000839568 000__ 06034cam\a2200601Ii\4500 000839568 001__ 839568 000839568 005__ 20230306144736.0 000839568 006__ m\\\\\o\\d\\\\\\\\ 000839568 007__ cr\un\nnnunnun 000839568 008__ 180531s2018\\\\si\a\\\\ob\\\\101\0\eng\d 000839568 019__ $$a1038446701$$a1040651952 000839568 020__ $$a9789811081835$$q(electronic book) 000839568 020__ $$a9811081832$$q(electronic book) 000839568 020__ $$z9789811081828 000839568 020__ $$z9811081824 000839568 0247_ $$a10.1007/978-981-10-8183-5$$2doi 000839568 035__ $$aSP(OCoLC)on1038068103 000839568 035__ $$aSP(OCoLC)1038068103$$z(OCoLC)1038446701$$z(OCoLC)1040651952 000839568 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dN$T$$dGW5XE$$dEBLCP$$dAZU$$dUAB$$dYDX$$dOCLCF$$dOCLCQ 000839568 049__ $$aISEA 000839568 050_4 $$aQA76.9.A25 000839568 08204 $$a005.8$$223 000839568 24500 $$aAdvanced computing and systems for security.$$nVolume six /$$cRituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki, editors. 000839568 264_1 $$aSingapore :$$bSpringer,$$c2018. 000839568 300__ $$a1 online resource :$$billustrations. 000839568 336__ $$atext$$btxt$$2rdacontent 000839568 337__ $$acomputer$$bc$$2rdamedia 000839568 338__ $$aonline resource$$bcr$$2rdacarrier 000839568 347__ $$atext file$$bPDF$$2rda 000839568 4901_ $$aAdvances in intelligent systems and computing ;$$vvolume 667 000839568 504__ $$aIncludes bibliographical references and index. 000839568 5050_ $$aIntro; Preface; Contents; About the Editors; Algorithms; A Framework for Solution to Nurse Assignment Problem in Health Care with Variable Demand; 1 Introduction; 2 Review Work; 2.1 Heuristic Search; 3 Research Scope; 4 Proposed Work; 4.1 Framework; 4.2 Description of Proposed Nurse Assignment Methods; 5 Experimental Results and Discussion; 5.1 Performance Evaluation of Home Care Nursing Service; 5.2 Results of Hospital Care Nursing Service in Emergency Scheduling; 5.3 Results of Combined GA for Regular Scheduling; 6 Conclusion; References 000839568 5058_ $$aA Novel Bio-inspired Algorithm for Increasing Throughput in Wireless Body Area Network (WBAN) by Mitigating Inter-WBAN Interference1 Introduction; 2 Related Work; 3 WBAN Design Model; 3.1 System Model; 3.2 Optimization Problem Formulation; 4 Problem Solving Based on Particle Swarm Optimization (PSO) Technique; 4.1 Notation; 4.2 PSO Based Spectrum Allocation Algorithm; 5 Simulation Results; 6 Conclusion; References; Cloud Computing; Paving the Way for Autonomic Clouds: State-of-the-Art and Future Directions; 1 Introduction; 2 Review of Existing Approaches in the Literature 000839568 5058_ $$a2.1 Metaheuristic-Based Approaches2.2 Machine Learning Based Approaches; 2.3 Market-Based Approaches; 2.4 Cryptography-Based Approaches; 2.5 Hybrid Approaches; 2.6 Miscellaneous Approaches; 3 Discussion; 4 Future Directions; 5 Conclusion; References; Toward Efficient Autonomic Management of Clouds: A CDS-Based Hierarchical Approach; 1 Introduction; 2 Motivation; 3 Related Work; 4 Proposed Framework; 4.1 Preliminaries; 4.2 Details of the Proposed Framework; 5 Results and Discussion; 6 Conclusion; References; Delta Authorization Concept for Dynamic Access Control Model in Cloud Environment 000839568 5058_ $$a1 Introduction2 Background Details; 2.1 Authentication; 2.2 Authorization; 2.3 Context-Based Authorization; 3 Proposed Model; 3.1 Session Data Management in Different Authorization Model; 3.2 Structuring the Different Context Conditions; 4 Implementation Details; 4.1 Different Phases; 5 Comparison; 5.1 Time for Reaction; 5.2 Message Overhead; 5.3 Session Management; 6 Conclusion; References; Wireless Sensor Networks; Two-Hop-Based Geographic Opportunistic Routing in WSNs; 1 Introduction; 2 Literature Survey; 3 Background; 4 System Model and Problem Definition 000839568 5058_ $$a4.1 Definitions of Node's Neighbor and Its Relationships4.2 Terminology: One-Hop and Two-Hop Receivers; 4.3 Definition of Forwarding Area; 5 Mathematical Model; 6 Proposed Algorithm; 7 Simulation Setup; 8 Performance Analysis; 9 Conclusions; References; Data Gathering from Path-Constrained Mobile Sensors Using Data MULE; 1 Introduction; 1.1 Contribution; 2 Related Works; 3 Problem Statement and Complexity Analysis; 4 Algorithm to Find Minimum Data Mules and Their Paths; 4.1 Example of Execution of Algorithm DGPCMS; 4.2 Analysis; 5 Conclusions; References 000839568 506__ $$aAccess limited to authorized users. 000839568 520__ $$aThis book contains extended version of selected works that have been discussed and presented in the fourth International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2017) held in Patna, India during March 17-19, 2017. The symposium was organized by the Departments of Computer Science & Engineering and A. K. Choudhury School of Information Technology, both from University of Calcutta in collaboration with NIT, Patna. The International partners for ACSS 2016 had been Ca Foscari University of Venice, Italy and Bialystok University of Technology, Poland. This bi-volume book has a total of 21 papers divided in 7 chapters. The chapters reflect the sessions in which the works have been discussed during the symposium. The different chapters in the book include works on biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems. 000839568 588__ $$aOnline resource; title from PDF title page (viewed June 01, 2018). 000839568 650_0 $$aComputer security$$vCongresses. 000839568 650_0 $$aComputers$$xAccess control$$vCongresses. 000839568 650_0 $$aComputer science$$vCongresses. 000839568 7001_ $$aChaki, Rituparna,$$eeditor. 000839568 7001_ $$aCortesi, Agostino,$$d1963-$$eeditor. 000839568 7001_ $$aSaeed, Khalid$$c(Computer scientist),$$eeditor. 000839568 7001_ $$aChaki, Nabendu,$$eeditor. 000839568 7112_ $$aInternational Doctoral Symposium on Applied Computation and Security Systems$$n(4th :$$d2017 :$$cPatna, India) 000839568 77608 $$iPrint version: $$z9789811081828 000839568 830_0 $$aAdvances in intelligent systems and computing ;$$v667. 000839568 852__ $$bebk 000839568 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-981-10-8183-5$$zOnline Access$$91397441.1 000839568 909CO $$ooai:library.usi.edu:839568$$pGLOBAL_SET 000839568 980__ $$aEBOOK 000839568 980__ $$aBIB 000839568 982__ $$aEbook 000839568 983__ $$aOnline 000839568 994__ $$a92$$bISE