74 research outputs found

    AN ECONOMETRICAL MODEL FOR CALCULATING THE ROMANIAN GROSS DOMESTIC PRODUCT

    Get PDF
    This article analyzes the possibility of determining the Romanian Gross Domestic Product on the basis of a linear model, based on macroeconomic indicators such as unemployment, inflation, exchange rate. The proposed solution allows forecasting the Gross Domestic Product for the following period of time based on equation determined from the model in order to develop scenarios for improving the macroeconomic situation of Romania. The article also can be a starting point in the field of strategic investments, both at macro and micro level. Any foreign investor, before starting a business in another country, calculated and also made predictions about the economic situation of that country, in order not to lose the investment made.regression, GDP, inflation, unemployment, forecast

    CLASSIFICATION OF EUROPEAN UNION COUNTRIES FROM DATA MINING POINT OF VIEW, USING SAS ENTERPRISE GUIDE

    Get PDF
    With the development of computers and the increasing the amount of data it appeared the need of identifying new acquaintances, unknown until that moment in a relatively short time. The term of data mining involves the analysis of data from different views (aspects) in order to extract the knowledge to use them further in the foundation of decisions at microeconomic or macroeconomic levels. In this article we apply data analysis techniques such as principal component analysis and cluster analysis in order to group the countries of the European Union based on the financial indicators registered at the end of 2009 year.classification, cluster, data mining, European Union, financial indicators

    SMART CARDS - UTILITY, APPLICATIONS AND VULNERABILITIES

    Get PDF
    The Internet has taken its place beside the telephone and television as an important part of people’s lives. Consumers use the Internet to shop, bank and invest online. Most consumers use credit or debit cards to pay for online purchases, but other payment methods, like “e-wallets,” are becoming more common. But not all the payments are safe there are a lot of fake sites, hackers, viruses.smart cards, e-payment, vulnerabilities, security

    The Business Model Canvas ”Camelina Omega 3 Plus”15

    Get PDF
    The Business Model Canvas ”Camelina omega 3 Plus” is a transpose in practice of the information from the best seller book ”Business Model Generation – A handbook for Visionaries, Game Changers and Challengers” written by the Alexander OSTERWALDER & Yves PIGNEUR and of the knowledge accumulated from the complex and diverse activities carried on during project H2020 - EU RUR-09-2017 ”Replicable business models for modern rural economies (RUBIZMO), financed under Grant Agreement Nº 773621, in which the Business Model Canvas is a basic tool. Firstly, the paper is focusing on a clear presentation of the structural elements (9) of the business model canvas – (PC) Key partners and partnerships, (AC) Key activities, (R-C) Key resources, (PV) Value propositions, (CA) Channels, (RC) Customer relationships, (SC) Customer segments, ($C) Costs structure and (FV) Revenue Streams. Further on it is presented the description, analysis and design of the Business Model Canvas ”Camelina Omega 3 Plus”, a case study for inspiration of those who are interested to develop or who are already running a sustainable business based on similar values as the company ”Camelina Omega 3 Plus”

    Context-based security function orchestration for the network edge

    Get PDF
    Over the last few years the number of interconnected devices has increased dramatically, generating zettabytes of traffic each year. In order to cater to the requirements of end-users, operators have deployed network services to enhance their infrastructure. Nowadays, telecommunications service providers are making use of virtualised, flexible, and cost-effective network-wide services, under what is known as Network Function Virtualisation (NFV). Future network and application requirements necessitate services to be delivered at the edge of the network, in close proximity to end-users, which has the potential to reduce end-to-end latency and minimise the utilisation of the core infrastructure while providing flexible allocation of resources. One class of functionality that NFV facilitates is the rapid deployment of network security services. However, the urgency for assuring connectivity to an ever increasing number of devices as well as their resource-constrained nature, has led to neglecting security principles and best practices. These low-cost devices are often exploited for malicious purposes in targeting the network infrastructure, with recent volumetric Distributed Denial of Service (DDoS) attacks often surpassing 1 terabyte per second of network traffic. The work presented in this thesis aims to identify the unique requirements of security modules implemented as Virtual Network Functions (VNFs), and the associated challenges in providing management and orchestration of complex chains consisting of multiple VNFs The work presented here focuses on deployment, placement, and lifecycle management of microservice-based security VNFs in resource-constrained environments using contextual information on device behaviour. Furthermore, the thesis presents a formulation of the latency-optimal placement of service chains at the network edge, provides an optimal solution using Integer Linear Programming, and an associated near-optimal heuristic solution that is able to solve larger-size problems in reduced time, which can be used in conjunction with context-based security paradigms. The results of this work demonstrate that lightweight security VNFs can be tailored for, and hosted on, a variety of devices, including commodity resource-constrained systems found in edge networks. Furthermore, using a context-based implementation of the management and orchestration of lightweight services enables the deployment of real-world complex security service chains tailored towards the user’s performance demands from the network. Finally, the results of this work show that on-path placement of service chains reduces the end-to-end latency and minimise the number of service-level agreement violations, therefore enabling secure use of latency-critical networks

