Journal & Issues

Volume 28 (2023): Issue 1 (June 2023)

Volume 27 (2022): Issue 2 (December 2022)

Volume 27 (2022): Issue 1 (June 2022)

Volume 26 (2021): Issue 2 (December 2021)

Volume 26 (2021): Issue 1 (May 2021)

Volume 25 (2020): Issue 2 (December 2020)

Volume 25 (2020): Issue 1 (May 2020)

Volume 24 (2019): Issue 2 (December 2019)

Volume 24 (2019): Issue 1 (May 2019)

Volume 23 (2018): Issue 2 (December 2018)

Volume 23 (2018): Issue 1 (May 2018)

Volume 22 (2017): Issue 1 (December 2017)

Volume 21 (2017): Issue 1 (May 2017)

Volume 20 (2016): Issue 1 (December 2016)

Volume 19 (2016): Issue 1 (May 2016)

Volume 18 (2015): Issue 1 (December 2015)

Volume 17 (2015): Issue 1 (May 2015)

Volume 16 (2014): Issue 1 (December 2014)

Volume 15 (2014): Issue 1 (July 2014)

Volume 14 (2013): Issue 1 (June 2013)

Volume 13 (2012): Issue 1 (November 2012)

Journal Details
Format
Journal
eISSN
2255-8691
First Published
08 Nov 2012
Publication timeframe
2 times per year
Languages
English

Search

Volume 21 (2017): Issue 1 (May 2017)

Journal Details
Format
Journal
eISSN
2255-8691
First Published
08 Nov 2012
Publication timeframe
2 times per year
Languages
English

Search

0 Articles
Open Access

Model-Driven Approach and Library of Reusable Source Code for Automation of IT Operations

Published Online: 13 Jun 2017
Page range: 5 - 12

Abstract

Abstract

Large software development projects with high levels of agility require several IT operations: software configuration management, bug tracking management, making software builds and deployments. Due to high agility in projects, the starting phases are very chaotic and sometimes in a few days customer is willing to get the first release of software. It means that all IT operations should be automated as soon as possible. The study presents a model-driven approach for automation of IT operations through the reuse of the existing source code. In addition, it presents a method for the development of library of reusable source code. The paper contains a brief description of the model-driven approach, library of source code and meta-models developed for a new methodology. The paper ends with the results of the practical experiments and conclusions on how this approach could be improved in the future.

Keywords

  • Automation
  • IT operations
  • meta-models
  • model-driven approach
  • reusable source code
Open Access

A Survey on Challenges of Semantics Application in the Internet of Things Domain

Published Online: 13 Jun 2017
Page range: 13 - 21

Abstract

Abstract

The Internet of Things (IoT), a global Internet-based system of computing devices and machines, is one of the most significant trends in the information technology area. An accepted unified communication approach would be a prerequisite for its mass adoption. Semantic technologies (Semantic Web) have been advocated as enablers of unified communication. However, while there are particular advancements in research on application of Semantic Web in the IoT domain, the dynamic and complex nature of the IoT often requires case specific solutions hard to be applied widely. In the present survey, the semantic technology challenges in the IoT domain are amalgamated to provide background for further studies in the use of semantic technologies in the IoT.

Keywords

  • Internet of Things
  • Semantic Web
  • semantics
Open Access

Comparative Analysis of Business Process Modelling Tools for Compliance Management Support

Published Online: 13 Jun 2017
Page range: 22 - 27

Abstract

Abstract

The paper presents results of the comparative analysis of business process modelling tools for supporting automated compliance management in organisations. By compliance in the paper we mean compliance to legislation, regulations of municipalities, external regulatory requirements and also internal organisational policies. The goal of the research is (1) to identify main attributes of business process modelling tools relevant in compliance management, and (2) to use the identified attributes for analysis of the tools to better understand the scope of their capability to support compliance management. The attributes of the tools have been derived from the related research. The analysis of the tools has been performed by installing each tool and evaluating it against a set of the identified attributes. The obtained results are useful in choosing the tools for compliance management in general and for open source solutions to develop new compliance management tools in particular.

