Dissertations / Theses on the topic '080611 Information Systems Theory'

To see the other types of publications on this topic, follow the link: 080611 Information Systems Theory.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic '080611 Information Systems Theory.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Puhakainen, P. (Petri). "A design theory for information security awareness." Doctoral thesis, University of Oulu, 2006. http://urn.fi/urn:isbn:9514281144.

Full text
Abstract:
Abstract When implementing their information security solutions organizations have typically focused on technical and procedural security measures. However, from the information systems (IS) point of view, this is not enough: effective IS security requires that users are aware of and use the available security measures as described in their organizations' information security policies and instructions. Otherwise, the usefulness of the security measures is lost. The research question of this thesis is to explore how IS users' compliance with IS security policies and instructions can be improved. Solving this research question is divided into two steps. Since there is a lack of a comprehensive review of existing IS security awareness approaches, the first step aims at reviewing the existing IS security awareness approaches. This kind of analysis is useful for practitioners as they do not necessarily have the time to go through a large body of literature. For scholars, such an analysis shows what areas of IS security awareness have been studied, and to where the need for future research is of greatest importance. The second step in this dissertation is to address the shortcomings detected by the analysis by developing three novel design theories for improving IS users' security behavior: (1) IS security awareness training, (2) IS security awareness campaigns, and (3) punishment and reward. These design theories aim to help practitioners to develop their own IS security awareness approaches. Finally, testing of the design theory for IS security awareness training (1) in two action research interventions is described. The results of the interventions suggest that this design theory provides a useful and applicable means for developing a training program in organizations. In addition, the results provide empirically evaluated information regarding the obstacles to user compliance with IS security policies and instructions. In the action research studies described, the goal was to solve practical problems experienced by the host organizations and to understand them and the results achieved from the viewpoint of theory. Consequently, the results as such can not be generalized, but they are of use in the host organizations in planning and delivering subsequent IS security awareness training programs. In addition, the results are utilizable in similar organizations as a point of departure in planning IS security awareness training programs.
APA, Harvard, Vancouver, ISO, and other styles
2

Symons, Veronica Jean. "Evaluation of information systems : multiple perspectives." Thesis, University of Cambridge, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.279415.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Richardson, Sandra. "HEALTHCARE INFORMATION SYSTEMS:DESIGN THEORY, PRINCIPLES AND APPLICATION." Doctoral diss., University of Central Florida, 2006. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3182.

Full text
Abstract:
Healthcare information systems (HISs), as a class of systems, are not currently addressed in the MIS literature. This is in spite of a sharp increase in use over the past few years, and the uniquely qualified role that MIS has in the development of, impact and general understanding of HISs. In this project the design science paradigm frames the development of a set of design principles derived from the synthesis of the design literature, ethics literature, and professional guidelines, from both the medical and computing professions. The resulting principles are offered to address the design of healthcare information systems. Action research, a widely accepted methodology for testing design principles derived from the design science paradigm, is employed to test the HIS principles and to implement change in a healthcare organization through the use of an HIS. The action research project was a collaborative effort between a Central Florida hospice and the researcher, the result of which was an advanced directives decision support system. The system was design to meet a number of organizational goals that ranged from tracking compliance with federal regulations to increasing the autonomy of the patients that used the system. The result is a set of tested design principles and lessons learned from both anticipated and unanticipated consequences of the action research project.
Ph.D.
Department of Management Information Systems
Business Administration
Business Administration: Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
4

Brown, Irwin T. J. "Espoused theory versus theory in use : the case of strategic information systems planning." Doctoral thesis, University of Cape Town, 2005. http://hdl.handle.net/11427/5638.

Full text
Abstract:
Includes bibliographical references.
Strategic information systems planning (SISP) has been a key issue for Information Systems (IS) managers over several decades. As a consequence, much research has been devoted to studing it. Noted concerns have been the gap between opinion and practice, and the absence of a sound theory to underpin it. Attempts at developing an overarching theoretical framework have typically used an input-process-output variance model as the basis. Rich processual elements of SISP, and the existence of feedback loops, which could then lead to improved practice, have however, been noted as absent from these models. Synthesis and integration of the above concerns lead to the goal of this study, which was to develop rich processual theories about SISP. The grounded theory methodology was ideally suited to this purpose as it aims to develop theory that is well grounded in data, and therefore very much reflective of the reality presented by the data.
APA, Harvard, Vancouver, ISO, and other styles
5

McFarland, Sean Alan. "Decision making theory with geographic information systems support." CSUSB ScholarWorks, 2008. https://scholarworks.lib.csusb.edu/etd-project/3393.

Full text
Abstract:
Decisions are made with varying degrees of effectiveness and efficiency and are influenced by a myriad of internal and external forces. Decision Support Systems (DSS) software can effectively aid decision making through processing the facts and producing meaningful outputs for use by the person or team in making the final choice. Geographic Information Systems (GIS), a form of DSS, are very effective when locational data are present. This thesis talks about using GIS software in decision making procedures.
APA, Harvard, Vancouver, ISO, and other styles
6

Ploesser, Karsten. "A Design Theory for Context-Aware Information Systems." Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/60865/1/Karsten_Ploesser_Thesis.pdf.

