Narrow your search

Library

ULB (5)

VUB (5)

KU Leuven (4)

Odisee (4)

Thomas More Kempen (4)

Thomas More Mechelen (4)

UCLL (4)

ULiège (4)

VIVES (4)

AP (3)

More...

Resource type

book (11)

digital (3)


Language

English (12)


Year
From To Submit

2018 (2)

2010 (3)

2007 (3)

2003 (2)

2001 (1)

More...
Listing 1 - 10 of 12 << page
of 2
>>
Sort by
Terrestrial trunked radio - TETRA : a global security tool
Author:
ISBN: 1280864761 9786610864768 3540711929 3540711902 364209029X Year: 2007 Publisher: Berlin ; London : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular due to the strongly increased security demands for mobile systems. In this book, the authors show how TETRA can be strongly improved and these improvements will most probably be part of future TETRA standards. The areas examined include channel assignment and multiple access techniques, video transmission, wireless LAN integration, and the establishment of multiple wireless mesh networks. Since the requirements for these networks is security, the authors show that innovative techniques such as those based on chaotic signals can be used in order to maximize security. The book is a vital reference point for researchers with ambition to find the general solution for modern problems of public safety.

Biological effects of electromagnetic fields : mechanisms, modeling, biological effects, therapeutic effects, international standards, exposure criteria
Author:
ISBN: 3540429891 9783540429890 3642076971 3662060795 Year: 2003 Publisher: Berlin : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The book covers the field of Biological Effects of Electromagnetic Fields in its entirety. Both high and low frequency areas are presented. In particular, the underlying mechanisms of interaction between EMF and biological systems, and the absorption patterns verification of theoretical models via real world measurement assessment are studied. Topics such as mathematical modeling of EMF absorption, Ion Cyclotron Resonance in Biological Systems, thermal and dissipation effects of mobile system radiation, effects on transmission lines and railway radiation, effects on the reproductive capacity of specific insects, on the immune systems, embryos, fetuses, blood parameters and behavior of rats are thoroughly covered as well as health risk assessment and therapeutic effects of EMF. Each topic is presented from the theoretical point of view, and experimental verification is shown in all cases possible. The book provides well-founded material for an overview of the major aspects of this important field in a tutorial format, which can pave the way in introducing courses in many universities.

Interference analysis and reduction for wireless systems
Author:
ISBN: 1580535747 9781580535748 9781580533164 1580533167 Year: 2003 Publisher: Boston, MA Artech House

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Interference Analysis and Reduction for Wireless Systems offers a New methodology for analyzing and studying the behavior of wireless communication systems in an interference environment. It provides modern tools and techniques for use in real-world applications that help engineers guarantee optimum system performance. The book treats both additive and multiplicative interfering signals, including in-depth descriptions of how these signals behave, regardless of the source. Hands-on details are provided to help practitioners."--Jacket.


Book
Interference analysis of communication systems
Author:
ISBN: 0879421355 0471086738 9780879421366 0471086746 9780471086734 0879421363 9780879421359 9780471086741 Year: 1980 Publisher: New York: IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Multi
Terrestrial Trunked Radio - Tetra : A Global Security Tool
Author:
ISBN: 9783540711926 Year: 2007 Publisher: Berlin, Heidelberg Springer-Verlag Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

Third generation mobile telecommunication systems : UMTS and IMT-2000
Author:
ISBN: 3540678506 Year: 2001 Publisher: Berlin ; New York : Springer,


Book
Handbook of information and communication security
Authors: ---
ISBN: 3642444598 3642041167 9786612837319 3642041175 1282837311 Year: 2010 Publisher: Berlin ; Heidelberg : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called “Y2K” issue. The Y2K scare was the fear that computer networks and the systems that are controlled or operated by software would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of several Computer Emergency Response Teams (CERTs) around the world that now work - operatively to exchange expertise and information, and to coordinate in case major problems should arise in the modern IT environment. The terrorist attacks of 11 September 2001 raised security concerns to a new level. The international community responded on at least two fronts; one front being the transfer of reliable information via secure networks and the other being the collection of information about - tential terrorists. As a sign of this new emphasis on security, since 2001, all major academic publishers have started technical journals focused on security, and every major communications conference (for example, Globecom and ICC) has organized workshops and sessions on security issues. In addition, the IEEE has created a technical committee on Communication and Information Security. The first editor was intimately involved with security for the Athens Olympic Games of 2004.


Multi
Handbook of Information and Communication Security
Authors: ---
ISBN: 9783642041174 9783642041518 9783642444593 9783642041167 Year: 2010 Publisher: Berlin, Heidelberg Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called “Y2K” issue. Te Y2K scare was the fear that c- puter networks and the systems that are controlled or operated by sofware would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of several Computer Emergency Response Teams (CERTs) around the world that now work - operatively to exchange expertise and information, and to coordinate in case major problems should arise in the modern IT environment. Te terrorist attacks of 11 September 2001 raised security concerns to a new level. Te - ternational community responded on at least two fronts; one front being the transfer of reliable information via secure networks and the other being the collection of information about - tential terrorists. As a sign of this new emphasis on security, since 2001, all major academic publishers have started technical journals focused on security, and every major communi- tions conference (for example, Globecom and ICC) has organized workshops and sessions on security issues. In addition, the IEEE has created a technical committee on Communication and Information Security. Te ?rst editor was intimately involved with security for the Athens Olympic Games of 2004.


Book
Terrestrial Trunked Radio - Tetra : A Global Security Tool
Authors: ---
ISBN: 9783540711926 Year: 2007 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular due to the strongly increased security demands for mobile systems. In this book, the authors show how TETRA can be strongly improved and these improvements will most probably be part of future TETRA standards. The areas examined include channel assignment and multiple access techniques, video transmission, wireless LAN integration, and the establishment of multiple wireless mesh networks. Since the requirements for these networks is security, the authors show that innovative techniques such as those based on chaotic signals can be used in order to maximize security. The book is a vital reference point for researchers with ambition to find the general solution for modern problems of public safety.


Book
Handbook of Information and Communication Security
Authors: --- ---
ISBN: 9783642041174 9783642041518 9783642444593 9783642041167 Year: 2010 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called Y2K  issue. Te Y2K scare was the fear that c- puter networks and the systems that are controlled or operated by sofware would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of several Computer Emergency Response Teams (CERTs) around the world that now work - operatively to exchange expertise and information, and to coordinate in case major problems should arise in the modern IT environment. Te terrorist attacks of 11 September 2001 raised security concerns to a new level. Te - ternational community responded on at least two fronts; one front being the transfer of reliable information via secure networks and the other being the collection of information about - tential terrorists. As a sign of this new emphasis on security, since 2001, all major academic publishers have started technical journals focused on security, and every major communi- tions conference (for example, Globecom and ICC) has organized workshops and sessions on security issues. In addition, the IEEE has created a technical committee on Communication and Information Security. Te ?rst editor was intimately involved with security for the Athens Olympic Games of 2004.

Listing 1 - 10 of 12 << page
of 2
>>
Sort by