Razvan Bocu - Academia.edu (original) (raw)

Papers by Razvan Bocu

Research paper thumbnail of Brain Journal - The Fundamentals Regarding The Usage Of The Concept Of Interface For The Modeling Of The Software Artefacts

This paper presents the conceptual foundations of a software system's solution modelling acti... more This paper presents the conceptual foundations of a software system's solution modelling activity, which is formally based on two essential concepts: the artefact and the interface. This modelling activity envisions two objectives: the explicit emphasis on the interfaces' importance in the software engineering, and the preparation of the framework inside which the loop structurebehaviour can be formalized considering the inherent benefits for the modelling activity in general, and for the modelling activity automation in particular.

Research paper thumbnail of The Fundamentals Regarding the Usage of the Concept of Interface for the Modeling of the Software Artefacts

This paper presents the conceptual foundations of a software system's solution modelling acti... more This paper presents the conceptual foundations of a software system's solution modelling activity, which is formally based on two essential concepts: the artefact and the interface. This modelling activity envisions two objectives: the explicit emphasis on the interfaces' importance in the software engineering, and the preparation of the framework inside which the loop structure-behaviour can be formalized considering the inherent benefits for the modelling activity in general, and for the modelling activity automation in particular.

Research paper thumbnail of BIOTECHNO 2017 Committee BIOTECHNO Steering Committee

Research paper thumbnail of BRAIN Journal - The Fundamentals Regarding the Usage of the Concept of Interface for the Modeling of the Software Artefacts

<i>Abstract</i><br>This paper presents the conceptual foundations of a software... more <i>Abstract</i><br>This paper presents the conceptual foundations of a software system's solution modelling activity, which is formally based on two essential concepts: the artefact and the interface. This modelling activity envisions two objectives: the explicit emphasis on the interfaces' importance in the software engineering, and the preparation of the framework inside which the loop structure-behaviour can be formalized considering the inherent benefits for the modelling activity in general, and for the modelling activity automation in particular.<br><b>Find more at:</b><b>https://www.edusoft.ro/brain/index.php/brain/article/view/581</b><br&gt;

Research paper thumbnail of Figure 3. The Artefact As It Exists As A Black Box-The Fundamentals Regarding The Usage Of The Concept Of Interface For The Modeling Of The Software Artefacts

Consequently, the artefact as it exists as a black box can be represented according to the repres... more Consequently, the artefact as it exists as a black box can be represented according to the representation in Figure 3. It can be noticed that the artefact as it exists as a black box begins to interact with the environment. Two main categories of interfaces may be utilized by any artefact in order to interact with the environment: — Human Computer Interfaces (HCI); — Shared Resource Interfaces (SRI).

Research paper thumbnail of Figure 1. Visual And Synthetic Representation Of The Modelling Process In The Software Industry-The Fundamentals Regarding The Usage Of The Concept Of Interface For The Modeling Of The Software Artefacts

The experience that is accumulated regarding the modelling paradigms in the software engineering ... more The experience that is accumulated regarding the modelling paradigms in the software engineering is impressive. Thus, the software engineering recognizes modelling paradigms like object orientation, aspect orientation, component orientation, service orientation, agent orientation. In one form or another, these paradigms prove their ex- cellence in certain types of IT projects. At the same time, these paradigms reveal their objective limits when they are used to engineer the real world software systems. Every modelling paradigm represents, in fact, a modality to represent the real world using a specific formal framework. The specificity of the formal framework is defined from both a syntactic and semantic perspective. The formal syntactic framework of a paradigm refers to the concepts that are used by the paradigm in order to represent the real world, but also to the recommended principles that allow for these concepts to interact in a correct and efficient manner. Both the concepts ...

