{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T20:53:27Z","timestamp":1768424007923,"version":"3.49.0"},"publisher-location":"Cham","reference-count":52,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030616557","type":"print"},{"value":"9783030616564","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-61656-4_11","type":"book-chapter","created":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T16:03:54Z","timestamp":1604505834000},"page":"167-187","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Assessing the Investment Risk of Virtual IT Company Based on Machine Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2441-6292","authenticated-orcid":false,"given":"Hrystyna","family":"Lipyanina","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4006-4848","authenticated-orcid":false,"given":"Valeriya","family":"Maksymovych","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0907-3682","authenticated-orcid":false,"given":"Anatoliy","family":"Sachenko","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9484-8333","authenticated-orcid":false,"given":"Taras","family":"Lendyuk","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3755-4130","authenticated-orcid":false,"given":"Andrii","family":"Fomenko","sequence":"additional","affiliation":[]},{"given":"Ivan","family":"Kit","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,5]]},"reference":[{"key":"11_CR1","unstructured":"About approval of the methodology for identifying risks of public-private partnership, their assessment and determination of the form of their management (2011)"},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.autcon.2018.03.032","volume":"92","author":"Z Ahmad","year":"2018","unstructured":"Ahmad, Z., Thaheem, M.J., Maqsoom, A.: Building information modeling as a risk transformer: an evolutionary insight into the project uncertainty. Autom. Constr. 92, 103\u2013119 (2018). https:\/\/doi.org\/10.1016\/j.autcon.2018.03.032","journal-title":"Autom. Constr."},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"105754","DOI":"10.1016\/j.knosys.2020.105754","volume":"196","author":"S Alam","year":"2020","unstructured":"Alam, S., Sonbhadra, S.K., Agarwal, S., Nagabhushan, P.: One-class support vector classifiers: a survey. Knowl.-Based Syst. 196, 105754 (2020). https:\/\/doi.org\/10.1016\/j.knosys.2020.105754","journal-title":"Knowl.-Based Syst."},{"issue":"2","key":"11_CR4","first-page":"1","volume":"2","author":"B Anthony","year":"2017","unstructured":"Anthony, B., Che Pa, N., Haizan Nor, R., Yah Josoh, Y.: The development and initial results of a component model for risk mitigation in IT governance. J. Sci. Technol. Innov. Policy 2(2), 1\u201313 (2017)","journal-title":"J. Sci. Technol. Innov. Policy"},{"key":"11_CR5","doi-asserted-by":"publisher","unstructured":"Apatova, N.: Mechanisms and resources of virtual enterprise risk management. In: Proceedings of the International Scientific Conference \u201cFar East Con\" (ISCFEC 2020), pp. 834\u2013844 (2020). https:\/\/doi.org\/10.2991\/aebmr.k.200312.116","DOI":"10.2991\/aebmr.k.200312.116"},{"issue":"20","key":"11_CR6","doi-asserted-by":"publisher","first-page":"7046","DOI":"10.1016\/j.eswa.2015.05.013","volume":"42","author":"M Ballings","year":"2015","unstructured":"Ballings, M., Van den Poel, D., Hespeels, N., Gryp, R.: Evaluating multiple classifiers for stock price direction prediction. Expert Syst. Appl. 42(20), 7046\u20137056 (2015). https:\/\/doi.org\/10.1016\/j.eswa.2015.05.013","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"11_CR7","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1145\/76359.76371","volume":"36","author":"A Blumer","year":"1989","unstructured":"Blumer, A., Ehrenfeucht, A., Haussler, D., Warmuth, M.K.: Learnability and the Vapnik-Chervonenkis dimension. J. ACM 36(4), 929\u2013965 (1989). https:\/\/doi.org\/10.1145\/76359.76371","journal-title":"J. ACM"},{"issue":"1","key":"11_CR8","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/a:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001). https:\/\/doi.org\/10.1023\/a:1010933404324","journal-title":"Mach. Learn."