Razvan Bocu

Razvan Bocu
  • PhD (Doctor of Philosophy) in Computer Science
  • Researcher and Associate Professor at Transylvania University of Brasov, Romania

About

48
Publications
7,730
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
203
Citations
Current institution
Transylvania University of Brasov, Romania
Current position
  • Researcher and Associate Professor

Publications

Publications (48)
Article
Full-text available
The consideration of micro ribonucleic acid (microRNA) molecules is justified by their ability to act as possible biomarkers, which may be used to detect the most prevalent type of lung cancer: non-small-cell lung cancer (NSCLC). This article describes a surface plasmon resonance imaging (SPRi) biosensor, which was considered to detect malignant lu...
Article
Full-text available
The dynamic monitoring of biomolecules that are part of cell membranes generally constitutes a challenge. Electrochemiluminescence (ECL) biosensor assemblies provide clear advantages concerning microscopic imaging. Therefore, this paper proposes and analyzes a quantum dots-based biosensor assembly. Thus, particular attention is granted to biomolecu...
Article
Full-text available
Electrochemical biosensors include a recognition component and an electronic transducer, which detect the body fluids with a high degree of accuracy. More importantly, they generate timely readings of the related physiological parameters, and they are suitable for integration into portable, wearable and implantable devices that are significant rela...
Article
Full-text available
Research on quantum computers has advanced significantly in recent years. If humanity ever creates an effective quantum computer, many of the present public key cryptosystems can be compromised. These cryptosystems are currently found in many commercial products. We have devised solutions that seem to protect us from quantum attacks, but they are u...
Article
Full-text available
One of the nodes of a block symmetric encryption algorithm is represented by a linear layer, the purpose of which is to distribute the mutual influence of bits within the processed data block. Several methods exist for constructing a linear layer, the most common of which are matrix multiplication operations and the permutation of bits. Both approa...
Article
Full-text available
The theoretical and practical progress that has occurred in the field of computer networks during the past fifteen years has enhanced the economical efficiency and social relevance of related real-world use cases. Nevertheless, this ubiquitous usage has also introduced numerous security risks. Therefore, monitoring hardware and software resources r...
Chapter
The increasing usage of mobile devices amounts to around 6.8 billion by 2022. This implies a substantial increase in the quantity of personal data that are managed. The paper surveys the most relevant contributions that pertain to human activity, behavioural patterns detection, demographics, health and body parameters. Moreover, significant aspects...
Chapter
Development of IoT, mobile devices and AI have triggered 5G network deployment. The new standard of telecom communication will exceed the limitations of the existing network and create new ecosystem with incorporated different industries, including emergency and critical services, security, healthcare. A new standard, design, solution always trigge...
Chapter
In recent years, a large amount of research has been conducted on quantum computers. If we ever get a large-scale quantum computer, they will be able to break many of the public key cryptosystems currently in use. Today, such cryptosystems are integrated into many commercial products. Alternatives are created that seems to protect us from quantum a...
Article
Full-text available
Bug reports are generated in large numbers during the software development processes in the software industry. The manual processing of these issues is usually time consuming and prone to errors, consequently delaying the entire software development process. Thus, a properly designed bug triage and management process implies that essential operatio...
Article
Full-text available
The philosophy of the IoT world is becoming important for a projected, always-connected world. The 5G networks will significantly improve the value of 4G networks in the day-to-day world, making them fundamental to the next-generation IoT device networks. This article presents the current advances in the improvement of the standards, which simulate...
Article
Full-text available
The continuously increasing number of mobile devices actively being used in the world amounted to approximately 6.8 billion by 2022. Consequently, this implies a substantial increase in the amount of personal data collected, transported, processed, and stored. The authors of this paper designed and implemented an integrated personal health data man...
Article
Full-text available
The design and implementation of secure IoT platforms and software solutions represent both a required functional feature and a performance acceptance factor nowadays. This paper describes relevant cybersecurity problems considered during the proposed microservices architecture development. Service composition mechanisms and their security are affe...
Article
Full-text available
The integrated collection of personal health data represents a relevant research topic, which is enhanced further by the development of next-generation mobile networks that can be used in order to transport the acquired medical data. The gathering of personal health data has become recently feasible using relevant wearable personal devices. Neverth...
Preprint
UNSTRUCTURED The solutions proposed so far to the problem of recognising a chess diagram from an image containing a standard chess set are not usable in a real scenario, because the constant mistakes in recognising different chess pieces, such as pawns versus bishops, for example, make the whole recognition process useless. There is a great need to...
Chapter
The syntagm “code rationalization” denotes, in this paper, the approach by which the programmer chooses from the multitude of known alternatives that transpose the algorithmic solution of a problem into the target language of a software system, maximizing the benefits that the user pursues through the utilization of the software system. This paper...
Chapter
The detection of 3D objects is fundamental in the field of autonomous driving. The involved computations consist of sets of 3D bounding boxes that determine specific significant objects. The existing scientific contributions generally do not report applied studies that assess the reliability of 3D objects detection considering various weather condi...
Chapter
Full-text available
The telecommunications industry is undergoing a significant transformation towards 5G networks. Research has shown that 5G has security issues. In the paper, we present a new machine learning-based cybersecurity model that also includes a firewall and IDS/IPS. The attack patterns are created in the simulated laboratory and the IDS is trained by mea...
Article
Full-text available
The relatively complex task of detecting 3D objects is essential in the realm of autonomous driving. The related algorithmic processes generally produce an output that consists of a series of 3D bounding boxes that are placed around specific objects of interest. The related scientific literature usually suggests that the data that are generated by...
Chapter
