M. Ursuleanu, A. Graur, M. Dimian, O. Gherman, S. Gherasim
{"title":"Developing Cybertek e-learning tool on emerging Cyberinfrastructure","authors":"M. Ursuleanu, A. Graur, M. Dimian, O. Gherman, S. Gherasim","doi":"10.1109/ROEDUNET.2011.5993691","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2011.5993691","url":null,"abstract":"The paper describes a framework and the state of the art for integrating Cyberinfrastructure systems on the Internet and the new e-learning tool Cybertek for instrument control and course presentation. The proposed framework combines Web Services to integrate data and services on the Cyberinfrastructure. It utilizes the Remote Control technologies in LAN and the powerful communication capability of Web Services to accommodate different communication interfaces/protocols. References have been made to Cyberinfrastructure models and middleware and the impact on the network bandwidth of Cybertek tool.","PeriodicalId":277269,"journal":{"name":"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134423095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A decision support based on data mining in e-banking","authors":"I. Ioniță, L. Ioniţă","doi":"10.1109/ROEDUNET.2011.5993710","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2011.5993710","url":null,"abstract":"The use of data mining techniques in banking domain is suitable due to the nature and sensitivity of bank data and due to the real time complex decision processes. The main concern for a bank's manager is to take good decisions in order to minimize the risks level associated to bank's activities. It is very important for a bank to have knowledge of causes which generate the financial crises or imbalances. Lending is one of the most risky activities in banking area and adequate methods to support the decision making process are necessary. In this paper the authors present a prototype decision support system based on data mining techniques used in lending process. The proposed system was designed to assist a customer who applies for a credit and it may represent an extension for e-banking activities.","PeriodicalId":277269,"journal":{"name":"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116122150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ciubancan, M. Marinescu, V. Marinescu, O. Grigoriu, G. Neculoiu, V. Sandulescu, I. Halcu
{"title":"Computer aided learning with GRID technologies","authors":"M. Ciubancan, M. Marinescu, V. Marinescu, O. Grigoriu, G. Neculoiu, V. Sandulescu, I. Halcu","doi":"10.1109/ROEDUNET.2011.5993719","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2011.5993719","url":null,"abstract":"In recent years, E-learning has been in a continuous development, due to the fact that it eases the process of teaching, evaluation and selfevaluation, offering schedulling flexibility and a tool support. E-learning makes learning content available even in remote locations, eliminating the need to travel to the place where the content is delivered. Nevertheless, the current E-learning platforms have some limitations like in scalability, availability, distribution of computing power and storage capabilities. The main aim of this following paper is to present a way for the integration of GRID technologies into new learning methodologies, in the same time answering the following questions: How will this improve the quality of traditional E-learning platforms, how can this be realised and what other benefits will there be for the universities, the students and for the work field as well.","PeriodicalId":277269,"journal":{"name":"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114537769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic analysis of microposts for efficient people to people interactions","authors":"Kisgyorgy Zoltan, Stan Johann","doi":"10.1109/ROEDUNET.2011.5993688","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2011.5993688","url":null,"abstract":"In this paper we present a framework that extracts meaningful knowledge from microposts shared in social platforms in order to build user profiles. This process involves different steps for the analysis of such microposts (extraction of keywords, named entities and their matching to ontological concepts) and their weighting. The concept weighting involves different scores, such as sentiment analysis and statistical patterns which attempt to measure the expertise of the user in the given field. Additionally, we inform on our prototype application, implemented as a social search engine on top of Twitter, which recommends people relevant to a given question.","PeriodicalId":277269,"journal":{"name":"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127784452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extending the BOINC architecture using peer-to-peer application code exchange","authors":"G. Farkas, I. Szanto, Valentin Gora, P. Haller","doi":"10.1109/ROEDUNET.2011.5993689","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2011.5993689","url":null,"abstract":"We propose a new peer-to-peer solution for exchanging the application code of BOINC projects between clients. Our proposed add-on is integrated into the original client-server architecture and the architecture is fully compatible with the original architecture. The proposed modifications will significantly reduce the central server's data traffic for projects where the code-data ratio is high.","PeriodicalId":277269,"journal":{"name":"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126926095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building trust within the national Educational Network","authors":"M. Marian","doi":"10.1109/ROEDUNET.2011.5993707","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2011.5993707","url":null,"abstract":"This paper is presenting one possible centralized approach on building trust within the Romanian Educational Network.","PeriodicalId":277269,"journal":{"name":"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126559122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DDH-MAC: A novel Dynamic De-Centralized Hybrid MAC protocol for Cognitive Radio