Informatica Economica Vol. 17 No. 3/2013

Issue Topic: Trading Architectures and Technologies

Issue Editor: Claudiu VINTE, PhD


Direct Heuristic Algorithms of Possibilistic Clustering Based on Transitive Approximation of Fuzzy Tolerance
This paper deals with the problem of a heuristic approach to possibilistic clustering. The ap-proach is based on the concept of allotment among fuzzy clusters. The paper provides the de-scription of basic concepts of the heuristic approach to possibilistic clustering. Plans of direct prototype-based heuristic algorithms of possibilistic clustering based on a transitive approx-imation of a fuzzy tolerance are described in detail. An illustrative example of application of the basic version of the proposed algorithms to Sneath and Sokal’s two-dimensional data set is considered. Preliminary conclusions are formulated.
Keywords: Clustering, Fuzzy Tolerance, Transitive Approximation, Allotment, Fuzzy Cluster

Methodological Aspects of Controlling Multilevel Man-Machine Organization Systems
Hierarchical on-line control models for multilevel man-machine organization systems (pro-duction and project management systems) are outlined. The models are based on the concep-tion of emergency situations and risk averse on-line control. By using the idea that hierarchical levels can interact only in special situations, the so-called emergency points, one can decompose general and complex multi-level problems of optimal control into sequences of one-level control problems. A hierarchical on-line control model under chance constraint is presented. The model comprises a chance constraint at the upper level and enables at the lower level optimizing both the units' starting time and the resources to be hired. The objective is the average total expenses within the planning horizon while the chance constraint is the minimal permissible probability of meeting the due date on time.
Keywords: Man-Machine Production System, On-Line Production Control, On-Line Project Management, Risk Averse Control Model, Chance Constraint Control Model, Control Via Coordination Principles, Control Via Emergency Situations

Architecture and Design of Expert System for Quality of Life Evaluation
This article presents an architectural framework of an expert system (ES) in the social area domain and describes the design of the ES, using the shell Expert System for Text Animation (ESTA). The designed system is intended for the evaluation of quality of life (QL). The devel-opment of ES for QL evaluation is a new information technology derived from artificial intel-ligent research, using ESTA system with application in social area domain. The proposed ES contains knowledge about sets of factors (objective conditions and subjective perception) and indicators, which may be used to QL measure, as followings: equal protection of the law; freedom from discrimination; right to be treated equally without regard to gender, race, lan-guage, religion, political beliefs, nationality, socioeconomic status and more; right to privacy; freedom of thought; free choice of employment; right to fair pay; equal pay for equal work; right to vote; right to rest and leisure; right to education. The system is developed in the ESTA, which is Visual Prolog 7.3 Application. The knowledge for the ES will be acquired from domain experts, texts and other related sources.
Keywords: Expert System, ESTA, Quality of Life, Knowledge Base

A Conceptual Model to Implement an Interactive and Collaborative Enterprise 2.0
Domenico CONSOLI 36
To implement an interactive and collaborative Enterprise 2.0 it is important to have, inside the company, organizational and technological preconditions. In this model of advanced enterprise, internal workers must collaborate among themselves to communicate with all external subjects of the supply chain for achieving business goals. The implementation process is a critical and complex procedure that requires a strategic plan in the introduction and adoption of the innovation. In this paper the single actions to follow, for the implementation of the new model of business, with all determinant factors and variables, are described.
Keywords: Web 2.0, Enterprise 2.0, Implementation Procedure, Platform 2.0, Performance

A GCM Solution for Leveraging Server-side JMS Functionality to Android-based Trading Application
Claudiu VINŢE 49
The paper presents our solution for a message oriented communication mechanism, employing Google Cloud Messaging (GCM) on the client-side, and Java Message Service (JMS) on the server-side, in order to leverage JMS functionality to Android-based trading application. Our ongoing research has been focused upon conceiving a way to expose the trading services offered by our academic trading system ASETS to a mobile trading application based on An-droid platform. ASETS trading platform is a distributed SOA implementation, with an original API based on JMS. In order to design and implement an Android based client, able to inter-communicate with the server-side components of ASETS, in a manner consistent with publish-er/subscriber JMS communication model, there was particularly necessary to have object im-bedded messages, produced by various ASETS services, pushed to the client application. While point-to-point communication model could be resolved on the client-side by employing synchronous HTTP socket connections over TCP/IP, the asynchronously generated messages from the server-side had to reach the client application in a push manner.
Keywords: Trading Technologies, JMS, GCM, Android Bridge Servlet, MOM

