The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes a new solution for parking management and control that can be used along with the actual parking system. The proposed solution uses a Web Service as a data controller, a database for data storage and three client applications targeting a better user experience. Web Service's role is to process data received from clients and works as a link between clients and database. Also, Web...
This paper describes an efficient edge detection algorithm that can be used as a plug-in for digital image processing systems. The proposed algorithm uses a method based on iterative clustering targeting a reduced number of operations. The algorithm splits the image into two parts, background and foreground, and calculates the mean value for each of them. Based on these results, the new threshold...
Today, the audio systems become more performant and powerful using direct radiator loudspeakers realized in advanced technologies to achieve a high fidelity of the sound in a smaller box. Due to the increasing of the power and miniaturization, the system radiator became exposed to degradation. This can be prevented by integrating a fault detection system that monitories continuously the system radiator...
The monitoring and identification of suspicious activity is necessary for protection of Critical Infrastructure. The protection is extended to an early warning area beyond the physical security perimeter. The early warning area can cover from kilometer to hundred kilometers. The analysis of soil induced vibration by walking, digging, vehicle, can provide the useful information about human activity...
This paper is focused on the hardware and software implementation of DSP algorithms for footstep detection using seismic signal. The main contribution of this research consists in a hardware design and in a software application that process the signals received from the seismic sensor of type SM-24 using PC sound card. The signal samples received from the sensor are stored in a .wav file. The main...
The topic of data deduplication has received lately a lot of attention for its storage reduction functionality. Data deduplication essentially refers to the elimination of redundant data, leaving only one copy of the data to be stored, and is meant to reduce the pain regarding the exponential data growth in backup or archiving centers. Most existing state-of-the-art deduplication systems rely on approximate...
In this paper is presented a solution based on a bi-dimensional cellular automata (CA) for image density classification task (DCT). The two necessary properties: density preserving and translation are combined together to obtain the DCT solution. These two properties are achieved using a combination of nine fundamental 2D-CA rules and the proposed solution for DCT has two phases: preprocessing phase...
This paper is focused on the software implementation of DSP oriented algorithms for different audio effects, like Echo, 3-Tap Echo, Vibrato, Tremolo and Chorus. The main contribution of this research consists in a software application which is able to process in real time the audio signals received from the electric guitar using PC sound card. In addition, the application also includes a digital filter...
This paper presents an efficient video surveillance system which consists of a network camera and an algorithm for automatically detection of the human faces in the monitoring area via real time video contents analysis. The main contribution of this research consists in a software application which is able to process the images received from the camera in order to detect human faces and trigger the...
In this paper, programmable cellular automata (PCAs) are used to design a symmetric key cryptosystem. Based on PCAs state transitions certain fundamental transformations are defined which represents block ciphering functions of the proposed enciphering scheme. In order to verify the proposed encryption algorithm, an experimental hardware platform based on a reconfigurable FPGA of type Spartan 3E XC3S500E...
The paper present an encryption system based on a combination of a one-dimensional hybrid cellular automaton (CA) and a programmable cellular automaton (PCA) used for securing of medical data sent over the internet. The experimental results are based on the powerful of cellular automata encryption systems, already validated in my previously works. The method supports both software and hardware implementation...
In this paper is presented an efficient implementation of the Rivest, Shamir and Adleman (RSA) algorithm as a prototype programmable structure Xilinx Spartan3 to be integrated on an Application Specific Integrated Circuits (ASIC) structure. The purpose of this implementation was the optimization of the Field Programmable Gate Array (FPGA) area used. The paper describes the structures of the constituent...
This paper presents a cryptographic system based on cellular automata (CA) theory. The entire encryption system is implemented in reconfigurable hardware (FPGA) and it is used to protect data sent over the internet. It is shown how a series of simple elements called “cells” interact between each other using certain rules and topologies to form a larger system further used to encrypt/decrypt data....
The artificial immune algorithms are implemented by the human immune system. They inspired a technique that has the ability to find optimal solutions in a nonlinear search space. This kind of technique increases the computing speed and converges faster than the genetic algorithms. In this paper is presented an application of artificial immune algorithms in order to optimize the transfer function of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.