction
  • 2 Literature review
  • 3 Issues in cybersecurity
  • 4 Attacks with their classification
  • 4.1 Phishing
  • 4.2 SQL injection
  • 4.3 Brute force attack
  • 4.4 Malware
  • 4.5 Man-in-the-middle
  • 5 Data breaches
  • 6 Conclusion
  • Parth Gautam, Apurva Omer, Jeetendra Pande, Devesh Bora Mechanism to protect the physical boundary of organization where the private and public networks encounter
  • 1 Introduction
  • 2 Literature review
  • 3 Purpose and objectives
  • 4 Overview of private and public networks
  • 5 Security considerations for private and public networks
  • 5.1 Network segmentation
  • 5.2 Segmentation techniques
  • 5.3 Use of firewalls and intrusion prevention systems (IPS)
  • 5.4 Access control mechanisms
  • 5.5 Network access control (NAC) solutions
  • 5.6 Physical security measures
  • 6 Future trends and considerations
  • 7 Conclusion
  • Bhawnesh Kumar, Aditya Bhatt, Neeraj Panwar By combining binary search and insertion sort, a sorting method for small input size
  • 1 Introduction
  • 2 Related works
  • 3 Proposed work
  • 3.1 Algorithm
  • 3.2 Time complexity
  • 3.3 In the worst case of binary insertion sort
  • 3.4 For average case of binary insertion sort
  • 3.5 Time complexity analysis
  • 4 Numerical illustration
  • 5 Conclusion
  • Index

Additional information

Veldu vöru

Rafbók til eignar

Aðrar vörur

0
    0
    Karfan þín
    Karfan þín er tómAftur í búð