Informatica Economica Vol. 15 No.
2/2011
Issue Topic: Data Mining
Issue Editor: Cristian CIUREA, PhD
CONTENTS
A Layered Software Architecture for the Management of a
Manufacturing Company Domenico CONSOLI 5 In this paper we
describe a layered software architecture in the management of a
manufactur-ing company that intensively uses computer technology.
Application tools, new and legacy, after the updating, operate in a
context of an open web oriented architecture. The software architecture
enables the integration and interoperability among all tools that support
business processes. Manufacturing Executive System and Text Mining tools
are excellent interfaces, the former both for internal production and
management processes and the latter for external processes coming from the
market. In this way, it is possible to implement, a computer integrated
factory, flexible and agile, that immediately responds to customer
requirements. Keywords: ICT, Service Oriented
Architecture, Web Services, Computer-Integrated Factory, Application
Software
IT&C Impact on the Romanian Business and
Organizations. The Enterprise Resource Planning and Business
Intelligence Methods Influence on Manager’s Decision: A Case
Study Eduard EDELHAUSER 16 The aim of the paper is to
study the use of the advanced management methods in the 2010 year in
Romania. The research results were obtained with the use of a
questionnaire, and our purpose was to demonstrate some hypothesis
concerning identify the effect that implementation of ERP and BI
applications in all functions of an organization has over the management
method and the IT&C based decision. The originality of this article
consists in the study realized in computer based advanced management
methods implementation. The study is limited to the SIVECO companies
portfolio. The purpose of the study was to demonstrate some hypothesis
concerning the relationship between the size of the organization, the
management method used, and the role of IT&C in decision making. The
practical value of this study consists in the measurement of the impacts
of contingency factors, including size, and in the assessment of the ERP
systems success. The results demonstrate that the relationship between
firm size and ERP success is moderated by IT assets.
Keywords: Enterprise Resource Planning, Business
Intelligence, Management Methods, Balanced Scorecard
Prototype of Intrusion Detection Model using UML 5.0
and Forward Engineering Muthaiyan MADIAJAGAN, Pragya GARG
29 In this paper we are using UML (Unified Modeling Language) which
is the blueprint language between the programmers, analysts, and
designer’s for easy representation of pictures or diagrammatic notation
with some textual data. Here we are using UML 5.0 to show “prototype of
the Intrusion Detection Model” and by explaining it by combining various
parts by drawing various UML diagrams such as Use cases and Activity
diagrams and Class Diagram using which we show forward engineering using
the class diagram of the IDM( Intrusion Detection Model). IDM is a device
or software that works on detecting malicious activities by unauthorized
users that can cause breach to the security policy within a network.
Keywords: Intrusion, Anomaly, UML,
Forward Engineering, Intrusion Detection
Initiatives in the Romanian eHealth Landscape
Dan-Andrei SITAR-TAUT, Adela SITAR-TAUT, Oana-Maria PENCIU, Daniel MICAN
38 Even if the foundation in the field of eHealth was set almost
half century ago, the current achievements’ status does not place
Romania on a good position in a European ranking. The efforts made
during the last years are promising, but they still cannot surpass
the enormous gaps in many eHealth indicators. This is not a
surprising fact because the eHealth level must be sustained by a
healthy and stable sanitary system and infrastructure, which, in our
country, is almost in collapse, especially now in the context of
global economic and financial crisis. We consider being guilty for
these circumstances the lack of a clear and solid mid-term strategy
developed at the level of the Ministry of Health (MoH), harmonized
in a global legal and regulatory framework as well, and also the
non-correlated researcher groups interests. The good attitude of
practitioners regarding the challenges of new technologies and the
political will can still give a chance to the Romanian healthcare
system and to its modern faces. Keywords:
eHealth, Telemedicine, Public Health Policies, EMR, EHR,
eHealth Projects
Predicting Product Performance with Social
Media Liviu LICĂ, Mihaela TUTĂ 46 Last 20
years brought massive growth in IT&C world. Mobile solutions such as
netbooks, laptops, mobile phones, tablets enable the wireless connection
to the Internet. Anyone can ac-cess it anytime and anywhere. In this
context, a part of the activities from the real world have a
correspondence in the online discussions. Social media in general and
social networks in particular have turned into marketing tools for
organizations and a place where people can express their opinions and
attitudes about products.The paper shows how social media can be used for
predicting the success of a product or service. To showcase this, two case
studies are presented; a test to prove that the conversations that take
place in social media are a good indicator of success and the second is an
exercise to predict the winner of the Oscar for best picture in 2011.