Full text
Abstract:
This research studies information systems that adapt to the context in which they are used and provides recommendations on how the design of such systems can be improved. This thesis covers the problem of context-awareness via two case studies in the insurance and transportation industries. The study highlights shortcomings in the understanding of the relationship between information systems and context. Furthermore, it presents a new, theory-informed approach to design, and provides guidance for system developers seeking to implement context-aware information systems.
APA, Harvard, Vancouver, ISO, and other styles
7

Mansouri-Samani, Masoud. "Monitoring of distributed systems." Thesis, Imperial College London, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.362441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Levi, Elliott Kendrick. "Information transfer in open quantum systems." Thesis, University of St Andrews, 2017. http://hdl.handle.net/10023/16690.

Full text
Abstract:
This thesis covers open quantum systems and information transfer in the face of dissipation and disorder through numerical simulation. In Chapter 3 we present work on an open quantum system comprising a two-level system, single bosonic mode and dissipative environment; we have included the bosonic mode in the exact system treatment. This model allows us to gain an understanding of an environment's role in small energy transfer systems. We observe how the two-level system-mode coupling strength and the spectral density form characterising the environment interplay, affecting the system's coherent behaviour. We find strong coupling and a spectral density resonantly peaked on the two-level system oscillation frequency enhances the system's coherent oscillatory dynamics. Chapter 4 focusses on a physically motivated study of chain and ladder spin geometries and their use for entanglement transfer between qubits. We consider a nitrogen vacancy centre qubit implementation with nitrogen impurity spin-channels and demonstrate how matrix product operator techniques can be used in simulations of this physical system. We investigate coupling parameters and environmental decay rates with respect to transfer efficiency effects. Then, in turn, we simulate the effects of missing channel spins and disorder in the spin-spin coupling. We conclude by highlighting where our considered channel geometries outperform each other. The work in Chapter 5 is an investigation into the feasibility of routing entanglement between distant qubits in 2D spin networks. We no longer consider a physical implementation, but keep in mind the effects of dissipative environments on entanglement transfer systems. Starting with a single sending qubit-ancilla and multiple addressable receivers, we show it is possible to target a specific receiver and establish transferred entanglement between it and the sender's ancilla through eigenstate tunnelling techniques. We proceed to show that eigenstate tunnelling-mediated entanglement transfer can be achieved simultaneously from two senders across one spin network.
APA, Harvard, Vancouver, ISO, and other styles
9

Ray, Gautam. "Information systems and competitive advantage : a process-oriented theory." Connect to resource, 2000. http://rave.ohiolink.edu/etdc/view.cgi?acc%5Fnum=osu1261401669.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hellmuth, Wayne J. "Design theory for innovation of classroom-based information systems." Thesis, Queensland University of Technology, 2015. https://eprints.qut.edu.au/87824/1/Wayne_Hellmuth_Thesis.pdf.

Full text
Abstract:
This research used design science research methods to develop, instantiate, implement, and measure the acceptance of a novel software artefact. The primary purpose of this software artefact was to enhance data collection, improve its quality and enable its capture in classroom environments without distracting from the teaching activity. The artefact set is an iOS app, with supporting web services and technologies designed in response to teacher and pastoral care needs. System analysis and design used Enterprise Architecture methods. The novel component of the iOS app implemented proximity detection to identify the student through their iPad and automatically link to that student's data. The use of this novel software artefact and web services was trialled in a school setting, measuring user acceptance and system utility. This integrated system was shown to improve the accuracy, consistency, completeness and timeliness of captured data and the utility of the input and reporting systems.
APA, Harvard, Vancouver, ISO, and other styles
11

Gong, Li. "Cryptographic protocols for distributed systems." Thesis, University of Cambridge, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.357767.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Askira, Gelman I. "Studies on the informativeness, value, and cost, of information and information systems." Diss., The University of Arizona, 2003. http://hdl.handle.net/10150/289235.

Full text
Abstract:
The widely used database technology and more recent developments in networking and Web technologies are encouraging diversity in the utilization of existing data. Data are now routinely pooled from multiple systems and physical locations, and integrated in creative ways for various decision-making purposes. From a managerial perspective, however, there are growing concerns in regard to the quality of the output information, and the economic justification of costly investments in such technologies. The major part of this dissertation addresses these concerns through formal studies on the quality and value of information, based on information economics (IE) theory. The quality and value of information integration is studied from a standpoint that recognizes the fundamental role of information integration in information systems. The objective of this study is to create a domain-independent theoretical framework that can facilitate decision making on information integration. The framework classifies information integration situations using two information quality characteristics--informativeness and dependence--and links different conditions in terms of these characteristics with different predictions on the value of integration. A second, related study centers on the questions of whether improving the accuracy of the input of an information system guarantees higher accuracy and economic value of its output, especially higher accuracy and economic value of forecasts. The study offers sufficient conditions under which the answer to these questions is positive, and also presents counter examples that suggest conditions under which the answer is negative. The results point to a contextual factor that can affect accuracy both ways--positive or negative--which has been ignored by data quality theory. This factor is dependence between errors. A third study considers a question related to software economics. Software economics theory equates software with code and directs that the supply of information be based entirely on demand patterns. However, an increasingly common custom in the software market to bundle the code with services indicates that a different model of cost and price may apply in many cases. Such model combines the information goods cost model with a service cost model. The study focuses on the question of the validity of such alternative model.
APA, Harvard, Vancouver, ISO, and other styles
13

