Informatica Economica Vol. 17 No. 1/2013

Issue Topic: Cloud Computing

Issue Editor: Paul POCATILU, PhD

CONTENTS


Outlier Analysis of Categorical Data using NAVF
D. LAKSHMI SREENIVASA REDDY, B. RAVEENDRA BABU, A. GOVARDHAN 5
Outlier mining is an important task to discover the data records which have an exceptional behavior comparing with other records in the remaining dataset. Outliers do not follow with other data objects in the dataset. There are many effective approaches to detect outliers in numerical data. But for categorical dataset there are limited approaches. We propose an algorithm NAVF (Normally distributed attribute value frequency) to detect outliers in categorical data. This algorithm utilizes the frequent pattern data mining method. It avoids problem of giving k-outliers to get optimal accuracy in any classification models in previous work like Greedy, AVF, FPOF, and FDOD while finding outliers. The algorithm is applied on UCI ML Repository datasets like Nursery, Breast cancer mushroom and bank dataset by excluding numerical attributes. The experimental results show that it is efficient for outlier detection in categorical dataset.
Keywords: Outliers, Categorical, AVF, NAVF, FPOF, FDOD


A Lexical Analysis of Social Software Literature
Loay ALTAMIMI 14
Social software are today more prevalent in organizational context, providing new ways for work and giving web users new opportunities for interaction and collaboration. This review aims to gain insight into the extent of available scholarly and professional literature on these new tools and into interests in this field. The analysis of the 5356 collected articles includes type of publication, year of publication, source, keywords in articles' titles and abstracts. The study here adopted a systematic approach for the literature review, that is, the principle of Lexical Analysis.
Keywords: Lexical Analysis, Literature Review, Social Software, Web 2.0


Using AMDD method for Database Design in Mobile Cloud Computing Systems
Silviu Claudiu POPA, Mihai-Constantin AVORNICULUI, Vasile Paul BRESFELEAN 27
The development of the technologies of wireless telecommunications gave birth of new kinds of e-commerce, the so called Mobile e-Commerce or m-Commerce. Mobile Cloud Computing (MCC) represents a new IT research area that combines mobile computing and cloud compu-ting techniques. Behind a cloud mobile commerce system there is a database containing all necessary information for transactions. By means of Agile Model Driven Development (AMDD) method, we are able to achieve many benefits that smooth the progress of designing the databases utilized for cloud m-Commerce systems.
Keywords: Agile method, Agile Model Driven Development, Mobile Cloud Computing, Data-base Refactoring, Database Designing, Mobile e-Commerce, UML

Mobile Computing and Cloud maturity - Introducing Machine Learning for ERP Configuration Automation
Elena Geanina ULARU, Florina Camelia PUICAN, George SUCIU, Alexandru VULPE, Gyorgy TODORAN 40
Nowadays the smart phone market is clearly growing due to the new type of functionalities that mobile devices have and the role that they play in everyday life. Their utility and benefits rely on the applications that can be installed on the device (the so-called mobile apps). Cloud computing is a way to enhance the world of mobile application by providing disk space and freeing the user of the local storage needs, this way providing cheaper storage, wider acces-sibility and greater speed for business. In this paper we introduce various aspects of mobile computing and we stress the importance of obtaining cloud maturity by using machine learning for automating configurations of software applications deployed on cloud nodes using the open source application ERP5 and SlapOS, an open source operating system for Decentralized Cloud Computing.
Keywords: Cloud Computing, Mobile Computing, SlapOS, Machine Learning, ERP5

