Abraham, Ajith
Innovations in Bio-Inspired Computing and Applications
1. Dynamic Parameter Adaptation Using Interval Type-2 Fuzzy Logic in Bio-Inspired Optimization Methods
Oscar Castillo, Frumen Olivas, Fevrier Valdez
2. Reducing Blackhole Effect in WSN
Sana Akourmis, Youssef Fakhri, Moulay Driss Rahmani
3. Minimum Spanning Tree in Trapezoidal Fuzzy Neutrosophic Environment
Said Broumi, Assia Bakali, Mohamed Talea, Florentin Smarandache, Vakkas Uluçay
4. Differential Evolution Assisted MUD for MC-CDMA Systems Using Non-orthogonal Spreading Codes
Atta-ur-Rahman, Kiran Sultan, Nahier Aldhafferi, Abdullah Alqahtani
5. Solving the Problem of Distribution of Fiscal Coupons by Using a Steady State Genetic Algorithm
Qëndresë Hyseni, Sule Yildirim Yayilgan, Bujar Krasniqi, Kadri Sylejmani
6. A Survey of Cross-Layer Design for Wireless Visual Sensor Networks
Afaf Mosaif, Said Rakrak
7. An IPv6 Flow Label Based Approach for Mobile IPTV Quality of Service
Mohamed Matoui, Noureddine Moumkine, Abdellah Adib
8. NWP Model Revisions Using Polynomial Similarity Solutions of the General Partial Differential Equation
Ladislav Zjavka, Stanislav Mišák, Lukáš Prokop
9. Energy Consumption and Cost Analysis for Data Centers with Workload Control
Abdellah Ouammou, Mohamed Hanini, Said El Kafhali, Abdelghani Ben Tahar
10. A Stochastic Game Analysis of the Slotted ALOHA Mechanism Combined with ZigZag Decoding and Transmission Cost
Ahmed Boujnoui, Abdellah Zaaloul, Abdelkrim Haqiq
11. Analytic Approach Using Continuous Markov Chain to Improve the QoS of a Wireless Network
Adnane El Hanjri, Abdellah Zaaloul, Abdelkrim Haqiq
12. Determining and Evaluating the Most Route Lifetime as the Most Stable Route Between Two Vehicles in VANET
Mohamed Nabil, Abdelmajid Hajami, Abdelkrim Haqiq
13. Reverse Extraction of Early-Age Hydration Kinetic Equation of Portland Cement Using Gene Expression Programming with Similarity Weight Tournament Selection
Mengfan Zhi, Ziqiang Yu, Bo Yang, Lin Wang, Liangliang Zhang, Jifeng Guo, Xuehui Zhu
14. Performance Improvement of Bio-Inspired Strategies Through Feedback Laws
Lairenjam Obiroy Singh, R. Devanathan
15. A Semantic Approach Towards Online Social Networks Multi-aspects Analysis
Asmae El Kassiri, Fatima-Zahra Belouadha
16. Towards a New Generation of Wheelchairs Sensitive to Emotional Behavior of Disabled People
Mohamed Moncef Ben Khelifa, Hachem A. Lamti, Adel M. Alimi
17. A Comprehensive Technical Review on Security Techniques and Low Power Target Architectures for Wireless Sensor Networks
Abdulfattah M. Obeid, Manel Elleuchi, Mohamed Wassim Jmal, Manel Boujelben, Mohamed Abid, Mohammed S. BenSaleh
18. A Closed Form Expression for the Bit Error Probability for Majority Logic Decoding of CSOC Codes over
Souad Labghough, Fouad Ayoub, Mostafa Belkasmi
19. Straightforward MAAS to Ensure Interoperability in Heterogeneous Environment
Majda Elhozmari, Ahmed Ettalbi
20. A Capability Maturity Framework for IT Security Governance in Organizations
Yassine Maleh, Abdelkbir Sahid, Abdellah Ezzati, Mustapha Belaissaoui
21. System Multi Agents for Automatic Negotiation of SLA in Cloud Computing
Zineb Bakraouy, Amine Baina, Mostafa Bellafkih
22. A Comparison Between Modeling a Normal and an Epileptic State Using the FHN and the Epileptor Model
R. Jarray, N. Jmail, A. Hadriche, T. Frikha
23. Modeling the Effect of Security Measures on Electronic Payment Risks
Marie Ndaw, Gervais Mendy, Samuel Ouya
24. Modeling an Anomaly-Based Intrusion Prevention System Using Game Theory
El Mehdi Kandoussi, Iman El Mir, Mohamed Hanini, Abdelkrim Haqiq
25. Optimized Security as a Service Platforms via Stochastic Modeling and Dynamic Programming
Oussama Mjihil, Hamid Taramit, Abdelkrim Haqiq, Dijiang Huang
26. Multi-view Web Services as a Key Security Layer in Internet of Things Architecture Within a Cloud Infrastructure
Anass Misbah, Ahmed Ettalbi
27. Access Domain-Based Approach for Anomaly Detection and Resolution in XACML Policies
Maryem Ait El Hadj, Yahya Benkaouz, Ahmed Khoumsi, Mohammed Erradi
28. Biometric Template Privacy Using Visual Cryptography
Sana Ibjaoun, Anas Abou El Kalam, Vincent Poirriez, Abdellah Ait Ouahman
29. Scalable and Dynamic Network Intrusion Detection and Prevention System
Safaa Mahrach, Oussama Mjihil, Abdelkrim Haqiq
30. A Hybrid Feature Selection for MRI Brain Tumor Classification
Ahmed Kharrat, Mahmoud Neji
31. A Statistical Analysis for High-Speed Stream Ciphers
Youssef Harmouch, Rachid Kouch
32. Weighted Access Control Policies Cohabitation in Distributed Systems
Asmaa El Kandoussi, Hanan El Bakkali
33. A Comparative Study on Access Control Models and Security Requirements in Workflow Systems
Monsef Boughrous, Hanan Bakkali
Nyckelord: Engineering, Computational Intelligence, Artificial Intelligence (incl. Robotics)
- Utgivare
- Abraham, Ajith
- Gandhi, Niketa
- Haqiq, Abdelkrim
- Muda, Azah Kamilah
- Utgivare
- Springer
- Utgivningsår
- 2018
- Språk
- en
- Utgåva
- 1
- Serie
- Advances in Intelligent Systems and Computing
- Sidantal
- 16 sidor
- Kategori
- Teknologi, energi, trafik
- Format
- E-bok
- eISBN (PDF)
- 9783319763545
- Tryckt ISBN
- 978-3-319-76353-8