Research paper thumbnail of Objects Detection Using Sensors Data Fusion in Autonomous Driving Scenarios

Electronics

The relatively complex task of detecting 3D objects is essential in the realm of autonomous drivi... more The relatively complex task of detecting 3D objects is essential in the realm of autonomous driving. The related algorithmic processes generally produce an output that consists of a series of 3D bounding boxes that are placed around specific objects of interest. The related scientific literature usually suggests that the data that are generated by different sensors or data acquisition devices are combined in order to work around inherent limitations that are determined by the consideration of singular devices. Nevertheless, there are practical issues that cannot be addressed reliably and efficiently through this strategy, such as the limited field-of-view, and the low-point density of acquired data. This paper reports a contribution that analyzes the possibility of efficiently and effectively using 3D object detection in a cooperative fashion. The evaluation of the described approach is performed through the consideration of driving data that is collected through a partnership with ...

Research paper thumbnail of Intrusion Detection System for 5G with a Focus on DOS/DDOS Attacks

2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)

Research paper thumbnail of Post-quantum Digital Signature Scheme for Personal Data Security in Communication Network Systems

Advances in Intelligent Systems and Computing

Research paper thumbnail of Novel Method of Hardware Security Problems Identification

2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T), 2020

Hardware security is one of the most important aspects of cyber security today. A lot of systems ... more Hardware security is one of the most important aspects of cyber security today. A lot of systems are based on the hardware components today. Software implementation of different mechanisms is rather strong only on the program layer. At the same time hardware-based part could be a weak point and easy to break. Hackers today are using different hardware-based attacks methods to gain an access to the systems. Side-channel attacks together with software Trojans are widely used today. Information can be leaked from different sources and on different layers of the system. Engineers from global organizations today are working on improving the security of hardware-based systems. Different components are developed to increase the level of security against popular attacks like side-channel ones. Improvements in hardware components will increase the efficiency of the security mechanisms of an entire systems and make them adoptable in a broader range of real-world use case scenarios. IoT device...

Research paper thumbnail of A Secure Distributed e-Health System for the Management of Personal Health Metrics Data

Advanced Information Networking and Applications

The definition of smart city as a broad concept values the versatile acquisition, storage, and pr... more The definition of smart city as a broad concept values the versatile acquisition, storage, and processing of relevant data for the city’s community. In this context, health data occupies a privileged place. The reliable gathering of personal health information has become recently possible through wearable medical devices. These devices usually do not store the data locally and offer, in the most favourable case, limited basic data processing features, and virtually no advanced processing capabilities for the collected personal health data. This paper describes an integrated distributed e-Health system, which collects health data from the enrolled city residents, and allows secure storage and processing of medical data in cloud by using a comprehensive encryption model to preserve the data privacy, which is based on the NTRU public-key cryptosystem. The system collects the user data through a client application module that is installed on the user’s smartphone or smartwatch, and securely transports it to the cloud backend. The homomorphic processing of the encrypted data is performed using the Apache Spark service. The event-based handlers are triggered by the IBM OpenWhisk programming service. The prototype has been tested using a real-world use case, which involves five hundred residents of Brasov City, Romania.

Research paper thumbnail of Secure e-Health System for the Integrated Management of Personal Health Data Collected by IoT Devices

The definition of a smart city as a broad concept values the versatile acquisition, storage, and ... more The definition of a smart city as a broad concept values the versatile acquisition, storage, and processing of relevant data for the city’s community. In this context, health data occupies a privileged place. The reliable gathering of personal health information has become recently possible through wearable medical devices. These devices usually do not store the data locally and offer, in the most favorable case, limited basic data processing features, and virtually no advanced processing capabilities for the collected personal health data. This paper describes an integrated distributed e-Health system, which collects health data from the enrolled city residents, and allows secure storage and processing of medical data in the cloud by using a comprehensive encryption model to preserve the data privacy, which is based on the NTRU public-key cryptosystem. The correct assignment of the medical data to the respective person is verified by the usage of a hash-based digital signature mech...

Research paper thumbnail of The Fundamentals Regarding the Usage of the Concept of Interface for the Modeling of the Software Artefacts

This paper presents the conceptual foundations of a software system’s solution modelling activity... more This paper presents the conceptual foundations of a software system’s solution modelling activity, which is formally based on two essential concepts: the artefact and the interface. This modelling activity envisions two objectives: the explicit emphasis on the interfaces’ importance in the software engineering, and the preparation of the framework inside which the loop structure-behaviour can be formalized considering the inherent benefits for the modelling activity in general, and for the modelling activity automation in particular.

