توضیحاتی در مورد کتاب Advanced Computing and Systems for Security (Advances in Intelligent Systems and Computing)
نام کتاب : Advanced Computing and Systems for Security (Advances in Intelligent Systems and Computing)
عنوان ترجمه شده به فارسی : محاسبات پیشرفته و سیستم های امنیتی (پیشرفت در سیستم های هوشمند و محاسبات)
سری :
نویسندگان : Rituparna Chaki
ناشر : Springer
سال نشر :
تعداد صفحات : 169
ISBN (شابک) : 9789811081828 , 9811081824
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 7 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Preface\nContents\nAbout the Editors\nAlgorithms\nA Framework for Solution to Nurse Assignment Problem in Health Care with Variable Demand\n 1 Introduction\n 2 Review Work\n 2.1 Heuristic Search\n 3 Research Scope\n 4 Proposed Work\n 4.1 Framework\n 4.2 Description of Proposed Nurse Assignment Methods\n 5 Experimental Results and Discussion\n 5.1 Performance Evaluation of Home Care Nursing Service\n 5.2 Results of Hospital Care Nursing Service in Emergency Scheduling\n 5.3 Results of Combined GA for Regular Scheduling\n 6 Conclusion\n References\nA Novel Bio-inspired Algorithm for Increasing Throughput in Wireless Body Area Network (WBAN) by Mitigating Inter-WBAN Interference\n 1 Introduction\n 2 Related Work\n 3 WBAN Design Model\n 3.1 System Model\n 3.2 Optimization Problem Formulation\n 4 Problem Solving Based on Particle Swarm Optimization (PSO) Technique\n 4.1 Notation\n 4.2 PSO Based Spectrum Allocation Algorithm\n 5 Simulation Results\n 6 Conclusion\n References\nCloud Computing\nPaving the Way for Autonomic Clouds: State-of-the-Art and Future Directions\n 1 Introduction\n 2 Review of Existing Approaches in the Literature\n 2.1 Metaheuristic-Based Approaches\n 2.2 Machine Learning Based Approaches\n 2.3 Market-Based Approaches\n 2.4 Cryptography-Based Approaches\n 2.5 Hybrid Approaches\n 2.6 Miscellaneous Approaches\n 3 Discussion\n 4 Future Directions\n 5 Conclusion\n References\nToward Efficient Autonomic Management of Clouds: A CDS-Based Hierarchical Approach\n 1 Introduction\n 2 Motivation\n 3 Related Work\n 4 Proposed Framework\n 4.1 Preliminaries\n 4.2 Details of the Proposed Framework\n 5 Results and Discussion\n 6 Conclusion\n References\nDelta Authorization Concept for Dynamic Access Control Model in Cloud Environment\n 1 Introduction\n 2 Background Details\n 2.1 Authentication\n 2.2 Authorization\n 2.3 Context-Based Authorization\n 3 Proposed Model\n 3.1 Session Data Management in Different Authorization Model\n 3.2 Structuring the Different Context Conditions\n 4 Implementation Details\n 4.1 Different Phases\n 5 Comparison\n 5.1 Time for Reaction\n 5.2 Message Overhead\n 5.3 Session Management\n 6 Conclusion\n References\nWireless Sensor Networks\nTwo-Hop-Based Geographic Opportunistic Routing in WSNs\n 1 Introduction\n 2 Literature Survey\n 3 Background\n 4 System Model and Problem Definition\n 4.1 Definitions of Node\'s Neighbor and Its Relationships\n 4.2 Terminology: One-Hop and Two-Hop Receivers\n 4.3 Definition of Forwarding Area\n 5 Mathematical Model\n 6 Proposed Algorithm\n 7 Simulation Setup\n 8 Performance Analysis\n 9 Conclusions\n References\nData Gathering from Path-Constrained Mobile Sensors Using Data MULE\n 1 Introduction\n 1.1 Contribution\n 2 Related Works\n 3 Problem Statement and Complexity Analysis\n 4 Algorithm to Find Minimum Data Mules and Their Paths\n 4.1 Example of Execution of Algorithm DGPCMS\n 4.2 Analysis\n 5 Conclusions\n References\nLocalization in 3D Wireless Sensor Network\n 1 Introduction\n 2 Related Work\n 3 Network Model and Assumptions\n 3.1 Assumptions\n 3.2 Energy Consumption Model\n 4 Proposed Work\n 4.1 Mathematical Prerequisites\n 4.2 Region Identification\n 4.3 Abscissa and Ordinates Computation\n 4.4 Height Computation\n 4.5 Algorithm for Localization\n 5 Analysis\n 6 Conclusions and Future Works\n References\nSecurity Systems\nEAER-AODV: Enhanced Trust Model Based on Average Encounter Rate for Secure Routing in MANET\n 1 Introduction\n 2 Related Works\n 3 Trust Model\n 3.1 Average Encounter Rate\n 3.2 Successful Cooperation Frequency (SCF)\n 3.3 Modified D-S Evidence Theory for Recommended Trust\n 3.4 Opinion Evaluation\n 4 Trust-Based Secure Routing Protocol\n 4.1 Route Discovery\n 4.2 Trusted Route Selection\n 5 Results and Analysis\n 5.1 Simulation Environment\n 5.2 Performance Metrics\n 5.3 Simulation Results\n 6 Conclusion\n References\nRepresentation and Validation of Enterprise Security Requirements—A Multigraph Model\n 1 Introduction\n 2 Physical Interconnection Graph (PIG)\n 2.1 Graph Constraint Specification Language for Multigraph Structure\n 3 Policy Specification and Multigraph\n 4 Realization of Multigraph and Experimental Setup\n 5 Conclusion and Future Work\n References\nAuthor Index