Narrow your search

Library

ULB (22)

KU Leuven (20)

Odisee (20)

Thomas More Kempen (20)

Thomas More Mechelen (20)

ULiège (20)

VIVES (20)

UCLL (18)

UGent (10)

KBC (1)


Resource type

book (22)


Language

English (22)


Year
From To Submit

2024 (2)

2023 (2)

2018 (2)

2017 (4)

2016 (4)

More...
Listing 1 - 10 of 22 << page
of 3
>>
Sort by

Book
Cognitive Resource Management for Heterogeneous Cellular Networks
Authors: ---
ISBN: 1322039836 3319062840 3319062832 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This Springer Brief focuses on cognitive resource management in heterogeneous cellular networks (Het Net) with small cell deployment for the LTE-Advanced system. It introduces the Het Net features, presents practical approaches using cognitive radio technology in accommodating small cell data relay and optimizing resource allocation and examines the effectiveness of resource management among small cells given limited coordination bandwidth and wireless channel uncertainty. The authors introduce different network characteristics of small cell, investigate the mesh of small cell access points in parallel with macrocells in network control and resource management and address resource management in the backhaul with coordination constraints and wireless channel uncertainty. The final section of this brief summarizes and provides future research directions for this topic, including a proposed framework that has been evaluated through realistic simulations. Cognitive Resource Management for Heterogeneous Cellular Networks is designed for researchers and professionals working in wireless communications and networks. Advanced-level students studying electrical and computer engineering should also find the content helpful.

Keywords

Cognitive radio networks. --- Ad hoc cognitive networks (Wireless communication systems) --- Cognitive networks (Wireless communication systems) --- Ad hoc networks (Computer networks) --- Self-organizing systems --- Computer Communication Networks. --- Telecommunication. --- Information systems. --- Computer network architectures. --- Communications Engineering, Networks. --- Information Systems and Communication Service. --- Computer Systems Organization and Communication Networks. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Computer communication systems. --- Electrical engineering. --- Computers. --- Computer organization. --- Organization, Computer --- Electronic digital computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Electric engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing


Book
Maritime Wideband Communication Networks : Video Transmission Scheduling
Authors: ---
ISBN: 3319073621 3319073613 1322136548 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This Springer Brief covers emerging maritime wideband communication networks and how they facilitate applications such as maritime distress, urgency, safety and general communications. It provides valuable insight on the data transmission scheduling and protocol design for the maritime wideband network. This brief begins with an introduction to maritime wideband communication networks including the architecture, framework, operations and a comprehensive survey on current developments. The second part of the brief presents the resource allocation and scheduling for video packet transmission with a goal of maximizing the weights of uploaded video packets. Finally, an energy and content aware scheduling scheme is proposed for the most efficient vessel packet throughput. Based on the real ship route traces obtained from the navigation software BLM-Ship, simulation results demonstrate the viability of the proposed schemes. Conclusions and further research directions are discussed. Maritime Wideband Communication Networks: Video Transmission Scheduling is a valuable tool for researchers and professionals working in wireless communications and networks. Advanced-level students studying computer science and electrical engineering will also find the content valuable.

Keywords

Broadband communication systems --- Wireless sensor networks --- Telecommunication --- Mathematical models. --- Design and construction. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- WSNs (Sensor networks) --- Computer networks --- Low voltage systems --- Sensor networks --- Wireless communication systems --- Context-aware computing --- Wideband communication systems --- Telecommunication systems --- Computer Communication Networks. --- Telecommunication. --- Information systems. --- Computer network architectures. --- Communications Engineering, Networks. --- Information Systems and Communication Service. --- Computer Systems Organization and Communication Networks. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Computer communication systems. --- Electrical engineering. --- Computers. --- Computer organization. --- Organization, Computer --- Electronic digital computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Electric engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing


Book
Security and Privacy for Mobile Healthcare Networks
Authors: ---
ISBN: 3319247158 3319247174 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book examines state-of-art research on designing healthcare applications with the consideration of security and privacy. It explains the Mobile Healthcare Network (MHN) architecture and its diverse applications, and reviews the existing works on security and privacy for MHNs. Critical future challenges and research problems are also identified. Using a Quality-of-Protection perspective, the authors provide valuable insights on security and privacy preservation for MHNs. Some promising solutions are proposed to accommodate the issues of secure health data transmission, misbehavior detection, health data processing with privacy preservation and access control in MHNs. Specifically, the secure health data aggregation explores social spots to help forward health data and enable users to select the optimal relay according to their social ties and health data priority. The secure aggregation achieves the desirable delivery ratio with reasonable communication costs and lower delay for the data in different priorities. A proposed misbehavior detection scheme distinguishes Sybil attackers from normal users by comparing their mobile contacts and pseudonym changing behaviors. The detection accuracy is high enough to resist various Sybil attack s including forgery. In addition, the health data processing scheme can analyze the encrypted health data and preserve user’s privacy at the same time. Attribute based access control can achieve fine-grained access control with user-defined access policy in MHNs. Security and Privacy for Mobile Healthcare Networks is designed for researchers and advanced-level students interested in healthcare security and secure data transmission.

Keywords

Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Medicine --- Medical informatics --- Wireless communication systems in medical care --- Databases --- Security measures. --- m-health --- mHealth --- Mobile healthcare --- Clinical informatics --- Health informatics --- Medical information science --- Clinical sciences --- Medical profession --- Computer science. --- Computer communication systems. --- Computer security. --- Electrical engineering. --- Computer Science. --- Computer Communication Networks. --- Systems and Data Security. --- Communications Engineering, Networks. --- Information science --- Human biology --- Life sciences --- Medical sciences --- Pathology --- Physicians --- Medical care --- Data processing --- Telecommunication. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Communication --- Information theory --- Telecommuting --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Electric engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing


Book
Opportunistic Spectrum Utilization in Vehicular Communication Networks
Authors: ---
ISBN: 3319204440 3319204459 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This brief examines current research on improving Vehicular Networks (VANETs), examining spectrum scarcity due to the dramatic growth of mobile data traffic and the limited bandwidth of dedicated vehicular communication bands and the use of opportunistic spectrum bands to mitigate congestion. It reviews existing literature on the use of opportunistic spectrum bands for VANETs, including licensed and unlicensed spectrum bands and a variety of related technologies, such as cognitive radio, WiFi and device-to-device communications. Focused on analyzing spectrum characteristics, designing efficient spectrum exploitation schemes, and evaluating the date delivery performance when utilizing different opportunistic spectrum bands, the results presented in this brief provide valuable insights on improving the design and deployment of future VANETs.


Book
Blockchain-Based Data Security in Heterogeneous Communications Networks
Authors: ---
ISBN: 3031524772 Year: 2024 Publisher: Cham : Springer Nature Switzerland : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book investigates data security approaches in Heterogeneous Communications Networks (HCN). First, the book discusses the urgent need for a decentralized data management architecture in HCN. The book investigates preliminaries and related research to help readers obtain a comprehensive picture of the research topic. Second, the book presents three blockchain-based approaches for data management in HCN: data provenance, data query, and data marketing. Finally, based on the insights and experiences from the presented approaches, the book discusses future research directions. Discusses the need for decentralized data security approaches in heterogeneous communications networks (HCN); Presents solutions applicable and practical for real-world applications; Investigates HCN data security approaches such as reliable data provenance, transparent data query, and fair data marketing.


Book
Decentralized Privacy Preservation in Smart Cities
Authors: ---
ISBN: 3031540751 Year: 2024 Publisher: Cham : Springer Nature Switzerland : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book investigates decentralized trust-based privacy-preserving solutions in smart cities. The authors first present an overview of smart cities and privacy challenges and discuss the benefits of adopting decentralized trust models in achieving privacy preservation. The authors then give a comprehensive review of fundamental decentralized techniques and privacy-preserving cryptographic techniques. The next four chapters each detail a decentralized trust-based scheme, focusing respectively on privacy-preserving identity management, cross-domain authentication, data analytics, and data search, in specific use cases. Finally, the book explores open issues and outlines future research directions in the field of decentralized privacy preservation. Discusses benefits and challenges of applying decentralized trusts in smart cities Provides scheme designs and security analysis for use cases in smart cities, offering insights into applications Includes cryptographic knowledge accompanied by practical algorithm and protocol implementations.