Keywords

  • Business process compliance
  • compliance management
  • compliance management tools
  • open source business process modelling tools
Open Access

The Knowledge Frame System based on Principles of Topological Functioning Model

Published Online: 13 Jun 2017
Page range: 28 - 37

Abstract

Abstract

Understanding of domain phenomena and their interrelations is necessary for successful software development. The knowledge frame system based on principles of Topological Functioning Modelling (TFM) can be used for this purpose at the Computation Independent level within Model Driven Development. Research on knowledge formats showed that inferring in the closed world paradigm and similarity to the object-oriented paradigm made frames an attractive candidate to the knowledge representation format. Frames can hold information necessary for generation of the TFM. The knowledge system based on the principles of the TFM does not allow inferring ambiguous facts and leads to the more complete discovery of knowledge.

Keywords

  • Knowledge base
  • knowledge frame
  • model driven development
  • model transformation
  • topological functioning model
Open Access

Security Evaluation of Wireless Network Access Points

Published Online: 13 Jun 2017
Page range: 38 - 45

Abstract

Abstract

The paper focuses on the real-world usage of IEEE 802.11 wireless network encryption and Wi-Fi Protected Setup (WPS) function. A brief history on the development of encryption methods and WPS is given. Wireless scanning of 802.11 networks in a capital city has been performed, and the results of it have been analysed. To ascertain the knowledge about the security of wireless networks of the average user, an online survey has been conducted. To test the security of encryption methods and WPS function, practical attacks against private test wireless networks have been made. The authors conclude that the safest way to set up 802.11 network with a pre-shared key is to use Wi-Fi Protected Access 2 (WPA2) encryption without support for WPS function. Statistics in Riga shows that networks are often configured otherwise and thus vulnerable to attacks. Survey results prove that respondents are not well informed regarding the security of wireless networks.

Keywords

  • Network security
  • unauthorised access
  • wireless networks
Open Access

Coordinator Role Mobility Method for Increasing the Life Expectancy of Wireless Sensor Networks

Published Online: 13 Jun 2017
Page range: 46 - 51

Abstract

Abstract

The general problem of wireless sensor network nodes is the low-power batteries that significantly limit the life expectancy of a network. Nowadays the technical solutions related to energy resource management are being rapidly developed and integrated into the daily lives of people. The energy resource management systems use sensor networks for receiving and processing information during the realia time. The present paper proposes using a coordinator role mobility method for controlling the routing processes for energy balancing in nodes, which provides dynamic network reconfiguration possibilities. The method is designed to operate fully in the background and can be integrated into any exiting working system.

Keywords

  • Industry 4.0
  • life expectancy
  • sensor network
Open Access

On Necessity of Semantic Analysis when Evaluating Concept Maps

Published Online: 13 Jun 2017
Page range: 52 - 60

Abstract

Abstract

Modern technologies have changed the landscape of teaching and learning in many ways, including introduction of computational support for knowledge assessment. Concept maps (CMs) can be used to externalise student’s internal knowledge structure in a form suitable for computer-aided assessment. Current CM-based knowledge assessment systems do not analyse semantics of CM elements. The paper represents a study designed to find out how big is the portion of a CM that is left unevaluated in default of semantic analysis.

Keywords

  • Automated knowledge assessment
  • concept map
  • linking phrase
  • semantic analysis
Open Access

Analysing the Methods of Dzongkha Word Segmentation

Published Online: 13 Jun 2017
Page range: 61 - 65

Abstract

Abstract

In both Chinese and Dzongkha languages, the greatest challenge is to identify the word boundaries because there are no word delimiters as it is in English and other Western languages. Therefore, preprocessing and word segmentation is the first step in Dzongkha language processing, such as translation, spell-checking, and information retrieval. Research on Chinese word segmentation was conducted long time ago. Therefore, it is relatively mature, but the Dzongkha word segmentation has been less studied by researchers. In the paper, we have investigated this major problem in Dzongkha language processing using a probabilistic approach for selecting valid segments with probability being computed on the basis of the corpus.