Integrated Applications with Laser Technology
Octavian DOSPINESCU, Paul BRODNER 53
The introduction of new materials as Power Point presentations are the most convenient way of teaching a course or to display a scientific paper. In order to support this function, most schools, universities, institutions, are equipped with projectors and computers. For controlling the presentation of the materials, the persons that are in charge with the presentation use, in most cases, both the keyboard of the computer as well as the mouse for the slides, thing that burdens, in a way, the direct communication (face to face) with the audience. Of course, the invention of the wireless mouse allowed a sort of freedom in controlling from the distance the digital materials. Although there seems to appear a certain impediment: in order to be used, the mouse requires to be placed on a flat surface. This article aims at creating a new application prototype that will manipulate, only through the means of a light-beam instrument (laser fascicle), both the actions of the mouse as well as some of the elements offered by the keyboard on a certain application or presentation. The light fascicle will be „connected” to a calculus system only through the images that were captured by a simple webcam.
Keywords: Surface Emitting Lasers, Technology Management, Software Prototyping, Optical Recognition Software


Procedural Optimization Models for Multiobjective Flexible JSSP
Elena Simona NICOARA 62
The most challenging issues related to manufacturing efficiency occur if the jobs to be sched-uled are structurally different, if these jobs allow flexible routings on the equipments and mul-tiple objectives are required. This framework, called Multi-objective Flexible Job Shop Scheduling Problems (MOFJSSP), applicable to many real processes, has been less reported in the literature than the JSSP framework, which has been extensively formalized, modeled and analyzed from many perspectives. The MOFJSSP lie, as many other NP-hard problems, in a tedious place where the vast optimization theory meets the real world context. The paper brings to discussion the most optimization models suited to MOFJSSP and analyzes in detail the genetic algorithms and agent-based models as the most appropriate procedural models.
Keywords: JSSP, Multiobjective, Optimization, Genetic Algorithm, Agent-Based Model

A Mathematical Formalization Proposal for Business Growth
Gheorghe BĂILEŞTEANU, Diana TÂRNĂVEANU 74
Economic sciences have known a spectacular evolution in the last century; beginning to use axiomatic methods, applying mathematical instruments as a decision-making tool. The quest to formalization needs to be addressed from various different angles, reducing entry and operating formal costs, increasing the incentives for firms to operate formally, reducing obstacles to their growth, and searching for inexpensive approaches through which to enforce compliancy with government regulations. This paper proposes a formalized approach to business growth, based on mathematics and logics, taking into consideration the particularities of the economic sector.
Keywords: Formalization, Symbolism, Business Growth, Axioms, Theorems


The Role and the Effects of Risk Management in IT Projects Success
Otniel DIDRAGA 86
The success of IT projects is influenced by risk and risk management according to the existing project management literature. The paper emphasizes the role of risk management and its contribution to projects success in the existing literature. The methodology applied is based on documentary study review and analysis of the concepts used by the literature. We analyzed the literature published between 1978 and 2012 from the main IT project management journals and publications. The results are that risk management is a very important component of the project management process and it is assumed implicitly to work in favour of project success. We also performed a quantitative analysis of how risk management processes affect the subjective and objective performance of IT projects in Romanian IT companies.
Keywords: Project Risk Management, IT Projects, Project Success, Project Performance


Extracting Usage Patterns and the Analysis of Tag Connection Dynamics within Collaborative Tagging Systems
Daniel MICAN, Nicolae TOMAI 99
Collaborative tagging has become a very popular way of annotation, thanks to the fact that any entity may be labeled by any individual based on his own reason. In this paper we present the results of the case study carried out on the basis of data gathered at different time intervals from the social tagging system developed and implemented on Întelepciune.ro. Analyzing collective data referring to the way in which community members associate different tags, we have observed that between tags, links are formed which become increasingly stable with the passing of time. Following the application of methodology specific to network analysis, we have managed to extract information referring to tag popularity, their influence within the network and the degree to which a tag depends upon another. As such, we have succeeded in determining different semantic structures within the collective tagging system and see their evolution at different stages in time. Furthermore, we have pictured the way in which tag rec-ommendations can be executed and that they can be integrated within recommendation sys-tems. Thus, we will be able to identify experts and trustworthy content based on different cat-egories of interest.
Keywords: Tags, Collaborative tagging, Network Analysis, Tag Recommendation, Collective Intelligence


