𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Advanced Computing and Systems for Security (Advances in Intelligent Systems and Computing)

✍ Scribed by Rituparna Chaki


Publisher
Springer
Tongue
English
Leaves
169
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book contains extended version of selected works that have been discussed and presented in the fourth International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2017) held in Patna, India during March 17-19, 2017. The symposium was organized by the Departments of Computer Science & Engineering and A. K. Choudhury School of Information Technology, both from University of Calcutta in collaboration with NIT, Patna. The International partners for ACSS 2016 had been Ca Foscari University of Venice, Italy and Bialystok University of Technology, Poland.

This bi-volume book has a total of 21 papers divided in 7 chapters. The chapters reflect the sessions in which the works have been discussed during the symposium. The different chapters in the book include works on biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems.

✦ Table of Contents


Preface
Contents
About the Editors
Algorithms
A Framework for Solution to Nurse Assignment Problem in Health Care with Variable Demand
1 Introduction
2 Review Work
2.1 Heuristic Search
3 Research Scope
4 Proposed Work
4.1 Framework
4.2 Description of Proposed Nurse Assignment Methods
5 Experimental Results and Discussion
5.1 Performance Evaluation of Home Care Nursing Service
5.2 Results of Hospital Care Nursing Service in Emergency Scheduling
5.3 Results of Combined GA for Regular Scheduling
6 Conclusion
References
A Novel Bio-inspired Algorithm for Increasing Throughput in Wireless Body Area Network (WBAN) by Mitigating Inter-WBAN Interference
1 Introduction
2 Related Work
3 WBAN Design Model
3.1 System Model
3.2 Optimization Problem Formulation
4 Problem Solving Based on Particle Swarm Optimization (PSO) Technique
4.1 Notation
4.2 PSO Based Spectrum Allocation Algorithm
5 Simulation Results
6 Conclusion
References
Cloud Computing
Paving the Way for Autonomic Clouds: State-of-the-Art and Future Directions
1 Introduction
2 Review of Existing Approaches in the Literature
2.1 Metaheuristic-Based Approaches
2.2 Machine Learning Based Approaches
2.3 Market-Based Approaches
2.4 Cryptography-Based Approaches
2.5 Hybrid Approaches
2.6 Miscellaneous Approaches
3 Discussion
4 Future Directions
5 Conclusion
References
Toward Efficient Autonomic Management of Clouds: A CDS-Based Hierarchical Approach
1 Introduction
2 Motivation
3 Related Work
4 Proposed Framework
4.1 Preliminaries
4.2 Details of the Proposed Framework
5 Results and Discussion
6 Conclusion
References
Delta Authorization Concept for Dynamic Access Control Model in Cloud Environment
1 Introduction
2 Background Details
2.1 Authentication
2.2 Authorization
2.3 Context-Based Authorization
3 Proposed Model
3.1 Session Data Management in Different Authorization Model
3.2 Structuring the Different Context Conditions
4 Implementation Details
4.1 Different Phases
5 Comparison
5.1 Time for Reaction
5.2 Message Overhead
5.3 Session Management
6 Conclusion
References
Wireless Sensor Networks
Two-Hop-Based Geographic Opportunistic Routing in WSNs
1 Introduction
2 Literature Survey
3 Background
4 System Model and Problem Definition
4.1 Definitions of Node's Neighbor and Its Relationships
4.2 Terminology: One-Hop and Two-Hop Receivers
4.3 Definition of Forwarding Area
5 Mathematical Model
6 Proposed Algorithm
7 Simulation Setup
8 Performance Analysis
9 Conclusions
References
Data Gathering from Path-Constrained Mobile Sensors Using Data MULE
1 Introduction
1.1 Contribution
2 Related Works
3 Problem Statement and Complexity Analysis
4 Algorithm to Find Minimum Data Mules and Their Paths
4.1 Example of Execution of Algorithm DGPCMS
4.2 Analysis
5 Conclusions
References
Localization in 3D Wireless Sensor Network
1 Introduction
2 Related Work
3 Network Model and Assumptions
3.1 Assumptions
3.2 Energy Consumption Model
4 Proposed Work
4.1 Mathematical Prerequisites
4.2 Region Identification
4.3 Abscissa and Ordinates Computation
4.4 Height Computation
4.5 Algorithm for Localization
5 Analysis
6 Conclusions and Future Works
References
Security Systems
EAER-AODV: Enhanced Trust Model Based on Average Encounter Rate for Secure Routing in MANET
1 Introduction
2 Related Works
3 Trust Model
3.1 Average Encounter Rate
3.2 Successful Cooperation Frequency (SCF)
3.3 Modified D-S Evidence Theory for Recommended Trust
3.4 Opinion Evaluation
4 Trust-Based Secure Routing Protocol
4.1 Route Discovery
4.2 Trusted Route Selection
5 Results and Analysis
5.1 Simulation Environment
5.2 Performance Metrics
5.3 Simulation Results
6 Conclusion
References
Representation and Validation of Enterprise Security Requirementsβ€”A Multigraph Model
1 Introduction
2 Physical Interconnection Graph (PIG)
2.1 Graph Constraint Specification Language for Multigraph Structure
3 Policy Specification and Multigraph
4 Realization of Multigraph and Experimental Setup
5 Conclusion and Future Work
References
Author Index


πŸ“œ SIMILAR VOLUMES


Advances in Intelligent Systems, Compute
✍ Zhengbing Hu (editor), Sergey Petoukhov (editor), Matthew He (editor) πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<span>This book comprises high-quality refereed research papers presented at The Second International Symposium on Computer Science, Digital Economy and Intelligent Systems (CSDEIS2020), held in Moscow, Russia, on December 18–20, 2020, organized jointly by Moscow State Technical University and the I

Advances in Intelligent Systems, Compute
✍ Zhengbing Hu (editor), Sergey Petoukhov (editor), Matthew He (editor) πŸ“‚ Library πŸ“… 2020 πŸ› Springer 🌐 English

<p><span>This book comprises high-quality, refereed research papers presented at the 2019 International Symposium on Computer Science, Digital Economy and Intelligent Systems (CSDEIS2019): The symposium, held in Moscow, Russia, on 4–6 October 2019, was organized jointly by Moscow State Technical Uni

Advances in Artificial Systems for Medic
✍ SERGEY PETOUKHOV, Zhengbing Hu (editor), Sergey Petoukhov (editor), Matthew He ( πŸ“‚ Library 🌐 English

<p></p><p><span>This book discusses the latest advances in the development of artificial intelligence systems and their applications in various fields, from medicine and technology to education. It comprises papers presented at the Third International Conference of Artificial Intelligence, Medical E

Advances in Artificial Systems for Medic
✍ Zhengbing Hu (editor), Sergey Petoukhov (editor), Matthew He (editor) πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<span>This book covers the latest advances for the development of artificial intelligence systems and their applications in various fields from medicine and technology to education. The proceedings comprise refereed papers presented at the Fourth International Conference of Artificial Intelligence,

Advancing Computational Intelligence Tec
✍ Uzzal Sharma, Parmanand Astya, Anupam Baliyan, Salah-ddine Krit, Vishal Jain, Mo πŸ“‚ Library πŸ“… 2022 πŸ› CRC Press 🌐 English

<p><span>Security systems have become an integral part of the building and large complex setups, and intervention of the computational intelligence (CI) paradigm plays an important role in security system architecture. This book covers both theoretical contributions and practical applications in sec