Mircea Vaida

Mircea Vaida
Universitatea Tehnica Cluj-Napoca | UT Cluj · Department of Communications

PhD

About

94
Publications
16,505
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
338
Citations
Citations since 2017
17 Research Items
192 Citations
2017201820192020202120222023010203040
2017201820192020202120222023010203040
2017201820192020202120222023010203040
2017201820192020202120222023010203040

Publications

Publications (94)
Article
Background The situation created by global emergencies, such as the current global pandemic [1], has led in many parts of the world to the cessation of clinical practice in hospitals for medical and nursing students, although in medical education the contact with the patient and the practical practice of various medical techniques and procedures by...
Article
Full-text available
In this article we describe our segmentation framework applied to glioma delimitation in multimodal magnetic resonance images. Statistical pattern recognition strategies are applied to create a discriminative function. The discriminative classifier is the result of an automatic learning process based on random forest (RF) algorithm. This algorithm...
Chapter
Nowadays numerous efforts and promising results are obtained in medical imaging processing, although reproducible segmentation and classification of tumors is still a challenging task. The difficulty consists of the different shapes, locations and image intensities of these tissues. In this article we present our discriminative segmentation system...
Chapter
This paper proposes a method for detection of abnormalities in mammograms that could be integrated into a computer-aided diagnosis system. The method is based on segmentation using a clustering method, elimination of small regions, blobs and contour detection and a density analysis. The method was tested on images from screening mammography databas...
Conference Paper
In the field of image segmentation, discriminative models have shown promising performance. Generally, every such model begins with the extraction of numerous features from annotated images. Most authors create their discriminative model by using many features without using any selection criteria. A more reliable model can be built by using a frame...
Conference Paper
Enterprise software is being pushed further towards the cloud and mobile technological trends, keeping application integration as one of the most challenging topics. The writing introduces a cloud-based Field Service Management solution, productively deployed in a world-wide distributed environment, to serve as a case study. It then continues by ou...
Conference Paper
The issue of plagiarism is a much discussed topic in the nowadays academic environment. Since the inspiration sources are very vast and accessible, analyzing the originality can become extremely challenging for a human interpreter and therefore an automated solution is very welcomed. This article presents a cross-platform implementation that measur...
Article
Full-text available
The Enterprise Resource Planner is a half-centenary giant that gained popularity in the industry-software market segment throughout the years. Influenced by the latest technology trends, such as mobility and cloud, it keeps software integration as one of its greatest challenges. The present article introduces a cloud-based Field Service Management...
Conference Paper
ERP to cloud integration is a widely debated topic, especially in the — so popular nowadays — cloud and mobility context. This article introduces a cloud based field service management solution that integrates with ERP back offices. To increase commercial adoption and obtain ERP vendor independence, a generic integration application is proposed, th...
Conference Paper
This paper presents a new way of addressing beamforming in ultrasound imaging, by formulating it, for each image depth, as an inverse problem solved using elastic-net regularization. This approach was evaluated on both simulated and in vivo data showing a gain in contrast, while maintaining an increased value of the signal-to-noise ratio compared t...
Conference Paper
Full-text available
Mobile learning is becoming a common experience especially for young people by using state-of-the-art mobile devices able to process large amount of information and equipped with large responsive displays and different kind of sensors. In the development of such mobile learning applications, the ability to notice user behaviour and emotions can lea...
Conference Paper
DNA sequence analysis has been developing to reveal some hidden structure, to distinguish coding from noncoding regions in DNA sequence, and to explore structural similarity among DNA sequences. DNA repeats are associated with human disease, seems to play a role in genome organization and evolution and are important in regulatory processes. A lot o...
Article
Full-text available
Facial expressions are a set of symbols of great importance for human-to-human communication. Spontaneous in their nature, diverse and personal, facial expressions demand for real-time, complex, robust and adaptable facial expression recognition (FER) systems to facilitate the human-computer interaction. The last years' research efforts in the reco...