Book
Mobile Electric Vehicles : Online Charging and Discharging
Authors: --- ---
ISBN: 3319251287 3319251309 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book examines recent research on designing online charging and discharging strategies for mobile electric vehicles (EVs) in smart grid. First, the architecture and applications are provided. Then, the authors review the existing works on charging and discharging strategy design for EVs. Critical challenges and research problems are identified. Promising solutions are proposed to accommodate the issues of high EV mobility, vehicle range anxiety, and power systems overload. The authors investigate innovating charging and discharging potentials for mobile EVS based on real-time information collections (via VANETS and/or cellular networks) and offer the power system adjustable load management methods.  Several innovative charging/discharging strategy designs to address the challenging issues in smart grid, i.e., overload avoidance and range anxiety for individual EVs, are presented. This book presents an alternative and promising way to release the pressure of the power grid caused by peak-time EV charging demand. Mobile Electric Vehicles: Online Charging and Discharging provides valuable insights on charging/ discharging strategy design for mobile EVs and the power system management in a smart grid. The authors’ findings indicate that the proposed strategies considerably outperform the traditional EV charging strategies without real-time collections on the metrics of the overall energy utilizat ion, the average EV travel cost and the number of successfully charged EVs. Research and graduate students who are working on smart grid and vehicular communication will find this book a valuable resource.  Customs and systems operators will also find this book useful. .

Keywords

Electrical Engineering --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Electric vehicles --- Electric automobiles --- Smart power grids. --- Power supply. --- Automobiles, Electric --- Electric cars --- EVs (Electric vehicles) --- Vehicles, Electric --- Smart grids (Electric power distribution) --- Grids, Smart power --- Power grids, Smart --- Electric power distribution --- Automobiles --- Motor vehicles --- Automation --- Telecommunication. --- Computer Communication Networks. --- Information systems. --- Communications Engineering, Networks. --- Information Systems and Communication Service. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Electrical engineering. --- Computer communication systems. --- Computers. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Electric engineering --- Engineering --- Distributed processing


Book
Resource Management for Heterogeneous Wireless Networks
Authors: ---
ISBN: 3319642685 3319642677 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides an in-depth discussion on how to efficiently manage resources of heterogeneous wireless networks and how to design resource allocation algorithms to suit real world conditions. Efficiently managing resources of the networks is more crucial now, than ever before, to meet users’ rapidly increasing demand for higher data rates, better quality-of-service (QoS) and seamless coverage. Some of the techniques that can be incorporated within heterogeneous wireless networks to achieve this objective are interworking of the networks, user multi-homing and device-to-device (D2D) communication.  Designing resource allocation algorithms to suit real world conditions is also important, as the algorithms should be deployable and perform well in real networks. For example, two of the conditions considered in this book are resource allocation intervals of different networks are different and small cell base stations have limited computational capacity. To address the first condition, resource allocation algorithms for interworking systems are designed to allocate resources of different networks at different time-scales. To address the second condition, resource allocation algorithms are designed to be able to run at cloud computing servers. More of such conditions, algorithms designed to suit these conditions, modeling techniques for various networks and performance analysis of the algorithms are discussed in the book.   This book concludes with a discussion on the future research directions on the related fields of study. Advanced-level students focused on communication and networking will use this book as a study guide. Researchers and experts in the fields of networking, converged networks, small-cell networks, resource management, and interference management, as well as consultants working in network planning and optimization and managers, executives and network architects working in the networking industry will also find this book useful as a reference.

Keywords

Radio resource management (Wireless communications) --- Heterogeneous distributed computing systems. --- Distributed computational systems, Heterogeneous --- Distributed computer systems, Heterogeneous --- Distributed computing systems, Heterogeneous --- Distributed heterogeneous computer systems --- Distributed heterogeneous computing systems --- HeDCSs (Heterogeneous distributed computing systems) --- Heterogeneous computer systems, Distributed --- Heterogeneous computing systems, Distributed --- Heterogeneous distributed computational systems --- Heterogeneous distributed computer systems --- Wireless communications resource management --- Engineering. --- Computer communication systems. --- Electrical engineering. --- Communications Engineering, Networks. --- Computer Communication Networks. --- Computer systems --- Electronic data processing --- Resource allocation --- Wireless communication systems --- Distributed processing --- Management --- Telecommunication. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Electric engineering --- Engineering


Book
Privacy-Enhancing Fog Computing and Its Applications
Authors: --- ---
ISBN: 3030021130 3030021122 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief. .


Book
Secure automatic dependent surveillance-broadcast systems
Authors: --- ---
ISBN: 3031070216 3031070208 Year: 2023 Publisher: Cham, Switzerland : Springer,

Listing 1 - 10 of 22 << page
of 3
>>
Sort by