89 research outputs found

    Clustering and 5G-enabled smart cities: a survey of clustering schemes in VANETs

    Get PDF
    This chapter highlights the importance of Vehicular Ad-hoc Networks (VANETs) in the context of the 5Genabled smarter cities and roads, a topic that attracts significant interest. In order for VANETs and its associated applications to become a reality, a very promising avenue is to bring together multiple wireless technologies in the architectural design. 5G is envisioned to have a heterogeneous network architecture. Clustering is employed in designing optimal VANET architectures that successfully use different technologies, therefore clustering has the potential to play an important role in the 5G-VANET enabled solutions. This chapter presents a survey of clustering approaches in the VANET research area. The survey provides a general classification of the clustering algorithms, presents some of the most advanced and latest algorithms in VANETs, and it is among the fewest works in the literature that reviews the performance assessment of clustering algorithms

    Secure exchange of electronic health records

    Get PDF
    Protecting the confidentiality of a patient\u27s information in a shared care environment could become a complex task. Correct identification of users, assigning of access permissions, and resolution of conflict rise as main points of interest in providing solutions for data exchange among health care providers. Traditional approaches such as Mandatory Access Control, Discretionary Access control and Role-Based Access Control policies do not always provide a suitable solution for health care settings, especially for shared care environments. The core of this contribution consists in the description of an approach which uses attribute-based encryption to protect the confidentiality of patients\u27 information during the exchange of electronic health records among healthcare providers. Attribute-based encryption allows the reinforcing of access policies and reduces the risk of unauthorized access to sensitive information; it also provides a set of functionalities which are described using a case study. Attribute-based encryption provides an answer to restrictions presented by traditional approaches and facilitate the reinforcing of existing security policies over the transmitted data

    Image Registration for Biomedical Information Integration

    No full text
    The rapid advance and innovation in medical imaging techniques offer significant improvement in healthcare services, as well as provide new challenges in medical knowledge discovery from multi-imaging modalities and management. In this chapter, biomedical image registration and fusion, which is an effective mechanism to assist medical knowledge discovery by integrating and simultaneously representing relevant information from diverse imaging resources, is introduced. This chapter covers fundamental knowledge and major methodologies of biomedical image registration, and major applications of image registration in biomedicine. Further, discussions on research perspectives are presented to inspire novel registration ideas for general clinical practice to improve the quality and efficiency of healthcare.Department of Electronic and Information Engineerin
    corecore