Article
Full-text available
In automated image processing the intensity inhomogeneity of MR images causes significant errors. In this work we analyze three algorithms with the purpose of intensity inhomogeneity correction. The well-known N3 algorithm is compared to two more recent approaches: a modified level set method, which is able to deal with intensity inhomogeneity and...
Conference Paper
Full-text available
Nowadays the classical Delay-and-Sum (DAS) beam-former is extensively used in ultrasound imaging due to its low computational characteristics. However, it suffers from high sidelobe level, poor resolution and low contrast. An alternative is the Minimum-Variance (MV) beamformer which results in a higher image quality both in terms of spatial resolut...
Conference Paper
Full-text available
Students are often encouraged to work in groups to solve complex tasks and develop collaboration skills. Classical grouping strategies don't take into account the student's personality or the compatibilities of group members. We introduce an alternative grouping method based on the student typologies and their neuro-linguistic programming (NLP) pro...
Conference Paper
Nowadays the main problems of ultrasound imaging (USI) are the quality of the image (in terms of signal-to-noise ratio and resolution) and the duration of data acquisition. For solving these challenges, multiple methods were studied during the last decade. It was shown that through the transmission of coded excitation pulses to the ultrasound probe...
Conference Paper
Many of the methods for detecting repeated sequences are part of the digital signal processing (DSP) field and most of these methods use distances, similarities and consensus sequences to generate candidate sequences. This paper presents results obtained using a dedicated numerical representation and a mapping algorithm (with different DNA distance...
Conference Paper
The identification of DNA motifs remains an active challenge for the researchers in the bioinformatics domain. A considerable effort in this area was concentrated on understanding the evolution of the genome by identifying the DNA binding sites for transcription factors. The evolution in genome sequencing has led to the appearance of numerous compu...
Conference Paper
Full-text available
Education and research activities are now oriented on groups to solve complex tasks and develop collaboration skills. Agile Software methodologies, psychology and spirituality elements, information technology developments offer possibilities to create dynamic and efficient groups. In education, classical grouping strategies can't be used in e-learn...
Conference Paper
Full-text available
The problem we address in this paper is object segmentation applied to plant recognition. The image can contain one or more plants on a natural background. More precisely, we aim to segment flowers. This approach poses several challenges, such as texture, multiple colors that form one object, natural background, non-homogeneous regions, etc. We pro...
Conference Paper
The aim of this research is to propose a method for verifying business processes automatically generated through Web services composition. The method is based on model checking and uses Spin model checker, a tool for verifying the correctness of software models. Model checking is a powerful verification technique that can be applied to hardware or...
Article
Patients rely on the physician for recommending an adequate treatment path for their medical condition. Since there are several possible paths to choose from, the optimal solution should be selected. This paper proposes a method to optimize medical services as business workflows. Such a workflow consists in a set of medical services. Each medical s...
Article
Full-text available
Medical image registration is of great interest nowadays and is considered a reliable technique to improve diagnosis, therapy and analysis. The majority of pixel-based registration methods use the native intensity during the registration methods. However, in the last years newer methods based on local-phase were proposed. So far, there is no object...
Article
The process of gene regulation remains an active challenge for the researchers in molecular biology field. The main focus in this area is to understand the process that is behind gene regulation so that we can form an idea about biological evolution and adaptation. A good start in understanding the evolution of genes is by searching for DNA binding...
Conference Paper
Full-text available
This paper presents a local no-reference blur assessment method in natural macro-like images. The purpose is to decide the blurriness of the object of interest. In our case, it represents the first step for a plant recognition system. Blur detection works on small non-overlapping blocks using wavelet decomposition and edge classification. At the bl...
Conference Paper
Due to the growing ubiquity of monitoring equipment, researchers and developers are faced with the challenge of creating systems that are capable of processing a high number of data streams in order to return useful information to the end user. Data streams are characterized by high throughput and infinite length, which make them impossible to stor...
Article
Full-text available
Medical imaging domain is a field of interest which concentrates great efforts to offer software tools for the assisted diagnosis. Segmentation, 3D reconstruction and visualization are techniques that allow physicians to observe possible pathological structure inside of the human body. Computing the volume of such a structure offers critical inform...