The design and implementation of proactive fault diagnosis systems concerning the bearings during their manufacturing process requires the selection of robust representation learning techniques, which belong to the broader scope of the machine learning techniques. Particular systems, such as those that are based on machine learning libraries like S...
Chapter
Full-text available
The philosophy that founds the world of the Internet of Things apparently becomes essential for the projected permanently connected world. The 5G data networks are supposed to dramatically improve the actual 4G networks’ real world significance, which makes them fundamental for the next generation networks of IoT devices. The academic and industria...
Chapter
Full-text available
The amount of traffic carried over wireless networks is growing rapidly and is being driven by many factors. The telecommunications industry is undergoing a major transformation towards 5G networks in order to fulfill the needs of existing and emerging use cases. The paper studies the existing vulnerabilities of the 5G ecosystem. Considering this s...
Chapter
The reliable collection, processing and storage of the sensitive personal data constitute an important research topic in the European context, especially after the General Data Protection Regulation started to produce its legal effects. The data encryption has been the traditional way of ensuring the sensitive data is legitimately accessed. Neverth...
Conference Paper
Full-text available
Quantum computations cause problems for classical systems. The perfect examples are effective quantum algorithms, which are causing problems for the most popular cryptosystems. These systems are considered safe for classical computers. Despite on releasing quantum computers all sensitive information should stay safe. This information should be encr...
Chapter
The paradigm of the Internet of Things seems to become the backbone of the future always connected world. The current 4G mobile infrastructures have been consistently used during the initial stages of the Internet of Things’ (IoT) evolution, but they seem not to satisfy all the speed and capacity requirements. Thus, the 5G mobile networks are expec...
Chapter
The definition of smart city as a broad concept values the versatile acquisition, storage, and processing of relevant data for the city’s community. In this context, health data occupies a privileged place. The reliable gathering of personal health information has become recently possible through wearable medical devices. These devices usually do n...
Article
Hardware and software solutions for the collection of personal health information continue to evolve. The reliable gathering of personal health information, previously usually possible only in dedicated medical settings, has recently become possible through wearable specialized medical devices. Among other drawbacks, these devices usually do not st...
Conference Paper
Full-text available
Today's IT organizations who act as service providers are under increasing pressure to keep up with the continuous and growing demand for IT services. Through the shift from interactive, manual processes to automated, self-deployment of resources, the providers can increase the efficiency of delivering on-demand services. Virtualized resources, par...
Article
Full-text available
This paper explores the foundations regarding the systematic usage of the concept of interface in order to sketch a methodological approach, in which the fundamental perspectives that guide the abstracting of a software system solution (referred to as UP, SP and BP in the paper) are unified, with the goal to optimally derive the behaviour of the sy...
Article
In this chapter, the authors systematically relate to the question: "What are the main ideas that should be considered when elaborating software Systems for the communication's streamlining and diversification (CSD) between the actors of a learning system?" The broader perspective within which these ideas are debated is represented by the context t...
Article
Full-text available
The endeavour to ensure email servers attain and keep a good reputation on the internet is essential for today's system administrators and companies. This is due to the fact that approximately 90% of nowadays email traffic is represented by purely spam and unsolicited messages. Therefore, email filtering techniques have continuously developed durin...
Article
Full-text available
Proteins and the networks they determine, called interactome net-works, have received attention at an important degree during the last years, because they have been discovered to have an influence on some complex bi-ological phenomena, such as problematic disorders like cancer. This paper presents a contribution that aims to optimize the detection...
Article
Full-text available
Proteins and the networks they determine, called interactome networks, have received attention at an important degree during the last years, because they have been discovered to have an influence on some complex biological phenomena, such as problematic disorders like cancer. This paper describes an optimized algorithm, which assesses the importanc...
Article
Proteins and the networks they determine, called interactome networks, have received attention at an important degree during the last years, because they have been discovered to have an influence on some complex biological phenomena, such as problematic disorders like cancer. This paper presents a new parallel computation technique that allows for...
Article
Proteins and the networks they determine, called interactome networks, have received attention at an important degree during the last years, because they have been discovered to have an influence on some complex biological phenomena, such as problematic disorders like cancer. This paper presents a contribution that aims to optimize the Newman-Girva...
Article
Full-text available
The study of proteomics reached unexpected levels of interest, as a direct consequence of its discovered influence over some complex biological phenomena, such as problematic diseases like cancer. This paper presents a new technique that allows for an accurate analysis of the human interactome network. It is basically a two-step analysis process th...
Conference Paper
This paper discusses the use of Fister-Panetta model in the visualisation of cancerous growths. Cancer evolution and the associated proper medication strategy is an example of such a complex problem that requires an interdisciplinary approach in order to be properly addressed. The paper addresses some basic aspects regarding how cancer research cou...
Article
Full-text available
The study of proteomics reached unexpected levels of interest, as a direct consequence of its discovered influence over some complex biological phenomena, such as problematic diseases like cancer. This paper presents the latest authors' achievements regarding the analysis of the networks of proteins (interactome networks), by computing more efficie...
Article
Both the official statistics and the dedicated literature acknowledge a problematic state-of-the-art for the software industry: the elevation of the quality standards is a problem that preoccupies both the industry and the academic environment, the results being obtained are still insufficient, and considering the percentage of the projects that fa...
Conference Paper
Full-text available
Contemporary people live in a society featured by a continuously increasing complexity. As a consequence, interdisciplinary approaches represent a must for every scientist that aims to efficiently manage a certain problem. Cancer evolution and the associated proper medication strategy is an example of such a complex problem that requires an interdi...

Network

Cited By