Keywords

  • Dzongkha word segmentation
  • maximal matching
  • n-gram
  • natural language processing
Open Access

Speeding-up the Fitting of the Model Defining the Ribs-bounded Contour

Published Online: 13 Jun 2017
Page range: 66 - 70

Abstract

Abstract

The method for analysing transversal plane images from computer tomography scans is considered in the paper. This method allows not only approximating ribs-bounded contour but also evaluating patient rotation around the vertical axis during a scan. In this method, a mathematical model describing the ribs-bounded contour was created and the problem of approximation has been solved by finding the optimal parameters of the mathematical model using least-squares-type objective function. The local search has been per-formed using local descent by quasi-Newton methods. The benefits of analytical derivatives of the function are disclosed in the paper.

Keywords

  • Analytical models
  • computed tomography
  • least squares approximation
  • medical diagnostic imaging
Open Access

Several Ideas on Integration of SCRUM Practices within Microsoft Solutions Framework

Published Online: 13 Jun 2017
Page range: 71 - 79

Abstract

Abstract

In order to develop and deliver a software project successfully, any software development organisation has to follow a well-known and recognised software engineering process for successful delivery and maintenance of the software. However, when the organisation is willing to follow a new software development process, the success rate of adopting a new software engineering process is a question mark. In the paper, we aim at studying and comparing two software engineering processes, which are based on different paradigms or models, and proposing a hybrid methodology, which integrates advantages of both compared methods. They are Microsoft Solutions Framework as a representative for an iterative methodology and SCRUM for agile software development. The comparative analysis will help a software development company to make the transition easier from Microsoft Solutions Framework to SCRUM or vice versa.

Keywords

  • Agile software development
  • iterative software development
  • Microsoft Solutions Framework
  • SCRUM
  • software engineering
Open Access

Various Methods of Knowledge Assessment during the Training of IT Specialists

Published Online: 13 Jun 2017
Page range: 80 - 85

Abstract

Abstract

Nowadays requirements for training of qualified IT specialists constantly increase. These issues as well as possible solutions are discussed by both teachers and students on many seminars, forums and conferences. The paper studies different methods of students′ knowledge control and computer systems that are used at the Faculty of Computer Science and Information Technology of Riga Technical University and demonstrates results of computer based students’ knowledge control use. Since 2005, two experiments have been held at the Department of Software Engineering in order to evaluate the efficiency of e-course application. The aim of the study is to determine how the use of e-courses for the control of knowledge affects the quality of education during the course studies given that students do not perform all the control activities. The results have shown that the highest examination results are achieved by the students who have completed all the control activities. It proves the influence of use of e-courses for knowledge control on quality of education.

Keywords

  • Correlation
  • education
  • knowledge control
  • performance
  • statistical analysis
0 Articles
Open Access

Model-Driven Approach and Library of Reusable Source Code for Automation of IT Operations

Published Online: 13 Jun 2017
Page range: 5 - 12

Abstract

Abstract

Large software development projects with high levels of agility require several IT operations: software configuration management, bug tracking management, making software builds and deployments. Due to high agility in projects, the starting phases are very chaotic and sometimes in a few days customer is willing to get the first release of software. It means that all IT operations should be automated as soon as possible. The study presents a model-driven approach for automation of IT operations through the reuse of the existing source code. In addition, it presents a method for the development of library of reusable source code. The paper contains a brief description of the model-driven approach, library of source code and meta-models developed for a new methodology. The paper ends with the results of the practical experiments and conclusions on how this approach could be improved in the future.

Keywords

  • Automation
  • IT operations
  • meta-models
  • model-driven approach
  • reusable source code
Open Access

A Survey on Challenges of Semantics Application in the Internet of Things Domain

Published Online: 13 Jun 2017
Page range: 13 - 21

Abstract

Abstract

The Internet of Things (IoT), a global Internet-based system of computing devices and machines, is one of the most significant trends in the information technology area. An accepted unified communication approach would be a prerequisite for its mass adoption. Semantic technologies (Semantic Web) have been advocated as enablers of unified communication. However, while there are particular advancements in research on application of Semantic Web in the IoT domain, the dynamic and complex nature of the IoT often requires case specific solutions hard to be applied widely. In the present survey, the semantic technology challenges in the IoT domain are amalgamated to provide background for further studies in the use of semantic technologies in the IoT.