Article
Full-text available
Grouping students in e-learning using alternative methodologies offers complementary results in education. Today's trend in education is to integrate computer-based tasks with practical activities. Students are often encouraged to work in groups to solve complex tasks and develop collaboration skills. But classical grouping strategies can’t be used...
Article
Full-text available
In World Wide Web there are many online communities with a huge number of users and a great amount of data which are continuously increasing. In this context it is important for users to interact with resources and other users according to their preferences. On this direction of information filtering domain our work is oriented to trust based filte...
Conference Paper
Full-text available
The aim of our research is to find an efficient solution to the services QoS optimization problem. This NP-hard problem is well known in the service-oriented computing field: given a business workflow that includes a set of abstract services and a set of concrete service implementations for each abstract service, the goal is to find the optimal com...
Conference Paper
Full-text available
This paper presents alternative security methods based on DNA. From the alternative security methods available, a DNA algorithm was implemented using symmetric coding in BioJava and MatLab. As results, a comparison has been made between the performances of different standard symmetrical algorithms using dedicated applications. In addition to this,...
Chapter
Full-text available
This paper proposes a method to compose and optimize medical services as business workflows. Such a workflow consists in a set of abstract services, and for each abstract service there are several concrete services. Since each medical service has different QoS (Quality of Service) parameters such as response time, rating, distance and cost, determi...
Article
Full-text available
This paper presents alternative security methods based on DNA. From the available alternative security methods, symmetric DNA algorithms were developed and implemented. The first symmetric DNA algorithm was implemented in the Java language, while the second DNA algorithm was implemented in BioJava and MatLab. Comparisons have been made between the...
Article
Full-text available
Multimodal medical image registration is a challenging task as anatomical structures might have different appearances depending on the physical principles that are the foundation of the imaging modality. The task is even more difficult to perform when ultrasound (US) images are used in the registration process because of their low resolution and lo...
Conference Paper
Full-text available
The aim of our research is to create a service composition system that is able to detect and deal with the imperfections of a natural language user request while keeping it as unrestricted as possible. Our solution consists in three steps: first, service prototypes are generated based on grammatical relations; second, semantic matching is used to d...
Article
Full-text available
A web dedicated application is very useful for assisted diagnosis in healthcare domain. Medical images acquired with different medical image modalities contain important diagnostic information. The combination of complementary data from different images can lead to more important information. The fusion process allows combination of salient feature...
Article
Full-text available
The widespread of Web services in the ubiquitous computing era and the impossibility to predict a priori all possible user needs generates the necessity for on-demand service composition. Natural language is one of the the easiest ways for a user to express what he expects regarding a service. Two main problems need to be solved in order to create...
Article
Full-text available
Today's trend in education is to integrate computer-based tasks with practical activities. Students are often encouraged to work in groups to solve complex tasks and develop collaboration skills. But classical grouping strategies can't be used in eLearning environments where there's little or no physical interaction between parties. We introduce a...
Conference Paper
This paper depicts some major aspects involved in an on-line management process of multimedia data, emphasizing the security elements and proposed solutions for protecting the static images. The techniques have been embedded into a distributed medical application that uses the most up-to-date distributed programming concepts and technologies for ma...
Conference Paper
Nowadays, the main problem is not the lack of high quality resources, but their retrieval, organization and maintenance. That is a challenge for the users in making the best and right decisions. The paper presents a model for trust, able to be used in various online communities. The model provides to each user from the community, a personalized sec...
Article
Multi tier applications are usually comprised of data tiers, logic tiers and presentation tiers. Logging is the technique that allows us to insert tracing statements which will produce persistent results at runtime with no effort. Modern applications use logging solutions like NLog, C# Logger or one of the many others for tracing. Logger solutions...
Conference Paper
DNA has a great cryptographic strength, its binding properties between nucleotides bases (A—T, C—G) offer the possibility to create self-assembly structures which are an efficient means of executing parallel molecular computations. Our work is based on the development of the new encryption system with indexing DNA chromosomes cryptographic algorith...