    Analysis and Design of an Array of Two Differential Oscillators Coupled Through a Resistive Network

    No full text
    International audienceThis paper considers the analysis and the design of an array of two NMOS differential oscillators coupled through a resistor. A new writing of the nonlinear equations proposed by R. York to describe the oscillators' locked states but limited for the specific case of a resistive coupling is presented. The new system permits the calculation of the free-running frequencies of the oscillators when a specific phase shift is desired. This has led to the modeling of the two coupled NMOS differential oscillators as two coupled differential Van der Pol oscillators, with a resistive coupling network. A good agreement between the circuit, the model and the theory was found, giving some design considerations for a network of two differential oscillators coupled through one resistor

    Modeling and characterization of oscillator circuits by Van Der Pol model using parameter estimation

    No full text
    International audienceIn this paper, we present a new method for the modeling and characterization of oscillator circuit with a Van Der Pol (VDP) model using parameter identification. We also discussed and investigated the problem of estimation in nonlinear system based on time domain data. The approach is based on an appropriate state space representation of Van der Pol oscillator that allows an optimal parameter estimation. Using sampled output voltage signal, model parameters are obtained by an iterative identification algorithm based on Output Error method. Normalization issues are fixed by an appropriate transformation allowing a quickly global minimum search. Finally, the proposed estimation method is tested and validated using simulation data from a 1 GHz oscillator circuit in GaAs technology

    A CAD Tool for an Array of Differential Oscillators Coupled Through a Broadband Network

    No full text
    International audienceA new expression of the equations describing the locked states of two oscillators coupled through a resistor is presented in this article. This theory has led to the elaboration of a CAD tool which provides, in a short simulation time, the frequency locking region of two coupled differential oscillator

    Generation of the coupling circuit parameters for the coupled oscillators used in antenna arrays

    No full text
    International audienceThis paper presents a new software which can generate in full-symbolic or numeric-symbolic form the Y, Z, H, and fundamental parameters of a two-port structure. Our procedure can also determine all the resonant frequencies of any two-port configuration as functions of the two-port circuit parameters. The procedure is based on the modified nodal equations in full-symbolic form. A new software called ANCSYANP (Analog Circuit Symbolic Analysis Program) was elaborated. This is an interactive tool that combines symbolic and numeric computational techniques, and which uses the facilities of the symbolic simulator Maple to manipulate the symbolic expressions. An illustrative example is done

    Romania\u27s Participation to the European Assessment Project Titled HyUnder, Multi-Criterial Analyses of Salt Cavern Locations

    Get PDF
    The scope of the work is to assess the potential, the actors and relevant business cases for large scale storage of renewable electricity by hydrogen underground storage in Romania. This presentation intends to provide a picture of the multi-criterial analyses of salt cavern locations in Romania. The energy sector is facing with the necessity to store large energy quantities for short to long term in order to adapt to the increasingly intermittent renewable energy. The results of this presentation have originated from an ongoing European assessment project by the name of HyUnder (FCH JU, grant 303417) regarding utilization of salt caverns for hydrogen underground storage. Currently, main uses of salt caverns include storage of hydrocarbons or wastes disposal. Salt caverns have stirred the interest of the scientific community regarding the potential applications in hydrogen economy. Romania has active mines or caverns and others closed, many of them have the potential to be used from hydrogen storage. These facts represent an interested situation in order to initiate studies or assessments of the potential hydrogen underground storage. The salt mines, hydrogen producers, renewable energy sources and research centers with high qualified scientists, represent essentially elements for new type of studies regarding hydrogen economy. In the context of scientific community\u27s efforts from Romania to assert active in the area of hydrogen technologies, this approach can certainly constitutes an attractive example for pan-European cooperation. The work disclaims the technic multi-criterial analyses of salt cavern locations regarding hydrogen underground storage. The introduction of hydrogen into economy offers the possibility to provide a number of advantages: sustainable development, valorization of local resources and improvement of competitiveness. The opportunities and viabilities of salt cavern locations are analyzed
    corecore