},{"key":"11_CR9","unstructured":"Cabral, J.S.: Project risk management strategies for IT project managers. Ph.D. thesis, Walden University (2017)"},{"key":"11_CR10","unstructured":"Chapman, C., Ward, S.: Project Risk Management: Processes, Techniques and Insights. Wiley, Hoboken (1996)"},{"key":"11_CR11","doi-asserted-by":"publisher","unstructured":"Chen, T.H., Ho, R.J., Liu, Y.W.: Investigating the predictive power of investor personality in forecasting investment performance using machine learning models. Comput. Hum. Behav. 101 (2018). https:\/\/doi.org\/10.1016\/j.chb.2018.09.027","DOI":"10.1016\/j.chb.2018.09.027"},{"issue":"2","key":"11_CR12","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.inpa.2018.10.003","volume":"5","author":"NL Costa","year":"2018","unstructured":"Costa, N.L., Llobodanin, L.A.G., Castro, I.A., Barbosa, R.: Using support vector machines and neural networks to classify merlot wines from South America. Inf. Process. Agric. 5(2), 265\u2013278 (2018). https:\/\/doi.org\/10.1016\/j.inpa.2018.10.003","journal-title":"Inf. Process. Agric."},{"key":"11_CR13","unstructured":"Davidow, W.H.: The virtual corporation: Structuring and revitalizing the corporation for the 21st century. Harpercollins (1992)"},{"issue":"10","key":"11_CR14","doi-asserted-by":"publisher","first-page":"1288","DOI":"10.1057\/jors.2016.22","volume":"67","author":"JY Dong","year":"2016","unstructured":"Dong, J.Y., Wan, S.P.: Virtual enterprise partner selection integrating linmap and topsis. J. Oper. Res. Soc. 67(10), 1288\u20131308 (2016). https:\/\/doi.org\/10.1057\/jors.2016.22","journal-title":"J. Oper. Res. Soc."},{"key":"11_CR15","unstructured":"Du, W., Zhan, Z.: Building decision tree classifier on private data. In: Proceedings of the IEEE International Conference on Privacy, Security and Data Mining CRPIT 2002 (2002)"},{"issue":"4","key":"11_CR16","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1109\/tsmc.1976.5408784","volume":"6","author":"SA Dudani","year":"1976","unstructured":"Dudani, S.A.: The distance-weighted k-nearest-neighbor rule. IEEE Trans. Syst. Man Cybern. 6(4), 325\u2013327 (1976). https:\/\/doi.org\/10.1109\/tsmc.1976.5408784","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"11_CR17","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.ijpe.2013.10.003","volume":"148","author":"E Esposito","year":"2014","unstructured":"Esposito, E., Evangelista, P.: Investigating virtual enterprise models - literature review and empirical findings. Int. J. Prod. Econ. 148, 145\u2013157 (2014). https:\/\/doi.org\/10.1016\/j.ijpe.2013.10.003","journal-title":"Int. J. Prod. Econ."},{"key":"11_CR18","doi-asserted-by":"publisher","first-page":"1112","DOI":"10.1016\/j.procs.2017.12.120","volume":"121","author":"L Ferreira","year":"2017","unstructured":"Ferreira, L., Lopes, N., Avila, P.S., et al.: Virtual enterprise integration management based on a meta-enterprise - a PMBoK approach. Procedia Comput. Sci. 121, 1112\u20131118 (2017). https:\/\/doi.org\/10.1016\/j.procs.2017.12.120","journal-title":"Procedia Comput. Sci."},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Golovko, V., Savitsky, Y., Laopoulos, T., Sachenko, A., Grandinetti, L.: Technique of learning rate estimation for efficient training of MLP. In: Proceedings of the International Joint Conference on Neural Networks, pp. 323\u2013328 (2000)","DOI":"10.1109\/IJCNN.2000.857856"},{"issue":"3","key":"11_CR20","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/s0166-3615(03)00021-6","volume":"50","author":"H Gou","year":"2003","unstructured":"Gou, H., Huang, B., Liu, W., Li, X.: A framework for virtual enterprise operation management. Comput. Ind. 50(3), 333\u2013352 (2003). https:\/\/doi.org\/10.1016\/s0166-3615(03)00021-6","journal-title":"Comput. Ind."