000866461 000__ 04715cam\a2200517Ii\4500 000866461 001__ 866461 000866461 005__ 20230306145713.0 000866461 006__ m\\\\\o\\d\\\\\\\\ 000866461 007__ cr\cn\nnnunnun 000866461 008__ 190401s2019\\\\si\\\\\\o\\\\\000\0\eng\d 000866461 019__ $$a1091252123 000866461 020__ $$a9789811365737$$q(electronic book) 000866461 020__ $$a9811365733$$q(electronic book) 000866461 020__ $$z9789811365720 000866461 020__ $$z9811365725 000866461 035__ $$aSP(OCoLC)on1091029033 000866461 035__ $$aSP(OCoLC)1091029033$$z(OCoLC)1091252123 000866461 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dN$T$$dGW5XE$$dYDX$$dEBLCP 000866461 049__ $$aISEA 000866461 050_4 $$aHV551.2 000866461 08204 $$a363.348$$223 000866461 1001_ $$aBasu, Souvik,$$eauthor. 000866461 24510 $$aReliable post disaster services over smartphone based DTN :$$ban end-to-end framework /$$cSouvik Basu, Siuli Roy, and Sipra Das Bit. 000866461 264_1 $$aSingapore :$$bSpringer,$$c2019. 000866461 300__ $$a1 online resource. 000866461 336__ $$atext$$btxt$$2rdacontent 000866461 337__ $$acomputer$$bc$$2rdamedia 000866461 338__ $$aonline resource$$bcr$$2rdacarrier 000866461 4901_ $$aSmart innovation, systems and technologies ;$$v137 000866461 5050_ $$aIntro; Foreword; Preface; Acknowledgements; About the Book; Contents; About the Authors; Abbreviations; 1 Introduction; 1.1 Disaster Management; 1.1.1 Disaster Management Phases; 1.1.2 Post-disaster Services; 1.1.3 Post-disaster Communication; 1.2 Overview of Delay-Tolerant Networks; 1.2.1 Features; 1.2.2 Architecture; 1.2.3 Routing; 1.2.4 Applications; 1.2.5 Other Communication Systems; 1.3 Security in DTN; 1.3.1 Security Requirements; 1.3.2 Attacks on DTN; 1.3.3 Challenges in DTN Security; 1.4 Overall Objective and Contribution of the Book; References; 2 Post-disaster Need Assessment 000866461 5058_ $$a2.1 Literature Review2.1.1 Emergency Resource Demand Forecasting; 2.1.2 PCRA-Based Techniques; 2.2 Demand Forecast Using Principal Component Regression Model; 2.2.1 Identification of Influencing Parameters; 2.2.2 Selection of Uncorrelated Influencing Parameters; 2.2.3 Formulation of Forecasting Model; 2.2.4 Performance Analysis; 2.3 Utility Enumeration Through Utility Function; 2.3.1 Deriving the Utility Function; 2.4 Enumerating Resource Utility-An Illustrative Example; 2.5 Conclusion; References; 3 Need Accumulation Over DTN; 3.1 Literature Review; 3.1.1 Human Mobility Characteristics 000866461 5058_ $$a3.1.2 Post-disaster Volunteer Movement3.2 System Model; 3.2.1 Network Architecture; 3.2.2 Distribution of Volunteers; 3.2.3 Interaction Pattern of Volunteers; 3.3 Opportunistic Knowledge Sharing Scheme; 3.3.1 Local Knowledge Acquisition; 3.3.2 Local Knowledge Sharing and Regional Knowledge Acquisition; 3.3.3 Regional Knowledge Sharing and Global Knowledge Acquisition; 3.3.4 Global Knowledge Sharing; 3.3.5 Algorithm; 3.3.6 Expected Generation Time for Global View of Resource Needs; 3.4 Performance Analysis; 3.4.1 Qualitative Analysis; 3.4.2 Quantitative Analysis; 3.5 Conclusion; References 000866461 5058_ $$a4 Resource Planning4.1 Literature Review; 4.1.1 CBR-Driven Resource Demand Forecasting; 4.1.2 Resource Allocation; 4.2 Case-Based Reasoning-Driven Need Validation Technique; 4.2.1 Case-Based Reasoning; 4.2.2 Demand Validation Using CBR; 4.2.3 Performance Analysis; 4.3 Utility-Based Integer Programming Model for Optimal Resource Allocation; 4.3.1 Parameters and Variables; 4.3.2 Minimizing Overall Resource Deficit; 4.3.3 Minimizing Total Resource Deployment Time; 4.3.4 Solution of the Integer Programming Models; 4.3.5 Performance Analysis; 4.4 Conclusion; References 000866461 5058_ $$a5 Reliable Data Dissemination over DTN5.1 Literature Review; 5.1.1 Cryptographic Strategies; 5.1.2 Trust-Based Strategies; 5.1.3 Secured Keyword Search; 5.2 Multilayer Encryption and Hashing-Based Scheme; 5.2.1 System Model; 5.2.2 Group-Based Distributed Authentication; 5.2.3 Multilayer Hashed Encryption; 5.2.4 Performance Analysis; 5.3 SAGE-PRoPHET: Security-Aided and Group Encounter-Based PRoPHET Routing Protocol; 5.3.1 System Model; 5.3.2 Categorizing Situational Messages Using PEKS; 5.3.3 Adapting PRoPHET for Group Encounter-Based Routing 000866461 506__ $$aAccess limited to authorized users. 000866461 588__ $$aOnline resource; title from PDF title page (viewed April 2, 2019) 000866461 650_0 $$aEmergency management$$xTechnological innovations. 000866461 650_0 $$aSmartphones. 000866461 7001_ $$aRoy, Siuli,$$eauthor. 000866461 7001_ $$aBit, Sipra Das,$$eauthor. 000866461 77608 $$iPrint version: $$z9811365725$$z9789811365720$$w(OCoLC)1083034432 000866461 830_0 $$aSmart innovation, systems, and technologies ;$$v137. 000866461 852__ $$bebk 000866461 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-981-13-6573-7$$zOnline Access$$91397441.1 000866461 909CO $$ooai:library.usi.edu:866461$$pGLOBAL_SET 000866461 980__ $$aEBOOK 000866461 980__ $$aBIB 000866461 982__ $$aEbook 000866461 983__ $$aOnline 000866461 994__ $$a92$$bISE