Conveners
Session C
- Mihai CARABAȘ (Agency ARNIEC/RoEduNet, University Politehnica of Bucharest)
Description
Session C
The need for digitalization of education services is obvious, considering the natural and social challenges of humankind in recent years. To face these challenges, actions are needed to improve the efficiency (or automation) of education services. This is relevant given the important role of education in society. Through this article, a technical investigation is carried out on the need for...
Today, organizations around the world are using less and less paper documents that have handwritten signatures accompanied by stamps to prove their authenticity and are increasingly turning to digital signatures. Initially, the digital signature could be applied to documents by means of a hardware token, containing the cryptographic material (the private key and the associated digital...
Improving Network Security Using DD-WRT as a Solution for SOHO Routers
Timofte Edi Marian
”Ștefan cel Mare” University
Suceava, Romania
edi.timofte@usm.ro
Balan Doru
”Ștefan cel Mare” University
Suceava, Romania
dorub@usv.ro
Abstract—Securing the IT infrastructure in today's digital age against cyber-attacks has become vital, one of the most used robust solutions...
Nowadays, as the smartphone's performance grew a lot, being comparable with the one of computer systems, people are more attracted due to their capabilities and tend to use them in almost all activities. This fact determined the attackers to also consider the mobile devices among their targeted platforms. The easiest way for adversaries to get access to a smartphone is via SMS phishing...
This paper introduces a novel approach that enables students to compose music using deep neural networks while simultaneously gaining insights into the functionality of various mathematically computed aesthetic measures. While there are existing applications that allow users to compose music with artificial intelligence, they often lack the feedback, which may be provided by newly developed...
TBA
n this study, the performance of four speech/voice
activity detection (VAD) models, namely SpeechBrain, Picovoice,
InaSpeechSegmenter and WebRTC, is compared using data
collected from KAIST (Korea Advanced Institute of Science
and Technology). The goal is to develop an improved VAD
model based on the analysis of SpeechBrain’s performance and
provide a detailed perspective on the...
Network security is the practice of protecting computer networks and devices from unauthorized access, attacks, and threats. These threats can come from a variety of sources, including hackers, malware, and external attacks, and they can compromise the confidentiality, integrity, and availability of sensitive data and systems. A network security management system is a system that is designed...
The research team of this article was involved in a publicly funded project implementation and has resorted to a low-code solution for digital process automation (Microsoft Power Platform), to boost project team efficiency. This research paper reveals the development process of the solution starting from the modeling phase to testing and implementation phase. The components included in the...