Buttery, E. Allan. "New paradigm research within systems development." Thesis, University of Glasgow, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.314519.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Episkopou, D. M. "The theory and practice of information systems methodologies : A grounded theory of methodological evolution." Thesis, University of East Anglia, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.380960.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Myers, Barry L. "Information systems assessment: development of a comprehensive framework and contingency theory to assess the effectiveness of the information systems function." Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4302/.

Full text
Abstract:
The purpose of this research is to develop a comprehensive, IS assessment framework using existing IS assessment theory as a base and incorporating suggestions from other disciplines. To validate the framework and to begin the investigation of current IS assessment practice, a survey instrument was developed. A small group of subject matter experts evaluated and improved the instrument. The instrument was further evaluated using a small sample of IS representatives. Results of this research include a reexamination of the IS function measurement problem using new frameworks of analyses yielding (a) guidance for the IS manager or executive on which IS measures might best fit their organization, (b) a further verification of the important measures most widely used by IS executives, (c) a comprehensive, theoretically-derived, IS assessment framework, and by (d) the enhancement of IS assessment theory by incorporating ideas from actual practice. The body of knowledge gains a comprehensive, IS assessment framework that can be further tested for usefulness and applicability. Future research is recommended to substantiate and improve on these findings. Chapter 2 is a complete survey of prior research, subdivided by relevant literature divisions, such as organizational effectiveness, quality management, and IS assessment. Chapter 3 includes development of and support for the research questions, IS assessment framework, and the research model. Chapter 4 describes how the research was conducted. It includes a brief justification for the research approach, a description of how the framework was evaluated, a description of how the survey instrument was developed and evaluated, a description of the participants and how they were selected, a synopsis of the data collection procedures, a brief description of follow-up procedures, and a summary. Chapter 5 presents the results of the research. Chapter 6 is a summary and conclusion of the research. Finally, included in the appendices are definitions of terms, and copies of the original and improved survey instruments.
APA, Harvard, Vancouver, ISO, and other styles
16

Lund, David J. "Reconfigurable channel coding for future communication systems." Thesis, Lancaster University, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.289042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Jamasebi-Jahromi, Ali. "Code synchronisation in spread spectrum communication systems." Thesis, University of Manchester, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.257305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Adams, Carl. "Dealing with uncertainty within information systems development : applying prospect theory." Thesis, University of Southampton, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.395995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Vigneaux, Juan Pablo. "Topology of statistical systems : a cohomological approach to information theory." Thesis, Sorbonne Paris Cité, 2019. http://www.theses.fr/2019USPCC070.

