Advanced Computing and Systems for Security (Advances in Intelligent Systems and Computing)

دانلود کتاب Advanced Computing and Systems for Security (Advances in Intelligent Systems and Computing)

45000 تومان موجود

کتاب محاسبات پیشرفته و سیستم های امنیتی (پیشرفت در سیستم های هوشمند و محاسبات) نسخه زبان اصلی

دانلود کتاب محاسبات پیشرفته و سیستم های امنیتی (پیشرفت در سیستم های هوشمند و محاسبات) بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 10


توضیحاتی در مورد کتاب Advanced Computing and Systems for Security (Advances in Intelligent Systems and Computing)

نام کتاب : Advanced Computing and Systems for Security (Advances in Intelligent Systems and Computing)
عنوان ترجمه شده به فارسی : محاسبات پیشرفته و سیستم های امنیتی (پیشرفت در سیستم های هوشمند و محاسبات)
سری :
نویسندگان :
ناشر : Springer
سال نشر :
تعداد صفحات : 169
ISBN (شابک) : 9789811081828 , 9811081824
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 7 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Preface\nContents\nAbout the Editors\nAlgorithms\nA Framework for Solution to Nurse Assignment Problem in Health Care with Variable Demand\n 1 Introduction\n 2 Review Work\n 2.1 Heuristic Search\n 3 Research Scope\n 4 Proposed Work\n 4.1 Framework\n 4.2 Description of Proposed Nurse Assignment Methods\n 5 Experimental Results and Discussion\n 5.1 Performance Evaluation of Home Care Nursing Service\n 5.2 Results of Hospital Care Nursing Service in Emergency Scheduling\n 5.3 Results of Combined GA for Regular Scheduling\n 6 Conclusion\n References\nA Novel Bio-inspired Algorithm for Increasing Throughput in Wireless Body Area Network (WBAN) by Mitigating Inter-WBAN Interference\n 1 Introduction\n 2 Related Work\n 3 WBAN Design Model\n 3.1 System Model\n 3.2 Optimization Problem Formulation\n 4 Problem Solving Based on Particle Swarm Optimization (PSO) Technique\n 4.1 Notation\n 4.2 PSO Based Spectrum Allocation Algorithm\n 5 Simulation Results\n 6 Conclusion\n References\nCloud Computing\nPaving the Way for Autonomic Clouds: State-of-the-Art and Future Directions\n 1 Introduction\n 2 Review of Existing Approaches in the Literature\n 2.1 Metaheuristic-Based Approaches\n 2.2 Machine Learning Based Approaches\n 2.3 Market-Based Approaches\n 2.4 Cryptography-Based Approaches\n 2.5 Hybrid Approaches\n 2.6 Miscellaneous Approaches\n 3 Discussion\n 4 Future Directions\n 5 Conclusion\n References\nToward Efficient Autonomic Management of Clouds: A CDS-Based Hierarchical Approach\n 1 Introduction\n 2 Motivation\n 3 Related Work\n 4 Proposed Framework\n 4.1 Preliminaries\n 4.2 Details of the Proposed Framework\n 5 Results and Discussion\n 6 Conclusion\n References\nDelta Authorization Concept for Dynamic Access Control Model in Cloud Environment\n 1 Introduction\n 2 Background Details\n 2.1 Authentication\n 2.2 Authorization\n 2.3 Context-Based Authorization\n 3 Proposed Model\n 3.1 Session Data Management in Different Authorization Model\n 3.2 Structuring the Different Context Conditions\n 4 Implementation Details\n 4.1 Different Phases\n 5 Comparison\n 5.1 Time for Reaction\n 5.2 Message Overhead\n 5.3 Session Management\n 6 Conclusion\n References\nWireless Sensor Networks\nTwo-Hop-Based Geographic Opportunistic Routing in WSNs\n 1 Introduction\n 2 Literature Survey\n 3 Background\n 4 System Model and Problem Definition\n 4.1 Definitions of Node\'s Neighbor and Its Relationships\n 4.2 Terminology: One-Hop and Two-Hop Receivers\n 4.3 Definition of Forwarding Area\n 5 Mathematical Model\n 6 Proposed Algorithm\n 7 Simulation Setup\n 8 Performance Analysis\n 9 Conclusions\n References\nData Gathering from Path-Constrained Mobile Sensors Using Data MULE\n 1 Introduction\n 1.1 Contribution\n 2 Related Works\n 3 Problem Statement and Complexity Analysis\n 4 Algorithm to Find Minimum Data Mules and Their Paths\n 4.1 Example of Execution of Algorithm DGPCMS\n 4.2 Analysis\n 5 Conclusions\n References\nLocalization in 3D Wireless Sensor Network\n 1 Introduction\n 2 Related Work\n 3 Network Model and Assumptions\n 3.1 Assumptions\n 3.2 Energy Consumption Model\n 4 Proposed Work\n 4.1 Mathematical Prerequisites\n 4.2 Region Identification\n 4.3 Abscissa and Ordinates Computation\n 4.4 Height Computation\n 4.5 Algorithm for Localization\n 5 Analysis\n 6 Conclusions and Future Works\n References\nSecurity Systems\nEAER-AODV: Enhanced Trust Model Based on Average Encounter Rate for Secure Routing in MANET\n 1 Introduction\n 2 Related Works\n 3 Trust Model\n 3.1 Average Encounter Rate\n 3.2 Successful Cooperation Frequency (SCF)\n 3.3 Modified D-S Evidence Theory for Recommended Trust\n 3.4 Opinion Evaluation\n 4 Trust-Based Secure Routing Protocol\n 4.1 Route Discovery\n 4.2 Trusted Route Selection\n 5 Results and Analysis\n 5.1 Simulation Environment\n 5.2 Performance Metrics\n 5.3 Simulation Results\n 6 Conclusion\n References\nRepresentation and Validation of Enterprise Security Requirements—A Multigraph Model\n 1 Introduction\n 2 Physical Interconnection Graph (PIG)\n 2.1 Graph Constraint Specification Language for Multigraph Structure\n 3 Policy Specification and Multigraph\n 4 Realization of Multigraph and Experimental Setup\n 5 Conclusion and Future Work\n References\nAuthor Index




پست ها تصادفی