?
21st IEEE Conference on Business Informatics (CBI)
IEEE Computer Society, 2019.
Academic editor: J. Becker, D. Novikov
Golubtsov P., , in : 21st IEEE Conference on Business Informatics (CBI). : IEEE Computer Society, 2019. P. 212-220.
In large-scale research, data are usually collected on many sites, have a huge volume, and new data are constantly generated. Since it is often impossible to collect all the relevant data on a single computer, much attention is paid to the algorithms that provide sequential or parallel accumulation of information and do not need to ...
Added: July 31, 2019
Kirill Artamonov, Irina Lomazova, , in : 21st IEEE Conference on Business Informatics (CBI). : IEEE Computer Society, 2019. P. 551-558.
Checking conformance between a process model and an event log, which records information about a current process behavior, is a widely used technique for business process audit. It allows discovering changes in the behavior represented by the model. There are several methods to perform conformance checking: most of them are based on 'token replay' and ...
Added: August 28, 2019
Karminsky A. M., Dyachkova N., , in : 21st IEEE Conference on Business Informatics (CBI). : IEEE Computer Society, 2019. P. 320-329.
In our research, we study what macroeconomic factors drive and influence the credit cycle. Also, our study contains four sections with theoretical and empirical parts, in which we describe how to measure credit cycles for developed and developing countries, and then we introduce an important indicator credit gap. Our results show the comparative analysis of ...
Added: January 2, 2020
Language:
English
Keywords: Business informatics
Gromoff A., Информационные технологии в проектировании и производстве 2012 № 2 С. 13-19
The article is dedicated to quantitative assessment of operational risk in statistical incorrect environment specified by insufficiency of data: IT-system failure/breakdown and time to recovery. System capabilities provided by manufacturer as well as Company's business continuity reliability specifications were used as the input data for the model. The authors used their own experience of operational ...
Added: September 8, 2012
Omelchenko E. L., Социологический ежегодник 2011 № 2011 С. 243-263
The paper presents an analysis of the key events associated with changes in youth culture and civic activities in modern Russia, occurring during the first decade of the 21 st century. Discursive representations of youth typical for this period (government programs directed toward the youth theme, media projects, activist initiatives), as well as policy responses ...
Added: September 24, 2012
МИЭМ НИУ ВШЭ, 2018
В материалах конференции студентов, аспирантов и молодых специалистов представлены тезисы докладов по следующим направлениям: математика и компьютерное моделирование; информационно-коммуникационные технологии; автоматизация проектирования, банки данных и знаний, интеллектуальные системы; компьютерные образовательные продукты; информационная безопасность; электроника и приборостроение; производственные технологии, нанотехнологии и новые материалы; инновационные технологии цифровой экономики; инновационные технологии в дизайне. Материалы конференции могут быть полезны ...
Added: May 14, 2018
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2019 № 3 С. 35-40
Control sum mechanism efficiency research aimed at distortion revealing in a message being transmitted is a relevant task that is solved using different possible information transfer operation condition models.
In the paper distortions are modelled as an overlay of noise component with low signal/noise ratio , which poses most practical interest. Considered class of control sums ...
Added: December 29, 2019
Koldanov A. P., Kalyagin V. A., Pardalos P. M., Lecture Notes in Computer Science 2015 Vol. 9432 P. 26-36
Stock selection by Sharp ratio is considered in the framework of multiple statistical hypotheses testing theory. The main attention is paid to comparison of Holm stepdown and Hochberg step up procedures for different loss functions. Comparison is made on the basis of condittional risk as a function of selection threshold. This approach allows to discover ...
Added: December 13, 2015
Babkin E., Babkina T. S., Ulitin B., Бизнес-информатика 2018 № 2 (44) С. 17-29
Joint analysis of the general structure of online Internet discussions and different attributes of particular text comments becomes an important scientific task in theoretical and applied aspects. Although methods of machine learning facilitate stochastic analysis of text messages, appropriate modeling of dynamics of online discussion and psycho-linguistic characteristics of comments in the presence of multiple ...