Research paper thumbnail of The Role of the Conceptual Invariants Regarding the Prevention of the Software Artefacts’ Obsolescence

The paper presents a series of considerations regarding the role of the conceptual invariants con... more The paper presents a series of considerations regarding the role of the conceptual invariants concerning the prevention of the artefacts’ obsolescence, with an emphasis on the software engineering. The concept of artefact has the meaning that is defined in (Bocu & Bocu, 2016). The emphasizing of the invariants’ role has the goal to allow the understanding, with the respective approximation, of this invariants’ role considering the continuous qualitative progress of the human artefacts, generally speaking, but also in connection to the software systems engineering.

Research paper thumbnail of Post-Quantum Digital Signatures with Attenuated Pulse Generator

Quantum computations cause problems for classical systems. The perfect examples are effective qua... more Quantum computations cause problems for classical systems. The perfect examples are effective quantum algorithms, which are causing problems for the most popular cryptosystems. These systems are considered safe for classical computers. Despite on releasing quantum computers all sensitive information should stay safe. This information should be encrypted in such way that will withstand quantum computers’ attacks. Classical cryptography consists of problems and instruments: encryption, key distribution, digital signatures, pseudo-random number generator and one-way functions. For example, "RSA" is safe only when factorization is hard for classical computer, but quantum computers can easily solve this problem. Hash-based signature systems provide interesting alternatives. Hash-based signatures systems use cryptographically secure hash functions. Their security is based on the security of the concrete hash function. Using secure hash function is the minimal requirement for saf...

Research paper thumbnail of A Real-Time Intrusion Detection System for Software Defined 5G Networks

Research paper thumbnail of Eurographics Irish Chapter Synthetic Imaging for 3 D Bacterial Representation

The first form of life on earth began at the microscopic level, that of Bacteria. Ever since the ... more The first form of life on earth began at the microscopic level, that of Bacteria. Ever since the invention of the microscope has bacteria been studied in great depth. To study the growth patterns it is necessary to grow bacterial colonies, thus requiring incubation periods from hours or days to weeks. This paper looks at the use of 3D Turtle geometry, and recursion to develop computer generated equivalents. Applications that allow for the simulation of bacterial growth have many uses both in education and research, and remove many hazards and costs associated with the incubation and study of same.

Research paper thumbnail of Post-quantum Digital Signature Scheme for Personal Data Security in Communication Network Systems

Research paper thumbnail of Synthetic Imaging for 3D Bacterial Representation

The first form of life on earth began at the microscopic level, that of Bacteria. Ever since the ... more The first form of life on earth began at the microscopic level, that of Bacteria. Ever since the invention of the microscope has bacteria been studied in great depth. To study the growth patterns it is necessary to grow bacterial colonies, thus requiring incubation periods from hours or days to weeks. This paper looks at the use of 3D Turtle geometry, and recursion to develop computer generated equivalents. Applications that allow for the simulation of bacterial growth have many uses both in education and research, and remove many hazards and costs associated with the incubation and study of same.

Research paper thumbnail of A Constructive Review Regarding the Significance of 5G Networks for the Internet of Things

The paradigm of the Internet of Things seems to become the backbone of the future always connecte... more The paradigm of the Internet of Things seems to become the backbone of the future always connected world. The current 4G mobile infrastructures have been consistently used during the initial stages of the Internet of Things’ (IoT) evolution, but they seem not to satisfy all the speed and capacity requirements. Thus, the 5G mobile networks are expected to significantly improve the today’s 4G networks capabilities, which makes them essential for the future networks of always connected IoT devices. The efforts to expand the capabilities of the 5G technology take several pathways. Thus, this paper presents the state-of-the-art concerning the development of 5G in the context of IoT networks. It reviews the current research contributions, the essential founding technologies, and it also suggests the main research avenues and challenges that may have an impact on the development of 5G IoT networks.