Keywords: Social Media, Social
Networks, Prediction, Movie, Internet
Trading Platform for the Global Warrant Markets
Iosif ZIMAN 57 Global warrant markets are among the most
active financial markets in the retail derivatives investment landscape
currently. In this context some of the most relevant markets in the last
years have been the ones across Asia and in particular Hong Kong, Korea
and Japan. This paper introduces the financial instruments used in
connection with the warrant markets, pre-sents and offers suggestions for
setting up a generic warrant market making system and in-troduces the main
concepts and components that need to be taken into account when develop-ing
these systems targeting an exchange driven or E-Businesscontext.
Keywords: Trading, E-Business, Warrant,
Market Making
Techniques and Methods to Improve the Audit Process of
the Distributed Informatics Systems Based on Metric System
Marius POPA 69 The paper presents how an assessment system is
implemented to evaluate the IT&C audit process quality. Issues regarding
theoretical and practical terms are presented together with a brief
presentation of the metrics and indicators developed in previous
researches. The implementation process of an indicator system is
highlighted and linked to specification stated in international standards
regarding the measurement process. Also, the effects of an assessment
system on the IT&C audit process quality are emphasized to demonstrate the
importance of such assessment system. The audit process quality is an
iterative process consisting of repetitive improvements based on objective
measures established on analytical models of the indicators.
Keywords: Informatics Audit, Assessment,
Indicator Implementation
An Architectural Solution of Assistance e-Services for
Diabetes Diet Vasile AVRAM, Diana AVRAM 79 The aim of
this paper is to outline the requirements and main architecture for a
useful tool for determining the nutrition facts of food for people having
Type 2 Diabetes. This diabetes is used only to establish the target
audience, a “mass of people” having, maybe, to less in common regarding
the computer usage skills. The characteristics of the target audience
(huge number, diversity of habits and behaviors, computer usage skills)
requires a solution based on web services delivered at least partly as a
standalone/ portable application, build from Web services and provided
with means for domain knowledge dissemination and usage.
Keywords: Software Architecture, Knowledge
Management, SIK, Business Rules, Type 2 Diabetes
Theoretical and Factual Meaning in Assisted
Instruction Gabriel ZAMFIR 94 Technology determines
new borders for knowledge domain while education reflects more complex
activities. A solution in this context is to integrate technology in the
educational system, extending it as e-Education.E-Education is a dynamic
system and a conceptdeveloped on three kinds of infrastructure which are
likely to emerge: technological infrastructure, conceptual infrastructure
of the type ofthe study programmes, and cognitive infrastructure of all
participants involved in the teaching-learning activities. The purpose of
this paper is to provide a meaningful framework for contextual learning,
developed on the idea that a personal computer can deliver many skills to
a student, but only academic environment can connect those skills to a
modern community where they belong. This approach is developed on the much
known principle which sustain that the educational system becomes the
engine of the learning society. Keywords:
Scientific Research in E-Education, Assisted Instruction, E-Classroom,
Didactic Knowledge, Concepts Map Approach
Building Robust E-learning Software Systems Using Web
Technologies Diana BUTUCEA, Cezar Liviu CERVINSCHI 107
Building a robust e-learning software platform represents a major
challenge for both the project manager and the development team. Since
functionalities of these software systems improves and grows by the day,
several aspects must be taken into consideration – e.g. workflows, use-casesor
alternative scenarios – in order to create a well standardized and fully
functional integrated learning management system. The paper will focus on
a model of implementation for an e-learning software system, analyzing its
features, its functional mechanisms as well as exemplifying an
implementation algorithm. A list of some of the mostly used web
technologies (both server-side and client-side) will be analyzed and a
discussion over major security leaks of web applicationswill also be put
in discussion. Keywords: E-learning,
E-testing, Web Technology, Software System, Web Platform
A Windows Phone 7 Oriented Secure Architecture for
Business Intelligence Mobile Applications Silvia TRIF, Adrian
VIŞOIU 119 This paper present and implement a Windows Phone 7
Oriented Secure Architecture for Business Intelligence Mobile Application.
In the developing process is used a Windows Phone 7 application that
interact with a WCF Web Service and a database. The types of Business
Intelligence Mobile Applications are presented. The Windows mobile devices
security and restrictions are presented. The namespaces and security
algorithms used in .NET Compact Framework for assuring the application
security are presented. The proposed architecture is showed underlying the
flows between the application and the web service.
Keywords: Security, Secure Architecture, Mobile
Applications, Business Intelligence, Web Service
Reconfigurability Function Deployment in Software
Development Stelian BRAD, Adrian CHIOREANU, Mircea FULEA, Bogdan
MOCAN, Emilia BRAD 130 In the forthcoming highly dynamic and
complex business environment high-speed and cost-effective development of
software applications for targeting a precise, unique and momentary set of
requirements (no more-no less) associated to a customized business case
will bring sig-nificant benefits both for producers and users. This
requires a life cycle change-oriented ap-proach in software development.
