Abstract is missing.
- A short overview on imagery interpretability rating scalesThomas Kreitmair. 1-4 [doi]
- Applied cybersecurity using game theory elementsAlecsandru Patrascu, Emil Simion. 1-4 [doi]
- A performance analysis for a resource manager of a content aware networkVlad Poenaru, Serban Georgica Obreja, Radu Badea, Eugen Borcoci. 1-6 [doi]
- E - business platform for mobile usersEugen Pop. 1-4 [doi]
- Advanced signal processing techniques for detection and localization of electrical arcsAngela Digulescu, Teodor Petrut, Cindy Bernard, Ion Candel, Cornel Ioana, Alexandru Serbanescu. 1-4 [doi]
- Software system for data extraction and communication in virtual environment for pilots' performances optimizationPericle Gabriel Matei, Constantin Rotaru, Mihai Mihaila-Andres, Ioana Raluca Edu. 1-4 [doi]
- Local description using multi-scale complete rank transform for improved logo recognitionRaluca Boia, Alessandra Bandrabur, Corneliu Florea. 1-4 [doi]
- Efficient and robust perceptual hashing using log-polar image representationCezar Plesca, Luciana Morogan. 1-6 [doi]
- Spam host classification using swarm intelligenceAdriana-Cristina Enache, Victor Valeriu Patriciu. 1-4 [doi]
- On reducing the artifacts of sonar images with image fusion techniqueDorel Aiordachioaie. 1-4 [doi]
- Comparison-based computations over fully homomorphic encrypted dataMihai Togan, Cezar Plesca. 1-6 [doi]
- Some considerations about third-order statistics for different types of random signalsCristian Ghita, Teofil-Cristian Oroian, Razvan-Doru Raicu, Lucian Anton, Ioana Suciu. 1-4 [doi]
- Considerations regarding shielding effectiveness and testing of electromagnetic protected enclosures used in communications securityValerica Bîndar, Mircea Popescu, Alexandru Vulpe. 1-6 [doi]
- Kalman-based tracker for multiple radar targetsAdrian Macaveiu, Andrei Campeanu, Ioan Nafornita. 1-4 [doi]
- Micro-expression recognition by feature points trackingShuoqing Yao, Ning He, Huiquan Zhang, Osamu Yoshie. 1-4 [doi]
- Capacity and Available Transfer Rate evaluation for wireless linksIustin-Alexandru Ivanciu, Andrei Ciprian Hosu, Zsolt Alfred Polgar, Virgil Dobrota. 1-4 [doi]
- Secure data dissemination in MANETs by means of mobile agentsCansin Turguner. 1-4 [doi]
- Using OFDM pilot tone information to detect active 4G LTE transmissionsAhmed Temtam, Dimitrie C. Popescu, Otilia Popescu. 1-4 [doi]
- An Automatic Speech Recognition solution with speaker identification supportAndi Buzo, Horia Cucu, Lucian Petrica, Dragos Burileanu, Corneliu Burileanu. 1-4 [doi]
- Fiber Weave Effect - a performance-limiting factorDiana Bucur. 1-4 [doi]
- Automation within the ISR Collection Management domainCristian Coman, Kurt Veum. 1-4 [doi]
- Bandwidth scaling of fading properties of on-body wireless channel in Body Area NetworksVit Sipal, Domenico Gaetano, Patrick McEvoy, Max J. Ammann. 1-4 [doi]
- Knowledge Management System for military universities cooperationLadislav Burita. 1-4 [doi]
- Thwarting cryptanalytic attacks based on the correlation functionRoger Tauleigne, Octaviana Datcu, Mihai Stanciu. 1-4 [doi]
- COdec Recognition From Decoded AudioDragos Draghicescu, Gheorghe Pop, Corneliu Burileanu. 1-4 [doi]
- Securing an alerting subsystem for a keystroke-based user identification systemStefan-Ciprian Arseni, Eduard Cristian Popovici, Liviu A. Stancu, Ovidiu G. Guta, Simona Viorica Halunga. 1-4 [doi]
- Aspects of electromagnetic compatibility as a support for communication security based on TEMPEST evaluationValerica Bîndar, Mircea Popescu, Razvan Craciunescu. 1-4 [doi]
- A low cost COSPAS-SARSAT alternative for EPIRB transponder for local fishing boats in BangladeshAbdul Quader Munshi, Monalisha Mishu, Kazi Abu Sayeed. 1-6 [doi]
- Signals sources recognition based on equipments electromagnetic emissions signatureDan Stoica, Mihai Enache, Adina Boteanu, Anca Stoica. 1-4 [doi]