Full text
Abstract:
Cette thèse étend dans plusieurs directions l’étude cohomologique de la théorie de l’information initiée par Baudot et Bennequin. On introduit une notion d'espace statistique basée sur les topos, puis on étudie plusieurs invariants cohomologiques. Les fonctions d’information et quelques objets associés apparaissent comme des classes de cohomologie distinguées ; les équations de cocycle correspondantes codent les propriétés récursives de ces fonctions. L'information a donc une signification topologique et la topologie sert de cadre unificateur.La première partie traite des fondements géométriques de la théorie. Les structures d’information sont présentées sous forme de catégories qui codent les relations de raffinement entre différents observables statistiques. On étudie les produits et coproduits des structures d’information, ainsi que leur représentation par des fonctions mesurables ou des opérateurs hermitiens. Chaque structure d’information donne lieu à un site annelé ; la cohomologie de l'information est introduite avec les outils homologiques développés par Artin, Grothendieck, Verdier et leurs collaborateurs.La deuxième partie étudie la cohomologie des variables aléatoires discrètes. Les fonctions d'information — l'entropie de Shannon, l'alpha-entropie de Tsallis, et la divergence de Kullback-Leibler — apparaissent sous la forme de 1-cocycles pour certains modules de coefficients probabilistes (fonctions de lois de probabilité). Dans le cas combinatoire (fonctions des histogrammes), le seul 0-cocycle est la fonction exponentielle, et les 1-cocycles sont des coefficients multinomiaux généralisés (Fontené-Ward). Il existe une relation asymptotique entre les cocycles combinatoires et probabilistes.La troisième partie étudie en détail les coefficients q-multinomiaux, en montrant que leur taux de croissance est lié à la 2-entropie de Tsallis (entropie quadratique). Lorsque q est une puissance première, ces coefficients q-multinomiaux comptent les drapeaux d'espaces vectoriels finis de longueur et de dimensions prescrites. On obtient une explication combinatoire de la non-additivité de l'entropie quadratique et une justification fréquentiste du principe de maximisation d'entropie quadratique. On introduit un processus stochastique à temps discret associé à la distribution de probabilité q-binomial qui génère des espaces vectoriels finis (drapeaux de longueur 2). La concentration de la mesure sur certains sous-espaces typiques permet d'étendre la théorie de Shannon à ce cadre.La quatrième partie traite de la généralisation de la cohomologie de l'information aux variables aléatoires continues. On étudie les propriétés de fonctorialité du conditionnement (vu comme désintégration) et sa compatibilité avec la marginalisation. Les calculs cohomologiques sont limités aux variables réelles gaussiennes. Lorsque les coordonnées sont fixées, les 1-cocycles sont l’entropie différentielle ainsi que les moments généralisés. Les catégories grassmanniennes permettent de traiter les calculs canoniquement et retrouver comme seuls classes de cohomologie de degré 1 l'entropie et la dimension. Ceci constitue une nouvelle caractérisation algébrique de l'entropie différentielle
This thesis extends in several directions the cohomological study of information theory pioneered by Baudot and Bennequin. We introduce a topos-theoretical notion of statistical space and then study several cohomological invariants. Information functions and related objects appear as distinguished cohomology classes; the corresponding cocycle equations encode recursive properties of these functions. Information has thus topological meaning and topology serves as a unifying framework.Part I discusses the geometrical foundations of the theory. Information structures are introduced as categories that encode the relations of refinement between different statistical observables. We study products and coproducts of information structures, as well as their representation by measurable functions or hermitian operators. Every information structure gives rise to a ringed site; we discuss in detail the definition of information cohomology using the homological tools developed by Artin, Grothendieck, Verdier and their collaborators.Part II studies the cohomology of discrete random variables. Information functions—Shannon entropy, Tsallis alpha-entropy, Kullback-Leibler divergence—appear as 1-cocycles for appropriate modules of probabilistic coefficients (functions of probability laws). In the combinatorial case (functions of histograms), the only 0-cocycle is the exponential function, and the 1-cocycles are generalized multinomial coefficients (Fontené-Ward). There is an asymptotic relation between the combinatorial and probabilistic cocycles.Part III studies in detail the q-multinomial coefficients, showing that their growth rate is connected to Tsallis 2-entropy (quadratic entropy). When q is a prime power, these q-multinomial coefficients count flags of finite vector spaces with prescribed length and dimensions. We obtain a combinatorial explanation for the nonadditivity of the quadratic entropy and a frequentist justification for the maximum entropy principle with Tsallis statistics. We introduce a discrete-time stochastic process associated to the q-binomial probability distribution that generates finite vector spaces (flags of length 2). The concentration of measure on certain typical subspaces allows us to extend Shannon's theory to this setting.Part IV discusses the generalization of information cohomology to continuous random variables. We study the functoriality properties of conditioning (seen as disintegration) and its compatibility with marginalization. The cohomological computations are restricted to the real valued, gaussian case. When coordinates are fixed, the 1-cocycles are the differential entropy as well as generalized moments. When computations are done in a coordinate-free manner, with the so-called grassmannian categories, we recover as the only degree-one cohomology classes the entropy and the dimension. This constitutes a novel algebraic characterization of differential entropy
APA, Harvard, Vancouver, ISO, and other styles
20

Magalhaes, Rodrigo Manuel. "The organizational implementation of information systems : towards a new theory." Thesis, London School of Economics and Political Science (University of London), 1999. http://etheses.lse.ac.uk/284/.

Full text
Abstract:
This dissertation provides fundamental conceptual building blocks for a new theory of IS implementation. The main argument presented is for a new perspective to supplement and complement the main existing perspectives on IS implementation: the technological determinist perspective, the managerial imperative perspective, and the socio-technical interactionist perspective. in this the research seeks to overcomes identified shortcomings of these existing approaches to understanding IS implementation. The research methodology emphasizes multidisciplinary theory-building, based on the resource-based approach to strategy, using autopoiesis as the key organizational epistemology. The research explores the concept of organizational climate dimensions as the shapers of organizational contexts, and relates these to information systems research in implementation. The new perspective developed emphasizes managerial action and organizational contexts as a mid-level approach, bridging the gap between top-down, rationalist methods and bottom-up, emergent approaches. Based on this conceptual framework, the context for IS corporate governance is operationalized and presented as a causal model with five independent variables - IS Intent, Discipline, Trust, Support and Structural IS-related factors and one independent variable. IS-Organizational Learning. Data collection is carried out in large Portuguese companies by means of a postal questionnaire. The empirical data is supplemented by five short case studies. The key conclusions of the thesis are: (1) The duality managerial action - organizational contexts opens up whole new possibilities for research and practice of IS implementation. (2) The use of the notion of organizational contexts dimensions as a research tool allows the analysis to go deeper than the vague generalization about organizations found in most current literature. (3) The use of quantitative methods to investigate IS-related organizational contexts is not suitable, except for descriptive purposes; semi-structured interviews and in-depth case studies are recommended. (4) Two specific dimensions of IS-related contexts are suggested as topics for further investigation: IS Intent and IS structural factors.
APA, Harvard, Vancouver, ISO, and other styles
21

Hemingway, Christopher John. "A socio-cognitive theory of information systems and initial applications." Thesis, University of Leeds, 1999. http://etheses.whiterose.ac.uk/1280/.