In this respect, designing software with intrinsic evolutionary resources
for reconfiguration represents the sound approach. A methodology for
concurrent deployment of reconfigurability characteristics in software
applications is introduced in this paper. Its potential is exemplified in
a case study dealing with web-based software tools to support systematic
product innovation projects. Keywords:
Reconfigurability, Software Development, Innovation, TRIZ, RAD
On Best Practices for Risk Management in Complex
Projects Dan BENŢA, Ioan Marius PODEAN, Cristian MIRCEAN
142 Risk management shall be proactive. This is one of the key
preliminaries to cope with the challenges of complex projects. An
overarching and consistent view on project risks and uncertainties is
necessary to follow a holistic approach in project risk management.
Uncertainty is inevitable since projects are unique and temporary
undertakings based on assumptions and constraints, delivering project
results to multiple stakeholders with different requirements. Project
management can be seen as an attempt to control this uncertain
environment, through the use of structured and disciplined techniques such
as estimating, planning, cost control, task allocation, earned value
analysis, monitoring, and review meetings. Each of these elements of
project management has a role in defining or controlling inherent
variability in projects. Project risk management provides approaches by
which uncertainty can be understood, assessed, and managed within
projects. A number of associations (e.g., Project Management Institute –
PMI®, International Project Management Association – IPMA,or Network of
Nordic Project Management Associations - NORDNET) work constantly in
acquiring, improving, and standardizing best practices in project
management.Based on the industrial practice, this paper outlines
strategies to identify, prioritize, and mitigate risks for achievement of
project’ or organizational objectives. Keywords:
Project Management, Risk Management, Best Practices of Management,
Standardization of Management, Maturity of Organizations
Survey of the Use of Steganography over the
Internet Lavinia Mihaela DINCA 153 This paper
addresses the use of Steganography over the Internet by terrorists. There
were ru-mors in the newspapers that Steganography is being used to covert
communication between terrorists, without presenting any scientific proof.
Niels Provos and Peter Honeyman conducted an extensive Internet search
where they analyzed over 2 million images and didn’t find a single hidden
image. After this study the scientific community was divided: some
believed that Niels Provos and Peter Honeyman was conclusive enough other
did not. This paper describes what Steganography is and what can be
used for, various Steganography techniques and also presents the studies
made regarding the use of Steganography on the Internet.
Keywords: Steganography, Secret Communication,
Information Hiding, Cryptography
Collaborative Systems – Finite State Machines
Ion IVAN, Cristian CIUREA, Sorin PAVEL 165 In this paper the finite
state machines are defined and formalized. There are presented the
collaborative banking systems and their correspondence is done with finite
state machines. It highlights the role of finite state machines in the
complexity analysis and performs operations on very large virtual
databases as finite state machines. It builds the state diagram and
presents the commands and documents transition between the collaborative
systems states. The paper analyzes the data sets from Collaborative
Multicash Servicedesk application and performs a combined analysis in
order to determine certain statistics. Indicators are obtained, such as
the number of requests by category and the load degree of an agent in the
collaborative system. Keywords:
Collaborative System, Finite State Machine, Inputs, States, Outputs
Implementing SaaS Solution for CRM Adriana
LIMBĂŞAN, Lucia RUSU 175 Greatest innovations in
virtualization and distributed computing have accelerated interest in
cloud computing (IaaS, PaaS, SaaS, aso). This paper presents the SaaS
prototype for Customer Relationship Management of a real estate company.
Starting from several approaches of e-marketing and SaaS features and
architectures, we adopted a model for a CRM solution using SaaS Level 2
architecture and distributed database. Based on the system objective,
functionality, we developed a modular solution for solve CRM and
e-marketing targets in real estate companies.
Keywords: E-Marketing, SaaS Architecture, Modular
Development
IT Clusters as a Special Type of Industrial
Clusters Catalin BOJA 184 Economic and industrial
clusters have become in the last years the object of a new economic
theory that has proved important for regional and even national
(Porter, 1990) development. The papers objective is to emphasize the
particularities of IT clusters, especially their characteristics
that are derived from the special features of this type of
technological clusters. IT clusters represent an important type of
technology clusters and at global view they represent most
successful and efficient examples of clusters. The paper describes
the characteristics that are behind the creation, the continuous
development and the success of the IT cluster and aims to emphasize
those particular features which define an IT cluster and separate it
from another type of industrial cluster. In order to emphasize the
importance factors, there are described different types of IT
clusters. Keywords: Quality,
Cluster, Characteristic, IT
Publishing Guide for Authors 194
Inforec Association 197
|