Open Access Open Access  Restricted Access Subscription Access

Application of Factorial and Binomial Identities in Information, Cybersecurity and Machine Learning


Affiliations
1 Department of Management, Indian Institute of Technology, Kharagpur-2, India
 

This paper presents application of the binomial and factorial identities and expansions that are used in artificial intelligence, machine learning, and cybersecurity. The factorial and binomial identities can be used as methodological advances for various algorithms and applications in information and computational science. Cybersecurity is the practice of protecting the computing systems, communication networks, data and programs from cyber-attacks. Its objective is to reduce the risk of cyber-attacks and protect against the unauthorized exploitation of systems and networks. For this purposes, we need a strong cryptographic algorithms like RSA algorithm and Elliptic Curve Cryptography. In this connection, computing and combinatorial techniques based on factorials and binomial distributions are developed for the researchers who are working in artificial intelligence and cybersecurity.

Keywords

Cybersecurity, Combinatorics, Computation, Factorial, Information.
User
Notifications
Font Size

  • McCulloch J F (1888) “A Theorem in Factorials”, Annals of Mathematics, 4(5), 161-163. https://doi.org/10.2307/1967449.
  • Bhargava M (2008) “The Factorial Function and Generalizations”, the American Mathematical Montly, 107(9),783 – 199.https://doi.org/10.2307/2695734
  • Annamalai C (2020) “Optimized Computing Technique for Combination in Combinatorics”, hal-0286583. https://doi.org/10.31219/osf.io/9p4ek.
  • Annamalai C (2020) “Novel Computing Technique in Combinatorics”, hal-02862222.https://doi.org/10.31219/osf.io/m9re5.
  • Annamalai C (2022) “Comparison between Optimized and Traditional Combinations of Combinatorics”, OSF Preprints.https://doi.org/10.31219/osf.io/2qdyz.
  • Annamalai C (2022) “Novel Binomial Series and its Summations”, Authorea Preprints.https://doi.org//au.164933885.53684288/v2.
  • Annamalai C (2022) “Annamalai’s Binomial Identity and Theorem”, SSRN Electronic Journal. http://dx.doi.org/10.2139/ssrn.4097907.
  • Annamalai C (2022) “Sum of Summations of Annamalai’s Binomial Expansions”, ZenodoPrepints. https://doi.org/10.5281/zenodo.6582700.
  • Annamalai C (2022) “Combinatorial Theorem for Multiple of Two with Exponents”, OSF Preprints. https://doi.org/10.31219/osf.io/awu6b.
  • Annamalai C (2022) “Combinatorial Relation of Optimized Combination with Permutation”, Zenodo. https://doi.org/10.5281/zenodo.6341590.
  • Annamalai C (2022) “Application of Factorial and Binomial identities in Cybersecurity”, engrXiv. https://doi.org/10.31224/2355.
  • Annamalai C (2022) “A Binomial Expansion equal to Multiple of 2 with Non-Negative Exponents”, OSF Preprints.https://doi.org/10.31219/osf.io/73quz.
  • Annamalai C (2022) “Computation of Binomial Expansions and Application in Science and Engineering”, engrXiv. https://doi.org/10.31224/2373.
  • Annamalai C (2022) “Computation of Sum of Optimized Binomial Coefficients and Application in Computational Science and Engineering, ZenodoPrepints, https://doi.org/10.5281/zenodo.6589551.
  • Annamalai C (2010) “Application of Exponential Decay and Geometric Series in Effective Medicine”, Advances in Bioscience and Biotechnology, 1(1), 51-54. https://doi.org/10.4236/abb.2010.11008.

Abstract Views: 116

PDF Views: 0




  • Application of Factorial and Binomial Identities in Information, Cybersecurity and Machine Learning

Abstract Views: 116  |  PDF Views: 0

Authors

Chinnaraji Annamalai
Department of Management, Indian Institute of Technology, Kharagpur-2, India

Abstract


This paper presents application of the binomial and factorial identities and expansions that are used in artificial intelligence, machine learning, and cybersecurity. The factorial and binomial identities can be used as methodological advances for various algorithms and applications in information and computational science. Cybersecurity is the practice of protecting the computing systems, communication networks, data and programs from cyber-attacks. Its objective is to reduce the risk of cyber-attacks and protect against the unauthorized exploitation of systems and networks. For this purposes, we need a strong cryptographic algorithms like RSA algorithm and Elliptic Curve Cryptography. In this connection, computing and combinatorial techniques based on factorials and binomial distributions are developed for the researchers who are working in artificial intelligence and cybersecurity.

Keywords


Cybersecurity, Combinatorics, Computation, Factorial, Information.

References