Particularities of Verification Processes for Distributed Informatics Applications
Ion IVAN, Cristian CIUREA, Bogdan VINTILĂ, Gheorghe NOȘCA 113
This paper presents distributed informatics applications and characteristics of their development cycle. It defines the concept of verification and there are identified the differences from software testing. Particularities of the software testing and software verification processes are described. The verification steps and necessary conditions are presented and there are established influence factors of quality verification. Software optimality verification is analyzed and some metrics are defined for the verification process.
Keywords: Distributed Informatics Applications, Software Testing, Software Verification, Verification Process, Software Optimality


Using Raster Based Solutions to Identify Spatial Economic Agglomerations
Marian DÂRDALĂ, Adriana REVEIU 131
The efficient economic activities incline to be concentrated in space, and therefore there is an increased attention over the forces of spatial economic agglomerations and the role of location in economic development. This paper proposes some solutions to automate the identification of spatial agglomerations and their intensities, function on the spatial distribution of items in the geographical areas. The software components developed to accomplish this task are Geographic Information Systems specific tools.
Keywords: GIS, Spatial Agglomerations, Raster, Framework, Raster Symbology


Technologies, Methodologies and Challenges in Network Intrusion Detection and Prevention Systems
Nicoleta STANCIU 144
This paper presents an overview of the technologies and the methodologies used in Network Intrusion Detection and Prevention Systems (NIDPS). Intrusion Detection and Prevention System (IDPS) technologies are differentiated by types of events that IDPSs can recognize, by types of devices that IDPSs monitor and by activity. NIDPSs monitor and analyze the streams of network packets in order to detect security incidents. The main methodology used by NIDPSs is protocol analysis. Protocol analysis requires good knowledge of the theory of the main protocols, their definition, how each protocol works.
Keywords: Intrusion Detection and Prevention System, Protocol Analysis, Sensor, Signature,
State


Informatics System Design for the Management of Nutritional Supplementation in Body Modelling Sports
Dan MĂNESCU, Mihai DOINEA 157
Issues regarding body modeling are debated. Facts regarding the nutrional oriented processes for body modeling are identified. The nutriments classes are presented and how the administration process is conducted based on several characteristics and which are the stages of succeeding these processes. An informatics system is designed for the management of nutritional supplementation in order to control the calories intake based on the intentisty of physical effort. The stages of development are presented, identifying optimization criteria for the security of the systems and its users.
Keywords: Informatics Systems, Supplementation, Nutrition, Body Modeling


The Place, Role and Imperative of the Functional and Informatics Integration of the Economic Situational Information
Tudor Ştefan LEAHU 175
Concepts of economic information are analyzed, transforming, processing, carried out the general classification and elucidated their conceptual content. Also, it's established the place, the role, interconnections and interactions of economic informative subsystems.
Starting of the composition and structure of the unitary economic informational process, are highlighted the categories of the stages and operations of this process, the succession of the achievement, current situation ways and prospects of its integral informatics achievement. The necessity of the conscientiousness and consideration of situational information (informative, descriptive) as a decisive factor of the interspersing and interconnection of the material compartment and decisional informational under compartment of the unitary economic administrational process is motivated. The essential factors what motivated the integration of functional and informatics processing of situational information of the unitary economic managerial process are revealed in evidence, enumerated and examined.
Keywords: Notions Of Economic Situational Information, Place, Role, Processing, Unitary Economic Administrational Process, Material, Informational Compartments, Informative, Decisional Under Compartments, Motivation, Imperative Factors, Integration Functional, Informatics Achievement


The 12th International Conference on Informatics in Economy, IE 2013
Call for papers 193

The 6th International Conference on Security for Information Technology and Communications, SECITC’13
Call for papers 194

Publishing Guide for Authors 195

INFOREC Association 197