Daniela Elena Popescu
University of Oradea
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Daniela Elena Popescu.
soft computing | 2013
Alina Madalina Lonea; Huanglory Tianfield; Daniela Elena Popescu
Cloud Computing is a technology which aims to provide on-demand scalable services over the Internet via Cloud vendors to multi-tenant organizations. Enterprises are interested to move their on-premises infrastructure into cloud computing. However they are still concerned about the security risks implied by the act of embedding their resources within the cloud computing environment.
symposium on applied computational intelligence and informatics | 2012
Alina Madalina Lonea; Daniela Elena Popescu; Octavian Prostean
Cloud Computing is a technology which is susceptible to a continuous development, because of its strong advantages of accessing data from any place in the world over the Internet without concerning about the infrastructure used and the problems involved by the installation and maintenance processes. The purpose of this article is to provide an overview of several management interfaces for Eucalyptus cloud by addressing the taxonomy and evaluation of the cloud management interfaces. The taxonomy proposed in this paper results from the work accomplished by experimenting the Eucalyptus community cloud. First, an evaluation of the Eucalyptus architecture is presented, in order to emphasize the Eucalyptus platform involved in cloud management process, which facilitates the deployment, management and execution of Infrastructure-as-a-Service (laaS). The cloud management tools are described from two perspectives. The first perspective analyzes the cloud portals from the user roles, while the second perspective addresses them with respect to the type of the tools employed. The taxonomy presented in this paper is related with the 5 elements of the Common Cloud Management Architecture (CCMA), which was provided by Behrendt, et al. (2011) as one of the components of mM Cloud Computing Reference Architecture. Thus, the first category of interfaces (i.e. the cloud portals from the user roles) encompasses the Service Consumer Portal, the Service Provider Portal and the Service Development Portal, while second category of interfaces includes the main components of CCMA: Operational Support Services (OSS) and Business Support Services (BSS). Cloud management is a subject approached by researchers in the community and this can be observed by the big number of third party cloud management providers (i.e. RightScale, enStratus, IMOD Kaavo, CloudWatch, Scarl, Tapin, Cloudkick). This article is motivated by the fact that cloud management is a fundamental support for all users of cloud services from the cloud marketplace.
SOFA | 2013
Alina Mădălina Lonea; Daniela Elena Popescu; Octavian Prostean; Huaglory Tianfield
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks appear to be main threats for cloud computing. The protection of cloud services against DoS and DDoS attacks is realized using Intrusion Detection Systems (IDSs). This paper aims to evaluate the experimental results of our proposed quantitative solution. The experiments are performed in a private cloud model deployed using Eucalyptus open-source, with virtual machines based IDS (VMs-based IDS) being created in three nodes and the Mysql database together with the graphical interfaces for monitoring the alerts being installed and configured in the front-end server. After a set of DDoS attacks are launched against the VMs-based IDS, we analyze all the alerts collected from the VMs-based IDS.
soft computing | 2009
Mirela Pater; Daniela Elena Popescu
The problem of deriving association rules from data was first formulated in [9] and is called the “market-basket problem”. This paper presents an efficient version of APRIORI algorithm for mining multi-level association rules in large databases to solve market-basket problem. Our algorithm, named DEPTH FIRST MULTI-LEVEL APRIORI (DFMLA), uses the benefits of multi-leveled databases, by using the information gained by studying items from one concept level for the study of the items from the following concept levels.
international midwest symposium on circuits and systems | 2006
Daniela Elena Popescu; Corneliu. Popescu
The paper is the result of the authors activities concerning the testing and the design for testability for computer arithmetic systems. By applying the C-testability concept, we present a method of identifying a minimal complete set of test vectors for detecting all single stuck-at faults for the multi-level Carry Skip Adder (CSkA), together with our results.
Central European Journal of Physics | 2016
Duraisamy Jude Hemanth; Subramaniyan Umamaheswari; Daniela Elena Popescu; Antoanela Naaji
Abstract Image steganography is one of the ever growing computational approaches which has found its application in many fields. The frequency domain techniques are highly preferred for image steganography applications. However, there are significant drawbacks associated with these techniques. In transform based approaches, the secret data is embedded in random manner in the transform coefficients of the cover image. These transform coefficients may not be optimal in terms of the stego image quality and embedding capacity. In this work, the application of Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) have been explored in the context of determining the optimal coefficients in these transforms. Frequency domain transforms such as Bandelet Transform (BT) and Finite Ridgelet Transform (FRIT) are used in combination with GA and PSO to improve the efficiency of the image steganography system.
international conference on knowledge based and intelligent information and engineering systems | 2008
Daniela Elena Popescu; Marcela Florina Prada
Analysis is an important security component, because it provides a systematic way to approach computer and communications security. There is no single context within which to address the subject. There are distinct environments, each of which appears in a different light and must be considered with some degree of independence. The present paper give a potential solution for reducing the vulnerabilities for danger control systems. A danger control system is designed for managing different building dangers and any specific building activity. So, the danger control systems are an essential prerequisite for the reliable and efficient functioning of the life-safety measures and security in a building. The present paper gives the fault and recovery tress for a potential solution that enhances the quality for danger control systems.
international conference on engineering of modern electric systems | 2017
D. Jude Hemanth; Daniela Elena Popescu; Mamta Mittal; S Uma Maheswari
Transform based image steganography methods are commonly used in security applications. However, the application of several recent transforms for image steganography remains unexplored. This paper presents bit-plane based steganography method using different transforms. In this work, the bit-plane of the transform coefficients is selected to embed the secret message. The characteristics of four transforms used in the steganography have been analyzed and the results of the four transforms are compared. This has been proven in the experimental results.
soft computing | 2010
Daniela Elena Popescu; Alina Mădălina Lonea
In fact the mission for a danger control system consists of several phases. The system configuration, operational requirements for individual components, success criteria and stress on the components, can change from phase to phase. Furthermore, the duration of any phase can use deterministic or random models. All these changes and possibilities affect the system reliability. Thus, in this paper, we analyze the dangers system reliability from this point of view.
soft computing | 2010
Alina Mădălina Lonea; Daniela Elena Popescu
Grid is a hardware and software infrastructure which allows the sharing of flexible, secure and coordinated resources among dynamic collections of individuals, organizations and resources. The resources that are utilized in a Grid network are complex. There could be computing resources (PDA, PCs, workstations, servers, and clusters), storage resources (hard-disks, memory), Input-Output resources (sensors, networks, printers) or logical resources (users, timers etc) [1]. With the evolution of Grid systems and with the high capacity data transfer, will occur security issues. This topic is known in the Grid field as some of the necessary element to ensure the safeguard of the resources. Networks are recognized as a critical infrastructure which grew over the years and which continues to grow, because of the increasing dependence on computer systems. The first step in addressing this infrastructure is to understand it. After that, a good analyze should be done in order to avoid the attacks that could occur and to maintain a reliable network [2].