Added: September 30, 2018
Yasnitsky L., Пермь : Пермский государственный национальный исследовательский университет. – Электронные данные. , 2020
The collection contains materials from the international conference "Intelligent systems in science and technology" and the Sixth all-Russian scientific and practical conference "Artificial intelligence in solving urgent social and economic problems of the XXI century", which was held on October 12-18, 2020 in Perm as part of the Perm natural science forum "Mathematics and global ...
Added: December 4, 2020
NY : IEEE Computer Society, 2018
WF-IoT 2018, the 4th IEEE World Forum on Internet of Things, is the premier IEEE Forum for the Internet of Things. It is where conference attendees, from around the globe - including research institutes, academia, industry and the public sector -- share their knowledge, expertise and experiences about IoT technologies, applications, economic impacts, and social ...
Added: February 14, 2018
Levin V., Козлов Д. Н., Банковское кредитование 2013 Т. 48 № 2 С. 15-25
Система предотвращения мошенничества (внутреннего и внешнего) мошенничества при потребительском кредитовании нацелена на выявление искажений персональных данных самими клиентами и/или с участием лиц вне банка (организованных преступных группировок, "черных(серых)" брокеров), а также для выявления фактов внутреннего мошенничества с участием сотрудников банка. Упор делается на индикаторы мошенничества, построенные на основе алгоритма нечетких совпадений. В системе предусмотрены возможности ...
Added: November 24, 2013
Kazan : -, 2013
The issue contains the papers presented at the 7th Spring/Summer Young Researchers' Соllоquium оn Software Engineering (SYRCoSE 2013) held in Kazan, Russia on 30th and З1st оf Мay, 2013. Paper selection was based on a competitive peer review process being done by the program committee. Both regular and reseаrсh-in-рrogrеss papers were соnsidered ассeрtable for the ...
Added: June 8, 2013
IEEE Computer Society, 2020
ICTAI 2020: The annual IEEE International Conference on Tools with Artificial Intelligence (ICTAI) provides a major international forum where the creation and exchange of ideas related to artificial intelligence are fostered among academia, industry, and government agencies.
The conference facilitates the cross-fertilization of these ideas and promotes their transfer into practical tools, for developing intelligent systems ...
Added: January 30, 2021
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2018 № 4 С. 62-67
The paper examines probability-theoretic models of information distortion at message level. We research control sum distribution segments that are typical for network protocols like TCP.
As an addition operation we use both bitwise coordinate addition and addition of numbers in binary code with carry. Control sum error probability for asymptotic assessments provided distortion probability is low ...
Added: July 31, 2019
Липецк : ООО "Максимал информационные технологии", 2014
В сборнике публикуются статьи проблемного и научно-практического характера, представляющие собой результаты завершенных исследований, обладающие новизной и представляющие интерес для широкого круга читателей.
Печатается по решению редакционно-издательского совета Международного научного партнерства "Национальный фонд инноваций" ...
Added: March 26, 2014
Fuad Aleskerov, Evgeny Mitichkin, Sergey Shvydun et al., Procedia Computer Science 2013 No. 17 P. 1121-1124
The paper examines a choice problem in case of large number of alternatives characterized by a set of criteria. Very often existing choice procedures cannot be used due to their computational complexity. In contrast, the approach proposed in this paper utilizes a set of easy to use techniques having complexity less than the quadratic. We ...
Added: June 7, 2013
Kotelnikova M. V., Aistov A., Вестник Нижегородского университета им. Н.И. Лобачевского. Серия: Социальные науки 2019 Т. 55 № 3 С. 183-189
The article describes a method that allows to improve the content of disciplines of the mathematical cycle by dividing them into invariant (general) and variable parts. The invariants were identified for such disciplines as «Linear algebra», «Mathematical analysis», «Probability theory and mathematical statistics» delivered to Bachelors program students of economics at several universities. Based on ...