Research paper thumbnail of Brain Journal - The Fundamentals Regarding The Usage Of The Concept Of Interface For The Modeling Of The Software Artefacts

This paper presents the conceptual foundations of a software system's solution modelling acti... more This paper presents the conceptual foundations of a software system's solution modelling activity, which is formally based on two essential concepts: the artefact and the interface. This modelling activity envisions two objectives: the explicit emphasis on the interfaces' importance in the software engineering, and the preparation of the framework inside which the loop structurebehaviour can be formalized considering the inherent benefits for the modelling activity in general, and for the modelling activity automation in particular.

Research paper thumbnail of The Fundamentals Regarding the Usage of the Concept of Interface for the Modeling of the Software Artefacts

This paper presents the conceptual foundations of a software system's solution modelling acti... more This paper presents the conceptual foundations of a software system's solution modelling activity, which is formally based on two essential concepts: the artefact and the interface. This modelling activity envisions two objectives: the explicit emphasis on the interfaces' importance in the software engineering, and the preparation of the framework inside which the loop structure-behaviour can be formalized considering the inherent benefits for the modelling activity in general, and for the modelling activity automation in particular.

Research paper thumbnail of BIOTECHNO 2017 Committee BIOTECHNO Steering Committee

Research paper thumbnail of BRAIN Journal - The Fundamentals Regarding the Usage of the Concept of Interface for the Modeling of the Software Artefacts

<i>Abstract</i><br>This paper presents the conceptual foundations of a software... more <i>Abstract</i><br>This paper presents the conceptual foundations of a software system's solution modelling activity, which is formally based on two essential concepts: the artefact and the interface. This modelling activity envisions two objectives: the explicit emphasis on the interfaces' importance in the software engineering, and the preparation of the framework inside which the loop structure-behaviour can be formalized considering the inherent benefits for the modelling activity in general, and for the modelling activity automation in particular.<br><b>Find more at:</b><b>https://www.edusoft.ro/brain/index.php/brain/article/view/581</b><br&gt;

Research paper thumbnail of Figure 3. The Artefact As It Exists As A Black Box-The Fundamentals Regarding The Usage Of The Concept Of Interface For The Modeling Of The Software Artefacts

Consequently, the artefact as it exists as a black box can be represented according to the repres... more Consequently, the artefact as it exists as a black box can be represented according to the representation in Figure 3. It can be noticed that the artefact as it exists as a black box begins to interact with the environment. Two main categories of interfaces may be utilized by any artefact in order to interact with the environment: — Human Computer Interfaces (HCI); — Shared Resource Interfaces (SRI).

Research paper thumbnail of Figure 1. Visual And Synthetic Representation Of The Modelling Process In The Software Industry-The Fundamentals Regarding The Usage Of The Concept Of Interface For The Modeling Of The Software Artefacts

The experience that is accumulated regarding the modelling paradigms in the software engineering ... more The experience that is accumulated regarding the modelling paradigms in the software engineering is impressive. Thus, the software engineering recognizes modelling paradigms like object orientation, aspect orientation, component orientation, service orientation, agent orientation. In one form or another, these paradigms prove their ex- cellence in certain types of IT projects. At the same time, these paradigms reveal their objective limits when they are used to engineer the real world software systems. Every modelling paradigm represents, in fact, a modality to represent the real world using a specific formal framework. The specificity of the formal framework is defined from both a syntactic and semantic perspective. The formal syntactic framework of a paradigm refers to the concepts that are used by the paradigm in order to represent the real world, but also to the recommended principles that allow for these concepts to interact in a correct and efficient manner. Both the concepts ...