Chapter
The paper presents an application implemented for 3D rendering in the medical domain, especially for radiological images. For deployments we used Java and VTK technologies. The application allows selecting a pathological area on every 2D image, to reconstruct the pathological volume and rendering it in the entire tissue volume. It also offers facil...
Chapter
Full-text available
Object: Clinical environments are crowded with technology where devices from multiple vendors run into interoperability barriers. Systems of integrated medical devices support improvements in workflow and reductions in medical errors and healthcare costs to the benefit of patients throughout the continuum of care. Methods: Interoperability is achie...
Article
This paper describe a method that has as purpose closing the gateways that the Web bots can use in order to perform automatically a series of on-line operations meant to be fulfilled by the human operators. The applications that benefit from the actual implementation of the solution are either client-to-business or business-to-business Web distribu...
Conference Paper
Full-text available
The importance of information offered by the medical images for diagnosis support can be increased by combining images from different compatible medical devices. The fusion process allows combination of salient feature of these images. In this paper we present different techniques of image fusion, our work for medical image fusion based on discrete...
Conference Paper
Full-text available
This paper presents a technique meant for eliminating the access possibilities that Web-bots can use in order to perform automatically some on-line tasks destined to the human operators. The applications that benefit from the proposed solution are client-to-business or business-to-business Web distributed products. The solution refers to protecting...
Conference Paper
Full-text available
The widespread and diversity of Web services in the ubiquitous computing era and the impossibility to predict a priori all possible user demands, generates the need of a system capable of dynamically composing new services, based on unrestricted natural language requests.In order to create such a system two problems need to be solved: (a) retrieval...
Article
Full-text available
Dynamic context adaptation is a central concept in Pervasive and Ubiquitous Computing. In this paper we have analyzed the problem of context relevance and we have chosen an approach where the user is also involved also in the relevance control. The advantage of involving the user is motivated by the fact that a completely automatic context manageme...
Conference Paper
Full-text available
The work reported here deals with the observation of pedagogical activities in educational platforms. Userspsila behavior is observed through the traces of their activity. In this paper we present a multi-agent system designed to bring more flexibility to the observation of learnerspsila behavior in educational platforms. Our system enables the tea...
Article
Full-text available
Objective One of the problem existent today in the medical domain is that we have an important number of legacy applications that cannot be reused, shared, composed. The objective of this paper is to propose a solution that make possible to overcome these limitations and makes possible the creation of new composite services that may be used in comm...
Conference Paper
Full-text available
This paper depicts some major aspects involved in an on-line management process of multimedia data, emphasizing the security elements and proposed solutions for protecting the static images. The techniques have been embedded in a complex generic model that serves as starting point for developing an entire range of on-line applications, using the mo...
Conference Paper
Full-text available
Java cryptographic extension (JCE) offers support for developing cryptographic package providers, allowing us to extend the JCE by implementing faster or more secure cryptographic algorithms. By the same means we shall provide our independent implementation of a DNA encryption (DNAE) system, based on the central dogma of molecular biology (CDMB). I...
Conference Paper
The aim of this paper is to present the design of a service oriented architecture-based platform for medical image processing in assisted diagnosis. Service oriented architecture (SOA) improves the reusability and maintainability of distributed systems. In service oriented architectures, the most important element is the service, a resource provide...
Conference Paper
Full-text available
Java Cryptographic Extension (JCE) offers support for developing cryptographic package providers, allowing us to extend the JCE by implementing faster or more secure cryptographic algorithms. By the same means we shall provide our independent implementation of a DNA Encryption (DNAE) system, based on the Central Dogma of Molecular Biology (CDMB). I...
Conference Paper
Oracle database offers the facility of searching and retrieving content-based multimedia objects such as audio, video, image or electronic documents, after a signature. There are different methods for signature generation for each specified object. The content-based image retrieval (CBIR) in Oracle may be realized on a linear search and comparison...
Conference Paper
The aim of the paper is to present a mechanism able to be used in generating medical image processing applications using a dynamic assembling process. Two medical image processing dedicated applications, Healthlmag and ImageDiagnose are used in the integration process. Representative quantitative and statistics parameters are offered for DNA, Stere...
