Kaunas University of Technology

Displaying 1-15 of 15 results

  • White Papers // Nov 2012

    Extending BPMN Business Process Model with SBVR Business Vocabulary and Rules

    Despite the fact that Business Process (BP) modeling has its long-lasting traditions in various areas of application, this discipline remains in the constant process of improvement and issue-solving. The possibilities of synergy among Business Process Models and business vocabularies and rules are analyzed in this paper. The authors emphasize the...

    Provided By Kaunas University of Technology

  • White Papers // Oct 2012

    The Enrichment of BPMN Business Process Model with SBVR Business Vocabulary and Rules

    Aspects of business process models' integration with structured business vocabularies & rules are analyzed in this paper. Despite the fact that Business Process (BP) modeling has its long-lasting tradition in various areas of application, this discipline remains in the constant process of improvement and issue-solving. The paper deals with one...

    Provided By Kaunas University of Technology

  • White Papers // Aug 2012

    Investigation of Wi-Fi Indoor Signals Under LOS and NLOS Conditions

    In this paper the propagation of radio waves at 2.4 GHz in NLOS conditions has been studied. The study was carried out using two transmitters operating on different standards: 802.11g (D-Link) and 802.11n (TrendNet). The experiments were carried out under different scenarios in order to investigate the effect of the...

    Provided By Kaunas University of Technology

  • White Papers // Apr 2012

    A More Secure and Efficient Authentication Scheme with Roaming Service and User Anonymity for Mobile Communications

    In terms of convenience requirements, mobile communications have become one of the most important roaming services for wireless environments. Especially, how to prevent unauthorized users from illegitimate accesses in mobile communication systems has become an important issue. Password authentication with smart card is one of the mechanisms that were widely...

    Provided By Kaunas University of Technology

  • White Papers // Feb 2012

    Cloud - Computing Based Accounting for Small to Medium Sized Business

    Small to medium sized business enterprises are young and constantly changing their sphere of activities depending on fluctuations of the market. The enterprises daily use accounting information, which is used in enterprise's financial situation evaluation, correct decisions making, enterprise's financial situation analysis according to the results received, making plans for...

    Provided By Kaunas University of Technology

  • White Papers // May 2011

    Multilingual Lexicon Design Tool and Database Management System for MT

    The paper presents the design and development of English-Lithuanian-English dictionarylexicon tool and lexicon database management system for MT. The system is oriented to support two main requirements: to be open to the user and to describe much more attributes of speech parts as a regular dictionary that are required for...

    Provided By Kaunas University of Technology

  • White Papers // Aug 2010

    On the Application of Meta-Design Techniques in Hardware Design Domain

    System-level design based on high-level abstractions is becoming increasingly important in hardware and embedded system design. This paper analyzes meta-design techniques oriented at developing meta-programs and meta-models for well-understood domains. Meta-design techniques include meta-programming and meta-modeling. At the programming level of design process, meta-design means developing generic components that are...

    Provided By Kaunas University of Technology

  • White Papers // Oct 2009

    Measuring Organizational Openness to Strategic Business Networking

    Postmodern entrepreneurial organizations are ever more engaged in strategic business networking. It is argued in the paper that openness to strategic networking should be considered a core feature of emerging entrepreneurial companies of the authors' days. The theoretical basis and conceptual framework for the evaluation of an organization's openness to...

    Provided By Kaunas University of Technology

  • White Papers // Sep 2009

    An Image Encryption Using Pseudo Random Bit Generator Based on a Non-Linear Dynamic Chaotic System

    New rapid developments in the telecommunication technologies present new challenges for protecting the information from unauthorized access. It has intensified the research activities in the field of cryptography to fulfill the strong demand of the new secure cryptographic techniques. This paper deals with the image encryption scheme based on non-linear...

    Provided By Kaunas University of Technology

  • White Papers // Jun 2009

    Application-Level Energy Consumption in Communication Models for Handhelds

    The need for energy management grows along with the increasing computing and storage capacities of mobile computers such as handhelds, while the energy capacity of batteries lags behind. Since faster Central Processing Units and larger memories tend to require more power to operate, techniques to reduce and manage energy consumption...

