International Conference on Electronics, Communications and Computing (IC|ECCO): Recent submissions

  • IAPASCURTA, Victor; FIODOROV, Ion (Technical University of Moldova, 2022)
    Electroencephalography as a generally accepted method of monitoring the electrical activity of brain neurons is widely used both in diseases and in healthy conditions. The recorded electrical signal is usually obtained ...
  • DRIN, Yaroslav; DRIN, Iryna; DRIN, Svitlana; STETSKO, Yuriy (Technical University of Moldova, 2022)
    The initial-boundary problem for the heat conduction equation with the inversion of the argument are considered. The Green’s function of considered problem are determined. The theorem about the Poisson integral limitation ...
  • ȘIEAN, Alexandru-Ionuț (Technical University of Moldova, 2022)
    We present in this paper the results of a frequency analysis of gesture commands frequently employed for human- drone interaction in the scientific literature, and we propose a set of gestures for controlling drones that ...
  • ENACHI, Andrei; TURCU, Cornel; CULEA, George; BANU, Ioan-Viorel; ANDRIOAIA, Dragos-Alexandru; PETRU, Puiu-Gabriel; POPA, Sorin-Eugen (Technical University of Moldova, 2022)
    The goal of this paper's research is to develop learning methods that promote the automatic analysis and interpretation of human and mime-gestural movement from various perspectives and using various data sources images, ...
  • REDKO, Igor; YAHANOV, Petro; ZYLEVICH, Maksym (Technical University of Moldova, 2022)
    This work is aimed at demonstrating, on a representative sample, the usefulness of programming concepts in the state of semantic patterns as relations in a program chain that specify particular types of programs. This is ...
  • LEFEBVRE, Mario (Technical University of Moldova, 2022)
    The problem of controlling a compound Poisson process until it leaves an interval is considered. In this paper, instead of choosing the density function of the jumps and trying to find the corresponding value function, ...
  • GERU, Ion I. (Technical University of Moldova, 2022)
    The Schwinger's oscillator model of angular momentum is applied to define quantum logical elements in quantum circuits by means of wave functions of two independent harmonic oscillators. It is shown how four EPR entangled ...
  • FRATAVCHAN, Valerіi; FRATAVCHAN, Tonia; ABABII, Victor (Technical University of Moldova, 2022)
    This article considers the method of clustering in the problems of pattern recognition when studying with a teacher in the case of n-dimensional numerical features. Clusters of linear and ellipsoidal forms that are optimal ...
  • RADU, Rareș-Aurelian (Technical University of Moldova, 2022)
    Radio Frequency Identification Technology became more and more involved in authentication processes over the years and is still rising. Security in this context needs to be strongly ensured, hence security models have a ...
  • PERJU, Veaceslav; SARANCIUC, Dorian (Technical University of Moldova, 2022)
    This paper presents the evaluation’s results of the new classes of the target recognition systems – multi- algorithms unimodal systems and multi-algorithms multimodal systems. The structures and the graphs of the systems ...
  • LEAHU, Alexei; BAGRIN-ANDRIEVSCHI, Veronica; ROTARU, Maria (Technical University of Moldova, 2022)
    Our work deals with a typical problem of comparing the reliability of a serial-parallel type network vs the reliability of a parallel-serial type network. Using graphic methods on elementary models, we show how they lead ...
  • SCLIFOS, Alexei; SCLIFOS, Emilia; GUȚULEAC, Emilian (Technical University of Moldova, 2022)
    Traditional mathematical formalisms are unable to model modern self-adaptive discrete event systems (ADES) because they cannot handle behaviors that change at run-time in response to environmental changes. This paper ...
  • ISTRATI, Daniela (Technical University of Moldova, 2022)
    This paper presents a state of the art in field of intelligent user interfaces, which are the main elements that make the interaction between humans and machines in the most efficient, natural, effective way. As an ...
  • ISTRATI, Daniela; MORARU, Vasile; ZAPOROJAN, Sergiu (Technical University of Moldova, 2022)
    Binary quadratic programming is a classical combinatorial optimization problem that has many real-world applications. This paper presents a method for solving the quadratic programming problem with circulant matrix by ...
  • ȚÎFLEA, Denisa-Ionela (Technical University of Moldova, 2022)
    The construction of secure and private RFID protocols is necessary with the increasing application of RFID technology in increasingly diverse fields. While security refers to unilateral or mutual authentication depending ...
  • SAVA, Nina; MARUSIC, Galina (Technical University of Moldova, 2022)
    The paper addresses the issue of water quality of the Prut River between 2019 and 2021. The data on pollution of the Prut River and its tributaries are analyzed. The negative influence of detected pollutants on human health ...
  • PENTIUC, Ştefan-Gheorghe; BOBRIC, Elena Crenguța; BILIUS, Laura-Bianca (Technical University of Moldova, 2022)
    The problem of obtaining an optimal partition consistent with a series of partitions resulting from the application of various clustering algorithms is NP complete. A heuristic method based on the concepts of central ...
  • BURLEA, Tatiana; BOBICEV, Victoria (Technical University of Moldova, 2022)
    This paper describes an interface for the phonosemantic evaluation for Russian words. By phonosemantics we mean the subconscious emotional interpretation of the acoustic perception of words independent of their meaning. ...
  • BUTNARU, Alexandra-Ina (Technical University of Moldova, 2022)
    Access control is a fundamental security component in a system, especially in rapidly developing domains such as the cloud or the Internet of Things. The nature of these domains renders formerly acclaimed access control ...
  • ȚIPLEA, Ferucio Laurențiu; HRISTEA, Cristian; BULAI, Rodica (Technical University of Moldova, 2022)
    Privacy and mutual authentication are two significant requirements for real-life applications of RFID schemes. These two requirements have been studied for a long time only for adversaries that cannot corrupt the tem-porary ...

Search DSpace


Browse

My Account