Advanced computing and systems for security. Volume six (2018)
- Record Type:
- Book
- Title:
- Advanced computing and systems for security. Volume six (2018)
- Main Title:
- Advanced computing and systems for security.
- Further Information:
- Note: Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki, editors.
- Editors:
- Chaki, Rituparna
Cortesi, Agostino, 1963-
(Computer scientist), Saeed, Khalid
Chaki, Nabendu - Other Names:
- International Doctoral Symposium on Applied Computation and Security Systems, 4th
- Contents:
- Intro; Preface; Contents; About the Editors; Algorithms; A Framework for Solution to Nurse Assignment Problem in Health Care with Variable Demand; 1 Introduction; 2 Review Work; 2.1 Heuristic Search; 3 Research Scope; 4 Proposed Work; 4.1 Framework; 4.2 Description of Proposed Nurse Assignment Methods; 5 Experimental Results and Discussion; 5.1 Performance Evaluation of Home Care Nursing Service; 5.2 Results of Hospital Care Nursing Service in Emergency Scheduling; 5.3 Results of Combined GA for Regular Scheduling; 6 Conclusion; References. A Novel Bio-inspired Algorithm for Increasing Throughput in Wireless Body Area Network (WBAN) by Mitigating Inter-WBAN Interference1 Introduction; 2 Related Work; 3 WBAN Design Model; 3.1 System Model; 3.2 Optimization Problem Formulation; 4 Problem Solving Based on Particle Swarm Optimization (PSO) Technique; 4.1 Notation; 4.2 PSO Based Spectrum Allocation Algorithm; 5 Simulation Results; 6 Conclusion; References; Cloud Computing; Paving the Way for Autonomic Clouds: State-of-the-Art and Future Directions; 1 Introduction; 2 Review of Existing Approaches in the Literature. 2.1 Metaheuristic-Based Approaches2.2 Machine Learning Based Approaches; 2.3 Market-Based Approaches; 2.4 Cryptography-Based Approaches; 2.5 Hybrid Approaches; 2.6 Miscellaneous Approaches; 3 Discussion; 4 Future Directions; 5 Conclusion; References; Toward Efficient Autonomic Management of Clouds: A CDS-Based Hierarchical Approach; 1 Introduction; 2 Motivation; 3Intro; Preface; Contents; About the Editors; Algorithms; A Framework for Solution to Nurse Assignment Problem in Health Care with Variable Demand; 1 Introduction; 2 Review Work; 2.1 Heuristic Search; 3 Research Scope; 4 Proposed Work; 4.1 Framework; 4.2 Description of Proposed Nurse Assignment Methods; 5 Experimental Results and Discussion; 5.1 Performance Evaluation of Home Care Nursing Service; 5.2 Results of Hospital Care Nursing Service in Emergency Scheduling; 5.3 Results of Combined GA for Regular Scheduling; 6 Conclusion; References. A Novel Bio-inspired Algorithm for Increasing Throughput in Wireless Body Area Network (WBAN) by Mitigating Inter-WBAN Interference1 Introduction; 2 Related Work; 3 WBAN Design Model; 3.1 System Model; 3.2 Optimization Problem Formulation; 4 Problem Solving Based on Particle Swarm Optimization (PSO) Technique; 4.1 Notation; 4.2 PSO Based Spectrum Allocation Algorithm; 5 Simulation Results; 6 Conclusion; References; Cloud Computing; Paving the Way for Autonomic Clouds: State-of-the-Art and Future Directions; 1 Introduction; 2 Review of Existing Approaches in the Literature. 2.1 Metaheuristic-Based Approaches2.2 Machine Learning Based Approaches; 2.3 Market-Based Approaches; 2.4 Cryptography-Based Approaches; 2.5 Hybrid Approaches; 2.6 Miscellaneous Approaches; 3 Discussion; 4 Future Directions; 5 Conclusion; References; Toward Efficient Autonomic Management of Clouds: A CDS-Based Hierarchical Approach; 1 Introduction; 2 Motivation; 3 Related Work; 4 Proposed Framework; 4.1 Preliminaries; 4.2 Details of the Proposed Framework; 5 Results and Discussion; 6 Conclusion; References; Delta Authorization Concept for Dynamic Access Control Model in Cloud Environment. 1 Introduction2 Background Details; 2.1 Authentication; 2.2 Authorization; 2.3 Context-Based Authorization; 3 Proposed Model; 3.1 Session Data Management in Different Authorization Model; 3.2 Structuring the Different Context Conditions; 4 Implementation Details; 4.1 Different Phases; 5 Comparison; 5.1 Time for Reaction; 5.2 Message Overhead; 5.3 Session Management; 6 Conclusion; References; Wireless Sensor Networks; Two-Hop-Based Geographic Opportunistic Routing in WSNs; 1 Introduction; 2 Literature Survey; 3 Background; 4 System Model and Problem Definition. 4.1 Definitions of Node's Neighbor and Its Relationships4.2 Terminology: One-Hop and Two-Hop Receivers; 4.3 Definition of Forwarding Area; 5 Mathematical Model; 6 Proposed Algorithm; 7 Simulation Setup; 8 Performance Analysis; 9 Conclusions; References; Data Gathering from Path-Constrained Mobile Sensors Using Data MULE; 1 Introduction; 1.1 Contribution; 2 Related Works; 3 Problem Statement and Complexity Analysis; 4 Algorithm to Find Minimum Data Mules and Their Paths; 4.1 Example of Execution of Algorithm DGPCMS; 4.2 Analysis; 5 Conclusions; References. … (more)
- Publisher Details:
- Singapore : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource (x, 169 pages), illustrations
- Subjects:
- 005.8
Computer security -- Congresses
Computers -- Access control -- Congresses
Computer science -- Congresses
COMPUTERS -- Security -- General
Computer science
Computer security
Computers -- Access control
Big Data
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9789811081835
9811081832 - Related ISBNs:
- 9789811081828
9811081824 - Notes:
- Note: Includes bibliographical references and index.
Note: Online resource; title from PDF title page (EBSCO, viewed June 01, 2018). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.407182
- Ingest File:
- 02_480.xml