Algorithms : : Big Data, Optimization Techniques, Cyber Security / / ed. by Sushil C. Dimri, Abhay Saxena, Bhuvan Unhelkar, Akshay Kumar.

Algorithms are ubiquitous in the contemporary technological world, and they ultimately consist of finite sequences of instructions used to accomplish tasks with necessary input values. This book analyses the top performing algorithms in areas as diverse as Big Data, Artificial Intelligence, Optimiza...

Full description

Saved in:
Bibliographic Details
MitwirkendeR:
HerausgeberIn:
Place / Publishing House:Berlin ;, Boston : : De Gruyter, , [2024]
©2024
Year of Publication:2024
Language:English
Series:De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences , 17
Online Access:
Physical Description:1 online resource (VIII, 181 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9783111229157
ctrlnum (DE-B1597)650495
collection bib_alma
record_format marc
spelling Algorithms : Big Data, Optimization Techniques, Cyber Security / ed. by Sushil C. Dimri, Abhay Saxena, Bhuvan Unhelkar, Akshay Kumar.
Berlin ; Boston : De Gruyter, [2024]
©2024
1 online resource (VIII, 181 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences , 2626-5427 ; 17
Frontmatter -- Preface -- Contents -- Machine learning-enabled techniques for speech categorization -- Comprehensive study of cybersecurity issues and challenges -- An energy-efficient FPGA-based implementation of AES algorithm using HSTL IO standards for new digital age technologies -- A comparative study on security issues and clustering of wireless sensor networks -- Heuristic approach and its application to solve NP-complete traveling salesman problem -- Assessment of fake news detection from machine learning and deep learning techniques -- Spam mail detection various machine learning methods and their comparisons -- Cybersecurity threats in modern digital world -- Mechanism to protect the physical boundary of organization where the private and public networks encounter -- By combining binary search and insertion sort, a sorting method for small input size -- Index
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
Algorithms are ubiquitous in the contemporary technological world, and they ultimately consist of finite sequences of instructions used to accomplish tasks with necessary input values. This book analyses the top performing algorithms in areas as diverse as Big Data, Artificial Intelligence, Optimization Techniques and Cloud & Cyber Security Systems in order to explore their power and limitations.
Issued also in print.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 03. Jul 2024)
Algorithmen.
Cybersicherheit.
Einschränkungen.
Malware.
Optimierung.
Sicherheitsmechanismen.
COMPUTERS / Programming / Algorithms. bisacsh
Security Mechanism, Algorithms, Cyber security, Malwares, Optimization, Limitations.
Bhatt, Aditya, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Bijalwan, Rahul, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Bora, Devesh, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Brijlall, Deonarain, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Dhondiyal, Shiv Ashish, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Dimri, Sushil C., editor. edt http://id.loc.gov/vocabulary/relators/edt
Dimri, Sushil Chandra, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Dogra, Akash, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Gautam, Parth, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Indu, Richa, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Kharola, Shristi, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Kumar, Akshay, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Kumar, Akshay, editor. edt http://id.loc.gov/vocabulary/relators/edt
Kumar, Ashwani, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Kumar, Bhawnesh, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Maurya, Sudhanshu, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Negi, Harendra Singh, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Omer, Apurva, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Pande, Jeetendra, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Panwar, Neeraj, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Patel, Chandrashekhar, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Patwal, Akshita, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Rajput, Ishwari Singh, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Ram, Mangey, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Ranjan Giri, Rajiv, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Rawat, Vandana, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Saxena, Abhay, editor. edt http://id.loc.gov/vocabulary/relators/edt
Saxena, Aditi, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Shah, Megha, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Unhelkar, Bhuvan, editor. edt http://id.loc.gov/vocabulary/relators/edt
