Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Egidijus Kazanavičius is active.

Publication


Featured researches published by Egidijus Kazanavičius.


Journal of Electrical Engineering-elektrotechnicky Casopis | 2015

An Energy Efficient Protocol For The Internet Of Things

Algimantas Venčkauskas; Nerijus Jusas; Egidijus Kazanavičius; Vytautas Štuikys

Abstract The Internet of Things (IoT) is a technological revolution that represents the future of computing and communications. One of the most important challenges of IoT is security: protection of data and privacy. The SSL protocol is the de-facto standard for secure Internet communications. The extra energy cost of encrypting and authenticating of the application data with SSL is around 15%. For IoT devices, where energy resources are limited, the increase in the cost of energy is a very significant factor. In this paper we present the energy efficient SSL protocol which ensures the maximum bandwidth and the required level of security with minimum energy consumption. The proper selection of the security level and CPU multiplier, can save up to 85% of the energy required for data encryption.


computer, information, and systems sciences, and engineering | 2010

A Survey of Wireless Sensor Network Interconnection to External Networks

Agnius Liutkevicius; Arunas Vrubliauskas; Egidijus Kazanavičius

This paper aims at investigating the WSN (wireless sensor network) connectivity to external networks and infrastructures. It addresses research regarding existing techniques, mechanisms and devices that will provide connectivity of WSNs to external networks.


international test conference | 2015

Blood Pressure Estimation Accoording to Photoplethysmographic Signal Steepness

Rolandas Gircys; Agnius Liutkevicius; Arunas Vrubliauskas; Egidijus Kazanavičius

Abstract. The purpose of this paper is to prove the assumption that there is a correlation between the systolic blood pressure and the photoplethysmographic signal steepness. A method for indirect systolic blood pressure estimation based on photoplethysmographic signal steepness is proposed in this paper. Method: It is proved that based on Hooke’s law, the steepness of pressure and volume (diameter) of pulse waves differ by a constant. The coefficient for calculating arterial blood pressure when volume pulse wave steepness is known is presented in this paper. The Windkessel model is selected for the modeling. Experimental evaluation is based on veloergometrical trials. Volume pulse wave was obtained using a photoplethysmography device that is put on a finger. Blood pressure was measured using a semi-automatic OMRON blood pressure monitor. Results: The simulation of an arterial system using the Windkessel model shows that the steepness of pressure and volume pulse waves correlate. Ten veloergometrical trials were performed during the experimental evaluation. A significant 0.855±0.025 (p < 0.001) correlation between the photoplethysmographic signal steepness and the systolic blood pressure was obtained. The calculated and measured blood pressure values vary no more than ±5mmHg. Conclusions: The results demonstrate that the photoplethysmographic signal wavefront can be successfully applied in wearable devices that can be used for constant 24 hour registration of blood pressure for both home use and clinical practice. DOI: http://dx.doi.org/10.5755/j01.itc.44.4.12562


Computational Intelligence and Neuroscience | 2018

Combining Cryptography with EEG Biometrics

Robertas Damaševičius; Rytis Maskeliūnas; Egidijus Kazanavičius; Marcin Woźniak

Cryptographic frameworks depend on key sharing for ensuring security of data. While the keys in cryptographic frameworks must be correctly reproducible and not unequivocally connected to the identity of a user, in biometric frameworks this is different. Joining cryptography techniques with biometrics can solve these issues. We present a biometric authentication method based on the discrete logarithm problem and Bose-Chaudhuri-Hocquenghem (BCH) codes, perform its security analysis, and demonstrate its security characteristics. We evaluate a biometric cryptosystem using our own dataset of electroencephalography (EEG) data collected from 42 subjects. The experimental results show that the described biometric user authentication system is effective, achieving an Equal Error Rate (ERR) of 0.024.


Solid State Phenomena | 2010

A Reusable Agent-Based Framework for Smart Embedded Systems

Egidijus Kazanavičius; Vygintas Kazanavičius; Laura Ostaseviciute

Embedded computing systems still remain one of the underlying priorities in worldwide research communities. This paper presents an agent-based approach for embedded real-time systems design based on a reusable framework. The essence of our work lies on smart environment domain. Jade - a Java-based middleware is selected as a platform, facilitating the development of multi-agent embedded systems framework. Generic system architecture, framework prototype implementation and, subsequently, smart refrigerator control application are demonstrated, reasoning that the proposed method is effective in dealing with challenges raised by issues in contemporary embedded system development.


international symposium on intelligent control | 2003

Wavelet transform based signal processing method for nondestructive testing

Egidijus Kazanavičius; Antanas Mikuckas; Irena Mikuckiene

The main problem in ultrasonic nondestructive testing systems is to cancel out effects of the noise from the surroundings. Some measures have to be taken so that the original signal is not prone to mixing with environmental noise at any working condition. Some of these measures are not sufficiently effective, that is why some of these measures are combined in the same system and the amount of calculations (and the same signal processing time) considerably increases. The wavelets transform based methods are widely used for noise reduction in recent time. These methods have statistical optimality properties. The wavelets transform based signal processing method for ultrasonic nondestructive testing systems is suggested. Execution of this method requires fewer amounts of calculations than classical methods.


