20 articles in this issue
Aleksandar Peulic,Snezana Dragicevic,Zeljko Jovanovic,Radojka Krneta
Energy consumption for heating purposes accounts for a significant part of the budgets of individual and collective users. This increases the importance of issues related to the monitoring of heating energy flows, analysis of flow parameters, ve... see more
Emanuel Puschita,Tudor Palade,Rebeca Colda,Irina Vermesan,Ancuta Moldovan
In wireless communication systems the resource anagement needs to integrate adaptive techniques to the varying network conditions, due to the eventual dramatic changes that may occur in the link quality. Therefore, it may be desirable to s... see more
Soo Young Shin
IEEE 802.15.4 employs carrier sense multiple access with collision avoidance (CSMA/CA), which is known to have difficulty for supporting quality of service (QoS). In this paper, a new priority scheme called priority jamming (PJ) is proposed ... see more
Daniel Simion,Mihai Florentin Ursuleanu,Adrian Graur,Alin Dan Potorac,Alexandru Lavric
With the help of the Internet today we can communicate with anyone from anyplace to access all types of data with a high level of QoS. This mobility is available for legitimate users, as well as for illegitimate ones, for this reason we need ext... see more
Bogdana Stanojevic,Milan Stanojevic
The importance of linear fractional programming comes from the fact that many real life problems are based on the ratio of physical or economic values (for example cost/-time, cost/volume, profit/cost or any other quantities that measure the efficiency of... see more
P. Thangam,K. Thanushkodi,T.V. Mahendiran
Skeletal maturity is a reliable indicator of growth and skeletal bone age assessment (BAA) is used in the management and diagnosis of endocrine disorders. Bone age can be estimated from the left-hand wrist radiograph of the subject. The work pre... see more
Francisco J. Watkins,Ricardo A. Hinojosa,Astrid M. Oddershede
This paper describes a methodology that allows wireless networking allowing interconnection to the Internet through a Gateway, to interact and obtain products and services delivery. These Wireless Mesh Network(WMN), are based on routers which&nb... see more
Doina Zmaranda,Helga Silaghi,Gianina Gabor,Codruta Vancea
At the time being knowledge-based systems are used in almost all life aspects. The main reason for trying to use knowledge-based systems in real-time control is to reduce cognitive load on users (overload), their application proving to be import... see more
D. Arivudainambi,D. Rekha
In this paper, a new efficient immune genetic algorithm (IGA) is proposed for broadcast scheduling problem in TDMA Ad hoc network. Broadcast scheduling is a primary issue in wireless ad hoc networks. The objective of a broadcast schedule is to d... see more
Mihaela Breaban,Henri Luchian
The current work proposes and investigates a new method to identify outliers in multivariate numerical data, driving its roots in projection pursuit. Projection pursuit is basically a method to deliver meaningful linear combinations of attribute... see more
Lucio Canete
Every automaton in dynamic and complex environments requires sensory systems with an appropriate level of attention on the hazardous environment. This property in any efficient automaton is analogous to that observed in animal sensory syste... see more
Adrian Copie,Teodor-Florin Fortis,Victor Ion Munteanu
The Small and Medium Enterprises benefit now, due to the scale adoption of Cloud Computing, from an emerging market where they can associate and collaborate to form virtual enterprises or virtual clusters, aiming to compete with the large enterp... see more
Felisa M. Cordova,Franco F. Yanine
According to seismologists Chile has yet to face another big earthquake in the very near future, yet the country remains largely unprepared against massive electric power systems brake-down. The problem lies in the centralized electric power systems and t... see more
Arash Ghorbannia Delavar,Amir Abbas Baradaran
In this paper, we have presented an algorithm, based on genetics and re-clustering, to reduce energy consumption in Wireless Sensor Networks. Algorithm CRCWSN could be best used by selected chromosomes in different states. In this algorithm,&nbs... see more
Alina Madalina Lonea,Daniela Elena Popescu,Huaglory Tianfield
This paper is focused on detecting and analyzing the Distributed Denial of Service (DDoS) attacks in cloud computing environments. This type of attacks is often the source of cloud services disruptions. Our solution is to combine the evidences o... see more
Ferney A. Maldonado-Lopez,Yezid Donoso
Multicast is the keystone for multimedia Internet. Multicast is one of the new and most used services in telecommunication networks. However, these networks meet big challenges when facing failures from diverse factors, including natural disaste... see more
Miguel D. Alfaro,Juan M. Sepúlveda,Jasmín A. Ulloa
Currently, it is recognized that manufacturing systems are complex in their structure and dynamics. Management, control and forecasting of such systems are very difficult tasks due to complexity. Numerous variables and signals vary in time with ... see more
Mariana Nagy,Valentin Burca,Casian Butaci,Gabriela Bologa
Simulation is one of the main instruments within the financial techniques of modeling decisions in condition of risk. The paper compares a couple of simulation methods for Sales and their impact on the need of short term financing. For simulatin... see more
Diana-Elena Neghina,Emil Scarlat
Cyber-attacks can significantly hurt an organization’s IT environment, leading to serious operational disruptions, from simply damaging the first layers of IT security up to identity theft, data leakage and breaking down networks. Moreover, the ... see more