2014 RoEduNet Conference 13th Edition: Networking in Education and Research Joint Event RENAM 8th Conference最新文献

筛选
英文 中文
The collection and analysis of public data 收集和分析公共数据
Chiru Costin-Gabriel, Mihaila Constantin Ciprian
{"title":"The collection and analysis of public data","authors":"Chiru Costin-Gabriel, Mihaila Constantin Ciprian","doi":"10.1109/ROEDUNET-RENAM.2014.6955313","DOIUrl":"https://doi.org/10.1109/ROEDUNET-RENAM.2014.6955313","url":null,"abstract":"Public data can be considered large and important sources of data that can be used for different purposes. In this paper we present a method for collecting and analyzing data within urban settlements. For more focused analysis and gathering of large amount of data we considered a case study of Bucharest. The main purpose of this analysis is to pick up important information about different streets, points of interests, details about urban planning, etc., with the goal of facilitating a quick and correct evaluation of specific areas and identifying suitable location for adding new points of interest. The prediction of suitable location involves using heuristics and data mining technics such as clustering algorithms, association rules.","PeriodicalId":340048,"journal":{"name":"2014 RoEduNet Conference 13th Edition: Networking in Education and Research Joint Event RENAM 8th Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127156892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HeartFelt - Replicable and accurate ECG sensor architecture for real-time remote monitoring 可复制和准确的心电传感器架构,用于实时远程监控
D. Rosner, Dumitru-Cristian Tranca, R. Tataroiu, Adrian Petrescu, D. Iorga
{"title":"HeartFelt - Replicable and accurate ECG sensor architecture for real-time remote monitoring","authors":"D. Rosner, Dumitru-Cristian Tranca, R. Tataroiu, Adrian Petrescu, D. Iorga","doi":"10.1109/ROEDUNET-RENAM.2014.6955316","DOIUrl":"https://doi.org/10.1109/ROEDUNET-RENAM.2014.6955316","url":null,"abstract":"Heart affections are currently the main type of illness affecting the elderly, and pose unique difficulties both in diagnostic and in treatment effects tracking and long term evolution monitoring. The already stretched out medical system cannot handle the requirements of long term monitoring of patients with severe heart conditions, and thus, automated long term monitoring solutions are required. The present work displays a practical analysis of the hardware and software solutions available for ambulatory ECG (electrocardiogram) monitoring, by proposing a replicable ECG sensor architecture - HeartFelt. The proposal is detailed and validated by means of a complete hardware and software implementation, confirmed by tests performed in cooperation with medical staff. The exposed architecture offers the possibility of long term monitoring of an ECG signal from a patient in ambulatory environment, and offers a balance between precision, ergonomics, autonomy and productions costs.","PeriodicalId":340048,"journal":{"name":"2014 RoEduNet Conference 13th Edition: Networking in Education and Research Joint Event RENAM 8th Conference","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114853818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pattern encryption with cellular automata - A LabVIEW implementation on FPGA 基于元胞自动机的模式加密- LabVIEW在FPGA上的实现
Mihail Chitic, O. Machidon, F. Sandu, T. Balan, M. Machedon-Pisu
{"title":"Pattern encryption with cellular automata - A LabVIEW implementation on FPGA","authors":"Mihail Chitic, O. Machidon, F. Sandu, T. Balan, M. Machedon-Pisu","doi":"10.1109/ROEDUNET-RENAM.2014.6955296","DOIUrl":"https://doi.org/10.1109/ROEDUNET-RENAM.2014.6955296","url":null,"abstract":"Encryption of critical information is usually resource-intensive. The solution developed by the authors represents an efficient method for data encryption that uses cellular automata. The original contributions are mostly at the implementation level. A demonstrator based on FPGA boards was integrated with a new top-down LabVIEW approach that doesn't need particular hardware description skills. The first part of the paper solution proposes the use of programmable reversible cellular automata. The second part of the solution involves hybrid cellular automata. The specific advantages and disadvantages of the two solutions are presented in the paper, considering the reconfigurable hardware limitations.","PeriodicalId":340048,"journal":{"name":"2014 RoEduNet Conference 13th Edition: Networking in Education and Research Joint Event RENAM 8th Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129047464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Practical malware analysis based on sandboxing 基于沙盒的实用恶意软件分析
Mihai Vasilescu, L. Gheorghe, N. Tapus
