Coverart for item
The Resource Advanced computing and systems for security, Volume six, Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki, editors, (electronic book)

Advanced computing and systems for security, Volume six, Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki, editors, (electronic book)

Label
Advanced computing and systems for security, Volume six
Title
Advanced computing and systems for security
Title number
Volume six
Statement of responsibility
Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki, editors
Contributor
Editor
Subject
Genre
Language
eng
Summary
This book contains extended version of selected works that have been discussed and presented in the fourth International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2017) held in Patna, India during March 17-19, 2017. The symposium was organized by the Departments of Computer Science & Engineering and A. K. Choudhury School of Information Technology, both from University of Calcutta in collaboration with NIT, Patna. The International partners for ACSS 2016 had been Ca Foscari University of Venice, Italy and Bialystok University of Technology, Poland. This bi-volume book has a total of 21 papers divided in 7 chapters. The chapters reflect the sessions in which the works have been discussed during the symposium. The different chapters in the book include works on biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems
Member of
Cataloging source
N$T
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorDate
  • 1963-
  • 2017
http://library.link/vocab/relatedWorkOrContributorName
  • Chaki, Rituparna
  • Cortesi, Agostino
  • Saeed, Khalid
  • Chaki, Nabendu
  • International Doctoral Symposium on Applied Computation and Security Systems
Series statement
Advances in intelligent systems and computing
Series volume
volume 667
http://library.link/vocab/subjectName
  • Computer security
  • Computers
  • Computer science
Label
Advanced computing and systems for security, Volume six, Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki, editors, (electronic book)
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Intro; Preface; Contents; About the Editors; Algorithms; A Framework for Solution to Nurse Assignment Problem in Health Care with Variable Demand; 1 Introduction; 2 Review Work; 2.1 Heuristic Search; 3 Research Scope; 4 Proposed Work; 4.1 Framework; 4.2 Description of Proposed Nurse Assignment Methods; 5 Experimental Results and Discussion; 5.1 Performance Evaluation of Home Care Nursing Service; 5.2 Results of Hospital Care Nursing Service in Emergency Scheduling; 5.3 Results of Combined GA for Regular Scheduling; 6 Conclusion; References
  • A Novel Bio-inspired Algorithm for Increasing Throughput in Wireless Body Area Network (WBAN) by Mitigating Inter-WBAN Interference1 Introduction; 2 Related Work; 3 WBAN Design Model; 3.1 System Model; 3.2 Optimization Problem Formulation; 4 Problem Solving Based on Particle Swarm Optimization (PSO) Technique; 4.1 Notation; 4.2 PSO Based Spectrum Allocation Algorithm; 5 Simulation Results; 6 Conclusion; References; Cloud Computing; Paving the Way for Autonomic Clouds: State-of-the-Art and Future Directions; 1 Introduction; 2 Review of Existing Approaches in the Literature
  • 2.1 Metaheuristic-Based Approaches2.2 Machine Learning Based Approaches; 2.3 Market-Based Approaches; 2.4 Cryptography-Based Approaches; 2.5 Hybrid Approaches; 2.6 Miscellaneous Approaches; 3 Discussion; 4 Future Directions; 5 Conclusion; References; Toward Efficient Autonomic Management of Clouds: A CDS-Based Hierarchical Approach; 1 Introduction; 2 Motivation; 3 Related Work; 4 Proposed Framework; 4.1 Preliminaries; 4.2 Details of the Proposed Framework; 5 Results and Discussion; 6 Conclusion; References; Delta Authorization Concept for Dynamic Access Control Model in Cloud Environment
  • 1 Introduction2 Background Details; 2.1 Authentication; 2.2 Authorization; 2.3 Context-Based Authorization; 3 Proposed Model; 3.1 Session Data Management in Different Authorization Model; 3.2 Structuring the Different Context Conditions; 4 Implementation Details; 4.1 Different Phases; 5 Comparison; 5.1 Time for Reaction; 5.2 Message Overhead; 5.3 Session Management; 6 Conclusion; References; Wireless Sensor Networks; Two-Hop-Based Geographic Opportunistic Routing in WSNs; 1 Introduction; 2 Literature Survey; 3 Background; 4 System Model and Problem Definition