Full text
Abstract:
Much has been written in the academic literature about designing information systems (IS) to satisfy organizational, rather than purely technical, objectives. The design of systems to address the requirements of end-users has also received considerable attention. Little has been said, however, about the relationship between these two facets of "best practice'' and how they might be reconciled. This is of concern because the relationship is fundamental to the success of organizational systems, the value of which is ultimately realized through the activities of individuals and workgroups. The practical benefit of achieving an integrated approach is clear. Systems can be developed in light of the relationship between worker and organization, rather than as a result of a compromise between two `competing' viewpoints. An integrated theory would also reduce the conceptual distance between current conceptions of individuals, which tend to downplay their status as social beings, and of social organizations, which often overestimate the influence of social organization on individuals' actions. A process of conceptual analysis and theory development that addresses this disjunction is presented in this thesis. As the main contribution of this research, the socio-cognitive theory of information systems is a first attempt at providing an integrated treatment of IS phenomena. The theory is developed using a dialectic research method by drawing upon existing work in human-computer interaction, information systems, psychology and sociology. Following a consideration of dialectic as a research method, it is applied to existing conceptions of the individual and of social organization in these disciplines. The theory is then constructed to provide an explanation of information systems phenomena in socio-cognitive, rather than social and cognitive, terms. Having presented the theory, its potential contribution to realizing the practical benefits of integrated approaches to IS development is illustrated through the development of a systems development lifecycle and an evaluation methodology. Recognizing that IS development is primarily concerned with the relationship between individuals and social organizations, the lifecycle model focuses attention on addressing skills issues during the development process. Extending the focus on skills and intersubjective communication, the evaluation methodology outlines a method, consistent with the socio-cognitive theory, for analysing working practices and assessing the impacts upon them of IS-related change.
APA, Harvard, Vancouver, ISO, and other styles
22

Seevinck, Jennifer. "Emergence in interactive art." Thesis, University of Technology, Sydney, 2011.

Find full text
Abstract:
This thesis is concerned with creating and evaluating interactive art systems that facilitate emergent participant experiences. For the purposes of this research, interactive art is the computer based arts involving physical participation from the audience, while emergence is when a new form or concept appears that was not directly implied by the context from which it arose. This emergent ‘whole’ is more than a simple sum of its parts. The research aims to develop understanding of the nature of emergent experiences that might arise during participant interaction with interactive art systems. It also aims to understand the design issues surrounding the creation of these systems. The approach used is Practice-based, integrating practice, evaluation and theoretical research. Practice used methods from Reflection-in-action and Iterative design to create two interactive art systems: Glass Pond and +-now. Creation of +-now resulted in a novel method for instantiating emergent shapes. Both art works were also evaluated in exploratory studies. In addition, a main study with 30 participants was conducted on participant interaction with +-now. These sessions were video recorded and participants were interviewed about their experience. Recordings were transcribed and analysed using Grounded theory methods. Emergent participant experiences were identified and classified using a taxonomy of emergence in interactive art. This taxonomy draws on theoretical research. The outcomes of this Practice-based research are summarised as follows. Two interactive art systems, where the second work clearly facilitates emergent interaction, were created. Their creation involved the development of a novel method for instantiating emergent shapes and it informed aesthetic and design issues surrounding interactive art systems for emergence. A taxonomy of emergence in interactive art was also created. Other outcomes are the evaluation findings about participant experiences, including different types of emergence experienced and the coding schemes produced during data analysis.
APA, Harvard, Vancouver, ISO, and other styles
23

Brown, Michael Daniel. "Transputer implementation of adaptive control for turbogenerator systems." Thesis, Queen's University Belfast, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.334521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Rabee, Safaa Al-Dbin Hussein. "Power control optimisation for CDMA cellular radio systems." Thesis, University of Newcastle Upon Tyne, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.270810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Tindell, Kenneth William. "Fixed priority scheduling of hard real-time systems." Thesis, University of York, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.359298.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Zhang, Meng. "Systems thinking in the construction of information systems theory: A set of methodological inquiries." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/92275/1/Meng_Zhang_Thesis.pdf.

Full text
Abstract:
This thesis examines the nature of research methods and explores novel approaches to developing richer and more realistic theory concerned with information systems. The conceptual analysis offers a solid basis for flexibly configuring research methods and for systematically constructing complex theory. The frameworks provided can help researchers better deal with increasing complexities arising from the interaction between human and technological systems.
APA, Harvard, Vancouver, ISO, and other styles
27

Behnke, Matthew J. "An implementation methodology and software tool for an entropy based engineering model for evolving systems." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBehnke.pdf.

