About
43
Publications
79,010
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
354
Citations
Introduction
Skills and Expertise
Publications
Publications (43)
Distributed ledger technology (DLT) and blockchain are very popular these days, especially due to the cryptocurrencies like Bitcoin, Ethereum, Dogecoin, and others. To better understand these cryptocurrencies and the related transactions, it is important to know how these technologies work and how secure they are. This paper presents the concepts,...
Nowadays, the Internet of Things (IoT) projects are very popular and they are developed for numerous fields. In order to detect various medical problems on time, it is required to monitor the subjects either human or non-human. This could be used on regular or specific activities, like sport or work. It is necessary to determine the factors that co...
Social networks can be successfully used to promote any business, being developed in such a way to allow both individuals and business organizations to interact one with another. Companies may obtain important information about users of social networks which will help to a better understanding of their profile and needs and, consequently, to build...
Lucrarea Programarea aplicatiilor Android analizeaza modelul de programare specific aplicatiilor destinate platformei mobile Android. In cadrul lucrarii sunt prezentate detaliat componentele caracteristice platformei Android: activitati, mesaje, furnizori de continut, receptori de mesaje si servicii.
Pe lânga acestea, sunt abordate aspecte precum:...
Prevention actions (trainings, audits) and inspections (tests, validations, code reviews) are the crucial factors in achieving a high quality level for any software application simply because low investments in this area are leading to significant expenses in terms of corrective actions needed for defect fixing. Mobile applications testing involves...
Cross Site Scripting (XSS) is the most common security vulnerability that can be found in web applications of today. Any web application that is generating an output based on the user’s input but without validating the content is virtually exposed to XSS. The user input validation by filtering and escaping is the most effective way to prevent the X...
XSLT style sheets are designed to transform the XML documents into something else. The two most popular parsers of the moment are the Document Object Model (DOM) and the Simple API for XML (SAX). DOM is an official recommendation of the W3C (available at http://www.w3.org/TR/REC-DOM-Level-1), while SAX is a de facto standard. A good parser should b...
In a software factory, the applications are developed in the same way Henri Ford started manufacturing cars. In such a way, a customized solution could be obtained within a reasonable budget and within the foreseen timeframe. This development method offers a flexible solution that can be readapted rapidly and automatically to the changing business...
The paper focus on the main key points related to the IT security project management. The most important lifecycle stages are identified: IT security project proposal definition, project organization, project planning, quality planning, project team organization, IT security project activities management and project closing. The most important succ...
Software development projects are logically divided into phases that are composing the project life cycle. Typically, the phases are scheduled sequentially but in some cases a project may take clear advantages by running the phases concurrently. The most common phase-to-phase relation-ships are sequential, overlapping, iterative and composite.
The e-learning applications of today require a special focus on security. Distributed e-learning applications have several modules user can access using different clients (desktop or mobile). The same user has several accounts with different credentials. In this context, the SSO (Single Sign-On) solutions become very attractive since the user has t...
Any major software development starts with the Initiating process group. Once the charter document is approved, the Planning and then to the Executing stages will follow. Monitoring and Controlling is measuring the potential performance deviation of the project in terms of schedule and costs and performs the related Integrated Change Control activi...
In order to better achieve its goals, any project is logically divided into phases that are composing the project life cycle. The name and number of these phases are industry dependent, so they are completely different from one field of activity to another. Typically, the phases are scheduled sequentially but in some cases a project may take clear...
The purpose of this article is to explain the way in which a software project (old, current or future) should be tailored in order to be ready for an external backup.
Despite of its age, the Pareto Principle is still a strong mechanism constantly used in quality control of projects from various areas, including the IT field.
WiMAX (Worldwide Interoperability for Microwave Access) is a point-to-multipoint wireless network based on IEEE 802.16 standard. The WiMAX signal is broadcasted from a base station to the wide-geographically spread receivers. WiMAX enabled mobile devices become very popular due to the fact the network connections can be easily maintained on move. R...
WiMAX enabled mobile devices become very popular due to the fact the network connections can be easily maintained on move. Regarding the network security, WiMAX provides strong user authentication, access control, data privacy and data integrity using sophisticated encryption technology. WiMAX technology is the only solution for isolated locations...
