Enterprise Service Oriented Architectures
Concepts, Challenges, Recommendations
Chapter and Conference Paper
In the present times, with the massive growth of the Internet, unbelievably enormous measures of data are in our reach. Although our lives have been changed by prepared access to boundless information, still w...
Chapter and Conference Paper
Between the year 2003 and 2018, a considerable new and different swarm intelligence techniques have been presented in the literature for automated cryptanalysis of classical transposition cipher. This paper co...
Chapter and Conference Paper
Between the year 1994 and 2018, a considerable new and different metaheuristic optimization techniques have been presented in the literature for automated cryptanalysis of classical transposition cipher. This ...
Chapter and Conference Paper
Blockchain is a decentralized infrastructure widely used in emerging digital cryptocurrencies. With the gradual acceptance of Bitcoin, it has attracted attention and research in this field. Blockchain technolo...
Chapter and Conference Paper
The efficient utilization of one of the latest search heuristic, namely, cuckoo search for automated cryptanalysis (or attack) of substitution ciphers is addressed. A previously proposed genetic algorithm base...
Chapter and Conference Paper
This paper introduces a work on identification of conjunct verbs in Hindi. The paper will first focus on investigating which noun-verb combination makes a conjunct verb in Hindi using a set of linguistic diagn...
Book
Chapter
Traditionally software is loaded onto, or downloaded to, a user’s PC where it is then executed. The ubiquitous Web, however, allows another choice, a Web front end for data collection residing on the user’s PC...