- Improved automatic speech recognition system using sparse decomposition by basis pursuit with deep rectifier neural networks and compressed sensing recomposition of speech signalsMihai Gavrilescu. 1-6 [doi]
- Lightweight materials optimization for EMI protection applicationsMihai F. Enache, Dan Stoica, Andrei Szilagyi. 1-4 [doi]
- A new fast chaos-based image scrambling algorithmBoriga Radu, Dascalescu Ana Cristina, Priescu Iustin, Filis Cristina. 1-4 [doi]
- Design and implementation of microstrip patch antenna arrayGeorge Casu, Catalin Moraru, Andrei Kovacs. 1-4 [doi]
- Spline polynomial approach for the design of quadrature mirror filtersLucian Stanciu, Cristian Stanciu, Valentin Stanciu. 1-4 [doi]
- A new type of keystream generator based on chaotic maps: Illustration on a Hénon generalized mapDan Sava, Adriana Vlad, Relu Tataru. 1-6 [doi]
- Aspects regarding the characterization of in-orbit satellites using radio observationsPaul-Vladut Dascal, Tudor Palade, Paul Dolea, Octavian Cristea. 1-4 [doi]
- Design and implementation of a GPRS remote data logger for weather forecastingAndrei Kovacs, Andreea Nicolcioiu, Janel Arhip, George Casu. 1-4 [doi]
- FPGA implementation and evaluation of two cryptographically secure hybrid cellular automataDogaru Ioana, Dogaru Radu. 1-4 [doi]
- Some aspects about wind turbines as radar targetsIoana Suciu, Lucian Anton, Teofil-Cristian Oroian, Razvan-Doru Raicu. 1-4 [doi]
- Miller code usage in Visible Light Communications under the PHY I layer of the IEEE 802.15.7 standardAlin Mihai Cailean, Barthelemy Cagneau, Luc Chassagne, Mihai Dimian, Valentin Popa. 1-4 [doi]
- High-order modes in high permittivity cylindrical dielectric resonator antenna excited by a wide microstrip lineO. G. Avadanei, M. G. Banciu, L. Nedelcu. 1-6 [doi]
- Discontinuous Transmission detection of signals carrying unknown dataBogdan-Mihai Sandoi, Andrei Alexandru Enescu, Antal Anton, Andrei Gansari. 1-4 [doi]
- Chaos-based block ciphers: An overviewSafwan El Assad, Mousa Farajallah, Calin Vladeanu. 1-4 [doi]
- Time-frequency domain radar cross-section analysis of some simple objects and shapesLeontin Tuta, Roxana Lexutan, Catalin Moraru. 1-5 [doi]
- An anonymous voting system based on homomorphic encryptionYingming Zhao, Yue Pan, Sanchao Wang, Junxing Zhang. 1-4 [doi]
- Combined use of pattern recognition algorithms for keystroke-based continuous authentication systemEduard Cristian Popovici, Liviu A. Stancu, Ovidiu G. Guta, Stefan-Ciprian Arseni, Octavian Fratu. 1-4 [doi]
- RASSH - Reinforced adaptive SSH honeypotAdrian Pauna, Ion Bica. 1-6 [doi]
- Proposed architecture of a fully integrated modular neural network-based automatic facial emotion recognition system based on Facial Action Coding SystemMihai Gavrilescu. 1-6 [doi]
- Greening of IP-based video distribution networks: Developments and challengesAdrian Popescu. 1-8 [doi]
- Numerical properties of the DCD-RLS algorithm for stereo acoustic echo cancellationCristian Stanciu, Cristian Anghel. 1-4 [doi]
- Recent improvements of the SpeeD Romanian LVCSR systemHoria Cucu, Andi Buzo, Lucian Petrica, Dragos Burileanu, Corneliu Burileanu. 1-4 [doi]
- A low-complexity bit error rate estimation algorithm for wireless digital receiversAndrei Alexandru Enescu, Bogdan-Mihai Sandoi, Cosmin-Gabriel Dinu. 1-4 [doi]
- Data collection for spectrum sensing algorithms based on USRPValentin Stanciu, Alexandru Martian, Cezar Socoteanu, Ion Marghescu. 1-4 [doi]
- Automatic detection of skin melanoma from images using natural computing approachesIoana Dumitrache, Alina-Elena Sultana, Radu Dogaru. 1-4 [doi]
- HF interference temporal and spectral characteristics over the eastern MediterraneanHaris Haralambous, Photis Vryonides. 1-4 [doi]