As with rapid growth of the cloud computing architecture usage, more and more industries move their focus from investing into processing power to renting processing power from a specialized vendor. Education field is no different. E-learning systems usually require many hardware and software resources. There are numerous educational institutions th...
Many professionals and 3D artists consider Blender as being the best open source solution for 3D computer graphics. The main features are related to modeling, rendering, shading, imaging, compositing, animation, physics and particles and realtime 3D/game creation.
Several methods can be applied to parallelize a program containing input/output operations but one of the most important challenges is to parallelize loops because they usually spend the most CPU time even if the code contained is very small. A loop could by parallelized by distributing iterations among processes. Every process will execute just a...
The base entity in computer programming is the process or task. The parallelism can be achieved by executing multiple processes on different processors. Distributed systems are managed by distributed operating systems that represent the extension for multiprocessor architectures of multitasking and multiprogramming operating systems.
Using metrics and indicators for the evaluation of the IT projects management have the advantage of providing rigorous details about the required effort and the boundaries of the IT deliverables. There are some disadvantages, as well, due to the fact the input data contains errors and the value of metrics depends on the quality of data used in mode...
A grid is a collection of individual machines. The goal is to create the illusion of a powerful computer out of a large collection of connected systems sharing resources. Some resources may be used by all users of the grid while others may have specific restrictions. The most common resource is computing cycles provided by the processors. Grid comp...
The mobile banking involves the use of some mobile telecommunication devices (such phones or PDAs - Personal Digital Assistants) in order to complete, in a secure manner, banking transactions (like payments, transfers, account information and so on). It doesn't matter where the user is physically located. Also, the hour when the services are reques...
The future of mobile banking will be represented by such applications that support mobile, Internet banking and EFT (Electronic Funds Transfer) transactions in a single user interface. In such a way, the mobile banking will be able to cover all the types of applications demanded at the market level. The parallel processing of credit card bank trans...
A very good method that can be used to protect a private network is the implementation of a firewall between Internet and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at the system level. The SSL protocol allows verifying the identity of a WEB server based on a digital certifica...
Internet Banking (known also as online banking) allows performing transactions and payments over the internet through a bank's secure website. This can be very useful, especially for banking outside bank hours (which tend to be very short) and banking from anywhere where internet access is available. In most cases a web browser such as Internet Exp...
Software development projects are logically divided into phases that are composing the project life cycle. The name and number of these phases are industry dependent, so they are completely different from one field of activity to another. Typically, the phases are scheduled sequentially but in some cases a project may take clear advantages by runni...
Queuing theory, the theory of congestion, is a branch of operations research which explores the relationships between demand of a service and the delays suffered by the users of the system. The study of the queues is very useful in fields like telecommunications, traffic control, determining the sequence of computer operations, predicting computer...
Few years ago, parallel computers could be found only in research laboratories and they were used mainly for computation intensive applications such as numerical simulations of complex systems. Today, parallel computers are used to execute both data intensive applications in commerce and computation intensive applications in science and engineering...
A parallel computer is a set of processors that are able to work cooperatively to solve a computational problem. The parallelism can be achieved by executing multiple processes on different processors. A distributed operating system is a special kind of software that is used to manage the distributed system shared resources, the process scheduling...
Blender is a powerful open source tool dedicated to 3D graphics. Its main features are related to animation, physics and particles, modeling, rendering, shading, imag-ing, compositing and realtime 3D/game creation. Many professionals and 3D artists consider Blender as being the best open source solution for 3D computer graphics. 1. Blender Institut...
One of the fundamental problems of computer science is ordering a list of items. There are a lot of solutions for this problem, known as sorting algorithms. Some sorting algorithms are simple and intuitive but others are extremely complicated but produce lightening-fast results. The purpose of this paper is to present a parallel bubble sort algorit...
A system represents a set of dependent elements forming a single unitary entity. A particular type of system is the economic one which may define economic components and mechanisms such as a company, an industry, a field of the national economy and so on. Any system receives input from the outside word, which is processed and results in out. The ac...