},{"key":"11_CR21","unstructured":"Hassanat, A.B., Abbadi, M.A., Altarawneh, G.A., Alhasanat, A.A.: Solving the problem of the k parameter in the KNN classifier using an ensemble learning approach (2014). https:\/\/arxiv.org\/abs\/1409.0919"},{"key":"11_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eswa.2018.06.026","volume":"112","author":"W He","year":"2018","unstructured":"He, W., Liu, Y.: To regularize or not: revisiting SGD with simple algorithms and experimental studies. Expert Syst. Appl. 112, 1\u201314 (2018). https:\/\/doi.org\/10.1016\/j.eswa.2018.06.026","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"11_CR23","doi-asserted-by":"publisher","first-page":"216","DOI":"10.3846\/20294913.2014.979455","volume":"21","author":"BG Hwang","year":"2015","unstructured":"Hwang, B.G., Chen, M.: Sustainable risk management in the construction industry: lessons learned from the IT industry. Technol. Econ. Dev. Econ. 21(2), 216\u2013231 (2015). https:\/\/doi.org\/10.3846\/20294913.2014.979455","journal-title":"Technol. Econ. Dev. Econ."},{"issue":"2","key":"11_CR24","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1108\/ijmpb-07-2015-0055","volume":"9","author":"B Javani","year":"2016","unstructured":"Javani, B., Rwelamila, P.M.D.: Risk management in it projects - a case of the South African public sector. Int. J. Manag. Projects Bus. 9(2), 389\u2013413 (2016). https:\/\/doi.org\/10.1108\/ijmpb-07-2015-0055","journal-title":"Int. J. Manag. Projects Bus."},{"key":"11_CR25","unstructured":"John, G.H., Langley, P.: Estimating continuous distributions in Bayesian classifiers (2013). https:\/\/arxiv.org\/abs\/1302.4964"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Kanovskyi, A., Sachenko, A., Kochan, V.: Virtual spatial displaying of dynamic graphic objects for IoT. In: Proceedings of the 2019 3rd International Conference on Advanced Information and Communications Technologies, AICT 2019, pp. 254\u2013257 (2019)","DOI":"10.1109\/AIACT.2019.8847769"},{"key":"11_CR27","doi-asserted-by":"publisher","unstructured":"Kleinbaum, D.G., Klein, M.: Introduction to logistic regression. In: Kleinbaum, D.G., Klein, M. (eds.) Logistic Regression. SBH, pp. 1\u201339. Springer, New York (2010). https:\/\/doi.org\/10.1007\/978-1-4419-1742-3_1","DOI":"10.1007\/978-1-4419-1742-3_1"},{"key":"11_CR28","doi-asserted-by":"publisher","unstructured":"Kumsuprom, S., Corbitt, B., Pittayachawan, S.: ICT risk management in organizations: case studies in Thai business. In: Proceedings of the Australasian Conference on Information Systems ACIS 2008, p. artt. no. 98 (2008). https:\/\/doi.org\/10.13140\/2.1.2489.1689","DOI":"10.13140\/2.1.2489.1689"},{"key":"11_CR29","unstructured":"Lipyanina, H., Sachenko, A., Lendyuk, T., Nadvynychny, S., Grodskyi, S.: Decision tree based targeting model of customer interaction with business page. In: Proceedings of the third International Workshop on Computer Modeling and Intelligent Systems (CMIS-2020), CEUR Workshop Proceedings, vol. 2608, pp. 1001\u20131012 (2020). http:\/\/ceur-ws.org\/Vol-2608\/paper75.pdf"},{"key":"11_CR30","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.energy.2016.03.098","volume":"104","author":"G Locatelli","year":"2016","unstructured":"Locatelli, G., Invernizzi, D.C., Mancini, M.: Investment and risk appraisal in energy storage systems: a real options approach. Energy 104, 114\u2013131 (2016). https:\/\/doi.org\/10.1016\/j.energy.2016.03.098","journal-title":"Energy"},{"key":"11_CR31","doi-asserted-by":"publisher","unstructured":"Lu, F., Bi, H., Huang, M., Wang, X.: Virtual enterprise risk management under asymmetric information. In: Proceedings of the 2013 10th International Conference on Service Systems and Service Management, pp. 202\u2013207 (2013). https:\/\/doi.org\/10.1109\/icsssm.2013.6602655","DOI":"10.1109\/icsssm.2013.6602655"},{"key":"11_CR32","doi-asserted-by":"publisher","unstructured":"Lytvyn, V., Vysotska, V., Veres, O., Rishnyak, I., Rishnyak, H.: The risk management modelling in multi project environment. In: Proceedings of the 2017 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT 2017), pp. 32\u201335 (2017). https:\/\/doi.org\/10.1109\/stc-csit.2017.8098730","DOI":"10.1109\/stc-csit.2017.8098730"},{"key":"11_CR33","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.knosys.2016.06.012","volume":"117","author":"J Maillo","year":"2017","unstructured":"Maillo, J., Ramirez, S., Triguero, I., Herrera, F.: kNN-IS: an iterative spark-based design of the k-nearest neighbors classifier for big data. Knowl.