Thursday , 14 November 2019
roen

Vlad

Digital transformation of marketing

Electra MITAN   National Institute for Research and Development in Informatics – ICI Bucharest electra.mitan@ici.ro Abstract: The right key to an effective marketing activity is not the technique used, it is not the large amount of data but the immediate control of the useful information, knowing the preferences of the …

Read More »

Deep Reinforcement Learning. Case Study: Deep Q-Network

Mihnea Horia VREJOIU  National Institute for Research and Development in Informatics – ICI Bucharest mihnea.vrejoiu@ici.ro Abstract: Artificial Intelligence (AI) became today perhaps the most up-to-date topic in many areas. One of the main goals of AI is to create completely autonomous agents able to interact with the surrounding world and …

Read More »

Internet of Things framework development using Fuzzy approach

Changiz VALMOHAMMADI1*, Kobra DEHBASTEH2  1 Ph. D. Associate Professor, Department of Industrial Management, Faculty of Management, South Tehran Branch, Islamic Azad University, Tehran, Iran (Corresponding author*) valmohammadi@yahoo.com 2 Ph. D. candidate of IT Management, South Tehran Branch, Islamic Azad University, Tehran, Iran rdehbasteh@gmail.com Abstract: Given the increasing usage of the …

Read More »

Serious gaming towards learning of future city management

Jarutpong VASUTHANASUB1, Olga BUCOVETCHI2, Radu D. STANCIU2, Dorel BADEA3  1 Old Dominion University 2 “POLITEHNICA” University of Bucharest 3 “Nicolae Bălcescu” Landforce Academy of Sibiu jvasutha@odu.edu, olga.bucovetchi@upb.ro, radu.stanciu@upb.ro, dorel.badea@yahoo.com Abstract: The use of serious games as a learning tool is one of the most promising approaches. Games can deliver not …

Read More »

The SLA security issues in cloud computing services

Dragoș BARBU, Alexandru SIPICĂ, Ionuț CANDET National Institute for Research and Development in Informatics – ICI Bucharest dragos.barbu@ici.ro, alexandru.sipica@ici.ro, ionut.candet@ici.ro Abstract: This paper aims to identify the importance of security at the SLA level (Service Level Agreement), given the low utilization of Cloud Computing services at the economy level. The …

Read More »

New tendencies in linear prediction of events

Carmen ROTUNĂ, Antonio COHAL, Ionuț SANDU, Mihail DUMITRACHE National Institute for Research and Development in Informatics ˗ ICI Bucharest carmen.rotuna@rotld.ro, antonio.cohal@rotld.ro, ionut@rotld.ro, mihaildu@rotld.ro Abstract: The continuous development in the field of data science has greatly transformed big data analysis. Data is the foundation of innovation, but their value comes from …

Read More »

Online system for assessing the implementation of the Digital Agenda in Romania

Doina BANCIU1,2, Ionuț PETRE1, Dragoș SMADA1, Ionuț SANDU1 1 National Institute for Research and Development in Informatics – ICI Bucharest 2 Academy of Romanian Scientists doina.banciu@ici.ro, ionut.petre@ici.ro, dragos.smada@rotld.ro, ionut@rotld.ro Abstract: In Romania, the Ministry of Communications and Information Society (MCSI) and the World Bank signed a Consultancy Services Agreement on …

Read More »

Digital Identity Assurance Mechanisms. Multiple Factors Based Authentication

Cornel Ion ŞERBAN1, Ştefan MOCANU2, Cosmin POPA3  1 Academy of Economic Studies, Bucharest, Romania 2 Faculty of Automatic Control and Computer Science, PUB, Bucharest, Romania 3 Ingenios.Ro, 2C George Constantinescu Str., Bucharest, Romania cornel.serban@tgssoftware.ro, smocanu@rdslink.ro, cosmin.popa@ingenios.ro Abstract: In order to develop new technologies capable to exploit the digital identity concept, …

Read More »

Interception of P2P Traffic in a Campus Network

Merouane MEHDI Electronics Department, University Blida, Algeria mehdi_merouane@yahoo.com Abstract: Nowadays, many universities face bandwidth saturation problem caused by several origins. These include youtube abusively use, online games and especially illegal downloading that makes havoc to Peer-toPeer protocol e.g. BitTorrent. The latter is often associated with data piracy and copyright violation. …

Read More »