Journal:Informatica
Volume 12, Issue 4 (2001), pp. 559–572
Abstract
Objective of this work is to explain the modelling concept of analytical function in the financial knowledge discovery model. This new simulation model of analytical function is developed for a financial knowledge discovery process that is used for the Corporate Criminal Intelligence Analysis (CCIA, in short). Model was developed for the CCIA work of the whole analytical part of the Financial police of the Republic of Croatia. The benefit of this new simulation model of analytical function is in simple method (based mainly on statistical simulations) of measuring analytical capacity and capability of analysis, which is now in usage in the financial field and field of law. The analytical function of the CCIA was prepared for investigations of financial criminal incidents, financial criminal offenders or victims and for financial crime control methods, etc. An application of this simulation model increases the group effectiveness, efficiency, and quality of the operational and strategic financial investigative operations that are in usage during the whole financial knowledge discovery process.
Journal:Informatica
Volume 12, Issue 4 (2001), pp. 547–558
Abstract
Three kinds of the insurance policies for the net premium calculation for married couples are considered. The net premium equation principle is used in all premium calculations. The particular quality of the additional pension assurance is the individual form of its undertaking and the limitation of annual (monthly) pension payments. Due to this fact the biggest interest to the individual insurance show people after age 40–45 years, when the insurance premium rates are so high that most people can't buy such policies. So, the discussed form of the joint life insurance could be proposed to the participant of the pension plan when he or she is reached the pension age and wants to buy the life insurance policy for the accumulated capital of pension.
Journal:Informatica
Volume 12, Issue 4 (2001), pp. 519–546
Abstract
The article investigates the Swedish retail banks' application of price bundling in order to attract new customers, students. This is done through a customer survey about students' preferences concerning retail banking services, their price sensitiveness and banking behaviour. The conjoint analysis results showed that the students had relatively heterogeneous preferences, and four distinguishing segments could be found among them, namely a) plain banking, b) cheapest banking, c) modern banking, and d) traditional banking. The central factor in attracting students is the choice of services that are included in the bundle, and not the price. There were only roughly 20 percent who currently had a student bundle.
Journal:Informatica
Volume 12, Issue 4 (2001), pp. 509–518
Abstract
The integration of Lithuania to the European Union increases openness of its economy and gives an impulse to create financial and legal system aligning with the leading European countries. The universal German banking market conditioned more universality in Lithuanian banking system. Initially securities and insurance business was partly restricted for banks in Lithuania, but restrictions are gradually diminishing.
Formation of universal banking system in Lithuania raises a question: is the choice of universal banking under conditions of complicated economical situation and the weak legal basis right? This paper analyses the main positive and negative effects of commercial banks expansion into securities and insurance market. This paper discusses how should universal banks be supervised to ensure stability and reasonable profitability of banking activities.
Journal:Informatica
Volume 12, Issue 4 (2001), pp. 501–508
Abstract
The paper develops the idea of valuation capital market regulations efficiency. The performance and efficiency measurement idea is very widely spread in the private sector. However efficiency concept in a public sector is rather new approach and still underdeveloped. The goal of this paper is to reveal the possibilities to measure the efficiency of a public sector performance by applying some descriptive dependencies systems and by using the capital market regulations as an example to disclose the possible outcomes of that analysis process.
Journal:Informatica
Volume 12, Issue 4 (2001), pp. 491–500
Abstract
This paper discusses the normality assumption of the market model errors, conventionally accepted. Some other possible specifications are proposed and their performance is testing using a test statistic based on the empirical distribution function of the residuals of the model and assuming that the null distribution can depend on some unknown parameters. The parametric bootstrap method is used. Empirical evidence is provided using a sample of thirty companies of the Spanish Stock Market.
Journal:Informatica
Volume 12, Issue 3 (2001), pp. 477–486
Abstract
One of speech synthesis main problems is synthesis of unvoiced fricatives. One of our previously stated conclusions is that consonant x is influenced by before and behind existing phonetic elements. The aim of experiments described in this paper is to evaluate influence of different x allophones for speech intelligibility and automatic speech recognition.
In this paper the formal system, which describes allophones and, at the same time, phonemes interrelations in their possible sequences in natural language, is described. The formal system is necessary for automatic speech synthesis questions' solution. The experiments of two different types were carried out in order to evaluate the resemblance between two different ωx allophones: a) ωx allophones resemblance analysis based on expert evaluation; b) ωx allophones resemblance analysis based on automatic speech recognition results evaluation.
Experiment's results corroborated that ch allophones differ and depend from the context, i.e., from neighboring vowels, different ch allophones have influence on speech intelligibility, and therefore different ch allophones for high quality speech must be synthesized.
Journal:Informatica
Volume 12, Issue 3 (2001), pp. 469–476
Abstract
Peyravian and Zunic (2000) proposed a password transmission scheme and a password change scheme over an insecure network. Their proposed solutions do not require the use of any symmetric-key or public-key cryptosystems. However, this article points out that their schemes have several security flaws for practical applications. A slight improvement on their schemes is proposed in this paper to remove the security flaws.
Journal:Informatica
Volume 12, Issue 3 (2001), pp. 455–468
Abstract
This paper describes a preliminary algorithm performing epilepsy prediction by means of visual perception tests and digital electroencephalograph data analysis. Special machine learning algorithm and signal processing method are used. The algorithm is tested on real data of epileptic and healthy persons that are treated in Kaunas Medical University Clinics, Lithuania. The detailed examination of results shows that computerized visual perception testing and automated data analysis could be used for brain damages diagnosing.
Journal:Informatica
Volume 12, Issue 3 (2001), pp. 439–454
Abstract
The aim of the given paper is development of a joint input-output approach and its comparison with a direct one in the case of an additive correlated noise acting on the output of the system (Fig. 1), when the prediction error method is applied to solve the closed-loop identification problem by processing observations. In the case of the known regulator, the two-stage method, which belongs to the ordinary joint input-output approach, reduces to the one-stage method. In such a case, the open-loop system could be easily determined after some extended rational transfer function (25) is identified, including the transfer functions of the regulator and of the open-loop system, respectively, as additional terms. In the case of the unknown regulator, the estimate of the extended transfer function (27) is used to generate an auxiliary input. The form of an additive noise filter (36), that guarantees the minimal value of the mean square criterion (35), is determined. The results of numerical simulation and identification of the closed-loop system (Fig. 5) by computer, using the two-stage method and the direct approach are given (Figures 6–12, Table 1).