Kirjojen hintavertailu. Mukana 12 359 622 kirjaa ja 12 kauppaa.

Kirjailija

Vivek Kapoor

Kirjat ja teokset yhdessä paikassa: 40 kirjaa, julkaisuja vuosilta 2012-2025, suosituimpien joukossa Entwurf und Implementierung einer hybriden kryptographischen Technik mit AES. Vertaile teosten hintoja ja tarkista saatavuus suomalaisista kirjakaupoista.

40 kirjaa

Kirjojen julkaisuhaarukka 2012-2025.

Genetic Algorithms and Applications for Stock Trading Optimization
Genetic algorithms (GAs) are based on Darwin's theory of natural selection and survival of the fittest. They are designed to competently look for solutions to big and multifaceted problems. Genetic algorithms are wide groups of interrelated events with divided steps. Each step has dissimilarities, which leads to a broad range of connected actions. Genetic algorithms are used to improve trading systems, such as to optimize a trading rule or parameters of a predefined multiple indicator market trading system. Genetic Algorithms and Applications for Stock Trading Optimization is a complete reference source to genetic algorithms that explains how they might be used to find trading strategies, as well as their use in search and optimization. It covers the functions of genetic algorithms internally, computer implementation of pseudo-code of genetic algorithms in C++, technical analysis for stock market forecasting, and research outcomes that apply in the stock trading system. This book is ideal for computer scientists, IT specialists, data scientists, managers, executives, professionals, academicians, researchers, graduate-level programs, research programs, and post-graduate students of engineering and science.
Genetic Algorithms and Applications for Stock Trading Optimization
Genetic algorithms (GAs) are based on Darwin's theory of natural selection and survival of the fittest. They are designed to competently look for solutions to big and multifaceted problems. Genetic algorithms are wide groups of interrelated events with divided steps. Each step has dissimilarities, which leads to a broad range of connected actions. Genetic algorithms are used to improve trading systems, such as to optimize a trading rule or parameters of a predefined multiple indicator market trading system. Genetic Algorithms and Applications for Stock Trading Optimization is a complete reference source to genetic algorithms that explains how they might be used to find trading strategies, as well as their use in search and optimization. It covers the functions of genetic algorithms internally, computer implementation of pseudo-code of genetic algorithms in C++, technical analysis for stock market forecasting, and research outcomes that apply in the stock trading system. This book is ideal for computer scientists, IT specialists, data scientists, managers, executives, professionals, academicians, researchers, graduate-level programs, research programs, and post-graduate students of engineering and science.
Design & Implementation of Hybrid Cryptographic Technique using AES &
Data security and network security is a crucial domain of research and development. On the other hand the computing changes their face and at the same ways the attackers and intruders are also aware about the traditional security techniques. Thus new kind of security is required to find that are not accurately from the traditional backgrounds. But the traditional cryptographic models are computationally cost effective, produce additional storage overheads, and also generate the less secure cipher for storage. Therefore in order to resolve the issues in cryptographic security a new methodology is required to develop. We have successfully implemented this hybrid approach in .NET environment. Our experimental results demonstrate the effectiveness and efficiency of our technique and ensure security by means of authentication, confidentiality and integrity. Additionally to make obvious performance of anticipated technique the comparative performance study with the traditional RSA algorithm is performed. Results illustrate the effectiveness of this anticipated technique with respect to traditional RSA algorithm.
A New Cryptographic Algorithm to Improve Data Security

A New Cryptographic Algorithm to Improve Data Security

Yograj Sharma; Vivek Kapoor

LAP Lambert Academic Publishing
2019
pokkari
Information is a valuable asset. As an asset information needs to be secured from cryptanalysis attacks. They are computationally intensive application and consume large amount of CPU time and space at the time of encryption. In this work we have proposed a reliable, an efficient and a more secure system by using our proposed algorithm for encryption and decryption. In cryptography, information should be confidential not only when it is stored in the computer, it should maintain its confidentiality when it is transmitted from one computer to another. For this purpose here we proposed an integrated cryptographic scheme. This scheme is based on a new cryptographic algorithm, message digest algorithm MD5 and RSA Algorithm. Proposed Encryption Algorithm is used to achieve confidentiality, whereas Message Digest Algorithm MD5 is used to verify the integrity of the message and by using the message digest as Encryption key consists of 128 bits is sufficiently long against the cryptographic attacks like Brute-force attack, Dictionary attack to make them impractical. Four major security principles such as Authentication, Confidentiality, Integrity of Data and Non-Repudiation are addressed.