Usmani, Tauqeer Ahmed, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Yadav, Bhanu Priya, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
EPUB 9783111229638
print 9783111228006
https://doi.org/10.1515/9783111229157
https://www.degruyter.com/isbn/9783111229157
Cover https://www.degruyter.com/document/cover/isbn/9783111229157/original
language English
format eBook
author2 Bhatt, Aditya,
Bhatt, Aditya,
Bijalwan, Rahul,
Bijalwan, Rahul,
Bora, Devesh,
Bora, Devesh,
Brijlall, Deonarain,
Brijlall, Deonarain,
Dhondiyal, Shiv Ashish,
Dhondiyal, Shiv Ashish,
Dimri, Sushil C.,
Dimri, Sushil C.,
Dimri, Sushil Chandra,
Dimri, Sushil Chandra,
Dogra, Akash,
Dogra, Akash,
Gautam, Parth,
Gautam, Parth,
Indu, Richa,
Indu, Richa,
Kharola, Shristi,
Kharola, Shristi,
Kumar, Akshay,
Kumar, Akshay,
Kumar, Akshay,
Kumar, Akshay,
Kumar, Ashwani,
Kumar, Ashwani,
Kumar, Bhawnesh,
Kumar, Bhawnesh,
Maurya, Sudhanshu,
Maurya, Sudhanshu,
Negi, Harendra Singh,
Negi, Harendra Singh,
Omer, Apurva,
Omer, Apurva,
Pande, Jeetendra,
Pande, Jeetendra,
Panwar, Neeraj,
Panwar, Neeraj,
Patel, Chandrashekhar,
Patel, Chandrashekhar,
Patwal, Akshita,
Patwal, Akshita,
Rajput, Ishwari Singh,
Rajput, Ishwari Singh,
Ram, Mangey,
Ram, Mangey,
Ranjan Giri, Rajiv,
Ranjan Giri, Rajiv,
Rawat, Vandana,
Rawat, Vandana,
Saxena, Abhay,
Saxena, Abhay,
Saxena, Aditi,
Saxena, Aditi,
Shah, Megha,
Shah, Megha,
Unhelkar, Bhuvan,
Unhelkar, Bhuvan,
Usmani, Tauqeer Ahmed,
Usmani, Tauqeer Ahmed,
Yadav, Bhanu Priya,
Yadav, Bhanu Priya,
author_facet Bhatt, Aditya,
Bhatt, Aditya,
Bijalwan, Rahul,
Bijalwan, Rahul,
Bora, Devesh,
Bora, Devesh,
Brijlall, Deonarain,
Brijlall, Deonarain,
Dhondiyal, Shiv Ashish,
Dhondiyal, Shiv Ashish,
Dimri, Sushil C.,
Dimri, Sushil C.,
Dimri, Sushil Chandra,
Dimri, Sushil Chandra,
Dogra, Akash,
Dogra, Akash,
Gautam, Parth,
Gautam, Parth,
Indu, Richa,
Indu, Richa,
Kharola, Shristi,
Kharola, Shristi,
Kumar, Akshay,
Kumar, Akshay,
Kumar, Akshay,
Kumar, Akshay,
Kumar, Ashwani,
Kumar, Ashwani,
Kumar, Bhawnesh,
Kumar, Bhawnesh,
Maurya, Sudhanshu,
Maurya, Sudhanshu,
Negi, Harendra Singh,
Negi, Harendra Singh,
Omer, Apurva,
Omer, Apurva,
Pande, Jeetendra,
Pande, Jeetendra,
Panwar, Neeraj,
Panwar, Neeraj,
Patel, Chandrashekhar,
Patel, Chandrashekhar,
Patwal, Akshita,
Patwal, Akshita,
Rajput, Ishwari Singh,
Rajput, Ishwari Singh,
Ram, Mangey,
Ram, Mangey,
Ranjan Giri, Rajiv,
Ranjan Giri, Rajiv,
Rawat, Vandana,
Rawat, Vandana,
Saxena, Abhay,
Saxena, Abhay,
Saxena, Aditi,
Saxena, Aditi,
Shah, Megha,
Shah, Megha,
Unhelkar, Bhuvan,
Unhelkar, Bhuvan,
Usmani, Tauqeer Ahmed,
Usmani, Tauqeer Ahmed,
Yadav, Bhanu Priya,
Yadav, Bhanu Priya,
author2_variant a b ab
a b ab
r b rb
r b rb
d b db
d b db
d b db
d b db
s a d sa sad
s a d sa sad
s c d sc scd
s c d sc scd
s c d sc scd
s c d sc scd
a d ad
a d ad
p g pg
p g pg
r i ri
r i ri
s k sk
s k sk
a k ak
a k ak
a k ak
a k ak
a k ak
a k ak
b k bk
b k bk
s m sm
s m sm
h s n hs hsn
h s n hs hsn
a o ao
a o ao
j p jp
j p jp
n p np
n p np
c p cp
c p cp
a p ap
a p ap
i s r is isr
i s r is isr
m r mr
m r mr
g r r gr grr
g r r gr grr
v r vr
v r vr
a s as
a s as
a s as
a s as
m s ms
m s ms
b u bu
b u bu
t a u ta tau
t a u ta tau
b p y bp bpy
b p y bp bpy
author2_role MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
HerausgeberIn
HerausgeberIn
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
HerausgeberIn
HerausgeberIn
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
HerausgeberIn
HerausgeberIn
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
HerausgeberIn
HerausgeberIn
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
author_sort Bhatt, Aditya,
title Algorithms : Big Data, Optimization Techniques, Cyber Security /
spellingShingle Algorithms : Big Data, Optimization Techniques, Cyber Security /
De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences ,
Frontmatter --
Preface --
Contents --
Machine learning-enabled techniques for speech categorization --
Comprehensive study of cybersecurity issues and challenges --
An energy-efficient FPGA-based implementation of AES algorithm using HSTL IO standards for new digital age technologies --
A comparative study on security issues and clustering of wireless sensor networks --
Heuristic approach and its application to solve NP-complete traveling salesman problem --
Assessment of fake news detection from machine learning and deep learning techniques --
Spam mail detection various machine learning methods and their comparisons --
Cybersecurity threats in modern digital world --
Mechanism to protect the physical boundary of organization where the private and public networks encounter --
By combining binary search and insertion sort, a sorting method for small input size --
Index
title_sub Big Data, Optimization Techniques, Cyber Security /
title_full Algorithms : Big Data, Optimization Techniques, Cyber Security / ed. by Sushil C. Dimri, Abhay Saxena, Bhuvan Unhelkar, Akshay Kumar.
title_fullStr Algorithms : Big Data, Optimization Techniques, Cyber Security / ed. by Sushil C. Dimri, Abhay Saxena, Bhuvan Unhelkar, Akshay Kumar.
title_full_unstemmed Algorithms : Big Data, Optimization Techniques, Cyber Security / ed. by Sushil C. Dimri, Abhay Saxena, Bhuvan Unhelkar, Akshay Kumar.
title_auth Algorithms : Big Data, Optimization Techniques, Cyber Security /
title_alt Frontmatter --
Preface --
Contents --
Machine learning-enabled techniques for speech categorization --
Comprehensive study of cybersecurity issues and challenges --
An energy-efficient FPGA-based implementation of AES algorithm using HSTL IO standards for new digital age technologies --
A comparative study on security issues and clustering of wireless sensor networks --
Heuristic approach and its application to solve NP-complete traveling salesman problem --
Assessment of fake news detection from machine learning and deep learning techniques --
Spam mail detection various machine learning methods and their comparisons --
Cybersecurity threats in modern digital world --
Mechanism to protect the physical boundary of organization where the private and public networks encounter --
By combining binary search and insertion sort, a sorting method for small input size --
Index
title_new Algorithms :
title_sort algorithms : big data, optimization techniques, cyber security /
series De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences ,
series2 De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences ,
publisher De Gruyter,
publishDate 2024
physical 1 online resource (VIII, 181 p.)
Issued also in print.
contents Frontmatter --
Preface --
Contents --
Machine learning-enabled techniques for speech categorization --
Comprehensive study of cybersecurity issues and challenges --
An energy-efficient FPGA-based implementation of AES algorithm using HSTL IO standards for new digital age technologies --
A comparative study on security issues and clustering of wireless sensor networks --
Heuristic approach and its application to solve NP-complete traveling salesman problem --
Assessment of fake news detection from machine learning and deep learning techniques --
Spam mail detection various machine learning methods and their comparisons --
Cybersecurity threats in modern digital world --
Mechanism to protect the physical boundary of organization where the private and public networks encounter --
By combining binary search and insertion sort, a sorting method for small input size --
Index
isbn 9783111229157
9783111229638
9783111228006
issn 2626-5427 ;
url https://doi.org/10.1515/9783111229157
https://www.degruyter.com/isbn/9783111229157
https://www.degruyter.com/document/cover/isbn/9783111229157/original
illustrated Not Illustrated
doi_str_mv 10.1515/9783111229157
work_keys_str_mv AT bhattaditya algorithmsbigdataoptimizationtechniquescybersecurity
AT bijalwanrahul algorithmsbigdataoptimizationtechniquescybersecurity
AT boradevesh algorithmsbigdataoptimizationtechniquescybersecurity
AT brijlalldeonarain algorithmsbigdataoptimizationtechniquescybersecurity
AT dhondiyalshivashish algorithmsbigdataoptimizationtechniquescybersecurity
AT dimrisushilc algorithmsbigdataoptimizationtechniquescybersecurity
AT dimrisushilchandra algorithmsbigdataoptimizationtechniquescybersecurity
AT dograakash algorithmsbigdataoptimizationtechniquescybersecurity
AT gautamparth algorithmsbigdataoptimizationtechniquescybersecurity
AT induricha algorithmsbigdataoptimizationtechniquescybersecurity
AT kharolashristi algorithmsbigdataoptimizationtechniquescybersecurity
AT kumarakshay algorithmsbigdataoptimizationtechniquescybersecurity
AT kumarashwani algorithmsbigdataoptimizationtechniquescybersecurity
AT kumarbhawnesh algorithmsbigdataoptimizationtechniquescybersecurity
AT mauryasudhanshu algorithmsbigdataoptimizationtechniquescybersecurity
AT negiharendrasingh algorithmsbigdataoptimizationtechniquescybersecurity
AT omerapurva algorithmsbigdataoptimizationtechniquescybersecurity
AT pandejeetendra algorithmsbigdataoptimizationtechniquescybersecurity
AT panwarneeraj algorithmsbigdataoptimizationtechniquescybersecurity
AT patelchandrashekhar algorithmsbigdataoptimizationtechniquescybersecurity
AT patwalakshita algorithmsbigdataoptimizationtechniquescybersecurity
AT rajputishwarisingh algorithmsbigdataoptimizationtechniquescybersecurity
AT rammangey algorithmsbigdataoptimizationtechniquescybersecurity
AT ranjangirirajiv algorithmsbigdataoptimizationtechniquescybersecurity
AT rawatvandana algorithmsbigdataoptimizationtechniquescybersecurity
AT saxenaabhay algorithmsbigdataoptimizationtechniquescybersecurity
AT saxenaaditi algorithmsbigdataoptimizationtechniquescybersecurity
AT shahmegha algorithmsbigdataoptimizationtechniquescybersecurity
AT unhelkarbhuvan algorithmsbigdataoptimizationtechniquescybersecurity
AT usmanitauqeerahmed algorithmsbigdataoptimizationtechniquescybersecurity
AT yadavbhanupriya algorithmsbigdataoptimizationtechniquescybersecurity
status_str n
ids_txt_mv (DE-B1597)650495
carrierType_str_mv cr
is_hierarchy_title Algorithms : Big Data, Optimization Techniques, Cyber Security /
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
_version_ 1806145991410188288