    Provided By Kaunas University of Technology

  • White Papers // Jun 2009

    The Issues of Effectiveness of Advertisement Communication Process: A Case Study of Lithuania Consumers

    The goal of this paper was to disclose the core of the advertising research based on the psychological aspects by acquainting with the nature of advertising research and revealing the importance of psychological aspects of advertising during the advertising research. The growing interest in consumer response to advertisement served as...

    Provided By Kaunas University of Technology

  • White Papers // Feb 2009

    Methodology of Adaptation of Data Mining Methods for Medical Decision Support: Case Study

    Data mining is a problem solving technique, which analyzes the data already stored in the data base. It is a process of discovering, classifying and finding patterns in data. The classification of data helps to make a decision in different types of problems. Machine Learning, Statistical and Neural Network algorithms...

    Provided By Kaunas University of Technology

  • White Papers // Feb 2008

    Business Rules Specification Using Natural Language-Based Templates: Approach and Implementation

    One of the major problems in the area of Information Systems Development (ISD) today is the communication gap between the business users (i.e. business domain experts) and systems developers. The paper presents an approach of business rules specification using natural language-based templates in the processes of business modeling and user...

    Provided By Kaunas University of Technology

  • White Papers // Sep 2007

    Business Rules Manipulation Model

    Business rules are precise statements that describe, constrain and control the structure, operations and the strategy of a business. They can be found everywhere in a raw, unstructured form. Business rules approach is quite new and oriented at software systems in which the rules are separated, logically and physically, from...

    Provided By Kaunas University of Technology

  • White Papers // Dec 2006

    Repository for Business Rules Based IS Requirements

    The quality of software engineering projects often suffers due to the large gap between the way stakeholders present their requirements and the way analysts capture and express those requirements. With this problem in mind the new method for business rules driven IS requirements specification has been developed. In this paper...

    Provided By Kaunas University of Technology

  • White Papers // Sep 2009

    An Image Encryption Using Pseudo Random Bit Generator Based on a Non-Linear Dynamic Chaotic System

    New rapid developments in the telecommunication technologies present new challenges for protecting the information from unauthorized access. It has intensified the research activities in the field of cryptography to fulfill the strong demand of the new secure cryptographic techniques. This paper deals with the image encryption scheme based on non-linear...

    Provided By Kaunas University of Technology

  • White Papers // Feb 2012

    Cloud - Computing Based Accounting for Small to Medium Sized Business

    Small to medium sized business enterprises are young and constantly changing their sphere of activities depending on fluctuations of the market. The enterprises daily use accounting information, which is used in enterprise's financial situation evaluation, correct decisions making, enterprise's financial situation analysis according to the results received, making plans for...

    Provided By Kaunas University of Technology

  • White Papers // Feb 2009

    Methodology of Adaptation of Data Mining Methods for Medical Decision Support: Case Study

    Data mining is a problem solving technique, which analyzes the data already stored in the data base. It is a process of discovering, classifying and finding patterns in data. The classification of data helps to make a decision in different types of problems. Machine Learning, Statistical and Neural Network algorithms...

    Provided By Kaunas University of Technology

  • White Papers // Jun 2009

    Application-Level Energy Consumption in Communication Models for Handhelds

    The need for energy management grows along with the increasing computing and storage capacities of mobile computers such as handhelds, while the energy capacity of batteries lags behind. Since faster Central Processing Units and larger memories tend to require more power to operate, techniques to reduce and manage energy consumption...

    Provided By Kaunas University of Technology

  • White Papers // Jun 2009

    The Issues of Effectiveness of Advertisement Communication Process: A Case Study of Lithuania Consumers

    The goal of this paper was to disclose the core of the advertising research based on the psychological aspects by acquainting with the nature of advertising research and revealing the importance of psychological aspects of advertising during the advertising research. The growing interest in consumer response to advertisement served as...

