{"id":"https://openalex.org/W2136965804","doi":"https://doi.org/10.1109/saci.2009.5136277","title":"A multidisciplinary project: How to turn a webcam into a secure-cam","display_name":"A multidisciplinary project: How to turn a webcam into a secure-cam","publication_year":2009,"publication_date":"2009-05-01","ids":{"openalex":"https://openalex.org/W2136965804","doi":"https://doi.org/10.1109/saci.2009.5136277","mag":"2136965804"},"language":"en","primary_location":{"id":"doi:10.1109/saci.2009.5136277","is_oa":false,"landing_page_url":"https://doi.org/10.1109/saci.2009.5136277","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 5th International Symposium on Applied Computational Intelligence and Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048951454","display_name":"Bogdan Groza","orcid":"https://orcid.org/0000-0003-3078-3635"},"institutions":[{"id":"https://openalex.org/I3122695212","display_name":"Polytechnic University of Timi\u015foara","ror":"https://ror.org/02v91gy68","country_code":"RO","type":"education","lineage":["https://openalex.org/I3122695212"]}],"countries":["RO"],"is_corresponding":true,"raw_author_name":"Bogdan Groza","raw_affiliation_strings":["Department of Automation and Applied Informatics, Faculty of Automation and Computers, Politehnica University of Timi\u015foara, Romania","\u00bfPolitehnica\u00bf University of Timi\u00bfoara, Faculty of Automation and Computers, Department of Automation and Applied Informatics, Romania"],"affiliations":[{"raw_affiliation_string":"Department of Automation and Applied Informatics, Faculty of Automation and Computers, Politehnica University of Timi\u015foara, Romania","institution_ids":["https://openalex.org/I3122695212"]},{"raw_affiliation_string":"\u00bfPolitehnica\u00bf University of Timi\u00bfoara, Faculty of Automation and Computers, Department of Automation and Applied Informatics, Romania","institution_ids":["https://openalex.org/I3122695212"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006429760","display_name":"Lavinia Dragomir","orcid":null},"institutions":[{"id":"https://openalex.org/I3122695212","display_name":"Polytechnic University of Timi\u015foara","ror":"https://ror.org/02v91gy68","country_code":"RO","type":"education","lineage":["https://openalex.org/I3122695212"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Lavinia E. Dragomir","raw_affiliation_strings":["Department of Automation and Applied Informatics, Faculty of Automation and Computers, Politehnica University of Timi\u015foara, Romania","\u00bfPolitehnica\u00bf University of Timi\u00bfoara, Faculty of Automation and Computers, Department of Automation and Applied Informatics, Romania"],"affiliations":[{"raw_affiliation_string":"Department of Automation and Applied Informatics, Faculty of Automation and Computers, Politehnica University of Timi\u015foara, Romania","institution_ids":["https://openalex.org/I3122695212"]},{"raw_affiliation_string":"\u00bfPolitehnica\u00bf University of Timi\u00bfoara, Faculty of Automation and Computers, Department of Automation and Applied Informatics, Romania","institution_ids":["https://openalex.org/I3122695212"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5048951454"],"corresponding_institution_ids":["https://openalex.org/I3122695212"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15421806,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"381","last_page":"386"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10904","display_name":"Embedded Systems Design Techniques","score":0.8266000151634216,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10904","display_name":"Embedded Systems Design Techniques","score":0.8266000151634216,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10715","display_name":"Distributed and Parallel Computing Systems","score":0.8116999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11283","display_name":"Experimental Learning in Engineering","score":0.7146000266075134,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/multidisciplinary-approach","display_name":"Multidisciplinary approach","score":0.916121780872345},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7326078414916992},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.605140209197998},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5845460891723633},{"id":"https://openalex.org/keywords/bachelor","display_name":"Bachelor","score":0.5444605946540833},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5425671935081482},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4475586414337158},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.37860268354415894},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.32106947898864746},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18859893083572388},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.07909777760505676}],"concepts":[{"id":"https://openalex.org/C22467394","wikidata":"https://www.wikidata.org/wiki/Q849359","display_name":"Multidisciplinary approach","level":2,"score":0.916121780872345},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7326078414916992},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.605140209197998},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5845460891723633},{"id":"https://openalex.org/C2777626052","wikidata":"https://www.wikidata.org/wiki/Q516445","display_name":"Bachelor","level":2,"score":0.5444605946540833},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5425671935081482},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4475586414337158},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.37860268354415894},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.32106947898864746},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18859893083572388},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07909777760505676},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/saci.2009.5136277","is_oa":false,"landing_page_url":"https://doi.org/10.1109/saci.2009.5136277","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 5th International Symposium on Applied Computational Intelligence and Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322505","display_name":"Consiliului National al Cercetarii Stiintifice din Invatamantul Superior","ror":"https://ror.org/035rrps97"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W329998640","https://openalex.org/W1965302491","https://openalex.org/W2021797412","https://openalex.org/W2750964270","https://openalex.org/W3005433806","https://openalex.org/W6748161477"],"related_works":["https://openalex.org/W4242399787","https://openalex.org/W2358435779","https://openalex.org/W4286508873","https://openalex.org/W3127761055","https://openalex.org/W2504501183","https://openalex.org/W4255155046","https://openalex.org/W3146005063","https://openalex.org/W2593770045","https://openalex.org/W2242126915","https://openalex.org/W2789624424"],"abstract_inverted_index":{"The":[0,23,44,82],"paper":[1],"is":[2,30,129],"focused":[3],"on":[4],"developing":[5,27],"a":[6,32,130],"client-server":[7],"application":[8,29,113],"that":[9,35,92],"can":[10,36],"be":[11,64],"used":[12],"in":[13,26,50,53,77,114,136],"the":[14,21,28,54,57,65,70,78,86,90],"secure":[15],"communication":[16,119],"of":[17,56,85],"video":[18],"information":[19,102],"over":[20],"IP.":[22],"main":[24],"interest":[25,45],"as":[31,99],"multidisciplinary":[33,83,134],"project":[34,87],"help":[37],"students":[38],"to":[39,63,124,133],"develop":[40],"their":[41],"practical":[42],"skills.":[43],"for":[46],"such":[47,98],"an":[48,112],"approach":[49,68],"learning":[51,67,135],"appears":[52],"context":[55],"Bologna":[58],"process":[59],"where":[60],"multidisciplinarity":[61],"seems":[62],"preferred":[66],"at":[69],"bachelor":[71],"level,":[72],"while":[73],"interdisciplinarity":[74],"fits":[75],"mostly":[76],"higher":[79],"education":[80],"levels.":[81],"character":[84],"raises":[88],"from":[89,96],"fact":[91],"it":[93],"involves":[94],"knowledge":[95],"fields":[97],"data":[100],"communications,":[101],"security,":[103],"image":[104],"processing,":[105],"computer":[106],"programming,":[107],"mathematics":[108],"etc.":[109],"Thus,":[110],"implementing":[111],".NET":[115],"framework":[116],"and":[117,121],"using":[118],"protocols":[120],"cryptographic":[122],"primitives":[123],"assure":[125],"some":[126],"security":[127],"objectives":[128],"valid":[131],"response":[132],"engineering.":[137]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