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06690nam a2201009 4500 </leader><controlfield tag="001">9783111229157</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20240703114541.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">240703t20242024gw fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783111229157</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9783111229157</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)650495</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM051300</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Algorithms :</subfield><subfield code="b">Big Data, Optimization Techniques, Cyber Security /</subfield><subfield code="c">ed. by Sushil C. Dimri, Abhay Saxena, Bhuvan Unhelkar, Akshay Kumar.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ;</subfield><subfield code="a">Boston : </subfield><subfield code="b">De Gruyter, </subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (VIII, 181 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences ,</subfield><subfield code="x">2626-5427 ;</subfield><subfield code="v">17</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Machine learning-enabled techniques for speech categorization -- </subfield><subfield code="t">Comprehensive study of cybersecurity issues and challenges -- </subfield><subfield code="t">An energy-efficient FPGA-based implementation of AES algorithm using HSTL IO standards for new digital age technologies -- </subfield><subfield code="t">A comparative study on security issues and clustering of wireless sensor networks -- </subfield><subfield code="t">Heuristic approach and its application to solve NP-complete traveling salesman problem -- </subfield><subfield code="t">Assessment of fake news detection from machine learning and deep learning techniques -- </subfield><subfield code="t">Spam mail detection various machine learning methods and their comparisons -- </subfield><subfield code="t">Cybersecurity threats in modern digital world -- </subfield><subfield code="t">Mechanism to protect the physical boundary of organization where the private and public networks encounter -- </subfield><subfield code="t">By combining binary search and insertion sort, a sorting method for small input size -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Algorithms are ubiquitous in the contemporary technological world, and they ultimately consist of finite sequences of instructions used to accomplish tasks with necessary input values. This book analyses the top performing algorithms in areas as diverse as Big Data, Artificial Intelligence, Optimization Techniques and Cloud &amp; Cyber Security Systems in order to explore their power and limitations.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 03. Jul 2024)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithmen.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cybersicherheit.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Einschränkungen.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Malware.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Optimierung.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sicherheitsmechanismen.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Programming / Algorithms.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security Mechanism, Algorithms, Cyber security, Malwares, Optimization, Limitations.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bhatt, Aditya, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bijalwan, Rahul, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bora, Devesh, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Brijlall, Deonarain, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dhondiyal, Shiv Ashish, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dimri, Sushil C., </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dimri, Sushil Chandra, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dogra, Akash, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gautam, Parth, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Indu, Richa, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kharola, Shristi, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Akshay, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Akshay, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Ashwani, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Bhawnesh, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Maurya, Sudhanshu, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Negi, Harendra Singh, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Omer, Apurva, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pande, Jeetendra, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Panwar, Neeraj, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Patel, Chandrashekhar, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Patwal, Akshita, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rajput, Ishwari Singh, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ram, Mangey, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ranjan Giri, Rajiv, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rawat, Vandana, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Saxena, Abhay, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Saxena, Aditi, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shah, Megha, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Unhelkar, Bhuvan, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Usmani, Tauqeer Ahmed, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yadav, Bhanu Priya, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">EPUB</subfield><subfield code="z">9783111229638</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9783111228006</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9783111229157</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9783111229157</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9783111229157/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield></record></collection>