Journal title
ISSN: 1841-9836    frecuency : 4   format : Electrónica

Issues

      see all issue


Skip Navigation Links.

Volume 8 Number 1 Year 2013

20 articles in this issue 

Aleksandar Peulic,Snezana Dragicevic,Zeljko Jovanovic,Radojka Krneta

Energy consumption for heating purposes accounts for a significant part of the budgets of individual and collective users. This increases the importance of issues related to the monitoring of heating energy flows, analysis of flow parameters, ve... see more

Pags. 105 - 110  

Emanuel Puschita,Tudor Palade,Rebeca Colda,Irina Vermesan,Ancuta Moldovan

In wireless communication systems the resource  anagement needs to integrate adaptive techniques to the varying network conditions, due to the eventual dramatic changes that may occur in the link quality. Therefore, it may be desirable to s... see more

Pags. 111 - 126  

Soo Young Shin

IEEE 802.15.4 employs carrier sense multiple access with collision avoidance (CSMA/CA), which is known to have difficulty for supporting quality of service (QoS). In this paper, a new priority scheme called priority jamming (PJ) is proposed ... see more

Pags. 127 - 135  

Daniel Simion,Mihai Florentin Ursuleanu,Adrian Graur,Alin Dan Potorac,Alexandru Lavric

With the help of the Internet today we can communicate with anyone from anyplace to access all types of data with a high level of QoS. This mobility is available for legitimate users, as well as for illegitimate ones, for this reason we need ext... see more

Pags. 136 - 145  

Bogdana Stanojevic,Milan Stanojevic

The importance of linear fractional programming comes from the fact that many real life problems are based on the ratio of physical or economic values (for example cost/-time, cost/volume, profit/cost or any other quantities that measure the efficiency of... see more

Pags. 146 - 152  

P. Thangam,K. Thanushkodi,T.V. Mahendiran

Skeletal maturity is a reliable indicator of growth and skeletal bone age assessment (BAA) is used in the management and diagnosis of endocrine disorders. Bone age can be estimated from the left-hand wrist radiograph of the subject. The work pre... see more

Pags. 153 - 160  

Francisco J. Watkins,Ricardo A. Hinojosa,Astrid M. Oddershede

This paper describes a methodology that allows wireless networking allowing interconnection to the Internet through a Gateway, to interact and obtain products and services delivery. These Wireless Mesh Network(WMN), are based on routers which&nb... see more

Pags. 161 - 165  

Doina Zmaranda,Helga Silaghi,Gianina Gabor,Codruta Vancea

At the time being knowledge-based systems are used in almost all life aspects. The main reason for trying to use knowledge-based systems in real-time control is to reduce cognitive load on users (overload), their application proving to be import... see more

Pags. 166 - 175  

D. Arivudainambi,D. Rekha

In this paper, a new efficient immune genetic algorithm (IGA) is proposed for broadcast scheduling problem in TDMA Ad hoc network. Broadcast scheduling is a primary issue in wireless ad hoc networks. The objective of a broadcast schedule is to d... see more

Pags. 18 - 29  

Mihaela Breaban,Henri Luchian

The current work proposes and investigates a new method to identify outliers in multivariate numerical data, driving its roots in projection pursuit. Projection pursuit is basically a method to deliver meaningful linear combinations of attribute... see more

Pags. 30 - 36  

Lucio Canete

Every automaton in dynamic and complex environments requires sensory systems with an appropriate level of attention on the hazardous environment. This property in any efficient automaton is analogous to that observed in animal sensory syste... see more

Pags. 37 - 41  

Adrian Copie,Teodor-Florin Fortis,Victor Ion Munteanu

The Small and Medium Enterprises benefit now, due to the scale adoption of Cloud Computing, from an emerging market where they can associate and collaborate to form virtual enterprises or virtual clusters, aiming to compete with the large enterp... see more

Pags. 42 - 49  

Felisa M. Cordova,Franco F. Yanine

According to seismologists Chile has yet to face another big earthquake in the very near future, yet the country remains largely unprepared against massive electric power systems brake-down. The problem lies in the centralized electric power systems and t... see more

Pags. 50 - 60  

Arash Ghorbannia Delavar,Amir Abbas Baradaran

In this paper, we have presented an algorithm, based on genetics and re-clustering, to reduce energy consumption in Wireless Sensor Networks. Algorithm CRCWSN could be best used by selected chromosomes in different states. In this algorithm,&nbs... see more

Pags. 61 - 69  

Alina Madalina Lonea,Daniela Elena Popescu,Huaglory Tianfield

This paper is focused on detecting and analyzing the Distributed Denial of Service (DDoS) attacks in cloud computing environments. This type of attacks is often the source of cloud services disruptions. Our solution is to combine the evidences o... see more

Pags. 70 - 78  

Ferney A. Maldonado-Lopez,Yezid Donoso

Multicast is the keystone for multimedia Internet. Multicast is one of the new and most used services in telecommunication networks. However, these networks meet big challenges when facing failures from diverse factors, including natural disaste... see more

Pags. 79 - 86  

Miguel D. Alfaro,Juan M. Sepúlveda,Jasmín A. Ulloa

Currently, it is recognized that manufacturing systems are complex in their structure and dynamics. Management, control and forecasting of such systems are very difficult tasks due to complexity. Numerous variables and signals vary in time with ... see more

Pags. 8 - 17  

Mariana Nagy,Valentin Burca,Casian Butaci,Gabriela Bologa

Simulation is one of the main instruments within the financial techniques of modeling decisions in condition of risk. The paper compares a couple of simulation methods for Sales and their impact on the need of short term financing. For simulatin... see more

Pags. 87 - 98  

Diana-Elena Neghina,Emil Scarlat

Cyber-attacks can significantly hurt an organization’s IT environment, leading to serious operational disruptions, from simply damaging the first layers of IT security up to identity theft, data leakage and breaking down networks. Moreover, the ... see more

Pags. 97 - 104