<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>Conferinţa "Microelectronics and Computer Science"</title>
<link href="https://repository.utm.md/handle/5014/3168" rel="alternate"/>
<subtitle/>
<id>https://repository.utm.md/handle/5014/3168</id>
<updated>2026-04-19T17:35:32Z</updated>
<dc:date>2026-04-19T17:35:32Z</dc:date>
<entry>
<title>Selectarea modelului de calcul şi proiectarea reţelei DVBT-2 în Republica Moldova</title>
<link href="https://repository.utm.md/handle/5014/28951" rel="alternate"/>
<author>
<name>IACOB, Mihail</name>
</author>
<author>
<name>DEMCIUC, Iurie</name>
</author>
<author>
<name>AVRAM, Ion</name>
</author>
<id>https://repository.utm.md/handle/5014/28951</id>
<updated>2025-01-09T11:05:13Z</updated>
<published>2017-01-01T00:00:00Z</published>
<summary type="text">Selectarea modelului de calcul şi proiectarea reţelei DVBT-2 în Republica Moldova
IACOB, Mihail; DEMCIUC, Iurie; AVRAM, Ion
Sunt prezentate rezultatele calculelor zonelor de acoperire cu semnal de televiziune digitală terestră DVB-T2 efectuate la utilizarea diferitor modele de calcul și luînd în consideraţie particularitățile reliefului Republicii Moldova. Au fost selectate recomamdările internaționale ITU-R P.370, ITU-R P.1546, ITU-R P.1812. Оn baza lor au fost calculate și construite zonele de acoperire cu semnal DVB-T2 pentru canalul de televiziune 58 оn raza mun.Chișinău și pentru canalul de televiziune 22 al unei rețele SFN (Single Frequency Network) formate din stațiile de emisie amplasate în localităţile Mîndreștii Noi şi Cetireni.
</summary>
<dc:date>2017-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Sensitvity analysis of bayesian networks in cots- based software development</title>
<link href="https://repository.utm.md/handle/5014/25850" rel="alternate"/>
<author>
<name>DARADKEH, Yousef</name>
</author>
<author>
<name>BORDIER, Andrei</name>
</author>
<id>https://repository.utm.md/handle/5014/25850</id>
<updated>2024-01-15T12:23:05Z</updated>
<published>2009-01-01T00:00:00Z</published>
<summary type="text">Sensitvity analysis of bayesian networks in cots- based software development
DARADKEH, Yousef; BORDIER, Andrei
These The process of developing software applications by integrating one or more Commercial Off-The-Shelf (COTS) components has received much attention lately because it provides potential benefits including shortening the development time, reducing effort and shrinking budgets as well as improving the quality of the final product. However, COTS-based development (hereafter CBD) in particular the evaluation and selection of COTS components, which is an essential activity in CBD, is not a trivial task and associated with various challenges. One of the most critical challenges is uncertainty inherent to COTS-related information and their vendors. Ignoring the uncertainty challenge negatively influences the quality of COTS selection decisions. In this paper, a bayesian-based evaluation model (proposed elsewhere [8]) is extended to allow the allocation of various weights to evaluation criteria. We also investigate the impact of using various weights on the belief about the satisfaction level for various COTS candidates. Furthermore, the paper shows how the analytic hierarchy process (hereafter AHP) is used along with the model to rank various candidates. A digital library system is selected as an example to illustrate how the model along with AHP help decision makers to select the most promising COTS candidate.
</summary>
<dc:date>2009-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>De l’expérience – La détection des virus</title>
<link href="https://repository.utm.md/handle/5014/25849" rel="alternate"/>
<author>
<name>TCACI, Olga</name>
</author>
<author>
<name>SEVERIN, Olga</name>
</author>
<author>
<name>ISTRATI, Daniela</name>
</author>
<id>https://repository.utm.md/handle/5014/25849</id>
<updated>2024-01-15T12:10:31Z</updated>
<published>2009-01-01T00:00:00Z</published>
<summary type="text">De l’expérience – La détection des virus
TCACI, Olga; SEVERIN, Olga; ISTRATI, Daniela
Nous pensons qu’il n'y a pas de formule magique pour se débarrasser d'un virus informatique. C'est plus sage de dire que chaque virus a son remède ou antidote particulier, selon les dommages causés par le virus en question. D’après la croyance populaire, les logiciels d'antivirus détectent et se débarrassent automatiquement des virus informatiques. Cela est en partie vrai. Si le logiciel est mis à jour et balaye les courriels entrants, et qu'il perçoit la présence d'un virus, normalement il nous avertit par un message d'alerte et met le fichier contenant le virus en quarantaine pour le rendre inactif. Si notre ordinateur est déjà infecté, le logiciel d'antivirus va percevoir la présence d'un virus et il nous avertit par un message d'alerte (incluant le nom du virus), mais il n'élimine pas automatiquement le virus. C'est pour cette raison qu'il est important de prendre en note le nom du virus... On a besoin du nom du virus de faire une recherche pour trouver un outil de suppression.
</summary>
<dc:date>2009-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Development of simple and relatively strong encryption algorithm using combination of XOR and bit shifting</title>
<link href="https://repository.utm.md/handle/5014/25848" rel="alternate"/>
<author>
<name>LISNIC, Andrei</name>
</author>
<id>https://repository.utm.md/handle/5014/25848</id>
<updated>2024-01-15T12:00:02Z</updated>
<published>2009-01-01T00:00:00Z</published>
<summary type="text">Development of simple and relatively strong encryption algorithm using combination of XOR and bit shifting
LISNIC, Andrei
This article will describe how to easily develop a efficient encryption algorithm that is obtained by combination of simple encryption methods. This Combination will protect encrypted data from being analyzed semantically.
</summary>
<dc:date>2009-01-01T00:00:00Z</dc:date>
</entry>
</feed>