Research paper thumbnail of Objects Detection Using Sensors Data Fusion in Autonomous Driving Scenarios

Electronics

The relatively complex task of detecting 3D objects is essential in the realm of autonomous drivi... more The relatively complex task of detecting 3D objects is essential in the realm of autonomous driving. The related algorithmic processes generally produce an output that consists of a series of 3D bounding boxes that are placed around specific objects of interest. The related scientific literature usually suggests that the data that are generated by different sensors or data acquisition devices are combined in order to work around inherent limitations that are determined by the consideration of singular devices. Nevertheless, there are practical issues that cannot be addressed reliably and efficiently through this strategy, such as the limited field-of-view, and the low-point density of acquired data. This paper reports a contribution that analyzes the possibility of efficiently and effectively using 3D object detection in a cooperative fashion. The evaluation of the described approach is performed through the consideration of driving data that is collected through a partnership with ...

Research paper thumbnail of Intrusion Detection System for 5G with a Focus on DOS/DDOS Attacks

2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)

Research paper thumbnail of Post-quantum Digital Signature Scheme for Personal Data Security in Communication Network Systems

Advances in Intelligent Systems and Computing

Research paper thumbnail of Novel Method of Hardware Security Problems Identification

2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T), 2020

Hardware security is one of the most important aspects of cyber security today. A lot of systems ... more Hardware security is one of the most important aspects of cyber security today. A lot of systems are based on the hardware components today. Software implementation of different mechanisms is rather strong only on the program layer. At the same time hardware-based part could be a weak point and easy to break. Hackers today are using different hardware-based attacks methods to gain an access to the systems. Side-channel attacks together with software Trojans are widely used today. Information can be leaked from different sources and on different layers of the system. Engineers from global organizations today are working on improving the security of hardware-based systems. Different components are developed to increase the level of security against popular attacks like side-channel ones. Improvements in hardware components will increase the efficiency of the security mechanisms of an entire systems and make them adoptable in a broader range of real-world use case scenarios. IoT device...

Research paper thumbnail of A Secure Distributed e-Health System for the Management of Personal Health Metrics Data

Advanced Information Networking and Applications

The definition of smart city as a broad concept values the versatile acquisition, storage, and pr... more The definition of smart city as a broad concept values the versatile acquisition, storage, and processing of relevant data for the city’s community. In this context, health data occupies a privileged place. The reliable gathering of personal health information has become recently possible through wearable medical devices. These devices usually do not store the data locally and offer, in the most favourable case, limited basic data processing features, and virtually no advanced processing capabilities for the collected personal health data. This paper describes an integrated distributed e-Health system, which collects health data from the enrolled city residents, and allows secure storage and processing of medical data in cloud by using a comprehensive encryption model to preserve the data privacy, which is based on the NTRU public-key cryptosystem. The system collects the user data through a client application module that is installed on the user’s smartphone or smartwatch, and securely transports it to the cloud backend. The homomorphic processing of the encrypted data is performed using the Apache Spark service. The event-based handlers are triggered by the IBM OpenWhisk programming service. The prototype has been tested using a real-world use case, which involves five hundred residents of Brasov City, Romania.

Research paper thumbnail of Secure e-Health System for the Integrated Management of Personal Health Data Collected by IoT Devices

The definition of a smart city as a broad concept values the versatile acquisition, storage, and ... more The definition of a smart city as a broad concept values the versatile acquisition, storage, and processing of relevant data for the city’s community. In this context, health data occupies a privileged place. The reliable gathering of personal health information has become recently possible through wearable medical devices. These devices usually do not store the data locally and offer, in the most favorable case, limited basic data processing features, and virtually no advanced processing capabilities for the collected personal health data. This paper describes an integrated distributed e-Health system, which collects health data from the enrolled city residents, and allows secure storage and processing of medical data in the cloud by using a comprehensive encryption model to preserve the data privacy, which is based on the NTRU public-key cryptosystem. The correct assignment of the medical data to the respective person is verified by the usage of a hash-based digital signature mech...

Research paper thumbnail of The Fundamentals Regarding the Usage of the Concept of Interface for the Modeling of the Software Artefacts

This paper presents the conceptual foundations of a software system’s solution modelling activity... more This paper presents the conceptual foundations of a software system’s solution modelling activity, which is formally based on two essential concepts: the artefact and the interface. This modelling activity envisions two objectives: the explicit emphasis on the interfaces’ importance in the software engineering, and the preparation of the framework inside which the loop structure-behaviour can be formalized considering the inherent benefits for the modelling activity in general, and for the modelling activity automation in particular.