Added: January 28, 2020
Babash A. V., М. : ИНФРА-М, РИОР, 2013
Пособие предназначено для студентов высших учебных заведений, обучающихся по специальности «Прикладная информатика (в экономике)». Оно также содержит методический материал для ряда инновационных курсов лекций по профилю «Информационная безопасность» и может быть использовано и для блока дисциплин этого профиля. Ряд представленных результатов полезен специалистам и аспирантам, специализирующихся в указанной области. ...
Added: January 14, 2014
Красноярск : ИВМ СО РАН, 2013
Труды Пятой Международной конференции «Системный анализ и информационные технологии» САИТ-2013 (19–25 сентября 2013 г., г.Красноярск, Россия): ...
Added: November 18, 2013
Fuad Aleskerov, Demin S., Shvydun S., SN Computer Science 2020 Vol. 1 No. 2 Article 68
The paper examines the choice problem when the total number of observations and criteria is too large. There are many different procedures, which are used for decision-making process under multiple criteria; however, most of them cannot be applied to large datasets due to their computational complexity while others provide sufficient accuracy. To solve the problem, ...
Added: February 20, 2020
Aleskerov F. T., Gavrilenkova I., Shvydun S. et al., Group Decision and Negotiation 2020 Vol. 29 No. 3 P. 399-424
Since 9/11, terrorism has become a global issue of the twenty-first century. Terrorist organizations become important actors of world politics as they gain influence on political process and decision-making. Some organizations compete with each other in order to gain more power and influence. We study the distribution of power among terrorist groups using network approach ...
Added: April 19, 2020
Пенза : ПГУ, 2015
В сборник трудов включены доклады юбилейного ХХ-го Международного симпозиума «Надежность и качество», проходившего с 25 по 31 мая 2015 г. в городе Пензе.
Рассмотрены актуальные проблемы теории и практики повышения надежности и качества; эффективности внедрения инновационных и информационных технологий в фундаментальных научных и прикладных исследованиях, образовательных и коммуникативных системах и средах, экономике и юриспруденции; методов и ...
Added: May 31, 2015
Akopov A. S., Beklaryan L. A., Saghatelyan A. K., Environmental Modelling and Software 2019 Vol. 116 P. 7-25
Urban greenery such as trees can effectively reduce air pollution in a natural and eco-friendly way. However, how to spatially locate and arrange greenery in an optimal way remains as a challenging task. We developed an agent-based model of air pollution dynamics to support the optimal allocation and configuration of tree clusters in a city. The Pareto ...
Added: February 24, 2019
Akopov A. S., Beklaryan L., Automation and Remote Control 2015 Vol. 76 No. 10 P. 1817-1827
An agent model of crowd (ensemble) behavior in emergencies was presented. This model is distinguished for the allowance for dynamics of each agent from the ensemble under consideration. The crowd effect manifests itself mostly as attraction or repulsion of closely set agents with a probability depending on the agent’s psychological type. Consideration was given to ...
Added: October 24, 2015
M. : HSE, 2014
The materials of The Third International Scientific-Practical Conference is presented below. The Conference reflects the modern state of innovation in education, science, industry and social-economic sphere, from the standpoint of introducing new information technologies.
Digest of Conference materials is presented in 3 parts. It is interesting for a wide range of researchers, teachers, graduate students and ...
Added: April 18, 2014
IEEE, 2021
The conference “2021 Systems of signals generating and processing in the field of on board
communications” is organized with technical sponsorship of Russian (Moscow) IEEE Circuits
and Systems (CAS04) Chapter IEEE Region 8, Russian Section Chapter, MTT/ED and Institute of
Radio and Information Systems Association (IRIS), Vienna, Austria.
The conference featured invited researchers, educators, managers, and graduate students, whose
research ...
Added: May 19, 2021