The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Aiming to keep under control a particular system or environment or to ensure that it works as expected there is a need to know what-when-why happens there. Various conditions and environmental factors can lead to errors, unexpected behavior or loss of control. To pursue these factors manually is time consuming, error prone, slow and usually quite expensive. Monitoring is quite complex and challenging...
This paper describes expert systems for the aquatic ecosystem diagnostics including its dynamics in the changing climate and detection of stressful situations when anthropogenic processes are realized in the sea basin. Expert system is based on the monitoring data processing and simulation results that are delivered by series models describing basic ecological, hydrological, hydrochemical and geophysical...
New information–modeling technology is developed, to be as a tool for the diagnostics of climate-nature-society system with the view of sustainable development strategies. The questions of environmental monitoring system synthesis are discussed with the use of different instrumental means. Complex of models and algorithms is listed to be as a base of information-modeling technology. Examples of simulation...
The Corona discharge represents one of the main concerns of the century in the field of electricity and powerline design, as it is both harmful for the environment as well as very costly to cover for the voltage losses on the transport. In this paper, we propose the design for a measurement and analysis platform for this phenomenon that can estimate the Corona discharge losses based on a video stream...
The paper develops a model of heuristic negotiation between self-interested agents. The bargaining process involves multi-issue negotiation. The agents are modeling different strategies during negotiation and are able to improve their abilities with experience. The behavior of the agents is directed towards the gain obtained when the goals are satisfied. The details of the previous interactions are...
Among the important benefits of mobile applications are portability and accessibility. Integrating a native mobile application with a Web portal increases the value and quality of the final system. A developer perspective is presented in this paper discussing about the main motivational factors and decision criteria in the selection of the most appropriate mobile ecosystem. Also the main software...
The mobile and wireless networks used extensively by Internet of Things devices, are becoming more popular for data transfer between Cyber-Physical Systems. These are accessed through mobile applications installed on mobile devices, with various operating systems. The paper is presenting a Cyber Physical Systems Oriented platform for mobile transactions, with applications in remote services access...
The internet of things is an evolving trend, connecting "things" to the internet, exchanging and collecting information about the surrounding environment. This is possible, by using different devices such as sensors and actuators feeding information that when connected together, enable to monitor and interact with the surrounding environment. Nowadays, there are many devices with different...
In this paper, we present two high performing and efficient Smoothed Particle Hydrodynamics (SPH) methods used to physically simulate incompressible fluids: Implicit Incompressible SPH (IISPH) and Divergence-Free SPH (DFSPH). At the moment, the most stable SPH methods employ density correctors that reduce the density error of the fluid particles to achieve very low levels of compressibility. We analyze...
Data security has become an issue of increasing importance, especially for Web applications and distributed databases. One solution is using cryptographic algorithms whose improvement has become a constant concern. The increasing complexity of these algorithms involves higher execution times, leading to an application performance decrease. This paper presents a comparison of execution times for three...
Network engineers and security experts are constantly confronted with new threats that have yet to be handled. Mitigation of zero day attacks requires the implementation of machine learning algorithms for the detection of abnormalities and malicious behavior on the network. These processes are often time consuming and can add significant resource cost in terms of network speed and compute power. The...
This paper presents a parallel version of a semiautomatic image segmentation algorithm. The method is based on the OneCut algorithm. For parallelization, we used different aspects from Parallel Graph Cuts method. Tests were run on a set of images from various databases. Our results were compared with both OneCut and Boykov-Jolly algorithms. The results in terms of execution time provides an improvement...
This paper describes current approaches regarding indoor positioning systems and their applicability in the detection of a device's indoor location using beacons that implement the Bluetooth Low Energy standard. We analyze two positioning techniques, fingerprinting and particle filtering, for two usage scenarios. The first scenario refers to a corridor with beacons placed along a straight line at...
The fast evolution of mobile devices has made them the center of attention for not only the research industry, but also malicious actors, as smartphones are used to store, transmit and process sensitive information. The diversity and number of typically installed applications create windows of opportunity for attackers. Attackers can use vulnerable applications to gain control over the device or change...
In this paper, we present an application designed to analyze news articles from Romanian mass media and extract opinions about political entities relevant to the major political stage. The application was created with the desire to study media polarization around important political events, such as legislative or presidential elections. The application uses different crawlers to extract the data from...
Environment monitoring is key for multiple applications and requires that devices used in acquiring environment data to be scattered over a wide area, but at the same time maintain accessibility of information from all sensor nodes. Although many Wireless Sensor Networks are based on the IEEE 802.15.4 standard for low-power, Wi-Fi networks offer the most accessibility and interoperability with other...
This paper discusses the approaches required for the disaster risk management in the widened framework of a System of Systems (SoS) and identifies the key differences compared with traditional centralized systems. It was argued that, due to the inherent complexity of SoS, the management of risk must be holistic and in the same time more quantitative methods must be adopted rather than the qualitative...
We now live in a society flooded by increasing volumes of data. These data are being generated by our everyday actions and the plethora of machines and sensors which surround us. This is especially true for the fields of study related to Earth Observation. Over the last few decades, new government policies have dramatically increased the volumes of data available to the general public. This increase...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.