Research paper thumbnail of The Role of the Conceptual Invariants Regarding the Prevention of the Software Artefacts’ Obsolescence

The paper presents a series of considerations regarding the role of the conceptual invariants con... more The paper presents a series of considerations regarding the role of the conceptual invariants concerning the prevention of the artefacts’ obsolescence, with an emphasis on the software engineering. The concept of artefact has the meaning that is defined in (Bocu & Bocu, 2016). The emphasizing of the invariants’ role has the goal to allow the understanding, with the respective approximation, of this invariants’ role considering the continuous qualitative progress of the human artefacts, generally speaking, but also in connection to the software systems engineering.

Research paper thumbnail of Post-Quantum Digital Signatures with Attenuated Pulse Generator

Quantum computations cause problems for classical systems. The perfect examples are effective qua... more Quantum computations cause problems for classical systems. The perfect examples are effective quantum algorithms, which are causing problems for the most popular cryptosystems. These systems are considered safe for classical computers. Despite on releasing quantum computers all sensitive information should stay safe. This information should be encrypted in such way that will withstand quantum computers’ attacks. Classical cryptography consists of problems and instruments: encryption, key distribution, digital signatures, pseudo-random number generator and one-way functions. For example, "RSA" is safe only when factorization is hard for classical computer, but quantum computers can easily solve this problem. Hash-based signature systems provide interesting alternatives. Hash-based signatures systems use cryptographically secure hash functions. Their security is based on the security of the concrete hash function. Using secure hash function is the minimal requirement for saf...

Research paper thumbnail of A Real-Time Intrusion Detection System for Software Defined 5G Networks

Research paper thumbnail of Eurographics Irish Chapter Synthetic Imaging for 3 D Bacterial Representation

The first form of life on earth began at the microscopic level, that of Bacteria. Ever since the ... more The first form of life on earth began at the microscopic level, that of Bacteria. Ever since the invention of the microscope has bacteria been studied in great depth. To study the growth patterns it is necessary to grow bacterial colonies, thus requiring incubation periods from hours or days to weeks. This paper looks at the use of 3D Turtle geometry, and recursion to develop computer generated equivalents. Applications that allow for the simulation of bacterial growth have many uses both in education and research, and remove many hazards and costs associated with the incubation and study of same.

Research paper thumbnail of Post-quantum Digital Signature Scheme for Personal Data Security in Communication Network Systems

Research paper thumbnail of Synthetic Imaging for 3D Bacterial Representation

The first form of life on earth began at the microscopic level, that of Bacteria. Ever since the ... more The first form of life on earth began at the microscopic level, that of Bacteria. Ever since the invention of the microscope has bacteria been studied in great depth. To study the growth patterns it is necessary to grow bacterial colonies, thus requiring incubation periods from hours or days to weeks. This paper looks at the use of 3D Turtle geometry, and recursion to develop computer generated equivalents. Applications that allow for the simulation of bacterial growth have many uses both in education and research, and remove many hazards and costs associated with the incubation and study of same.

Research paper thumbnail of A Constructive Review Regarding the Significance of 5G Networks for the Internet of Things

The paradigm of the Internet of Things seems to become the backbone of the future always connecte... more The paradigm of the Internet of Things seems to become the backbone of the future always connected world. The current 4G mobile infrastructures have been consistently used during the initial stages of the Internet of Things’ (IoT) evolution, but they seem not to satisfy all the speed and capacity requirements. Thus, the 5G mobile networks are expected to significantly improve the today’s 4G networks capabilities, which makes them essential for the future networks of always connected IoT devices. The efforts to expand the capabilities of the 5G technology take several pathways. Thus, this paper presents the state-of-the-art concerning the development of 5G in the context of IoT networks. It reviews the current research contributions, the essential founding technologies, and it also suggests the main research avenues and challenges that may have an impact on the development of 5G IoT networks.