    Provided By Kaunas University of Technology

  • White Papers // Aug 2010

    On the Application of Meta-Design Techniques in Hardware Design Domain

    System-level design based on high-level abstractions is becoming increasingly important in hardware and embedded system design. This paper analyzes meta-design techniques oriented at developing meta-programs and meta-models for well-understood domains. Meta-design techniques include meta-programming and meta-modeling. At the programming level of design process, meta-design means developing generic components that are...

    Provided By Kaunas University of Technology

  • White Papers // Aug 2012

    Investigation of Wi-Fi Indoor Signals Under LOS and NLOS Conditions

    In this paper the propagation of radio waves at 2.4 GHz in NLOS conditions has been studied. The study was carried out using two transmitters operating on different standards: 802.11g (D-Link) and 802.11n (TrendNet). The experiments were carried out under different scenarios in order to investigate the effect of the...

    Provided By Kaunas University of Technology

  • White Papers // May 2011

    Multilingual Lexicon Design Tool and Database Management System for MT

    The paper presents the design and development of English-Lithuanian-English dictionarylexicon tool and lexicon database management system for MT. The system is oriented to support two main requirements: to be open to the user and to describe much more attributes of speech parts as a regular dictionary that are required for...

    Provided By Kaunas University of Technology

  • White Papers // Apr 2012

    A More Secure and Efficient Authentication Scheme with Roaming Service and User Anonymity for Mobile Communications

    In terms of convenience requirements, mobile communications have become one of the most important roaming services for wireless environments. Especially, how to prevent unauthorized users from illegitimate accesses in mobile communication systems has become an important issue. Password authentication with smart card is one of the mechanisms that were widely...

    Provided By Kaunas University of Technology

  • White Papers // Oct 2009

    Measuring Organizational Openness to Strategic Business Networking

    Postmodern entrepreneurial organizations are ever more engaged in strategic business networking. It is argued in the paper that openness to strategic networking should be considered a core feature of emerging entrepreneurial companies of the authors' days. The theoretical basis and conceptual framework for the evaluation of an organization's openness to...

    Provided By Kaunas University of Technology

  • White Papers // Nov 2012

    Extending BPMN Business Process Model with SBVR Business Vocabulary and Rules

    Despite the fact that Business Process (BP) modeling has its long-lasting traditions in various areas of application, this discipline remains in the constant process of improvement and issue-solving. The possibilities of synergy among Business Process Models and business vocabularies and rules are analyzed in this paper. The authors emphasize the...

    Provided By Kaunas University of Technology

  • White Papers // Feb 2008

    Business Rules Specification Using Natural Language-Based Templates: Approach and Implementation

    One of the major problems in the area of Information Systems Development (ISD) today is the communication gap between the business users (i.e. business domain experts) and systems developers. The paper presents an approach of business rules specification using natural language-based templates in the processes of business modeling and user...

    Provided By Kaunas University of Technology

  • White Papers // Dec 2006

    Repository for Business Rules Based IS Requirements

    The quality of software engineering projects often suffers due to the large gap between the way stakeholders present their requirements and the way analysts capture and express those requirements. With this problem in mind the new method for business rules driven IS requirements specification has been developed. In this paper...

    Provided By Kaunas University of Technology

  • White Papers // Sep 2007

    Business Rules Manipulation Model

    Business rules are precise statements that describe, constrain and control the structure, operations and the strategy of a business. They can be found everywhere in a raw, unstructured form. Business rules approach is quite new and oriented at software systems in which the rules are separated, logically and physically, from...

    Provided By Kaunas University of Technology

  • White Papers // Oct 2012

    The Enrichment of BPMN Business Process Model with SBVR Business Vocabulary and Rules

    Aspects of business process models' integration with structured business vocabularies & rules are analyzed in this paper. Despite the fact that Business Process (BP) modeling has its long-lasting tradition in various areas of application, this discipline remains in the constant process of improvement and issue-solving. The paper deals with one...

    Provided By Kaunas University of Technology