<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
<channel>
<title>2009</title>
<link>https://repository.utm.md/handle/5014/25683</link>
<description/>
<pubDate>Sun, 19 Apr 2026 19:21:57 GMT</pubDate>
<dc:date>2026-04-19T19:21:57Z</dc:date>
<item>
<title>Sensitvity analysis of bayesian networks in cots- based software development</title>
<link>https://repository.utm.md/handle/5014/25850</link>
<description>Sensitvity analysis of bayesian networks in cots- based software development
DARADKEH, Yousef; BORDIER, Andrei
These The process of developing software applications by integrating one or more Commercial Off-The-Shelf (COTS) components has received much attention lately because it provides potential benefits including shortening the development time, reducing effort and shrinking budgets as well as improving the quality of the final product. However, COTS-based development (hereafter CBD) in particular the evaluation and selection of COTS components, which is an essential activity in CBD, is not a trivial task and associated with various challenges. One of the most critical challenges is uncertainty inherent to COTS-related information and their vendors. Ignoring the uncertainty challenge negatively influences the quality of COTS selection decisions. In this paper, a bayesian-based evaluation model (proposed elsewhere [8]) is extended to allow the allocation of various weights to evaluation criteria. We also investigate the impact of using various weights on the belief about the satisfaction level for various COTS candidates. Furthermore, the paper shows how the analytic hierarchy process (hereafter AHP) is used along with the model to rank various candidates. A digital library system is selected as an example to illustrate how the model along with AHP help decision makers to select the most promising COTS candidate.
</description>
<pubDate>Thu, 01 Jan 2009 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://repository.utm.md/handle/5014/25850</guid>
<dc:date>2009-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>De l’expérience – La détection des virus</title>
<link>https://repository.utm.md/handle/5014/25849</link>
<description>De l’expérience – La détection des virus
TCACI, Olga; SEVERIN, Olga; ISTRATI, Daniela
Nous pensons qu’il n'y a pas de formule magique pour se débarrasser d'un virus informatique. C'est plus sage de dire que chaque virus a son remède ou antidote particulier, selon les dommages causés par le virus en question. D’après la croyance populaire, les logiciels d'antivirus détectent et se débarrassent automatiquement des virus informatiques. Cela est en partie vrai. Si le logiciel est mis à jour et balaye les courriels entrants, et qu'il perçoit la présence d'un virus, normalement il nous avertit par un message d'alerte et met le fichier contenant le virus en quarantaine pour le rendre inactif. Si notre ordinateur est déjà infecté, le logiciel d'antivirus va percevoir la présence d'un virus et il nous avertit par un message d'alerte (incluant le nom du virus), mais il n'élimine pas automatiquement le virus. C'est pour cette raison qu'il est important de prendre en note le nom du virus... On a besoin du nom du virus de faire une recherche pour trouver un outil de suppression.
</description>
<pubDate>Thu, 01 Jan 2009 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://repository.utm.md/handle/5014/25849</guid>
<dc:date>2009-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Development of simple and relatively strong encryption algorithm using combination of XOR and bit shifting</title>
<link>https://repository.utm.md/handle/5014/25848</link>
<description>Development of simple and relatively strong encryption algorithm using combination of XOR and bit shifting
LISNIC, Andrei
This article will describe how to easily develop a efficient encryption algorithm that is obtained by combination of simple encryption methods. This Combination will protect encrypted data from being analyzed semantically.
</description>
<pubDate>Thu, 01 Jan 2009 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://repository.utm.md/handle/5014/25848</guid>
<dc:date>2009-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Software web pentru monitorizarea de la distanţă a analizatorului de gaze</title>
<link>https://repository.utm.md/handle/5014/25847</link>
<description>Software web pentru monitorizarea de la distanţă a analizatorului de gaze
RUSU, Aurel; ŞIŞIANU, Sergiu
În cadrul acestei lucrări au fost analizate metodele, tehnologiile de monitorizare de la distanta a analizatoarelor de gaze moderne. A fost elaborată o aplicație soft (web), care oferă aplicații mai largi și mai vaste analizatoarelor de gaze, sistemelor de monitorizare. Avantajul primordial al aplicației elaborate bazându-se pe posibilitatea monitorizării, prelucrării, transmiterii și memorării de la distanta a informației primite de la analizatorul de gaze, ceea ce oferă posibilități esențiale Sistemului de monitorizare ecologic.
</description>
<pubDate>Thu, 01 Jan 2009 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://repository.utm.md/handle/5014/25847</guid>
<dc:date>2009-01-01T00:00:00Z</dc:date>
</item>
</channel>
</rss>