{"title":"Practical malware analysis based on sandboxing","authors":"Mihai Vasilescu, L. Gheorghe, N. Tapus","doi":"10.1109/ROEDUNET-RENAM.2014.6955304","DOIUrl":"https://doi.org/10.1109/ROEDUNET-RENAM.2014.6955304","url":null,"abstract":"The past years have shown an increase in the both number and sophistication of cyber-attacks targeting Windows and Linux operating systems. Traditional network security solutions such as firewalls are incapable of detecting and stopping these attacks. In this paper, we describe our distributed firewall solution Distfw and its integration with a sandbox for malware analysis and detection. We demonstrate the effectiveness and shortcomings of such a solution. We use Cuckoo to perform automated analysis of malware samples and compare the results with the ones from manual analysis. We discover that Cuckoo provides similar results in a considerable amount of time.","PeriodicalId":340048,"journal":{"name":"2014 RoEduNet Conference 13th Edition: Networking in Education and Research Joint Event RENAM 8th Conference","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127627734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Portable implementation of the SPID algorithm SPID算法的可移植实现
Andrei Burada, L. Gheorghe, N. Tapus
{"title":"Portable implementation of the SPID algorithm","authors":"Andrei Burada, L. Gheorghe, N. Tapus","doi":"10.1109/ROEDUNET-RENAM.2014.6955305","DOIUrl":"https://doi.org/10.1109/ROEDUNET-RENAM.2014.6955305","url":null,"abstract":"Nowadays, when the whole Internet is service oriented, our main concern is user privacy. Whether we talk about Google, Twitter, Facebook or even plain traffic filtering, we surely can say that our privacy is not their main concern. Luckily there are ways for enforcing our privacy over the Internet. Using Virtual Private Networks that do not keep any personal or accounting information is just one way for dealing with this issue. In this paper, we present a portable implementation of the Statistical Protocol Identification algorithm, which detects protocols based on statistical information extracted from the network packets. We show that traffic filtering can be achieved without breaking user privacy by using statistical analysis. We prove that this is a viable replacement for current packet filtering techniques. This is backed up with our test results that were more than promising.","PeriodicalId":340048,"journal":{"name":"2014 RoEduNet Conference 13th Edition: Networking in Education and Research Joint Event RENAM 8th Conference","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116609557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure cloud video streaming using tokens 使用令牌保护云视频流
M. Bucicoiu, Mircea Ghideu, N. Tapus
{"title":"Secure cloud video streaming using tokens","authors":"M. Bucicoiu, Mircea Ghideu, N. Tapus","doi":"10.1109/ROEDUNET-RENAM.2014.6955306","DOIUrl":"https://doi.org/10.1109/ROEDUNET-RENAM.2014.6955306","url":null,"abstract":"Nowadays, many applications benefit from the increasing number of resources that cloud computing provides in order to improve the quality of their services. Most of these services require an account in order to access different resources, limiting their users to personal devices for the benefit of security, i.e., a (possible) malicious device should not be used to authenticate. In this paper we introduce a novel architecture that allows sharing temporary and limited credentials with any device in order to increase the usability of cloud-based services. We show the efficiency and easiness to use of our solution by implementing video streaming service using well-known public cloud computing and a common and cost-efficient hardware.","PeriodicalId":340048,"journal":{"name":"2014 RoEduNet Conference 13th Edition: Networking in Education and Research Joint Event RENAM 8th Conference","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114597582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RSSI-based electromagnetic propagation in industrial environments 工业环境中基于rssi的电磁传播
M. Machedon-Pisu, G. Morariu, F. Sandu
{"title":"RSSI-based electromagnetic propagation in industrial environments","authors":"M. Machedon-Pisu, G. Morariu, F. Sandu","doi":"10.1109/ROEDUNET-RENAM.2014.6955315","DOIUrl":"https://doi.org/10.1109/ROEDUNET-RENAM.2014.6955315","url":null,"abstract":"In order to implement wireless sensor networks (WSN) in an industrial environment it is necessary to understand the medium's propagation conditions that affect the reliability and radio performance of such networks. This paper aims to present how to analyze electromagnetic (EM) propagation by means of Received Signal Strength Indicator (RSSI) measured in an industrial hall and how to design/predict the radio performance of wireless communications in such environments.","PeriodicalId":340048,"journal":{"name":"2014 RoEduNet Conference 13th Edition: Networking in Education and Research Joint Event RENAM 8th Conference","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130347700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TEMPO: Traffic engineering and management in private organizations 专业方向:私人机构的交通工程和管理