Efficient Architectures for Low Latency and High Throughput Trading Systems on the JVM
Alexandru LIXANDRU 60
The motivation for our research starts from the common belief that the Java platform is not suitable for implementing ultra-high performance applications. Java is one of the most widely used software development platform in the world, and it provides the means for rapid devel-opment of robust and complex applications that are easy to extend, ensuring short time-to-market of initial deliveries and throughout the lifetime of the system. The Java runtime envi-ronment, and especially the Java Virtual Machine, on top of which applications are executed, is the principal source of concerns in regards to its suitability in the electronic trading envi-ronment, mainly because of its implicit memory management. In this paper, we intend to iden-tify some of the most common measures that can be taken, both at the Java runtime environ-ment level and at the application architecture level, which can help Java applications achieve ultra-high performance. We also propose two efficient architectures for exchange trading sys-tems that allow for ultra-low latencies and high throughput.
Keywords: Trading Systems, Software Architectures, High Performance, Low Latency, High Throughput, Java Virtual Machine

Source Code Plagiarism Detection Method Using Protégé Built Ontologies
Software plagiarism is a growing and serious problem that affects computer science universities in particular and the quality of education in general. More and more students tend to copy their thesis’s software from older theses or internet databases. Checking source codes manually, to detect if they are similar or the same, is a laborious and time consuming job, maybe even impossible due to existence of large digital repositories. Ontology is a way of describing a document’s semantic, so it can be easily used for source code files too. OWL Web Ontology Language could find its applicability in describing both vocabulary and taxonomy of a programming language source code. SPARQL is a query language based on SQL that extracts saved or deducted information from ontologies. Our paper proposes a source code plagiarism detection method, based on ontologies created using Protégé editor, which can be applied in scanning students’ theses’ software source code.
Keywords: Ontology, OWL, SPARQL, Plagiarism, Protégé

Project Follow-Up & Change Management Tips
Claudia CARSTEA, Gheorghe SABAU 87
The managers have to understand the technological impact and the informatics applications upon the business they lead; taking into account the fact that IT assures them the necessary information. Today’s businesses are more and more organized, lead and automatized around the series of processes and the relations established among them. These processes involve de-velopments and the products and services, the interactions with the clients and the support of those processes and of human resources. Thereby, we suggest the identification of the solutions for the successful planning of the specific IS activities and their management in accordance with the company strategy, as well as the evaluation and control of main lines of work in accordance with: the following information criteria: efficiency, effectiveness, availability, in-tegrity, confidentiality, accord, safety and the financial and human resources through a flexible system of evaluation.
Keywords: Adapt to Changes, Input–Output Models, Effectiveness, Integrity, Principles

Learning Paradigms in e-Society
Gabriel ZAMFIR 99
Learning, defined both as the cognitive process of acquiring knowledge, and as the knowledge received by instruction, depends on the environment. Our world, analyzed as an educational environment, evolved from a natural native stage to a scientific technological based phase. Educative system, developed as a public service, including formal, non-formal and informal education, originated its foundations on the textbook, and at present, teacher preparation is based on the same technique. This article is designed as a conceptual basis analyze of learning in a scientific environment, in order to synthesize the interdependencies between the cognitive process of acquiring knowledge and the methods applied in knowledge conversion.
Keywords: Scientific Research, Higher Education, Learning Infrastructure, Deskwork, Field-work

Agile BI – The Future of BI
Mihaela MUNTEAN, Traian SURCEL 114
In a rapidly changing economy, Business Intelligence solutions have to become more agile. This paper attempts to discuss some questions which help in creating an agile BI solution such as: What is Agile? Why agile is so well suited for BI? Which are the key elements that promote an agile BI solution? Also, this paper briefly looks at technologies that can be used for enabling an agile BI solution.
Keywords: Agile Business Intelligence, Agile Business Analytics, Agile Development Methodologies, In-Memory Bi Approaches, Data Virtualization Server