Networks","authors":"M. A. Shah, G. A. Safdar, C. Maple","doi":"10.1109/ROEDUNET.2011.5993685","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2011.5993685","url":null,"abstract":"The radio spectrum (3kHz – 300GHz) has become saturated and proven to be insufficient to address the proliferation of new wireless applications. Cognitive Radio Technology which is an opportunistic network and is equipped with fully programmable wireless devices that empowers the network by OODA cycle and then make intelligent decisions by adapting their MAC and physical layer characteristics such as waveform, has appeared to be the only solution for current low spectrum availability and under utilization problem. In this paper a novel Dynamic De-Centralized Hybrid “DDH-MAC” protocol for Cognitive Radio Networks has been presented which lies between Global Common Control Channel (GCCC) and non-GCCC categories of cognitive radio MAC protocols. DDH-MAC is equipped with the best features of GCCC MAC protocols but also overcomes the saturation and security issues in GCCC. To the best of authors' knowledge, DDH-MAC is the first protocol which is hybrid between GCCC and non-GCCC family of protocols. DDH-MAC provides multiple levels of security and partially use GCCC to transmit beacon which sets and announces local control channel for exchange of free channel list (FCL) sensed by the co-operatively communicating cognitive radio nodes, subsequently providing secure transactions among participating nodes over the decided local control channel. This paper describes the framework of the DDH-MAC protocol in addition to its pseudo code for implementation; it is shown that the pre-transmission time for DDH-MAC is on average 20% better while compared to other cognitive radio MAC protocols.","PeriodicalId":277269,"journal":{"name":"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123663643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A programming model for context-sensitive application","authors":"S. Gherasim, M. Ursuleanu, O. Gherman, V. Gaitan","doi":"10.1109/ROEDUNET.2011.5993684","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2011.5993684","url":null,"abstract":"Recently, mobile devices have become increasingly widespread. Through these mobile devices have appeared new requirements and opportunities. Technological developments within mobile devices led to the discovery of new ways to develop and implement applications that support communication between these devices. These applications often operate in context-sensitive environments and must work with temporal, spatial, personal or social environment. This paper presents a programming model for context-sensitive applications. This model is based on the adaptation of particular semantic web services using the platform AOCI.","PeriodicalId":277269,"journal":{"name":"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123228353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of rateless erasure correcting codes for content distribution","authors":"A. Botos, V. Bota, M. Stef","doi":"10.1109/ROEDUNET.2011.5993680","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2011.5993680","url":null,"abstract":"Over the Internet, bit errors within the data packets translate into packet losses at the higher layers of the OSI model, yielding a packet erasure channel. Modern erasure correcting codes promise to offer a very simple and efficient solution to data transfers over these channels, opening up also other interesting applications. Amongst them one can enumerate reliable large scale content distribution, high quality real-time data transfers, distributed storage and others. These considerations make the study of such codes an actual and interesting topic. This paper presents a performance evaluation of some rateless erasure correcting codes. The performance evaluation is based on simulations, having as a secondary purpose the study of the feasibility of some proposed applications found in current literature. Several scenarios including various loss models have been simulated and the results show that these codes may indeed find applications in large-scale content distribution.","PeriodicalId":277269,"journal":{"name":"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134263774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A parallel unpredictable random number generator","authors":"K. Marton, A. Suciu, D. Petricean","doi":"10.1109/ROEDUNET.2011.5993701","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2011.5993701","url":null,"abstract":"Unpredictable random number generators represent a suitable solution when sources of true randomness are not available, too expensive or the nature of the application employing the generator requires a higher throughput and practicality than available TRNGs might provide, but at the same time, the desired level of irreproducibility and unpredictability can not be met by pseudorandom generators. The main goal of the new generator design is to take advantage of the fast randomness generation and different statistical quality of multiple PRNG families and provide an unpredictable combination method, which improves the quality of produced randomness and mitigates certain security problems the individual generators are exposed to if used on their own. Furthermore, the proposed generator leverages the processing power of multi-core and SMP systems by enabling the parallel execution of multiple generators selected by the user's unpredictable mouse movements. The result is a stream of unpredictably combined pseudorandom number sequences which shows high randomness quality - evaluated by the well known NIST statistical test suite, improved by the unpredictability and nondeterminism characteristic to human-computer interaction and doubled by a high generation speed provided by the parallel generation strategy. These characteristics enable the generator to be considered suitable for producing high quality randomness with the promise of cryptographic security.","PeriodicalId":277269,"journal":{"name":"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130574468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}