Now showing items 61-80 of 360

    • Closed-loop robust identification using the direct approach 

      Pupeikis, Rimantas (Informatica, 2000)
      The aim of the given paper is a development of the direct approach used for the estimation of parameters of a closed-loop discrete-time dynamic system in the case of additive noise with outliers contaminated uniformly in ...
    • Closed-loop robust identification using the direct approach 

      Pupeikis, Rimantas (Informatica, 2000)
      In the previous paper (Pupeikis, 2000) the problem of closed-loop robust identification using the direct approach in the presence of outliers in observations have been considered. The aim of the given paper is a development ...
    • Comparative analysis of business rules and business process modeling languages 

      Rima, Audrius; Vasilecas, Olegas; Šmaižys, Aidas (Computational Science and Techniques. Special Issue for Research Innovations Fundamentals 2011, 2013)
    • Comparison of GPU and CPU efficiency while solving heat conduction problems 

      Semenenko, Julija; Kolesau, Aliaksei; Starikovičius, Vadimas; Mackūnas, Artūras; Šešok, Dmitrij (Mokslas – Lietuvos ateitis. Informacinės technologijos ir multimedija = Science – Future of Lithuania. Information technologies and multimedia, 2020)
      Overview of GPU usage while solving different engineering problems, comparison between CPU and GPU computations and overview of the heat conduction problem are provided in this paper. The Jacobi iterative algorithm was ...
    • Composite DoS attack model 

      Ramanauskaitė, Simona; Čenys, Antanas (Mokslas – Lietuvos ateitis = Science – future of Lithuania: elektronika ir elektrotechnika = Electronics and electrical engineering, 2012)
      Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system ...
    • Computational Study of Predictor-Multicorrector Algorithm for Structural Dynamics 

      Baušys, Romualdas (Mechanika, 2001)
      Tyrinėta nauja trūkiojo laiko Galiorkino metodo versija. Taikant šį metodą, tenka spręsti didesnę lygčių sistemą palyginus su įprastiniais laiko integravimo algoritmais. Norint išvengti šio trūkumo, pasiūlytas naujas ...
    • Computational tools for semi-analytical finite element stability analysis of thin-walled structures 

      Samofalov, Michail; Kutas, Remigijus; Kačianauskas, Rimantas (Informacinės technologijos ir valdymas, 2004)
      Computational tools implementing the semi-analytical finite elements for the linear and stability analysis of thin-walled beams are considered. The proposed method presents two-stage discretisation, where the thin-walled ...
    • Computer algebra for comparison of analytical solution methods 

      Čepulkauskas, Algimantas; Kulvietienė, Regina; Kulvietis, Genadijus (Informacinės technologijos ir valdymas, 2002)
      The aim of this paper is to describe a theoretical background of systematic computer algebra methods for analyzing the free and steady-state periodic vibrations of nonlinear structures. Many analytical steady-state solution ...
    • Computer formation of complex surface developments 

      Audzijonis, Petras; Leonavičius, Giedrius (Informacinės technologijos ir valdymas, 2002)
      Computer formation and drawing of complex surface developments are analyzed. The main attention is paid to the programming of these problems. The analyzed methods for solving this task are illustrated by programs written ...
    • Computer simulation of scales measurement 

      Giniotis, Vytautas; Marčiukaitis, Gintautas (Geodezija ir kartografija = Geodesy and cartography, 1999)
      Tyrimų tikslai - sukurti kompiuterinius būdus ir juos įgyvendinti, imituojant linijinių ir kampinių apskritiminių skalių matavimą bei sukurti naujas kompiuterines programas matavimo proceso aiškinimui mokymo procese. Tokie ...
    • Computerised data acquisition and processing in measurement of raster scales 

      Rybokas, Mindaugas (WSEAS transactions on computer research, 2006)
      The development and tmplemeniatiaa of computerise control of measurements and the simulation and calculation of measurement of raster scales and transducers are discussed. The number of strokes in circular raster scales ...
    • Concerning a flowery tablecloth and the computer-aided analysis of a 19th-century photographic image 

      Žaltauskaitė, Vilma; Žiūrienė, Rytė (Limes : borderland studies, 2013)
      The paper introduces some peculiarities of the analysis of the photographic image which emerged in the process of the investigation and preparation for publication of the album of prelate Povilas Januševičius’ the end of ...
    • Correctness of the transformation: transformation of ontology axioms in formal rules 

      Vasilecas, Olegas; Kalibatienė, Diana (Lietuvos matematikos rinkinys, 2007)
      In this paper, authors emphasise on the correctness of the transformation. Therefore, types of correctness are analysed here. As a context of transformation, the transformation of PAL constraints in SQL rules is chosen for ...
    • Creating a composite solid 

      Sokas, Algirdas (Inžinerinė ir kompiuterinė grafika = Engineering and computer graphics : straipsnių rinkinys, [kn.] 4, 1998)
    • Darbų sekos: nukrypimų tvarkymas 

      Vojevodina, Dovilė (Lietuvių katalikų mokslo akademijos suvažiavimo darbai, 2005)
      Straipsnyje aptariama, kaip tvarkytini nukrypimai, atsirandantys normalioje darbų sekoje. Tokie nukrypimai tiesiogiai veikia jmonėje jau jdiegtą modelį. Tvarkyti nukrypimus ypač sunku todėl, kad negalima numatyti nei kada, ...
    • Data mining application for distance education information system 

      Kulvietis, Genadijus; Mamčenko, Jelena; Šileikienė, Irma (WSEAS transactions on information science and applications, 2006)
      Distance education is organised in three main forms: asynchronous, synchronous and blended. Student's data for analysis will be used only the asynchronous learning portion of the information system, since this portion is ...
    • Data mining application for fraud behaviour detection in telecoms 

      Kulvietienė, Regina; Mamčenko, Jelena (Rīgas tehniskās universitātes zinātniskie raksti. 5 serija: Datorzinātne = Scientific proceedings of Riga Technical University. Serija 5: Computer science, 2005)
      The main aim of this work was to analyse data, which is gathered in telecommunication, using modern Data Mining techniques. This kind of research activities is very significant for telecoms operators. Annual losses of ...
    • Data mining approach on information detection using intelligent miner for data 

      Kulvietienė, Regina; Mamčenko, Jelena (Lietuvos matematikos rinkinys. Lietuvos matematikų draugijos XLIV konferencijos mokslo darbai, 2003)
    • Data mining process for fraud detection in mobile communication 

      Mamčenko, Jelena; Kulvietienė, Regina (Lietuvos matematikos rinkinys, 2004)
      Without dependence from a sort of activity (sale, rendering of services, etc.) the using of data mining methods can bring the certain advantage. Fraud detection methods of data mining can be applied to this problem quite ...
    • Data mining technique for collaborative server activity analysis 

      Mamčenko, Jelena; Kulvietienė, Regina (WSEAS Transactions on Information Science and Applications, 2005)
      Most people, companies and organizations put information on the Web because they want it to be seen by the world. Their goal is to have visitors come to the site, feel comfortable and stay awhile. The goal of Vilnius ...