Search Results

1 - 10 of 170 items :

  • Information Technology x
Clear All
Development and Research of Information System Elements for Passengers Drive Comfort Improvement

(SATC’15), 2015, pp. 118-129. 10. Qian, J., D. Wang, Y. Niu. Analysisofthe Influencing Factorsof Urban Residentsto Use Urban Public Bikes: A Case Studyof Suzhou. – Geographical Research, Vol. 33 , 2014, pp. 358-371. 11. Weng, J., X. Di, C. Wang, J. Wang, L. Mao. A Bus Service Evaluation Methodfrom Passenger’s Perspective Basedon Satisfaction Surveys: A Case Studyof Beijing, China. – Sustainability, Vol. 10 , 2018, Issue 2723, pp. 1-15. 12. De Oña, J., R. De Oña, C. Garrido. Extracting Importanceof Attributesfrom Customer Satisfaction Surveyswith

Open access
Database Concepts in a Domain Ontology

. Skjæveland, et al., “Ontology Based Data Access in Statoil,” Web Semantics: Science, Services and Agents on the World Wide Web, Jul. 2017. [4] N. Konstantinou, D.-E. Spanos and N. Mitrou, “Ontology and database mapping: a survey of current implementations and future directions,” Journal of Web Engineering, vol. 7, no. 1, pp. 1-24, March 2008. [5] D. Calvanese, B. Cogrel, S. Komla-Ebri, R. Kontchakov, D. Lanti, M. Rezk, M. Rodriguez-Muro, and G. Xiao, “Ontop: Answering SPARQL queries over

Open access
Valuation of European Call Option via Inverse Fourier Transform

.51002 [11] P. Carr and D. Madan, “Option valuation using the fast Fourier transform,” The Journal of Computational Finance, vol. 2, no. 4, pp. 61-73, 1999. [12] M. Karanasos and J. Kim, “A re-examination of the asymmetric power ARCH model,” Journal of Empirical Finance, vol. 13, no. 1, pp. 113-128, Jan. 2006. [13] O. Alexandrov, Composite trapezoidal rule illustration. 2007. [Online]. Available:

Open access
Development of Ontological Knowledge Model for Raw Materials Management Task/ Ontoloģiskā zināšanu modeļa izstrāde izejvielu pārvaldības uzdevumam Построение онтологической модели знаний для задачи управления материальными ресурсами

References [1] WiseGEEK, [Online] Available: [2] N. F. Noy, D. L. McGuinness, “Ontology Development 101: A Guide to Creating Your First Ontology,” Stanford Knowledge Systems Laboratory Technical Rep. KSL-01-05 and Stanford Medical Informatics Technical Rep. SMI-2001-0880, 2001. [3] Wand [Online] Available: [4] T. Gruber, “A translation approach to portable ontology specifications,” Knowledge

Open access
A Case Study: Software Defect Root Causes

[Online]. Aviable: [6] D. N. Card, “Learning from Our Mistakes with Defect Causal Analysis,” IEEE Software, vol. 15, no. 1, pp. 56-63, 1998. [7] S. Li, H. Zhou, T. Xiao, H. Lin, W. Lin, and T. Xie, “A characteristic study on failures of production distributed data-parallel programms,” Proceeding of the 2013 International Conference on Software Engineering, p. 963-972, 2013.

Open access
Approaches to the Creation of Behavioural Patterns of Information System Users

References [1] Infected User Behavioral Modeling for Cyber Defense Exercises: Part I URL Last accessed 2012.05.12 [2] Laskey, K.B., Alghamdi, G., Wang, X., Barbara, D., Shackleford, T., Wright, E., and Fitzgerald, J., Detecting Threatening Behavior Using Bayesian Networks, Proceedings of the Conference on Behavioral Representation in Modeling and Simulation, 2004. [3] The Eighth Annual CSI/FBI 2003 report: Computer Crime and

Open access
Evaluation of Payoff Matrices for Non-Cooperative Games via Processing Binary Expert Estimations

, “Selective games on binary relations,” Topology and its Applications, vol. 192, pp. 58-83, 2015. [7] V. Knoblauch, “A simple voting scheme generates all binary relations on finite sets,” Journal of Mathematical Economics, vol. 49, iss. 3, pp. 230-233, 2013. [8] H. Ichihashi and I. B. Türksen, “A neuro-fuzzy approach to data analysis of pairwise comparisons,” International Journal of Approximate Reasoning, vol. 9, iss. 3, pp. 227-248, 1993. https

Open access
Data Analysis of Cybercrimes in Businesses

References [1] T. Agarwal, D. Henry and J. Finkle, “JPMorgan hack exposed data of 83 million, among biggest breaches in history,” 2014 [Online]. Available: [2] Bureau of Justice Statistics, “Data Collection: National Computer Security Survey (NCSS),” [Online]. Available: [3] D. Chaikin, “Network Investigations of Cyber Attacks: The Limits of Digital Evidence

Open access
Markov Chains in the Task of Author’s Writing Style Profile Construction/ Markova ķēžu pielietošanas iespēju izpēte autora stila identifikācijai/ Исследование возможностей применения Марковских цепей для идентификации авторского стиля

References [1] P. A. Osipov and A. N. Borisov, “Abnormal action detection based on Markov models”, in Automatic Control and Computer Sciences, vol. 45, no. 2. 2011, pp. 94-105. [2] The GraphML File Format. [Online]. Available: [Accessed 05 July, 2014]. [3] M. S. Elayidom, C. Jose et al, “Text classification for authorship attribution analysis”, in Advanced Computing: An International Journal, ACIJ, vol. 4, no. 5, Sep. 2013, 10 p

Open access
Data Analytics in CRM Processes: A Literature Review

-323, 2017. [4] J.Markarian, S. Brobst and J. Bedell, Critical Success Factors Deploying Pervasive BI, 2007 [Online]. Available: [5] E. W. T. Ngai, L. Xiu, and D. C. K. Chau, “Application of Data Mining Techniques in Customer Relationship Management: A Literature Review and Classification,” Expert Systems with Applications, vol. 36, no. 2, pp. 2592-2602, Mar. 2009.

Open access