-Based Syst. 117, 3\u201315 (2017). https:\/\/doi.org\/10.1016\/j.knosys.2016.06.012","journal-title":"Knowl.-Based Syst."},{"issue":"4","key":"11_CR34","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1590\/0104-530x1214-18","volume":"25","author":"GA Marodin","year":"2018","unstructured":"Marodin, G.A., Saurin, T.A., Tortorella, G.L., Fettermann, D.C.: Model of risk interactions hindering lean production implementation. Gestao Producao 25(4), 696\u2013712 (2018)","journal-title":"Gestao Producao"},{"issue":"1\u20133","key":"11_CR35","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/s0925-5273(01)00129-3","volume":"74","author":"M Martinez","year":"2001","unstructured":"Martinez, M., Fouletier, P., Park, K., Favrel, J.: Virtual enterprise - organisation, evolution and control. Int. J. Prod. Econ. 74(1\u20133), 225\u2013238 (2001). https:\/\/doi.org\/10.1016\/s0925-5273(01)00129-3","journal-title":"Int. J. Prod. Econ."},{"key":"11_CR36","doi-asserted-by":"publisher","first-page":"5007","DOI":"10.1007\/s12652-019-01178-5","volume":"10","author":"F Meng","year":"2019","unstructured":"Meng, F., Wang, N., Xu, Y.: Interval neutrosophic preference relations and their application in virtual enterprise partner selection. J. Ambient Intell. Hum. Comput. 10, 5007\u20135036 (2019). https:\/\/doi.org\/10.1007\/s12652-019-01178-5","journal-title":"J. Ambient Intell. Hum. Comput."},{"issue":"1","key":"11_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3923\/itj.2015.1.9","volume":"14","author":"C Noraini","year":"2015","unstructured":"Noraini, C., Bokolo, A., et al.: A review on risk mitigation of IT governance. Inf. Technol. J. 14(1), 1\u20139 (2015). https:\/\/doi.org\/10.3923\/itj.2015.1.9","journal-title":"Inf. Technol. J."},{"key":"11_CR38","doi-asserted-by":"publisher","unstructured":"Pa, N.C., Anthony, B.: A model of mitigating risk for it organisations. In: Proceedings of the IEEE 2015 4th International Conference on Software Engineering and Computer Systems (ICSECS), pp. 49\u201354 (2015). https:\/\/doi.org\/10.1109\/ICSECS.2015.7333082","DOI":"10.1109\/ICSECS.2015.7333082"},{"issue":"1\u20132","key":"11_CR39","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1016\/s0360-8352(99)00113-8","volume":"37","author":"KH Park","year":"1999","unstructured":"Park, K.H., Favrel, J.: Virtual enterprise - information system and networking solution. Comput. Ind. Eng. 37(1\u20132), 441\u2013444 (1999). https:\/\/doi.org\/10.1016\/s0360-8352(99)00113-8","journal-title":"Comput. Ind. Eng."},{"issue":"10","key":"11_CR40","doi-asserted-by":"publisher","first-page":"1072","DOI":"10.1080\/0951192x.2017.1285424","volume":"30","author":"BL Sadigh","year":"2017","unstructured":"Sadigh, B.L., Nikghadam, S., Ozbayoglu, A.M., Unver, H.O., Dogdu, E., Kilic, S.E.: An ontology-based multi-agent virtual enterprise system (OMAVE): part 2: partner selection. Int. J. Comput. Integr. Manuf. 30(10), 1072\u20131092 (2017). https:\/\/doi.org\/10.1080\/0951192x.2017.1285424","journal-title":"Int. J. Comput. Integr. Manuf."},{"issue":"2\u20133","key":"11_CR41","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1080\/0951192x.2016.1145811","volume":"30","author":"BL Sadigh","year":"2016","unstructured":"Sadigh, B.L., Unver, H.O., Nikghadam, S., Dogdu, E., Ozbayoglu, A.M., Kilic, S.E.: An ontology-based multi-agent virtual enterprise system (OMAVE): part 1: domain modelling and rule management. Int. J. Comput. Integr. Manuf. 30(2\u20133), 320\u2013343 (2016). https:\/\/doi.org\/10.1080\/0951192x.2016.1145811","journal-title":"Int. J. Comput. Integr. Manuf."},{"key":"11_CR42","doi-asserted-by":"publisher","unstructured":"Schapire, R.E.: Explaining adaboost. In: Scholkopf, B., Luo, Z., Vovk, V. (eds.) Empirical Inference, pp. 37\u201352. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41136-6_5","DOI":"10.1007\/978-3-642-41136-6_5"},{"key":"11_CR43","doi-asserted-by":"publisher","unstructured":"Shu, C., Dosyn, D., Lytvyn, V., Vysotska, V., Sachenko, A., Jun, S.: Building of the predicate recognition system for the NLP ontology learning module. In: Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2019, pp. 802\u2013808 (2019). https:\/\/doi.org\/10.1109\/IDAACS.2019.8924410","DOI":"10.1109\/IDAACS.2019.8924410"},{"issue":"3","key":"11_CR44","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/tge.1977.6498972","volume":"15","author":"PH Swain","year":"1977","unstructured":"Swain, P.H., Hauska, H.: The decision tree classifier: design and potential. IEEE Trans. Geosci. Electron. 15(3), 142\u2013147 (1977). https:\/\/doi.org\/10.1109\/tge.1977.6498972","journal-title":"IEEE Trans. Geosci. Electron."},{"key":"11_CR45","doi-asserted-by":"publisher","unstructured":"Swami, R., Jain, T.K.: Managing investment risks: Modern vs traditional knowledge and practices (2019). https:\/\/doi.org\/10.2139\/ssrn.3310062, https:\/\/ssrn.com\/abstract=3310062","DOI":"10.2139\/ssrn.3310062"},{"key":"11_CR46","doi-asserted-by":"crossref","unstructured":"Tao, T., Yan, K., Yang, S.: Classification of mutual fund investment types with advanced machine learning models. In: Proceedings of the 2019 IEEE International Conference on Big Data, Cloud Computing, Data Science and Engineering (BCD), pp. 84\u201389 (2019)","DOI":"10.1109\/BCD.2019.8885073"},{"key":"11_CR47","doi-asserted-by":"publisher","unstructured":"Tsvetkov, V.Y., Shaytura, S.V., Sultaeva, N.L.: Digital enterprise management in cyberspace. In: Proceedings of the 2nd International Scientific and Practical Conference \u201cModern Management Trends and the Digital Economy: from Regional Development to Global Economic Growth\u201d (MTDE 2020), pp. 361\u2013365 (2020). https:\/\/doi.org\/10.2991\/aebmr.k.200502.059","DOI":"10.2991\/aebmr.k.200502.059"},{"issue":"5","key":"11_CR48","first-page":"987","volume":"12","author":"A Vezhnevets","year":"2005","unstructured":"Vezhnevets, A., Vezhnevets, V.: Modest adaboost-teaching adaboost to generalize better. Graphicon 12(5), 987\u2013997 (2005)","journal-title":"Graphicon"},{"key":"11_CR49","unstructured":"Wan, J., Jiang, Q., Xie, L.: Research on risk factors of entrepreneurship in internet industry with the grounded theory. In: Proceedings of the Wuhan International Conference on e-Business, Association for Information Systems, pp. 99\u2013107 (2017)"},{"key":"11_CR50","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.4028\/www.scientific.net\/amr.129-131.1267","volume":"129\u2013131","author":"N Wang","year":"2010","unstructured":"Wang, N.: Research on virtual enterprise risk control based on optimization. Adv. Mater. Res. 129\u2013131, 1267\u20131272 (2010). https:\/\/doi.org\/10.4028\/www.scientific.net\/amr.129-131.1267","journal-title":"Adv. Mater. Res."},{"key":"11_CR51","unstructured":"Yang, M., Blyth, W.: Modeling investment risks and uncertainties with real options approach. In: International Energy Agency Working Paper Series. p. Paper Number LTO\/2007\/WP01 (2007)"},{"key":"11_CR52","first-page":"117","volume":"35","author":"MQ Yuan","year":"2018","unstructured":"Yuan, M.Q., Li, Z.F., Li, L.: SI system housing virtual enterprise partners selection based on vector angle cosine. J. Civ. Eng. Manag. 35, 117\u2013122 (2018)","journal-title":"J. Civ. Eng. Manag."}],"container-title":["Communications in Computer and Information Science","Data Stream Mining &amp; Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-61656-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T02:38:41Z","timestamp":1619231921000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-61656-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030616557","9783030616564"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-61656-4_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"5 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DSMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Stream Mining and Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lviv","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ukraine","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dsmp2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/dsmp.in.ua\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"134","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}