Victor Ciuntu, Traian Chiorniță, C. Boiangiu, N. Tarbă, M. Voncila, D. Rosner
{"title":"Image Enhancement for Facial Landmark Detection","authors":"Victor Ciuntu, Traian Chiorniță, C. Boiangiu, N. Tarbă, M. Voncila, D. Rosner","doi":"10.1109/RoEduNet57163.2022.9920981","DOIUrl":"https://doi.org/10.1109/RoEduNet57163.2022.9920981","url":null,"abstract":"Facial landmark detection (FLD) is a field of study in computer vision that specializes in detecting and tracking key points from human faces. There are many applications, such as detecting a human’s head pose (position and rotation), tracking whether drivers are paying attention or not, applying augmented reality, etc. This paper proposes to evaluate and decide what are the optimal techniques of image enhancement that can be used to improve different algorithms of FLD. After proposing different pipelines of contrast enhancement and grayscale conversion to enhance the image before applying the FLD algorithm, the results show that the performance will not increase drastically if an image enhancement pipeline is used, but for the reason that this step will not consume a lot of time in the process of detection, it is a step worth considering.","PeriodicalId":302692,"journal":{"name":"2022 21st RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"24 588 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116830960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Gradinaru, Andrei Negru, C. Boiangiu, N. Tarbă, M. Voncila, Răzvan Adrian Deaconescu
{"title":"Complete OCR Solution for Image Analysis of World War 2 Documents","authors":"M. Gradinaru, Andrei Negru, C. Boiangiu, N. Tarbă, M. Voncila, Răzvan Adrian Deaconescu","doi":"10.1109/RoEduNet57163.2022.9921092","DOIUrl":"https://doi.org/10.1109/RoEduNet57163.2022.9921092","url":null,"abstract":"The field of Optical Character Recognition (OCR) consists of techniques that are mainly focused on document image analysis. Aside from generating significant speedups of everyday procedures, OCR has a considerable role in the preservation of historical sources of information. Most of the World War 2 (WW2) documents are of great importance, especially with applications in virtual archives, museums, and research. The situation asks for an efficient, yet not aggressive, transcribing method using OCR tools. This paper describes an approach in the context of the given problem. The focus is oriented towards extracting the information from documents affected by their age, but with simpler structures, mainly split into paragraphs, such as letters and military reports. The approach is based on combining the results of multiple OCR engines, with the final objective of achieving better performance compared to the individual performance of each engine.","PeriodicalId":302692,"journal":{"name":"2022 21st RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130168507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Giorgiana Violeta Vlasceanu, Caraman Ghenadie, Răzvan Niţu, C. Boiangiu
{"title":"A voting method for image binarization of text-based documents","authors":"Giorgiana Violeta Vlasceanu, Caraman Ghenadie, Răzvan Niţu, C. Boiangiu","doi":"10.1109/RoEduNet57163.2022.9921086","DOIUrl":"https://doi.org/10.1109/RoEduNet57163.2022.9921086","url":null,"abstract":"Binarization is an essential stage of image pre-processing before text recognition. This process improves the performance of the obtained text and decreases the effort required for post-processing to find possible mistakes. The main direction for this work is to improve the binarization step in a Document Image Analysis System to increase the text’s accuracy and combine a series of thresholding algorithms into a voting solution.","PeriodicalId":302692,"journal":{"name":"2022 21st RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116909283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marian Mihailescu, Darius Mihai, M. Cărăbaş, N. Tapus
{"title":"Improving and testing live migration for bhyve","authors":"Marian Mihailescu, Darius Mihai, M. Cărăbaş, N. Tapus","doi":"10.1109/RoEduNet57163.2022.9921107","DOIUrl":"https://doi.org/10.1109/RoEduNet57163.2022.9921107","url":null,"abstract":"When managing a cluster or grid infrastructure, a system administrator uses live migration to move virtual machines that provide certain services from one host to another. The migration process should be fast and should not affect the service. For bhyve, FreeBSD’s hypervisor, we have added a live migration support. This paper presents the improvements we have added to the live migration feature such as cleaning the dirty bit after copying a page and extending the live migration support to support guests with more that 3GB of RAM. Moreover, this paper presents the testing procedure and scenarios we used to asset our live migration support in bhyve.","PeriodicalId":302692,"journal":{"name":"2022 21st RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115003601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Murariu, A. Pastrav, C. Tripon, C. Morari, E. Puschita, L. Zârbo
{"title":"A roadmap for building quantum key distribution devices","authors":"T. Murariu, A. Pastrav, C. Tripon, C. Morari, E. Puschita, L. Zârbo","doi":"10.1109/RoEduNet57163.2022.9921102","DOIUrl":"https://doi.org/10.1109/RoEduNet57163.2022.9921102","url":null,"abstract":"Adopting the emerging quantum communication technologies seems to be a logical answer to the security challenges implied by the ever expanding of our communication networks and computing and storage facilities. Quantum communications are based on quantum key distribution, which uses quantum mechanical processes to generate cryptographic keys and to securely distribute them to the users in the networks. There already are quantum key distribution devices on the market, but it is ill advised to fully rely on such devices, in the national security use cases. Thus, each country in EU is actively trying or has already succeeded in developing their own prototypes. We present our roadmap for building such a quantum key distribution prototype and the current status of the R&D activities undertaken by our collaboration ITIM-UTCN.","PeriodicalId":302692,"journal":{"name":"2022 21st RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131008155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Honeypot Generator using Software Defined Networks and Recursively Defined Topologies","authors":"Carol Sebastian Bontaș, Ioan Stan, R. Rughinis","doi":"10.1109/RoEduNet57163.2022.9921097","DOIUrl":"https://doi.org/10.1109/RoEduNet57163.2022.9921097","url":null,"abstract":"The domain of cyber security represents a constant struggle between researchers and hackers, a continuous competition where the global digital infrastructure is at stake. Throughout the years, various protective measures have been developed to prevent against an increasing number of exploits that are becoming more and more complex and refined. Instead of concentrating on general mitigating techniques, our proposal orients towards creating performant honeypots which are safe and isolated environments that attract malicious users for the purpose of studying their invasive techniques. Firstly, this paper introduces an original method of describing, from a mathematically point of view, recursively defined topologies and presents a proposed algorithm used in constructing them. Secondly, we suggest a novel architecture which combines recursively defined topologies (RDT), software-defined networks (SDN) and an orchestrator engine for containerized infrastructure in order to develop a high-interaction honeypot which simulates an entire data center using a single physical host. The proposed implementation may represent a promising framework used as a developing platform for more complex honeypots used in either researching malicious human behavior or in the IT industry as a defensive measure. Regarding achieved results, the proposed implementation accomplishes notable results in deceptive techniques, isolation and effortless configurability.","PeriodicalId":302692,"journal":{"name":"2022 21st RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122873328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}