Advanced Computing and Systems for Security (Advances in Intelligent Systems and Computing) 9789811081828, 9789811081835, 9811081824

This book contains extended version of selected works that have been discussed and presented in the fourth International

148 30 5MB

English Pages 180 [169]

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
Preface
Contents
About the Editors
Algorithms
A Framework for Solution to Nurse Assignment Problem in Health Care with Variable Demand
1 Introduction
2 Review Work
2.1 Heuristic Search
3 Research Scope
4 Proposed Work
4.1 Framework
4.2 Description of Proposed Nurse Assignment Methods
5 Experimental Results and Discussion
5.1 Performance Evaluation of Home Care Nursing Service
5.2 Results of Hospital Care Nursing Service in Emergency Scheduling
5.3 Results of Combined GA for Regular Scheduling
6 Conclusion
References
A Novel Bio-inspired Algorithm for Increasing Throughput in Wireless Body Area Network (WBAN) by Mitigating Inter-WBAN Interference
1 Introduction
2 Related Work
3 WBAN Design Model
3.1 System Model
3.2 Optimization Problem Formulation
4 Problem Solving Based on Particle Swarm Optimization (PSO) Technique
4.1 Notation
4.2 PSO Based Spectrum Allocation Algorithm
5 Simulation Results
6 Conclusion
References
Cloud Computing
Paving the Way for Autonomic Clouds: State-of-the-Art and Future Directions
1 Introduction
2 Review of Existing Approaches in the Literature
2.1 Metaheuristic-Based Approaches
2.2 Machine Learning Based Approaches
2.3 Market-Based Approaches
2.4 Cryptography-Based Approaches
2.5 Hybrid Approaches
2.6 Miscellaneous Approaches
3 Discussion
4 Future Directions
5 Conclusion
References
Toward Efficient Autonomic Management of Clouds: A CDS-Based Hierarchical Approach
1 Introduction
2 Motivation
3 Related Work
4 Proposed Framework
4.1 Preliminaries
4.2 Details of the Proposed Framework
5 Results and Discussion
6 Conclusion
References
Delta Authorization Concept for Dynamic Access Control Model in Cloud Environment
1 Introduction
2 Background Details
2.1 Authentication
2.2 Authorization
2.3 Context-Based Authorization
3 Proposed Model
3.1 Session Data Management in Different Authorization Model
3.2 Structuring the Different Context Conditions
4 Implementation Details
4.1 Different Phases
5 Comparison
5.1 Time for Reaction
5.2 Message Overhead
5.3 Session Management
6 Conclusion
References
Wireless Sensor Networks
Two-Hop-Based Geographic Opportunistic Routing in WSNs
1 Introduction
2 Literature Survey
3 Background
4 System Model and Problem Definition
4.1 Definitions of Node's Neighbor and Its Relationships
4.2 Terminology: One-Hop and Two-Hop Receivers
4.3 Definition of Forwarding Area
5 Mathematical Model
6 Proposed Algorithm
7 Simulation Setup
8 Performance Analysis
9 Conclusions
References
Data Gathering from Path-Constrained Mobile Sensors Using Data MULE
1 Introduction
1.1 Contribution
2 Related Works
3 Problem Statement and Complexity Analysis
4 Algorithm to Find Minimum Data Mules and Their Paths
4.1 Example of Execution of Algorithm DGPCMS
4.2 Analysis
5 Conclusions
References
Localization in 3D Wireless Sensor Network
1 Introduction
2 Related Work
3 Network Model and Assumptions
3.1 Assumptions
3.2 Energy Consumption Model
4 Proposed Work
4.1 Mathematical Prerequisites
4.2 Region Identification
4.3 Abscissa and Ordinates Computation
4.4 Height Computation
4.5 Algorithm for Localization
5 Analysis
6 Conclusions and Future Works
References
Security Systems
EAER-AODV: Enhanced Trust Model Based on Average Encounter Rate for Secure Routing in MANET
1 Introduction
2 Related Works
3 Trust Model
3.1 Average Encounter Rate
3.2 Successful Cooperation Frequency (SCF)
3.3 Modified D-S Evidence Theory for Recommended Trust
3.4 Opinion Evaluation
4 Trust-Based Secure Routing Protocol
4.1 Route Discovery
4.2 Trusted Route Selection
5 Results and Analysis
5.1 Simulation Environment
5.2 Performance Metrics
5.3 Simulation Results
6 Conclusion
References
Representation and Validation of Enterprise Security Requirements—A Multigraph Model
1 Introduction
2 Physical Interconnection Graph (PIG)
2.1 Graph Constraint Specification Language for Multigraph Structure
3 Policy Specification and Multigraph
4 Realization of Multigraph and Experimental Setup
5 Conclusion and Future Work
References
Author Index

Advanced Computing and Systems for Security (Advances in Intelligent Systems and Computing)
 9789811081828, 9789811081835, 9811081824

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Recommend Papers