Full text
Abstract:
Thesis (M.S. in Software Engineering)--Naval Postgraduate School, June 2003.
Thesis advisor(s): Mantak Shing, Christopher D. Miles. Includes bibliographical references (p. 69-70). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
28

Hashemi-Zahan, Saeid. "Inversion of non-minimum phase systems in signal processing." Thesis, University of Southampton, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.266944.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Kómár, Péter. "Quantum Information Science and Quantum Metrology: Novel Systems and Applications." Thesis, Harvard University, 2015. http://nrs.harvard.edu/urn-3:HUL.InstRepos:26718726.

Full text
Abstract:
The current frontier of our understanding of the physical universe is dominated by quantum phenomena. Uncovering the prospects and limitations of acquiring and processing information using quantum effects is an outstanding challenge in physical science. This thesis presents an analysis of several new model systems and applications for quantum information processing and metrology. First, we analyze quantum optomechanical systems exhibiting quantum phenomena in both optical and mechanical degrees of freedom. We investigate the strength of non-classical correlations in a model system of two optical and one mechanical mode. We propose and analyze experimental protocols that exploit these correlations for quantum computation. We then turn our attention to atom-cavity systems involving strong coupling of atoms with optical photons, and investigate the possibility of using them to store information robustly and as relay nodes. We present a scheme for a robust two-qubit quantum gate with inherent error-detection capabilities. We consider several remote entanglement protocols employing this robust gate, and we use these systems to study the performance of the gate in practical applications. Finally, we present a new protocol for running multiple, remote atomic clocks in quantum unison. We show that by creating a cascade of independent Greenberger-Horne-Zeilinger states distributed across the network, the scheme asymptotically reaches the Heisenberg limit, the fundamental limit of measurement accuracy. We propose an experimental realization of such a network consisting of neutral atom clocks, and analyze the practical performance of such a system.
Physics
APA, Harvard, Vancouver, ISO, and other styles
30

Li, Y. (Ying). "Users’ information systems (IS) security behavior in different contexts." Doctoral thesis, Oulun yliopisto, 2015. http://urn.fi/urn:isbn:9789526209395.

Full text
Abstract:
Abstract Users’ information systems (IS) security behavior continuously draws attentions from scholars and practitioners. While previous studies usually focused on one context (e.g., employees’ compliance with IS security policies in an organizational context), little research has focused on the possible explanations for users’ IS security behavior if the context changes. To address this gap, this dissertation discusses the role of context in IS security behavior research. An analysis of the differences between the organizational context and the home context suggests a need to study users’ IS security behavior solely in a specific context, such as home. This study provides guidelines for applying and developing contextualized theories in IS security behavior research. Based on the guidelines, this dissertation includes two empirical studies. First, drawing on rational choice theory, it compares specific IS security behavior in two contexts: the work context (N = 210) and the personal context (N = 202). Second, drawing on stewardship theory, this dissertation develops a contextualized theory explaining employees’ IS security risk-taking behavior in the organizational context (N = 170). The findings of this dissertation show different explanations for users’ IS security behavior in different contexts and highlight the importance of taking context into account when doing IS security behavior research. The results of each empirical study provide both theoretical contributions to research as well as actionable advice to practice
Tiivistelmä Tietokoneenkäyttäjien tietoturvakäyttäytyminen on jatkuvan kiinnostuksen kohteena niin tutkijoiden kuin käytännön ammatinharjoittajienkin keskuudessa. Aiempi tutkimus on keskittynyt tarkastelemaan tietoturvakäyttäytymistä yleensä yhdessä kontekstissa (esim. työntekijöiden tietoturvaohjeiden noudattaminen organisaatiokontekstissa), kun taas vähemmälle huomiolle on jäänyt se, kuinka kontekstin muuttuminen selittää tietoturvakäyttäytymistä. Tämä väitöskirja vastaa kyseiseen ongelmaan, sillä se käsittelee kontekstin roolia tietoturvakäyttäytymistutkimuksessa. Tutkimuksessa analysoidaan organisaatiokontekstin ja kotikontekstin eroja. Analyysi osoittaa, että on tarpeellista tutkia tietokoneen käyttäjien tietoturvakäyttäytymistä tietyissä konteksteissa, kuten esimerkiksi kotikontekstissa. Tutkimus tarjoaa ohjeita siihen, kuinka kontekstisidonnaisia teorioita sovelletaan ja kehitetään tietoturvakäyttäytymistutkimuksessa. Väitöskirja sisältää 2 empiiristä tutkimusta, jotka pohjautuvat edellä mainittuihin ohjeisiin. Ensimmäisessä vaiheessa tutkimuksessa sovelletaan rational choice -teoriaa, jonka pohjalta vertaillaan tiettyä tietoturvakäyttäytymistyyppiä 2 kontekstissa: työkonteksti (N = 210) ja henkilökohtaisen käytön konteksti (N = 202). Toiseksi, tutkimus soveltaa stewardship -teoriaa ja kehittää siihen pohjautuen kontekstisidonnaisen teorian, joka selittää organisaation työntekijöiden käyttäytymistä liittyen tietoturvariskin ottamiseen (N = 170). Väitöskirjan tutkimustulokset esittävät erilaisia selityksiä tietokoneen käyttäjien tie-toturvakäyttäytymiselle eri konteksteissa. Tutkimus korostaa sitä, kuinka tärkeää on ottaa konteksti huomioon tutkittaessa tietoturvakäyttäytymistä. Kummankin empiirisen tutkimuksen tulokset tarjoavat teoreettisen kontribuution lisäksi käytännöllisiä neuvoja tietoturvan toteuttamiseen
APA, Harvard, Vancouver, ISO, and other styles
31

Mujuru, Takunda Arthur. "Realising partnership needs : a grounded theory of mobile banking service providers in Zimbabwe." Master's thesis, University of Cape Town, 2013. http://hdl.handle.net/11427/5667.

