![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Review of Metaheuristic Techniques for Feature Selection
Due to the rise of high-dimensional datasets in various sectors, feature selection is one of the most important issues. The primary goal of the feature selection problem is to lower the dimension of the featur...
-
Chapter and Conference Paper
A Big Data Approach for Healthcare Analysis During Covid-19
In the present times, with the massive growth of the Internet, unbelievably enormous measures of data are in our reach. Although our lives have been changed by prepared access to boundless information, still w...
-
Chapter and Conference Paper
A Review on Metaheuristic Techniques in Automated Cryptanalysis of Classical Substitution Cipher
Between the year 1993 and 2019, a considerable new and different metaheuristic optimization techniques have been presented in the literature for automated cryptanalysis of classical substitution cipher. This p...
-
Chapter and Conference Paper
Swarm Intelligence Techniques for Automated Cryptanalysis of Classical Transposition Cipher: A Review
Between the year 2003 and 2018, a considerable new and different swarm intelligence techniques have been presented in the literature for automated cryptanalysis of classical transposition cipher. This paper co...
-
Chapter and Conference Paper
An Approach for Graph Coloring Problem Using Grou** of Vertices
The algorithm works by dividing the nodes of a graph G into two groups; one is non-visited type of groups including the nodes that are not colored and visited type of groups including the nodes that are alread...
-
Chapter and Conference Paper
Metaheuristic Techniques for Automated Cryptanalysis of Classical Transposition Cipher: A Review
Between the year 1994 and 2018, a considerable new and different metaheuristic optimization techniques have been presented in the literature for automated cryptanalysis of classical transposition cipher. This ...
-
Chapter and Conference Paper
State of the Art and Challenges in Blockchain Applications
Blockchain is a decentralized infrastructure widely used in emerging digital cryptocurrencies. With the gradual acceptance of Bitcoin, it has attracted attention and research in this field. Blockchain technolo...
-
Chapter and Conference Paper
A Modified Cuckoo Search for the n-Queens Problem
A modified cuckoo search algorithm is proposed in this paper to solve the n-queens problem. For solving the problem, the host nests are treated as permutations of a cluster of distinctive values. The main idea is...
-
Chapter and Conference Paper
Classification of Cervical Cancer Through C4.5 Algorithm
In today’s scenario, cervical malignant growth is one of the most affecting diseases in females. Its pace of event is around 80% in low and middle-pay nations. Cancer research is very important for the early t...
-
Chapter and Conference Paper
Analysis of Career Development Opportunities in IT Sectors in Jaipur
Career development programs are gaining significance as a stimulus that drive the employee growth as well as organization productivity, and hence, all the organizations are attempting to adopt the concept and ...
-
Chapter and Conference Paper
A New Design of Equiangular Circular Cum Elliptical Honeycomb Photonic Crystal Fiber
The design of Silica Glass photonic crystal fiber is proposed for lowering the chromatic dispersion. For this design, Finite Difference Time Domain (FDTD) methodology along with the transparent boundary condit...
-
Chapter and Conference Paper
Local Invariant Feature-Based Gender Recognition from Facial Images
Human gender is an important demographic characteristic in the society. Recognizing demography characteristics of individuals, for example, age and gender using automatic image recognition taken much considera...
-
Chapter and Conference Paper
Performance Assessment of Thirteen Crossover Operators Using GA
Performance of genetic algorithms depends on evolutionary operators, i.e., selection, crossover, and mutation, in general, and on the type of crossover operators, in particular. With constant research going on...
-
Chapter and Conference Paper
A New Heuristic Based on the Cuckoo Search for Cryptanalysis of Substitution Ciphers
The efficient utilization of one of the latest search heuristic, namely, cuckoo search for automated cryptanalysis (or attack) of substitution ciphers is addressed. A previously proposed genetic algorithm base...
-
Chapter and Conference Paper
Cryptanalytic Results on Knapsack Cryptosystem Using Binary Particle Swarm Optimization
The security of most Public Key Cryptosystem (PKC) proposed in literature relies on the difficulty of the integer factorization problem or discrete logarithm problem. However, using shor’s [19] algorithm the p...
-
Chapter and Conference Paper
Identification of Conjunct Verbs in Hindi and Its Effect on Parsing Accuracy
This paper introduces a work on identification of conjunct verbs in Hindi. The paper will first focus on investigating which noun-verb combination makes a conjunct verb in Hindi using a set of linguistic diagn...
-
Article
Relating logic programs via program maps
This paper presents a mathematical theory underlying a systematic method for constructingProlog programs calledstepwise enhancement. Stepwise enhancement dictates building a program starting with askeleton progra...