Vtome.ru - электронная библиотека

Algorithms: Big Data, Optimization Techniques, Cyber Security

  • Добавил: literator
  • Дата: 9-06-2024, 17:57
  • Комментариев: 0
Название: Algorithms: Big Data, Optimization Techniques, Cyber Security
Автор: Sushil C. Dimri, Abhay Saxena, Bhuvan Unhelkar
Издательство: De Gruyter
Год: 2024
Страниц: 383
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

Algorithms are ubiquitous in the contemporary technological world, and they ultimately consist of finite sequences of instructions used to accomplish tasks with necessary input values. This book analyses the top performing algorithms in areas as diverse as Big Data, Artificial Intelligence, Optimization Techniques and Cloud & Cyber Security Systems in order to explore their power and limitations.

Algorithms play a vital role in all sciences, especially in Computer Science. We are always in search of efficient algorithms that give the results in less amount of time and that consume less space for large input size. Cybersecurity and Big Data are two prominent areas of Computer Science, where the role of algorithms is vital. Algorithms provide the best security mechanism to protect the data from all types of attacks. There are several types of attacks such as threats to data safety, data security, and on the mechanisms to store and retrieve the data.

Cybercrime is a hard reality nowadays, and to deal with that we require full proof of algorithms which provides best data security, data safety, and protection from all kinds of attacks and crimes, which are changing their shapes, nature, and methodology with each passing moment. Big Data is a complicated scattered huge data which increases in size with time. Data processing, data safety, data operations, data information extraction, and so on are all equally important. Big Data is the area that deals with huge amount of data that needs sound high-performance algorithms. To extract the relevant information, data manipulation, access, and retrieval are big challenges.

Depending on intellect, environment, and mindset, humans can effectively identify sarcasm, hatred, abuse, praise, denial, neutrality, and any emotion behind the speech. But for a machine, it is merely a combination of ASCII characters. The machines are unable to identify the sentiments behind a sentence. Thus, to impart such knowledge to machines, several machine learning, deep learning, or natural language processing (NLP) algorithms are utilized. Traditionally, machine learning used several supervised classifiers for detecting hate speech, such as naive Bayes (NB), support vector machines (SVMs), extreme gradient boosting (XGBoost), logistic regression (LR), random forest (RF), k-nearest neighbors (kNNs), and decision tree (DT), which, later on, is advanced with usage of multilayer perceptron (MLP), long short-term memory (LSTM) networks, Bi-LSTM, convolutional neural networks (CNNs), and NLP techniques.

Optimization is a common term used almost everywhere, including our daily life. This book comprises chapters on the study of different algorithms used in cybersecurity and Big Data, and also puts light on optimization methods used in Computer Science. A comparative study of different algorithms is also provided. This book is helpful to students, especially for those who work in areas of cybersecurity and Big Data.

Скачать Algorithms: Big Data, Optimization Techniques, Cyber Security



ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!











ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!


ПРАВООБЛАДАТЕЛЯМ


СООБЩИТЬ ОБ ОШИБКЕ ИЛИ НЕ РАБОЧЕЙ ССЫЛКЕ



Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.