Abstract is missing.
- Markov chains as a simulation technique for epidemic growthKarolina Kesik. 1-4 [doi]
- Impact of manipulation on initial population in heuristicsAlicja Winnicka. 5-8 [doi]
- Mathematical model library for recombinant e.coli cultivation processMantas Butkus, Vytautas Galvanauskas. 9-12 [doi]
- Lattice based merkleMaksim Iavich, Avtandil Gagnidze, Giorgi Iashvili, Sergiy Gnatyuk, Vira Vialkova. 13-16 [doi]
- Context based number normalization using skip-chain conditional random fieldsLinas Balciunas. 17-21 [doi]
- Improvement and digitalization of business processes in small-medium enterprisesMatas Dumcius, Tomas Skersys. 22-27 [doi]
- Validation of VARK questionnaire using gaze tracking dataSimonas Baltulionis, Vilius Turenko, Mindaugas Vasiljevas, Robertas Damasevicius, Tatjana Sidekerskiene. 28-32 [doi]
- Analysing program source code reading skills with eye tracking technologyVilius Turenko, Simonas Baltulionis, Mindaugas Vasiljevas, Robertas Damasevicius. 33-37 [doi]
- CWW enhanced fuzzy SWOT evaluation for risk analysis and decision making under uncertaintyZygimantas Meskauskas. 38-42 [doi]
- Modelling principles for blockchain-based implementation of business or scientific processesMantas Jurgelaitis, Vaidotas Drungilas, Lina Ceponiene, Rita Butkiene, Evaldas Vaiciukynas. 43-47 [doi]
- Generation of high order primitive matrix elements for post-quantum key exchange protocolRichard Megrelishvili, Melkisadeg Jinjikhadze, Avtandil Gagnidze, Maksim Iavich, Giorgi Iashvili. 48-51 [doi]
- Public-Key hybrid cryptosystem based on Blowfish and RSAElza Jintcharadze, Maksim Iavich. 52-55 [doi]
- Evaluation of the impact on energy consumption of MQTT protocol over TLSEdgaras Baranauskas, Jevgenijus Toldinas, Borisas Lozinskis. 56-60 [doi]
- Comparative analysis of enterprise architecture frameworksJovita Bankauskaite. 61-64 [doi]
- Comparison of devops maturity modelsMonika Gasparaite, Saulius Ragaisis. 65-69 [doi]
- Cryptocurrencies short-term forecast: application of ARIMA, GARCH and SVR modelsDovile Kuiziniene, Ausra Varoneckiene, Tomas Krilavicius. 70-73 [doi]
- Content analysis methods for estimating the dynamics of Facebook groupsRasa Kasperiene, Tomas Krilavicius. 74-79 [doi]
- Detection of different types of vehicles from aerial imageryJonas Uus, Tomas Krilavicius. 80-85 [doi]
- Towards adoption of technology-enhanced learning: understanding its benefits and limitationsVilma Sukacke. 86-90 [doi]
- Numerical analysis of SLSSIM similarity on medical X-ray image domainJonas Brusokas, Linas Petkevicius. 91-97 [doi]
- Aligning agile software development with enterprise architecture frameworkKarolis Noreika, Saulius Gudas. 98-103 [doi]
- Lithuanian news clustering using document embeddingsLukas Stankevicius, Mantas Lukosevicius. 104-109 [doi]
- Automatic detection of contraindications of medicines in package leafletJonas Zalinkevicius, Rita Butkiene. 110-114 [doi]
- Fast language-independent correction of interconnected typos to finding longest termsBehzad Soleimani Neysiani, Seyed Morteza Babamir. 115-120 [doi]
- Accuracy of throwing distance perception in virtual realityKarolis Butkus, Tautvydas Ceponis. 121-124 [doi]
- Media analysis that reflects the spread of anti-Christian opinionMonika Briediene, Valdas Kilpys, Tomas Krilavicius. 125-129 [doi]
- Composition of the information security methods for a smart environment and the researchNerijus Satkauskas. 125-129 [doi]