Login

Abraham, Ajith

Innovations in Bio-Inspired Computing and Applications

Abraham, Ajith - Innovations in Bio-Inspired Computing and Applications, ebook

246,00€

Ebook, PDF with Adobe DRM
ISBN: 9783319763545
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

1. Dynamic Parameter Adaptation Using Interval Type-2 Fuzzy Logic in Bio-Inspired Optimization Methods
Oscar Castillo, Frumen Olivas, Fevrier Valdez

2. Reducing Blackhole Effect in WSN
Sana Akourmis, Youssef Fakhri, Moulay Driss Rahmani

3. Minimum Spanning Tree in Trapezoidal Fuzzy Neutrosophic Environment
Said Broumi, Assia Bakali, Mohamed Talea, Florentin Smarandache, Vakkas Uluçay

4. Differential Evolution Assisted MUD for MC-CDMA Systems Using Non-orthogonal Spreading Codes
Atta-ur-Rahman, Kiran Sultan, Nahier Aldhafferi, Abdullah Alqahtani

5. Solving the Problem of Distribution of Fiscal Coupons by Using a Steady State Genetic Algorithm
Qëndresë Hyseni, Sule Yildirim Yayilgan, Bujar Krasniqi, Kadri Sylejmani

6. A Survey of Cross-Layer Design for Wireless Visual Sensor Networks
Afaf Mosaif, Said Rakrak

7. An IPv6 Flow Label Based Approach for Mobile IPTV Quality of Service
Mohamed Matoui, Noureddine Moumkine, Abdellah Adib

8. NWP Model Revisions Using Polynomial Similarity Solutions of the General Partial Differential Equation
Ladislav Zjavka, Stanislav Mišák, Lukáš Prokop

9. Energy Consumption and Cost Analysis for Data Centers with Workload Control
Abdellah Ouammou, Mohamed Hanini, Said El Kafhali, Abdelghani Ben Tahar

10. A Stochastic Game Analysis of the Slotted ALOHA Mechanism Combined with ZigZag Decoding and Transmission Cost
Ahmed Boujnoui, Abdellah Zaaloul, Abdelkrim Haqiq

11. Analytic Approach Using Continuous Markov Chain to Improve the QoS of a Wireless Network
Adnane El Hanjri, Abdellah Zaaloul, Abdelkrim Haqiq

12. Determining and Evaluating the Most Route Lifetime as the Most Stable Route Between Two Vehicles in VANET
Mohamed Nabil, Abdelmajid Hajami, Abdelkrim Haqiq

13. Reverse Extraction of Early-Age Hydration Kinetic Equation of Portland Cement Using Gene Expression Programming with Similarity Weight Tournament Selection
Mengfan Zhi, Ziqiang Yu, Bo Yang, Lin Wang, Liangliang Zhang, Jifeng Guo, Xuehui Zhu

14. Performance Improvement of Bio-Inspired Strategies Through Feedback Laws
Lairenjam Obiroy Singh, R. Devanathan

15. A Semantic Approach Towards Online Social Networks Multi-aspects Analysis
Asmae El Kassiri, Fatima-Zahra Belouadha

16. Towards a New Generation of Wheelchairs Sensitive to Emotional Behavior of Disabled People
Mohamed Moncef Ben Khelifa, Hachem A. Lamti, Adel M. Alimi

17. A Comprehensive Technical Review on Security Techniques and Low Power Target Architectures for Wireless Sensor Networks
Abdulfattah M. Obeid, Manel Elleuchi, Mohamed Wassim Jmal, Manel Boujelben, Mohamed Abid, Mohammed S. BenSaleh

18. A Closed Form Expression for the Bit Error Probability for Majority Logic Decoding of CSOC Codes over




]]>

Γ
Γ

]]>

Channels
Souad Labghough, Fouad Ayoub, Mostafa Belkasmi

19. Straightforward MAAS to Ensure Interoperability in Heterogeneous Environment
Majda Elhozmari, Ahmed Ettalbi

20. A Capability Maturity Framework for IT Security Governance in Organizations
Yassine Maleh, Abdelkbir Sahid, Abdellah Ezzati, Mustapha Belaissaoui

21. System Multi Agents for Automatic Negotiation of SLA in Cloud Computing
Zineb Bakraouy, Amine Baina, Mostafa Bellafkih

22. A Comparison Between Modeling a Normal and an Epileptic State Using the FHN and the Epileptor Model
R. Jarray, N. Jmail, A. Hadriche, T. Frikha

23. Modeling the Effect of Security Measures on Electronic Payment Risks
Marie Ndaw, Gervais Mendy, Samuel Ouya

24. Modeling an Anomaly-Based Intrusion Prevention System Using Game Theory
El Mehdi Kandoussi, Iman El Mir, Mohamed Hanini, Abdelkrim Haqiq

25. Optimized Security as a Service Platforms via Stochastic Modeling and Dynamic Programming
Oussama Mjihil, Hamid Taramit, Abdelkrim Haqiq, Dijiang Huang

26. Multi-view Web Services as a Key Security Layer in Internet of Things Architecture Within a Cloud Infrastructure
Anass Misbah, Ahmed Ettalbi

27. Access Domain-Based Approach for Anomaly Detection and Resolution in XACML Policies
Maryem Ait El Hadj, Yahya Benkaouz, Ahmed Khoumsi, Mohammed Erradi

28. Biometric Template Privacy Using Visual Cryptography
Sana Ibjaoun, Anas Abou El Kalam, Vincent Poirriez, Abdellah Ait Ouahman

29. Scalable and Dynamic Network Intrusion Detection and Prevention System
Safaa Mahrach, Oussama Mjihil, Abdelkrim Haqiq

30. A Hybrid Feature Selection for MRI Brain Tumor Classification
Ahmed Kharrat, Mahmoud Neji

31. A Statistical Analysis for High-Speed Stream Ciphers
Youssef Harmouch, Rachid Kouch

32. Weighted Access Control Policies Cohabitation in Distributed Systems
Asmaa El Kandoussi, Hanan El Bakkali

33. A Comparative Study on Access Control Models and Security Requirements in Workflow Systems
Monsef Boughrous, Hanan Bakkali

Keywords: Engineering, Computational Intelligence, Artificial Intelligence (incl. Robotics)

Editor
 
 
 
Publisher
Springer
Publication year
2018
Language
en
Edition
1
Series
Advances in Intelligent Systems and Computing
Category
Technology, Energy, Traffic
Format
Ebook
eISBN (PDF)
9783319763545
Printed ISBN
978-3-319-76353-8

Similar titles