  • 4.1 Definitions of Node's Neighbor and Its Relationships4.2 Terminology: One-Hop and Two-Hop Receivers; 4.3 Definition of Forwarding Area; 5 Mathematical Model; 6 Proposed Algorithm; 7 Simulation Setup; 8 Performance Analysis; 9 Conclusions; References; Data Gathering from Path-Constrained Mobile Sensors Using Data MULE; 1 Introduction; 1.1 Contribution; 2 Related Works; 3 Problem Statement and Complexity Analysis; 4 Algorithm to Find Minimum Data Mules and Their Paths; 4.1 Example of Execution of Algorithm DGPCMS; 4.2 Analysis; 5 Conclusions; References
Extent
1 online resource
Form of item
online
Isbn
9789811081828
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-981-10-8183-5
Other physical details
illustrations.
System control number
  • on1038068103
  • (OCoLC)1038068103
Label
Advanced computing and systems for security, Volume six, Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki, editors, (electronic book)
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Intro; Preface; Contents; About the Editors; Algorithms; A Framework for Solution to Nurse Assignment Problem in Health Care with Variable Demand; 1 Introduction; 2 Review Work; 2.1 Heuristic Search; 3 Research Scope; 4 Proposed Work; 4.1 Framework; 4.2 Description of Proposed Nurse Assignment Methods; 5 Experimental Results and Discussion; 5.1 Performance Evaluation of Home Care Nursing Service; 5.2 Results of Hospital Care Nursing Service in Emergency Scheduling; 5.3 Results of Combined GA for Regular Scheduling; 6 Conclusion; References
  • A Novel Bio-inspired Algorithm for Increasing Throughput in Wireless Body Area Network (WBAN) by Mitigating Inter-WBAN Interference1 Introduction; 2 Related Work; 3 WBAN Design Model; 3.1 System Model; 3.2 Optimization Problem Formulation; 4 Problem Solving Based on Particle Swarm Optimization (PSO) Technique; 4.1 Notation; 4.2 PSO Based Spectrum Allocation Algorithm; 5 Simulation Results; 6 Conclusion; References; Cloud Computing; Paving the Way for Autonomic Clouds: State-of-the-Art and Future Directions; 1 Introduction; 2 Review of Existing Approaches in the Literature
  • 2.1 Metaheuristic-Based Approaches2.2 Machine Learning Based Approaches; 2.3 Market-Based Approaches; 2.4 Cryptography-Based Approaches; 2.5 Hybrid Approaches; 2.6 Miscellaneous Approaches; 3 Discussion; 4 Future Directions; 5 Conclusion; References; Toward Efficient Autonomic Management of Clouds: A CDS-Based Hierarchical Approach; 1 Introduction; 2 Motivation; 3 Related Work; 4 Proposed Framework; 4.1 Preliminaries; 4.2 Details of the Proposed Framework; 5 Results and Discussion; 6 Conclusion; References; Delta Authorization Concept for Dynamic Access Control Model in Cloud Environment
  • 1 Introduction2 Background Details; 2.1 Authentication; 2.2 Authorization; 2.3 Context-Based Authorization; 3 Proposed Model; 3.1 Session Data Management in Different Authorization Model; 3.2 Structuring the Different Context Conditions; 4 Implementation Details; 4.1 Different Phases; 5 Comparison; 5.1 Time for Reaction; 5.2 Message Overhead; 5.3 Session Management; 6 Conclusion; References; Wireless Sensor Networks; Two-Hop-Based Geographic Opportunistic Routing in WSNs; 1 Introduction; 2 Literature Survey; 3 Background; 4 System Model and Problem Definition
  • 4.1 Definitions of Node's Neighbor and Its Relationships4.2 Terminology: One-Hop and Two-Hop Receivers; 4.3 Definition of Forwarding Area; 5 Mathematical Model; 6 Proposed Algorithm; 7 Simulation Setup; 8 Performance Analysis; 9 Conclusions; References; Data Gathering from Path-Constrained Mobile Sensors Using Data MULE; 1 Introduction; 1.1 Contribution; 2 Related Works; 3 Problem Statement and Complexity Analysis; 4 Algorithm to Find Minimum Data Mules and Their Paths; 4.1 Example of Execution of Algorithm DGPCMS; 4.2 Analysis; 5 Conclusions; References
Extent
1 online resource
Form of item
online
Isbn
9789811081828
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-981-10-8183-5
Other physical details
illustrations.
System control number
  • on1038068103
  • (OCoLC)1038068103

Library Locations

Processing Feedback ...