Full text
Abstract:
Includes abstract.
Includes bibliographical references.
Mobile banking in Zimbabwe as a new phenomenon has been generally unexploredacademically. The infant industry has seen various stakeholders step up to partake in thedevelopment of mobile banking services with various renditions of the phenomenonsurfacing. The coming together of the stakeholders from different backgrounds has not beenwithout complications. This study employs the Classic Grounded Theory methodology in aneffort to discover the main concerns of the stakeholders involved in the development ofmobile banking in Zimbabwe. The study finds that the main concern of these people ispartnering. A grounded theory on how the need for partnering is realised and pursued througha three stage process named the Realisations Process is developed. The Realisations Processis how the stakeholders involved resolve their main concern by initially realising their needfor partnering, reaching out to and engaging potential partners and eventually partnering withthem on the condition they similarly realise the need to partner.
APA, Harvard, Vancouver, ISO, and other styles
32

Oreshkov, Ognyan. "Topics in quantum information and the theory of open quantum systems." Doctoral thesis, University of Southern California, Los Angeles, 2008. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/225666.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Ludlow, Brian Alan. "Information systems strategy - theory and practice within a multi-divisional organisation." Thesis, Henley Business School, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.232937.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Onik, Mohammad Fakhrul Alam. "Business value of information technology: A complex adaptive systems theory view." Thesis, Queensland University of Technology, 2019. https://eprints.qut.edu.au/132323/1/Mohammad%20Fakhrul%20Alam_Onik_Thesis.pdf.

Full text
Abstract:
This thesis explores a dynamic perspective on the business value of IT (BVIT) in contemporary organisations. Using two theoretical concepts from Complex Adaptive Systems theory, emergence and coevolution, it presents a conceptual BVIT framework explaining how IT-enabled capabilities emerge from IT assets in contemporary organisations and how the coevolution of these capabilities can help organisations obtain competitive advantage. The emergence perspective demonstrates how IT-enabled capabilities arise via bottom-up interactions between the components of IT assets and organisational resources. The coevolution perspective includes micro coevolution, which emphasises how these capabilities improve within organisations, and macro coevolution, which highlights action-based competitive relationships among firms and how they vie for advantage.
APA, Harvard, Vancouver, ISO, and other styles
35

Abegaze, A. "Assessment of speech synthesis systems for application in mobile communications." Thesis, University of Bradford, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.380392.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Johansson, Ronnie. "Information Acquisition in Data Fusion Systems." Licentiate thesis, KTH, Numerical Analysis and Computer Science, NADA, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-1673.

Full text
Abstract:

By purposefully utilising sensors, for instance by a datafusion system, the state of some system-relevant environmentmight be adequately assessed to support decision-making. Theever increasing access to sensors o.ers great opportunities,but alsoincurs grave challenges. As a result of managingmultiple sensors one can, e.g., expect to achieve a morecomprehensive, resolved, certain and more frequently updatedassessment of the environment than would be possible otherwise.Challenges include data association, treatment of con.ictinginformation and strategies for sensor coordination.

We use the term information acquisition to denote the skillof a data fusion system to actively acquire information. Theaim of this thesis is to instructively situate that skill in ageneral context, explore and classify related research, andhighlight key issues and possible future work. It is our hopethat this thesis will facilitate communication, understandingand future e.orts for information acquisition.

The previously mentioned trend towards utilisation of largesets of sensors makes us especially interested in large-scaleinformation acquisition, i.e., acquisition using many andpossibly spatially distributed and heterogeneous sensors.

Information acquisition is a general concept that emerges inmany di.erent .elds of research. In this thesis, we surveyliterature from, e.g., agent theory, robotics and sensormanagement. We, furthermore, suggest a taxonomy of theliterature that highlights relevant aspects of informationacquisition.

We describe a function, perception management (akin tosensor management), which realizes information acquisition inthe data fusion process and pertinent properties of itsexternal stimuli, sensing resources, and systemenvironment.

An example of perception management is also presented. Thetask is that of managing a set of mobile sensors that jointlytrack some mobile targets. The game theoretic algorithmsuggested for distributing the targets among the sensors proveto be more robust to sensor failure than a measurement accuracyoptimal reference algorithm.

Keywords:information acquisition, sensor management,resource management, information fusion, data fusion,perception management, game theory, target tracking

APA, Harvard, Vancouver, ISO, and other styles
37

Mair, Patrick, and Horst Treiblmaier. "Partial Credit Models for Scale Construction in Hedonic Information Systems." Department of Statistics and Mathematics, WU Vienna University of Economics and Business, 2008. http://epub.wu.ac.at/1614/1/document.pdf.