- Full Motion Video in a coalition environmentJoe Ross, Cristian Coman. 1-4 [doi]
- Public discussion strategies for secret key generation from sampled IR-UWB channel responsesIulia Tunaru, Benoît Denis, Bernard Uguen. 1-6 [doi]
- A study on the common words found in different literary Romanian corporaAdrian Mitrea, Adriana Vlad, Octavian Hodea, Roxana Dragomir. 1-4 [doi]
- Influence of sun elevation, azimuth and X-ray bursts on long distance VLF radio propagationOctavian Cristea, Paul Dolea, Paul-Vladut Dascal, Tudor Palade. 1-4 [doi]
- Multitemporal Satellite Image Time Series analysis of urban development in Bucharest and Ilfov areasTeodor Costachioiu, Rodica Constantinescu, Mihai Datcu. 1-4 [doi]
- Performance analysis of MC-CDMA system when image transmission is involvedRazvan Craciunescu, Carmen Voicu, Alexandru Vulpe, Simona Halunga. 1-4 [doi]
- A practical solution for the regularization of the affine projection algorithmConstantin Paleologu, Jacob Benesty, Silviu Ciochina. 1-4 [doi]
- On the performance of 4G mobile wireless systems with multiple antennasOtilia Popescu, Dimitrie C. Popescu. 1-4 [doi]
- Biologically inspired risk assessment in cyber security using neural networksMihai-Gabriel Ionita, Victor Valeriu Patriciu. 1-4 [doi]
- Proposed Hybrid Network Performance Simulator (HNPS) - General structureLaurentiu Boicescu, Daniel Gheorghica, Victor Croitoru. 1-4 [doi]
- MIMO-OFDM: Maximum diversity using maximum likelihood detectorAmmar Ali Sahrab, Ion Marghescu. 1-4 [doi]
- Inter-symbol interference free pulses for transmission over Intensity-Modulated ChannelsAlexandra Ligia Onofrei Balan, Nicolae Dumitru Alexandru. 1-4 [doi]
- Non-data aided doppler shift estimation for underwater acoustic communicationPaul Cotae, Suresh Regmi, Ira S. Moskowitz. 1-6 [doi]
- Modelling foundation based on Queueing Petri Nets and hybrid netsLaurentiu Boicescu, Daniel Gheorghica, Victor Croitoru. 1-4 [doi]
- Combining point operations for efficient elliptic curve cryptography scalar multiplicationCristian Liviu Leca, Cristian-Iulian Rincu. 1-4 [doi]
- An IoT architecture for things from industrial environmentIoan Ungurean, Nicoleta-Cristina Gaitan, Vasile Gheorghita Gaitan. 1-4 [doi]
- DHCP server authentication using digital certificatesDumitru Daniel Dinu, Mihai Togan. 1-6 [doi]
- Recurrence Plot Analysis for characterization of appliance load signatureFlorin Popescu, Florin Enache, Iulian-Constantin Vizitiu, Petrica Ciotirnae. 1-4 [doi]
- An overview of W-BAN antennas designed at LEMAAnja K. Skrivervik. 1-6 [doi]
- The impact of using Source Address Validation filtering on processing resourcesOvidiu Strugaru, Alin D. Potorac, Adrian Graur. 1-4 [doi]
- On implementing packet inspection using CUDA enabled graphical processing unitsSorin Zoican, Marius Vochin. 1-6 [doi]
- Short range imaging and localization of human body behind obstructing surfaces using UWB signalsEmanuel Radoi, Ana-Maria Pistea, Charles Canaff, Roua Youssef. 1-4 [doi]
- The analysis of gradiometer signal in magnetic field measurement with fluxgate transducerGeorgiana Marin, Serghei Radu, Gheorghe Samoilescu, Octavian Baltag. 1-6 [doi]
- On the outage probability of dual-hop AF relaying over Nakagami-m fading channelsAdrian Florin Paun, Calin Vladeanu. 1-4 [doi]
- S-box design based on chaotic maps combinationCristian-Iulian Rincu, Vasile-Gabriel Iana. 1-4 [doi]
- Logging framework for cloud computing forensic environmentsAlecsandru Patrascu, Victor Valeriu Patriciu. 1-4 [doi]
- Filtering the signal of a measured mechanical parameterMarin Marinescu, Constantin-Ovidiu Ilie. 1-4 [doi]
- Business integration of industrial communications with Cloud computingCosmin Costache, Florin Sandu, Titus Balan, Adrian Nedelcu, Alexandru Covei. 1-4 [doi]
- BLER and spectral efficiency performances of a two-way relay channel schemeVasile Bota, Barna Janos Bartha, Mihály Varga. 1-4 [doi]