Cristian Ruta, M. Cărăbaş, R. Rughinis, N. Tapus
{"title":"TEMPO: Traffic engineering and management in private organizations","authors":"Cristian Ruta, M. Cărăbaş, R. Rughinis, N. Tapus","doi":"10.1109/ROEDUNET-RENAM.2014.6955307","DOIUrl":"https://doi.org/10.1109/ROEDUNET-RENAM.2014.6955307","url":null,"abstract":"TEMPO aims to provide an implementation of a centralized control solution for the traffic within a network. TEMPO is a Java application developed in conjunction with OnePK framework, Cisco's response to Software Defined Networking revolution. Even if OnePK is in standardization process and it is not a mature technology, it already offers enough resources to build an innovative application that resolves problems that have no solution in classic networking. TEMPO closely monitors the state of the network elements and collects data regarding CPU load and interface's traffic rates. Based on the collected information, it creates and distributes decisions on every network element in part. By having a global view, the application has the intelligence to autonomously orchestrate the traffic in the network, improving its performance.","PeriodicalId":340048,"journal":{"name":"2014 RoEduNet Conference 13th Edition: Networking in Education and Research Joint Event RENAM 8th Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122994920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How useful are semantic links for the detection of implicit references in CSCL chats? 语义链接对CSCL聊天中的隐式引用的检测有多有用?
Traian Rebedea, Costin-Gabriel Chiru, Gabriel Gutu
{"title":"How useful are semantic links for the detection of implicit references in CSCL chats?","authors":"Traian Rebedea, Costin-Gabriel Chiru, Gabriel Gutu","doi":"10.1109/ROEDUNET-RENAM.2014.6955311","DOIUrl":"https://doi.org/10.1109/ROEDUNET-RENAM.2014.6955311","url":null,"abstract":"Chat conversations are used for a large range of Computer-Supported Collaborative Learning (CSCL) tasks especially because they allow the creation of multiple conversation threads that run in parallel. Thus, several different topics can be debated at the same time, fostering the exploitation of different ideas and facilitating collaborative knowledge creation. In order to detect these threads, our method proposed to firstly detect the links that arise between the utterances of a conversation. From a computational linguistics perspective, there is a wide variety of different types of links between utterances and there is no mechanism to compute all of them. This paper proposes to explain to what degree semantic similarity measures from Natural Language Processing (NLP) may be used to detect the links that arise between utterances in CSCL chat conversations and which is the effectiveness of applying solely this technique for implicit links identification.","PeriodicalId":340048,"journal":{"name":"2014 RoEduNet Conference 13th Edition: Networking in Education and Research Joint Event RENAM 8th Conference","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115812654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Diagram generation using genetic layout algorithms and orthogonal routing 图的生成采用遗传布局算法和正交路由
A. Musat, A. Voinescu
{"title":"Diagram generation using genetic layout algorithms and orthogonal routing","authors":"A. Musat, A. Voinescu","doi":"10.1109/ROEDUNET-RENAM.2014.6955300","DOIUrl":"https://doi.org/10.1109/ROEDUNET-RENAM.2014.6955300","url":null,"abstract":"A User-friendly, Innovative Layout and Routing Algorithm for Diagrams are used in a variety of fields such as FPGA design as a means to represent workflows and concepts and require dedicated algorithms which can produce easy to understand results. Available software is clunky, at times it can be really slow and will often result in layouts which are hard to read and understand. The main issue of layout algorithms is the sheer amount of data that a diagram (graph) can contain, which makes placing and routing in a limited space extremely difficult. We attempted to solve this problem by using a two phase software which tries to generate layouts which feel natural for the user. The first phase of the software will layout the diagrams using a genetic algorithm and constraints provided by the user, while the second phase will route the paths connecting the diagrams using orthogonal routing. Using this approach, we can provide layouts which suite the needs and preferences of any user, instead of providing generic representations.","PeriodicalId":340048,"journal":{"name":"2014 RoEduNet Conference 13th Edition: Networking in Education and Research Joint Event RENAM 8th Conference","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116220365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信