Ubiquitous Networking Third International Symposium, UNet 2017, Casablanca, Morocco, May 9-12, 2017, Revised Selected Papers

This book constitutes the refereed proceedings of the Third International Symposium on Ubiquitous Networking, UNet 2017, held in Casablanca, Morocco, in May 2017. The 56 full papers presented in this volume were carefully reviewed and selected from 127 submissions. They were organized in topical sec...

Full description

Bibliographic Details
Other Authors: Sabir, Essaid (Editor), García Armada, Ana (Editor), Ghogho, Mounir (Editor), Debbah, Mérouane (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2017, 2017
Edition:1st ed. 2017
Series:Computer Communication Networks and Telecommunications
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 06949nmm a2200493 u 4500
001 EB001689280
003 EBX01000000000000000959847
005 00000000000000.0
007 cr|||||||||||||||||||||
008 171203 ||| eng
020 |a 9783319681795 
100 1 |a Sabir, Essaid  |e [editor] 
245 0 0 |a Ubiquitous Networking  |h Elektronische Ressource  |b Third International Symposium, UNet 2017, Casablanca, Morocco, May 9-12, 2017, Revised Selected Papers  |c edited by Essaid Sabir, Ana García Armada, Mounir Ghogho, Mérouane Debbah 
250 |a 1st ed. 2017 
260 |a Cham  |b Springer International Publishing  |c 2017, 2017 
300 |a XXV, 659 p. 278 illus  |b online resource 
505 0 |a A Secure Machine-to-Machine Wireless Communication Using DNP3 Protocol for Feeder Automation in Smart-Grid -- L-CAHASH: A Novel Lightweight Hash Function Based on Cellular Automata for RFID -- Group Authentication with Fault Tolerance for Internet of Things -- Fully Distributed Indexing over a Distributed Hash Table --            IoT-Empowered Smart Agriculture: A Real-Time Lightweight Embedded Segmentation System -- Random Access Procedure based on an Adaptive Prioritization Method for Integration of MTC in Mobile Networks -- Adopting Fuzzy Technique to Save Energy in Smart Home Control System -- Multi-Hop Clustering Solution Based on Beacon Delay for Vehicular Ad-Hoc Networks -- F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-in-Motion using MQTT Protocol -- Compact Dual-band CPW-fed Patch Antenna for 2.45/5.80 GHz RFID Applications -- MRA*: Parallel and Distributed Path in Large-Scale Graph Using Mapreduce-A* Based Approach --  
505 0 |a A Multi-Broker Cloud Architecture for the Purpose of Large Scale Sensing Applications Development -- A Simulation Framework for IT Governance in the Context of Corporate Relocation -- NGN Management with NGOSS Framework-Based IMS Use Case -- Migration from Web Services to Cloud Services -- Improving Attack Graph Scalability For the Cloud Through SDN-Based Decomposition And Parallel Processing -- Performance Analysis of Intrusion Detection Systems in Cloud-Based Systems -- Towards Optimizing the Usability of Homomorphic Encryption in Cloud-Based Medical Image Processing -- A Verifiable Secret Sharing Approach for Secure Multi-Cloud Storage -- A Priority Based Task Scheduling in Cloud Computing using a Hybrid MCDM Model -- A Novel Approach for Security in Cloud-Based Medical Image Storage using Segmentation -- Ubiquitous Internet of Things: Emerging Technologies and Breakthroughs -- Toward Reliable Maritime Communication for a Safe Operation of Autonomous Ship --  
505 0 |a Study of Energy Consumption in Wireless Sensor Networks Using S-Rhombus, S-Square and S-Circle Deployment -- Toward a new extension of IPv6 addressing to connect non IP objects --  Enablers, Challenges and Applications -- Channel Coherence Classification with Frame-Shifting in Massive MIMO Systems -- Spectral Efficiency Analysis of Two-Way Massive MIMO Full-Duplex Relay Systems with Direct Link -- Robust Trajectory Planning for Robotic Communications under Fading Channels -- Performance of Enhanced LTE OTDOA Positioning Approach Through Nakagami-m Fading Channel -- Chaotic ZKP based Authentication and Key Distribution Scheme in Environmental Monitoring CPS -- Implementation and Performance Evaluation of Network Intrusion Detection Systems -- An Efficient Authentication Protocol for 5G Heterogeneous Networks -- An Agreement graph-based-authentication scheme for 5G networks -- Green Base Station Placement for Microwave Backhaul Links --  
505 0 |a Joint Frame Detection and Channel Estimation for DCO-OFDM LiFi Systems -- SIR-based Performance Analysis of Dual-Branch SC over Correlated \kappa-\mu Fading Channels.-Performance Analysis of Asynchronous and non-Linear FBMC Systems -- An Improved Bernoulli Sensing Matrix For Compressive Sensing -- Contribution to the Study of Beamforming at 2.4GHz of a Smart Antenna for Wireless Applications Fed by a 4x4 Butler matrix -- Adaptive Mapping for Multiple Applications on Parallel Architectures -- Verification of SystemC Components using the Method of Deduction -- Image Segmentation by Deep Community Detection Approach -- Data Mining Approaches for Alzheimer's Disease Diagnosis -- Image Search Engine based on Color Histogram and Zernike Moment -- Risk Assessment and Alert Prioritization for Intrusion Detection Systems 
505 0 |a Context-Awareness and Autonomy Paradigms -- Studying Node Cooperation in Reputation Based Packet Forwarding within Mobile Ad hoc Networks -- Routing Game On the Line: The Case Of Multiple Players -- A Fully Distributed Satisfactory Power Control for QoS Self-Provisioning in 5G Networks -- A Game Theoretic Approach Against The Greedy Behavior In MAC IEEE 802.11.-Leveraging User Intuition to Predict Item Popularity in Social Networks -- Quality of Experience in HTTP Adaptive Video Streaming Systems -- Community Detection through Topic Modeling in Social Networks -- A Formal Framework for Adaptation -- A Comprehensive Study Of Intelligent Transportation System Architectures For Road Congestion Avoidance -- Enhancing security in Optimized Link State Routing protocol for Mobile Ad Hoc Networks -- A new Data Forwarding Scheme for DTNs based on Coalition Game -- Impact of Link Lifetime on QoS in Mobile Ad-hoc Networks -- Mobile Edge Networking and Virtualization --  
653 |a Computer Communication Networks 
653 |a Electronic commerce 
653 |a Cryptography 
653 |a Artificial Intelligence 
653 |a Application software 
653 |a Computer networks  
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Artificial intelligence 
653 |a Cryptology 
653 |a e-Commerce and e-Business 
653 |a Computer and Information Systems Applications 
653 |a Data and Information Security 
700 1 |a García Armada, Ana  |e [editor] 
700 1 |a Ghogho, Mounir  |e [editor] 
700 1 |a Debbah, Mérouane  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Computer Communication Networks and Telecommunications 
028 5 0 |a 10.1007/978-3-319-68179-5 
856 4 0 |u https://doi.org/10.1007/978-3-319-68179-5?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 004.6 
520 |a This book constitutes the refereed proceedings of the Third International Symposium on Ubiquitous Networking, UNet 2017, held in Casablanca, Morocco, in May 2017. The 56 full papers presented in this volume were carefully reviewed and selected from 127 submissions. They were organized in topical sections named: context-awareness and autonomy paradigms; mobile edge networking and virtualization; ubiquitous internet of things: emerging technologies and breakthroughs; and enablers, challenges and applications.