Keywords

  • Internet of Things
  • Semantic Web
  • semantics
Open Access

Comparative Analysis of Business Process Modelling Tools for Compliance Management Support

Published Online: 13 Jun 2017
Page range: 22 - 27

Abstract

Abstract

The paper presents results of the comparative analysis of business process modelling tools for supporting automated compliance management in organisations. By compliance in the paper we mean compliance to legislation, regulations of municipalities, external regulatory requirements and also internal organisational policies. The goal of the research is (1) to identify main attributes of business process modelling tools relevant in compliance management, and (2) to use the identified attributes for analysis of the tools to better understand the scope of their capability to support compliance management. The attributes of the tools have been derived from the related research. The analysis of the tools has been performed by installing each tool and evaluating it against a set of the identified attributes. The obtained results are useful in choosing the tools for compliance management in general and for open source solutions to develop new compliance management tools in particular.

Keywords

  • Business process compliance
  • compliance management
  • compliance management tools
  • open source business process modelling tools
Open Access

The Knowledge Frame System based on Principles of Topological Functioning Model

Published Online: 13 Jun 2017
Page range: 28 - 37

Abstract

Abstract

Understanding of domain phenomena and their interrelations is necessary for successful software development. The knowledge frame system based on principles of Topological Functioning Modelling (TFM) can be used for this purpose at the Computation Independent level within Model Driven Development. Research on knowledge formats showed that inferring in the closed world paradigm and similarity to the object-oriented paradigm made frames an attractive candidate to the knowledge representation format. Frames can hold information necessary for generation of the TFM. The knowledge system based on the principles of the TFM does not allow inferring ambiguous facts and leads to the more complete discovery of knowledge.

Keywords

  • Knowledge base
  • knowledge frame
  • model driven development
  • model transformation
  • topological functioning model
Open Access

Security Evaluation of Wireless Network Access Points

Published Online: 13 Jun 2017
Page range: 38 - 45

Abstract

Abstract

The paper focuses on the real-world usage of IEEE 802.11 wireless network encryption and Wi-Fi Protected Setup (WPS) function. A brief history on the development of encryption methods and WPS is given. Wireless scanning of 802.11 networks in a capital city has been performed, and the results of it have been analysed. To ascertain the knowledge about the security of wireless networks of the average user, an online survey has been conducted. To test the security of encryption methods and WPS function, practical attacks against private test wireless networks have been made. The authors conclude that the safest way to set up 802.11 network with a pre-shared key is to use Wi-Fi Protected Access 2 (WPA2) encryption without support for WPS function. Statistics in Riga shows that networks are often configured otherwise and thus vulnerable to attacks. Survey results prove that respondents are not well informed regarding the security of wireless networks.

Keywords

  • Network security
  • unauthorised access
  • wireless networks
Open Access

Coordinator Role Mobility Method for Increasing the Life Expectancy of Wireless Sensor Networks

Published Online: 13 Jun 2017
Page range: 46 - 51

Abstract

Abstract

The general problem of wireless sensor network nodes is the low-power batteries that significantly limit the life expectancy of a network. Nowadays the technical solutions related to energy resource management are being rapidly developed and integrated into the daily lives of people. The energy resource management systems use sensor networks for receiving and processing information during the realia time. The present paper proposes using a coordinator role mobility method for controlling the routing processes for energy balancing in nodes, which provides dynamic network reconfiguration possibilities. The method is designed to operate fully in the background and can be integrated into any exiting working system.