- Self-recovery of unauthentic images using a new digital watermarking approach in the wavelet domainRadu Ovidiu Preda. 1-4 [doi]
- Characterization of a flat plate antenna for OAM generation in the millimeter frequency bandRonan Niemiec, C. Brousseau, K. Mahdjoubi, O. Emile, A. Menard. 1-4 [doi]
- Model checking ARAN ad hoc secure routing protocol with algebraic Petri netsMihai-Lica Pura, Didier Buchs. 1-4 [doi]
- Analytical imaging of bacteria in foodstuffAlexey Saenko, Steffen Lerm, Victor Musalimov. 1-4 [doi]
- Data packet length optimization for Wireless Sensor Network lifetime maximizationAyhan Akbas, Huseyin Ugur Yildiz, Bülent Tavli. 1-6 [doi]
- Efficient and cryptographically secure pseudorandom number generators based on chains of hybrid cellular automata mapsDogaru Radu, Dogaru Ioana. 1-4 [doi]
- Multiclass On-demand routing in heterogeneous ad hoc networksMuhammad Umar Farooq, Nicolae Tapus. 1-4 [doi]
- Numerical method for processing and analysing flying effects on pilotsIoana Raluca Edu, Felix Constantin Adochiei, Pericle Gabriel Matei, Constantin Rotaru. 1-4 [doi]
- An overview of cloud middleware services for interconnection of healthcare platformsAdelina Ochian, George Suciu, Octavian Fratu, Carmen Voicu, Victor Suciu. 1-4 [doi]
- Emotional speech classification in consensus buildingNing He, Shuoqing Yao, Osamu Yoshie. 1-4 [doi]
- Broadband amplifier with self adaptability to the electromagnetic statusAdrian-Viorel Diaconu, Constantin Balan. 1-4 [doi]
- A digital watermarking algorithm based on Chinese remainder theoremXiao-feng Luo, Qiaozhi Xu, Junxing Zhang. 1-4 [doi]
- Envelope detector with denoising to improve the detection probabilityCorina Nafornita, Adrian Macaveiu, Alexandru Isar, Ioan Nafornita, Andrei Campeanu. 1-6 [doi]
- A self-organized key management scheme for ad hoc networks based on identity-based cryptographyMihai-Lica Pura, Didier Buchs. 1-4 [doi]
- Real-time spectrum sensor based on USRPAlexandru Martian. 1-4 [doi]
- Accuracy evaluation of the theoretical approximation of the mean mutual information per coded bit in coordinated multi point transmissionsDalia Georgiana Popescu, Mihály Varga, Vasile Bota. 1-4 [doi]
- An image encryption algorithm with a chaotic dynamical system based Sudoku GridAdrian-Viorel Diaconu. 1-4 [doi]
- Model and algorithm for the estimation of internal/environmental interference influence and improvement of IEEE 802.11/WiFi networks performance, using passive monitoringVictor Greu, Petrica Ciotirnae, Florin Popescu, Miguel G. Burgos, Ion Sima. 1-4 [doi]
- Demonstrator for voice communication over LTERadu Curpen, Titus Balan, Florin Sandu, Cosmin Costache, Calin Cerchez. 1-4 [doi]
- Steganalysis of a chaos-based steganographic methodDalia Battikh, Safwan El Assad, Bassem Bakhache, Olivier Déforges, Mohamad Khalil. 1-4 [doi]
- Convergence study of IPv6 tunneling techniquesPoussy Amr, Nashwa Abdelbaki. 1-6 [doi]
- Removal of artifacts from dermatoscopic imagesAlina Sultana, Ioana Dumitrache, Mihai Vocurek, Mihai Ciuc. 1-4 [doi]
- Securing communication in cyber-physical systems using steganography and cryptographyLaura Vegh, Liviu Miclea. 1-4 [doi]
- VoLTE performances in a 3D modeled campus areaAndra Elena Iulia Pastrav, Tudor Palade, Emanuel Puschita. 1-4 [doi]
- Compressed projections for localization of landmarks in the eye regionAlessandra Bandrabur, Laura Florea, Raluca Boia, Corneliu Florea. 1-4 [doi]
- Analysis of fuzzy evidence accrual security approach To GPS systemsStephen C. Stubberud, Kathleen A. Kramer. 1-6 [doi]
- A critical perspective towards CCNRadu Alexandru Badea, Eugen Borcoci, Radu Lupu, Jordi Mongay Batalla. 1-6 [doi]
- Cramer-Rao bound for a sparse complex modelAnisia Florescu, Émilie Chouzenoux, Jean-Christophe Pesquet, Silviu Ciochina. 1-4 [doi]