Data Mining on Romanian Stock Market Using Neural Networks for Price Prediction
Magdalena Daniela NEMEŞ, Alexandru BUTOI 125
Predicting future prices by using time series forecasting models has become a relevant trading strategy for most stock market players. Intuition and speculation are no longer reliable as many new trading strategies based on artificial intelligence emerge. Data mining represents a good source of information, as it ensures data processing in a convenient manner. Neural networks are considered useful prediction models when designing forecasting strategies. In this paper we present a series of neural networks designed for stock exchange rates forecasting applied on three Romanian stocks traded on the Bucharest Stock Exchange (BSE). A multistep ahead strategy was used in order to predict short-time price fluctuations. Later, the findings of our study can be integrated with an intelligent multi-agent system model which uses data mining and data stream processing techniques for helping users in the decision making process of buying or selling stocks.
Keywords: Data Mining, Neural Networks, MLP, Multi-agent System, Majority Voting, Time series Forecasting

Cloud Standardization: Consistent Business Processes and Information
Răzvan-Daniel ZOTA, Lucian-Alexandru FRĂŢILĂ 137
Cloud computing represents one of the latest emerging trends in distributed computing that enables the existence of hardware infrastructure and software applications as services. The present paper offers a general approach to the cloud computing standardization as a mean of improving the speed of adoption for the cloud technologies. Moreover, this study tries to show out how organizations may achieve more consistent business processes while operating with cloud computing technologies.
Keywords: Business processes, Cloud, Enterprise Architecture, IT Governance, Standardization

Influence of Implemented Courseware on Students Knowledge Acquirement
Constantin-Gelu APOSTOL, Alina-Mihaela ION, Dragoş VESPAN 148
This paper presents the implementation of the courseware stages developed for an economic faculty with teaching in foreign languages with learning on campus through an assisted instruction approach based on a collaborative platform. The implementation of the conceptualization, construction and dialogue stages on the university platform dedicated to students in the first year is explained. We analyze the correlation between the accesses of didactic technologies on the educational platform and the results obtained at the final exam in order to see how the implementation of courseware technologies influenced the knowledge acquirement by students.
Keywords: Assisted Instruction, Collaborative Platform, Courseware Approach Stages, Pearson Correlation Coefficient, Coefficient of Determination

Security Solutions for Privacy Preserving Improved Data Mining
Marian STOICA, Silvia TRIF, Adrian VISOIU 157
Approaches of data analysis in the context of Business Intelligence solutions are presented, when the data is scarce with respect to the needs of performing an analysis. Several scenarios are presented: usage of an initial dataset obtained from primary data as a reference for the quality of the results, enriching the dataset through decoration with derived attributes and en-riching the dataset with external data. Each type of dataset decoration is used to improve the quality of the analysis’ results. After being subject to improvement using the presented methods, the improved dataset contains a large number of attributes regarding a subject. As some attributes refer to sensitive information or imply sensitive information about the subject, therefore dataset storage needs to prevent unwanted analysis that could reveal such infor-mation. A method for dataset partitioning is presented with respect to the predictive capacity of a set of attributes over a sensitive attribute. The proposed partitioning includes also means to hide the link between the real subject and stored data.
Keywords: Business Intelligence, Data Mining, Security, Privacy, Dataset Partitioning, Secret Sharing

Word Sense Disambiguation using Aggregated Similarity based on WordNet Graph Representation
Mădălina ZURINI 169
The term of word sense disambiguation, WSD, is introduced in the context of text document processing. A knowledge based approach is conducted using WordNet lexical ontology, describing its structure and components used for the process of identification of context related senses of each polysemy words. The principal distance measures using the graph associated to WordNet are presented, analyzing their advantages and disadvantages. A general model for aggregation of distances and probabilities is proposed and implemented in an application in order to detect the context senses of each word. For the non-existing words from WordNet, a similarity measure is used based on probabilities of co-occurrences. The module of WSD is proposed for integration in the step of processing documents such as supervised and unsupervised classification in order to maximize the correctness of the classification. Future work is related to the implementation of different domain oriented ontologies.
Keywords: WSD, Similarity Measure, WordNet, Ontology, Synset

Publishing Guide for Authors 181

INFOREC Association 183