Keywords

  • Industry 4.0
  • life expectancy
  • sensor network
Open Access

On Necessity of Semantic Analysis when Evaluating Concept Maps

Published Online: 13 Jun 2017
Page range: 52 - 60

Abstract

Abstract

Modern technologies have changed the landscape of teaching and learning in many ways, including introduction of computational support for knowledge assessment. Concept maps (CMs) can be used to externalise student’s internal knowledge structure in a form suitable for computer-aided assessment. Current CM-based knowledge assessment systems do not analyse semantics of CM elements. The paper represents a study designed to find out how big is the portion of a CM that is left unevaluated in default of semantic analysis.

Keywords

  • Automated knowledge assessment
  • concept map
  • linking phrase
  • semantic analysis
Open Access

Analysing the Methods of Dzongkha Word Segmentation

Published Online: 13 Jun 2017
Page range: 61 - 65

Abstract

Abstract

In both Chinese and Dzongkha languages, the greatest challenge is to identify the word boundaries because there are no word delimiters as it is in English and other Western languages. Therefore, preprocessing and word segmentation is the first step in Dzongkha language processing, such as translation, spell-checking, and information retrieval. Research on Chinese word segmentation was conducted long time ago. Therefore, it is relatively mature, but the Dzongkha word segmentation has been less studied by researchers. In the paper, we have investigated this major problem in Dzongkha language processing using a probabilistic approach for selecting valid segments with probability being computed on the basis of the corpus.

Keywords

  • Dzongkha word segmentation
  • maximal matching
  • n-gram
  • natural language processing
Open Access

Speeding-up the Fitting of the Model Defining the Ribs-bounded Contour

Published Online: 13 Jun 2017
Page range: 66 - 70

Abstract

Abstract

The method for analysing transversal plane images from computer tomography scans is considered in the paper. This method allows not only approximating ribs-bounded contour but also evaluating patient rotation around the vertical axis during a scan. In this method, a mathematical model describing the ribs-bounded contour was created and the problem of approximation has been solved by finding the optimal parameters of the mathematical model using least-squares-type objective function. The local search has been per-formed using local descent by quasi-Newton methods. The benefits of analytical derivatives of the function are disclosed in the paper.

Keywords

  • Analytical models
  • computed tomography
  • least squares approximation
  • medical diagnostic imaging
Open Access

Several Ideas on Integration of SCRUM Practices within Microsoft Solutions Framework

Published Online: 13 Jun 2017
Page range: 71 - 79

Abstract

Abstract

In order to develop and deliver a software project successfully, any software development organisation has to follow a well-known and recognised software engineering process for successful delivery and maintenance of the software. However, when the organisation is willing to follow a new software development process, the success rate of adopting a new software engineering process is a question mark. In the paper, we aim at studying and comparing two software engineering processes, which are based on different paradigms or models, and proposing a hybrid methodology, which integrates advantages of both compared methods. They are Microsoft Solutions Framework as a representative for an iterative methodology and SCRUM for agile software development. The comparative analysis will help a software development company to make the transition easier from Microsoft Solutions Framework to SCRUM or vice versa.

Keywords

  • Agile software development
  • iterative software development
  • Microsoft Solutions Framework
  • SCRUM
  • software engineering
Open Access

Various Methods of Knowledge Assessment during the Training of IT Specialists

Published Online: 13 Jun 2017
Page range: 80 - 85

Abstract

Abstract

Nowadays requirements for training of qualified IT specialists constantly increase. These issues as well as possible solutions are discussed by both teachers and students on many seminars, forums and conferences. The paper studies different methods of students′ knowledge control and computer systems that are used at the Faculty of Computer Science and Information Technology of Riga Technical University and demonstrates results of computer based students’ knowledge control use. Since 2005, two experiments have been held at the Department of Software Engineering in order to evaluate the efficiency of e-course application. The aim of the study is to determine how the use of e-courses for the control of knowledge affects the quality of education during the course studies given that students do not perform all the control activities. The results have shown that the highest examination results are achieved by the students who have completed all the control activities. It proves the influence of use of e-courses for knowledge control on quality of education.

Keywords

  • Correlation
  • education
  • knowledge control
  • performance
  • statistical analysis