international test conference | 2015

Solution of the Augmenting Sequence of Linear Programming Problems as a Tool for the Intellectual Home Environment’s Self-Training

Andrius Dmuchovskis; Raimundas Jasinevicius; Vaidas Jukavicius; Egidijus Kazanavičius; Laura Kizauskiene; Agnius Liutkevicius

This work presents the solution based on the augmenting sequence of linear programming problems (LPP) as a tool for intellectualizing home environment. The proposed solution empowers the intelligent decision making procedure which can be applied to various intelligent control applications. The augmenting self-training procedure based on LPP approach is presented as well, which allows making reasonable decisions having only limited data about the controlled environment. The method permits retraining the decision making system when new data is available. As a proof of concept, this solution is applied to intelligent light control application. The obtained simulation results show the method’s capability in making reasonable decisions according to users preferences. DOI: http://dx.doi.org/10.5755/j01.itc.44.2.10235


international conference on information and software technologies | 2015

Risk Evaluation: The Paradigm and Tools

Aiste Balzekiene; Eglé Gaule; Raimundas Jasinevicius; Egidijus Kazanavičius; Vytautas Petrauskas

The paper is devoted to: (1) investigate risk as an inherently fundamental entity that exists in all aspects of our life; (2) show that up until now, the majority of available risk definitions are suitable only for particular application areas; (3) propose a relatively unified risk paradigm and a fuzzy logic based risk evaluation methodology and (4) to present a set of computerized risk evaluation tools. This paper confirms and strongly advocates the possibility to use the newly developed, unified/generalized and theoretically based risk control methodology and a set of networked ICT tools for risk evaluation, mitigation and monitoring. Our conclusions emphasize that such methodology, if delivered through a networked academic community would increase the competences of university graduates and enable professionals from governmental and public organizations to properly maintain problems associated with risk and risk control.


Archive | 2015

Intellectualized Home Environment as a Complex System

Raimundas Jasinevicius; Egidijus Kazanavičius; Vytautas Petrauskas

In the analytical part of this report several EC projects, developing an idea to create the intellectualized home environment (IHE) serving for peoples’ comfort on the base of multiple internet things and services (IoT&S), are discussed, and the EC HORIZON 2020 program perspectives in this field are presented.


Journal of Intelligent and Fuzzy Systems | 2015

Functional organization of an artificially intellectualized home environment based on mandami and takagi-sugeno procedures

Raimundas Jasinevicius; Egidijus Kazanavičius; Laura Kizauskiene; Agnius Liutkevicius; Vytautas Petrauskas; Arunas Vrubliauskas

A substantial amount of scientific research and publications in the smart home domain deal with different aspects of fuzzy logic application. However, we feel there is a general lack of complex modelling done of the whole smart home environment. So, the main goal of this paper is threefold: 1) to present a virtual model of a smart home environment to be intellectualized, 2) to demonstrate the efficiency of Mamdani type inference procedure in modelling of intellectual behaviour of the environment and 3) to show that it is possible to minimize the quantity of fuzzy rules by taking the hierarchical approach and adding the Takagi- Sugeno inference procedure to empower it. The results of computerized modelling and simulation are delivered in the paper demonstrating the practical viability and efficiency of the theoretical approach. The model of the intelligent home environment was used in two projects. Since a formalized analytical method for evaluating the sensitivity of system parameters still does not exist, the experimental sensitivity simulation in our case is performed and presented in this paper. Characteristics obtained in the modelled virtual environment can be easily expanded and used in a real home environment by changing pixels into real coordinates and the light intensity into other real variables.

Collaboration


Dive into the Egidijus Kazanavičius's collaboration.

Top Co-Authors

Avatar

Agnius Liutkevicius

Kaunas University of Technology

View shared research outputs
Top Co-Authors

Avatar

Algimantas Venčkauskas

Kaunas University of Technology

View shared research outputs
Top Co-Authors

Avatar

Antanas Mikuckas

Kaunas University of Technology

View shared research outputs
Top Co-Authors

Avatar

Arunas Vrubliauskas

Kaunas University of Technology

View shared research outputs
Top Co-Authors

Avatar

Vytautas Štuikys

Kaunas University of Technology

View shared research outputs
Top Co-Authors

Avatar

Arūnas Vrubliauskas

Kaunas University of Technology

View shared research outputs
Top Co-Authors

Avatar

Eduardas Bareiša

Kaunas University of Technology

View shared research outputs
Top Co-Authors

Avatar

Raimundas Jasinevicius

Kaunas University of Technology

View shared research outputs
Top Co-Authors

Avatar

Jonas Čeponis

Kaunas University of Technology

View shared research outputs
Top Co-Authors

Avatar

Rimantas Butleris

Kaunas University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge