Felician Alecu

Felician Alecu
Bucharest University of Economic Studies | ASE · Department of Computer Science and Cybernetics

About

43
Publications
79,010
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
354
Citations

Publications

Publications (43)
Chapter
Distributed ledger technology (DLT) and blockchain are very popular these days, especially due to the cryptocurrencies like Bitcoin, Ethereum, Dogecoin, and others. To better understand these cryptocurrencies and the related transactions, it is important to know how these technologies work and how secure they are. This paper presents the concepts,...
Article
Full-text available
Nowadays, the Internet of Things (IoT) projects are very popular and they are developed for numerous fields. In order to detect various medical problems on time, it is required to monitor the subjects either human or non-human. This could be used on regular or specific activities, like sport or work. It is necessary to determine the factors that co...
Article
Full-text available
Social networks can be successfully used to promote any business, being developed in such a way to allow both individuals and business organizations to interact one with another. Companies may obtain important information about users of social networks which will help to a better understanding of their profile and needs and, consequently, to build...
Book
Lucrarea Programarea aplicatiilor Android analizeaza modelul de programare specific aplicatiilor destinate platformei mobile Android. In cadrul lucrarii sunt prezentate detaliat componentele caracteristice platformei Android: activitati, mesaje, furnizori de continut, receptori de mesaje si servicii. Pe lânga acestea, sunt abordate aspecte precum:...
Article
Full-text available
Prevention actions (trainings, audits) and inspections (tests, validations, code reviews) are the crucial factors in achieving a high quality level for any software application simply because low investments in this area are leading to significant expenses in terms of corrective actions needed for defect fixing. Mobile applications testing involves...
Article
Full-text available
Cross Site Scripting (XSS) is the most common security vulnerability that can be found in web applications of today. Any web application that is generating an output based on the user’s input but without validating the content is virtually exposed to XSS. The user input validation by filtering and escaping is the most effective way to prevent the X...
Article
Full-text available
XSLT style sheets are designed to transform the XML documents into something else. The two most popular parsers of the moment are the Document Object Model (DOM) and the Simple API for XML (SAX). DOM is an official recommendation of the W3C (available at http://www.w3.org/TR/REC-DOM-Level-1), while SAX is a de facto standard. A good parser should b...
Article
Full-text available
In a software factory, the applications are developed in the same way Henri Ford started manufacturing cars. In such a way, a customized solution could be obtained within a reasonable budget and within the foreseen timeframe. This development method offers a flexible solution that can be readapted rapidly and automatically to the changing business...
Article
Full-text available
The paper focus on the main key points related to the IT security project management. The most important lifecycle stages are identified: IT security project proposal definition, project organization, project planning, quality planning, project team organization, IT security project activities management and project closing. The most important succ...
Article
Full-text available
Software development projects are logically divided into phases that are composing the project life cycle. Typically, the phases are scheduled sequentially but in some cases a project may take clear advantages by running the phases concurrently. The most common phase-to-phase relation-ships are sequential, overlapping, iterative and composite.
Article
Full-text available
The e-learning applications of today require a special focus on security. Distributed e-learning applications have several modules user can access using different clients (desktop or mobile). The same user has several accounts with different credentials. In this context, the SSO (Single Sign-On) solutions become very attractive since the user has t...
Article
Full-text available
Any major software development starts with the Initiating process group. Once the charter document is approved, the Planning and then to the Executing stages will follow. Monitoring and Controlling is measuring the potential performance deviation of the project in terms of schedule and costs and performs the related Integrated Change Control activi...
Article
In order to better achieve its goals, any project is logically divided into phases that are composing the project life cycle. The name and number of these phases are industry dependent, so they are completely different from one field of activity to another. Typically, the phases are scheduled sequentially but in some cases a project may take clear...
Article
Full-text available
The purpose of this article is to explain the way in which a software project (old, current or future) should be tailored in order to be ready for an external backup.
Article
Full-text available
Despite of its age, the Pareto Principle is still a strong mechanism constantly used in quality control of projects from various areas, including the IT field.
Article
Full-text available
WiMAX (Worldwide Interoperability for Microwave Access) is a point-to-multipoint wireless network based on IEEE 802.16 standard. The WiMAX signal is broadcasted from a base station to the wide-geographically spread receivers. WiMAX enabled mobile devices become very popular due to the fact the network connections can be easily maintained on move. R...
Article
Full-text available
WiMAX enabled mobile devices become very popular due to the fact the network connections can be easily maintained on move. Regarding the network security, WiMAX provides strong user authentication, access control, data privacy and data integrity using sophisticated encryption technology. WiMAX technology is the only solution for isolated locations...
Article
As with rapid growth of the cloud computing architecture usage, more and more industries move their focus from investing into processing power to renting processing power from a specialized vendor. Education field is no different. E-learning systems usually require many hardware and software resources. There are numerous educational institutions th...
Article
Full-text available
Many professionals and 3D artists consider Blender as being the best open source solution for 3D computer graphics. The main features are related to modeling, rendering, shading, imaging, compositing, animation, physics and particles and realtime 3D/game creation.
Article
Full-text available
Several methods can be applied to parallelize a program containing input/output operations but one of the most important challenges is to parallelize loops because they usually spend the most CPU time even if the code contained is very small. A loop could by parallelized by distributing iterations among processes. Every process will execute just a...
Article
Full-text available
The base entity in computer programming is the process or task. The parallelism can be achieved by executing multiple processes on different processors. Distributed systems are managed by distributed operating systems that represent the extension for multiprocessor architectures of multitasking and multiprogramming operating systems.
Article
Using metrics and indicators for the evaluation of the IT projects management have the advantage of providing rigorous details about the required effort and the boundaries of the IT deliverables. There are some disadvantages, as well, due to the fact the input data contains errors and the value of metrics depends on the quality of data used in mode...
Article
A grid is a collection of individual machines. The goal is to create the illusion of a powerful computer out of a large collection of connected systems sharing resources. Some resources may be used by all users of the grid while others may have specific restrictions. The most common resource is computing cycles provided by the processors. Grid comp...
Article
Full-text available
The mobile banking involves the use of some mobile telecommunication devices (such phones or PDAs - Personal Digital Assistants) in order to complete, in a secure manner, banking transactions (like payments, transfers, account information and so on). It doesn't matter where the user is physically located. Also, the hour when the services are reques...
Article
The future of mobile banking will be represented by such applications that support mobile, Internet banking and EFT (Electronic Funds Transfer) transactions in a single user interface. In such a way, the mobile banking will be able to cover all the types of applications demanded at the market level. The parallel processing of credit card bank trans...
Article
Full-text available
A very good method that can be used to protect a private network is the implementation of a firewall between Internet and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at the system level. The SSL protocol allows verifying the identity of a WEB server based on a digital certifica...
Article
Full-text available
Internet Banking (known also as online banking) allows performing transactions and payments over the internet through a bank's secure website. This can be very useful, especially for banking outside bank hours (which tend to be very short) and banking from anywhere where internet access is available. In most cases a web browser such as Internet Exp...
Article
Full-text available
Software development projects are logically divided into phases that are composing the project life cycle. The name and number of these phases are industry dependent, so they are completely different from one field of activity to another. Typically, the phases are scheduled sequentially but in some cases a project may take clear advantages by runni...
Article
Queuing theory, the theory of congestion, is a branch of operations research which explores the relationships between demand of a service and the delays suffered by the users of the system. The study of the queues is very useful in fields like telecommunications, traffic control, determining the sequence of computer operations, predicting computer...
Article
Few years ago, parallel computers could be found only in research laboratories and they were used mainly for computation intensive applications such as numerical simulations of complex systems. Today, parallel computers are used to execute both data intensive applications in commerce and computation intensive applications in science and engineering...
Article
A parallel computer is a set of processors that are able to work cooperatively to solve a computational problem. The parallelism can be achieved by executing multiple processes on different processors. A distributed operating system is a special kind of software that is used to manage the distributed system shared resources, the process scheduling...
Article
Blender is a powerful open source tool dedicated to 3D graphics. Its main features are related to animation, physics and particles, modeling, rendering, shading, imag-ing, compositing and realtime 3D/game creation. Many professionals and 3D artists consider Blender as being the best open source solution for 3D computer graphics. 1. Blender Institut...
Article
One of the fundamental problems of computer science is ordering a list of items. There are a lot of solutions for this problem, known as sorting algorithms. Some sorting algorithms are simple and intuitive but others are extremely complicated but produce lightening-fast results. The purpose of this paper is to present a parallel bubble sort algorit...
Article
A system represents a set of dependent elements forming a single unitary entity. A particular type of system is the economic one which may define economic components and mechanisms such as a company, an industry, a field of the national economy and so on. Any system receives input from the outside word, which is processed and results in out. The ac...

Network

Cited By