Conference Paper
The aim of the paper is to present the resonance and the man of knowledge concepts able to be used in correlation with education in computing, or other technical domain. The technical concepts developed by scientists may be considered in connection with the human spiritual evolution. Some spiritual concepts as possible technical solutions are also...
Conference Paper
The aim of the paper is to present a flexible dedicated application, image diagnose, capable to integrate different medical facilities. Representative quantitative parameters and statistics measurements were used for DNA, and stereology, measurements. New facilities concerning the preprocessing, specific quantitative parameter measurements, data vi...
Article
In this work we consider a technical process for protecting medical information and other data assets using a technique of deriving DNA public keys from blood analysis. A DNA encryption technique is further developed here in which a personSs medical data is encrypted in DNA strands based on the central dogma of molecular biology. Protection is enha...
Conference Paper
The aim of the paper is to present essential quantitative and statistics parameters determined in a dedicated microscope image processing application. The statistics offer the possibility to consider relevant measurements for assisted diagnosis. Representative quantitative parameters were used in a dedicated medical image processing application, Fo...
Conference Paper
The main aim is to present the security elements involved in Web applications. E-commerce applications and data access applications such as a university information database may be protected using different security techniques. Considering an e-commerce application, we developed some security elements that will provide an accurate and safe data tra...
Conference Paper
Considering the perspective and observing learning with Web facilities, we developed a dedicated application for distance learning considering the Perl language. The application will emulate a virtual university and is compatible under Windows operating system. Some multimedia documents are also considered in the learning process and will be availa...
Conference Paper
Considering the numerous advantages of the Java platform, we developed a dedicated application that implements a surveillance system. The application will emulate this system in a real-time environment, providing facilities like intrusion detection and frame capturing. The user interface also provides intuitive and easy access to the image archive,...
Article
The authors have evaluated the nucleoli in 37 cases of prostatic carcinoma. The increase in Gleason's grade 1 correlated with an increase in the percentage of nucleolated nuclei. The increase in the percentage of bi- and trinucleolated nuclei was accompanied by a decrease of the uninucleated nuclei. The values of morphometrical parameters studied i...
Article
The authors have studied 12 cases of bone giant cell tumors and have shown that the increase in aggressiveness is accompanied by higher values of mitotic activity and nuclear features (area, perimeter, long and short axes), which might be useful for grading the bone giant cell tumors.
Article
The authors have studied the percent area occupied by the Grimelius-positive cells in lung neuroendocrine tumors. The highest values were noted in typical carcinoid tumors: they decreased progressively in atypical carcinoids, small "oat cell" carcinoma and large cell carcinoma. There was, however, a large dispersion of values, especially in the gro...
Article
The comparative study of the percentage nuclear area in brain tumors by the point-counting technique and digital analysis showed a good correlation between the results obtained. The investigation suggests the possibility of using the volume corrected mitotic index to tumors with uniformly distributed cells.
Article
In this work we consider a technical process for protecting medical information and other data assets using a mechanism of coding documents based on biotechnologies. A DNA encryption technique is further developed in which a person's medical data is encrypted in DNA strands based on the central dogma of molecular biology. Protection is enhanced by...
Article
Full-text available
Object: The aim of the paper is to present some concepts able to be used in high education teaching based on different pedagogical methodologies. A profound teaching process that combines e-learning and alternative learning elements will promote security in real life. A multi-agent case study based on observation for OOP was developed for e-learnin...
Article
In this work we consider a technical process for protecting medical information and other data assets using a technique of deriving DNA public keys from blood analysis. A DNA encryption technique is further developed here in which a person's medical data is encrypted in DNA strands based on the central dogma of molecular biology. Protection is enha...
Article
Full-text available
The aim of the paper is to present some concepts able to be used in teaching computers, or other technical domain, as web-based education. The technical concepts developed by scientists may be considered in connection with the human spiritual evolution. A unified human perception concept is shown in conjunction with the pattern recognition process....