default search action
Baltic Journal of Modern Computing, Volume 8
Volume 8, Number 1, 2020
- Darja Solodovnikova, Laila Niedrite:
Handling Evolution in Big Data Architectures. - R. Hildenbrandt:
The k-Server Problem with Parallel Requests and the Compound Work Function Algorithm. - Erika Nazaruka:
Processing Use Case Scenarios and Text in a Formal Style as Inputs for TFM-based Transformations. - Egle Zilinskaite-Sinkuniene, Jurgis Skilters, Liga Zarina:
Expressing Distance in the Baltic Languages: Remarks on the Use of an Extended RCC. - Atis Kapenieks, Iveta Daugule, Kristaps Kapenieks, Viktors Zagorskis, Janis Kapenieks Jr., Zanis Timsans, Ieva Vitolina:
TELECI Approach for e-Learning User Behavior Data Visualization and Learning Support Algorithm. - Jurgis Skilters, Liga Zarina, Egle Zilinskaite-Sinkuniene, Nora Berzina, Linda Apse:
Topologic and Geometric Structure of Spatial Relations in Latvian: an Experimental Analysis of RCC. - Karlis Krumins, Sarma Cakula:
Input Determination for Models Used in Predicting Student Performance. - Madara Pratt, Sarma Cakula:
The Impact of Using Technology-Based Communication on Quality of Work Relationships. - Oskars Java:
The Specification of Hydrological Model Requirements for Bog Restoration. - Arnis Cirulis, Kristaps Brigis Brigmanis, Gatis Zvejnieks:
Analysis of Suitable Natural Feature Computer Vision Algorithms for Augmented Reality Services. - Normunds Mihailovs, Sarma Cakula:
Dynamic System Sustainability Simulation Modelling. - Mohcine Boudhane, Ojars Balcers:
Underwater Optical Observation, How to Improve Visibility.
Volume 8, Number 2, 2020
- Sumeyye Cepni, Muhammed Enes Atik, Zaide Duran:
Vehicle Detection Using Different Deep Learning Algorithms from Image Sequence. - Abasi-Amefon Obot Affia, Raimundas Matulevicius, Alexander Nolte:
Security Risk Management in E-commerce Systems: A Threat-driven Approach. - Peteris Daugulis:
Proof as a Mathematical Object - Proposals for a Research Program. - Vija Vagale, Laila Niedrite, Svetlana Ignatjeva:
Implementation of Personalized Adaptive E-learning System. - Berk Tarihmen, Benay Diyarbakirli, Mustafa Onur Kanbur, Hande Demirel:
Indoor Navigation System of Faculty of Civil Engineering, ITU: A BIM Approach. - Sarunas Grigaliunas, Jevgenijus Toldinas:
Habits Attribution and Digital Evidence Object Models Based Tool for Cybercrime Investigation. - Irsad Bayirhan, Cem Gazioglu:
Use of Unmanned Aerial Vehicles (UAV) and Marine Environment Simulator in Oil Pollution Investigations. - Tarvo Mill:
Estimation of Accuracy and Reliability of Terrestrial Laser Scanner in the Detection of Object Shape. - Boris Pozin, Igor V. Galakhov:
Experience in Automated Functional and Load Testing in the Life Cycle of the Mission-critical System. - Tolga Bakirman, Mustafa Umit Gumusay:
Assessment of Machine Learning Methods for Seagrass Classification in the Mediterranean. - Sohaib K. M. Abujayyab, Ismail Rakip Karas:
Employing Neural Networks Algorithm for LULC Mapping. - Juris Rats, Inguna Pede:
Document Capturing Automation: Case Study.
Volume 8, Number 3, September 2020
- Bikram Awale, Pietro Murano:
A Preliminary Usability and Universal Design Evaluation of a Television App User Interface. - Oskars Java, Marko Kohv, Asko Löhmus:
Hydrological Model for Decision-Making: Männikjärve Bog Case Study, Estonia. - Julija Ovcinnikova:
Ontology Export Patterns in OWLGrEd Editor. - Tomas Rasymas, Laurynas Dovydaitis:
Detection of Phishing URLs by Using Deep Learning Approach and Multiple Features Combinations. - Aleksejs Zacepins, Armands Kviesis, Vitalijs Komasilovs, Fakhri Rido Muhammad:
Monitoring System for Remote Bee Colony State Detection. - Anastasija Nikiforova:
Definition and Evaluation of Data Quality: User-Oriented Data Object-Driven Approach to Data Quality Assessment.
Volume 8, Number 4, 2020
- Margarita Spichakova, Hele-Mai Haav:
Application of Machine Learning for Assessment of HS Code Correctness. - Kristine Mackare, Anita Jansone, Raivo Mackars:
E-material Formatting Application Prototype 2.0. - Mubashar Iqbal, Raimundas Matulevicius:
Corda Security Ontology: Example of Post-Trade Matching and Confirmation. - Radka Nacheva, Anita Jansone:
Usability Evaluation of Business Process Modelling Tools through Software Quality Metrics. - Majid Askar, Alsayed Algergawy, Taysir Hassan A. Soliman, Birgitta König-Ries, Adel A. Sewisy:
Ontology Based Natural Language Queries Transformation into SPARQL Queries. - Andrejs Cibulis, Walter Trump:
Domino Exclusion Problem. - Tarmo Robal, Uljana Reinsalu, Mairo Leier:
Towards Personalized Elevator Travel with Smart Elevator System. - Solvita Zarina:
Co-Production from the Viewpoint of Design and Computing Education Development. - Jurgita Lieponiene:
Recent Trends in Database Technology. - Sandra Virbukaite, Jolita Bernataviciene:
Deep Learning Methods for Glaucoma Identification Using Digital Fundus Images. - Daiga Cepite-Frisfelde, Aigars Valainis, Juris Sennikovs, Vilnis Frisfelds:
Modelling the Potential Accumulation Zones of Surface Current and Wind Driven Particles in the Shoreline of Baltic Sea in Latvia. - Jolanta Miliauskaite, Diana Kalibatiene:
Complexity in Data-Driven Fuzzy Inference Systems: Survey, Classification and Perspective. - Vija Vagale, Laila Niedrite, Svetlana Ignatjeva:
Application of the Reccommended Learning Path in the Personalized Adaptive E-learning System. - Edgars Celms, Janis Barzdins, Audris Kalnins, Paulis F. Barzdins, Arturs Sprogis, Mikus Grasmanis, Sergejs Rikacovs:
DSL Approach to Deep Learning Lifecycle Data Management.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.