Full text
Abstract:
Information Systems (IS) research frequently uses survey data to measure the interplay between technological systems and human beings. Researchers have developed sophisticated procedures to build and validate multi-item scales that measure real world phenomena (latent constructs). Most studies use the so-called classical test theory (CTT), which suffers from several shortcomings. We first compare CTT to Item Response Theory (IRT) and subsequently apply a Rasch model approach to measure hedonic aspects of websites. The results not only show which attributes are best suited for scaling hedonic information systems, but also introduce IRT as a viable substitute that overcomes severall shortcomings of CTT. (author´s abstract)
Series: Research Report Series / Department of Statistics and Mathematics
APA, Harvard, Vancouver, ISO, and other styles
38

Mpazanje, Flora Titani Harriet. "Towards understanding as-lived experiences in information systems projects : an actor-network theory perspective." Master's thesis, University of Cape Town, 2009. http://hdl.handle.net/11427/5668.

Full text
Abstract:
Includes bibliographical references (leaves 163-174).
This research project began with a literature review of IS project management theories which aimed to explore and describe the as-lived experience of practitioners in an IS project network. The study builds on this body of knowledge by providing a narrative of as-lived experiences of IS project participants. The study involved a cross-sectional study of two IS projects cases from two countries in sub-Saharan Africa, namely, Malawi and South Africa. Information was collected and analysed qualitatively using Actor-network Theory. Unstructured interviews were the main data gathering technique supplemented with secondary data and observations. Most interviews were audio recorded. All interviews were transcribed before analysis.
APA, Harvard, Vancouver, ISO, and other styles
39

Mutshewa, Athulang. "A theory of the use of information for environmental planning : the case of Botswana." Doctoral thesis, University of Cape Town, 2006. http://hdl.handle.net/11427/15426.

Full text
Abstract:
Includes bibliographical references.
This study is about the use of information by people work roles. Although the use of information is a key issue in information systems theory and practice, it has received little attention from information systems researchers. Information systems research has been biased towards technology and its use. Our understanding of the use of information by people in work roles to guide the development of information svstems and information management is limited. The present study addresses this imbalance investigating the use of information by planners when they grapple with environmental issues in the development process. The study takes a behavioural perspective to develop a Grounded Theory of the use of information for environmental planning. The research emphasises the use of a qualitative research to understand the use information in relation to tasks and activities the planners perform in projects. Semi-structured interviews were conducted in the workplace environment to collect data on the respondents have used information in projects that they had done before. Forty-four subjects were selected from five councils in Botswana. The evidence was corroborated by interviewing ten people outside council who were identified with help of the respondents in the councils. The data was analysed through a coding process in accordance the Grounded Theory techniques. The coding took place in multiple iterations, experts confirmed the results, and the respondents validated theory. The study demonstrates that the use of information by people in work roles can be explored empirically from a behavioural perspective using a qualitative approach – in particular, Grounded Theory. The study identified the processes, contexts, and behaviours relating to the use information. The main finding is the Grounded Theory of the use information for environmental planning. The theory has seven main categories - dynamic project information context, motivators, experiential knowledge, informational power, strategy for participation and pattern of information use. The pattern of information use is the core category. The dynamic project information context, motivators, experiential knowledge and role context influence the pattern of information use in a variety of ways. The pattern of information use generates the informational power base of the planners. The interpretation of the theory shows that the planners exercise their informational power through the strategy for participation in which they facilitate the environmental planning process for the production of environmental plans. The study shows that power relations endemic in environmental planning are essential determinants of the kind of information behaviour that planners exhibit. The findings provide a new way of thinking about developing information systems and information management for planners. It is suggested that when developing information systems for planners the developers should focus on systems functions that facilitate and enhance information behaviours that are induced by the power relations experienced by the planners.
APA, Harvard, Vancouver, ISO, and other styles
40

Dooley, Phillip. "The Effective implementation of GIS in local government using diffusion theory /." Connect to thesis, 2001. http://eprints.unimelb.edu.au/archive/00001047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Parrish, James. "SENSEMAKING IN INFORMATION SYSTEMS: TOWARD A SENSEMAKING INQUIRING SYSTEM." Doctoral diss., University of Central Florida, 2008. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3502.

Full text
Abstract:
Complexity and uncertainty have long been problems for organizations of all types. Organizational members do not do a very good job of dealing with the complexity and uncertainty as research shows that when faced with complex situations humans often turn to the same sources of information repeatedly (a practice that will eventually betray them), and/or reduce the amount of scanning that they do (Weick 1995; Boyd and Fulk 1996). Organizations often turn to information systems to help them deal with the complexity, but they often take a techno-centric view of knowledge that does not incorporate the human qualities needed for unstructured decisions (Malhotra 1997; Courtney 2001; Malhotra 2001). Additionally, there are times when the information systems that we are using may hinder the processes of dealing with the complexity (Weick and Meader 1993). Weick's (1995) concept of sensemaking is believed to help us to deal with this complexity. In his work with Meader (1993) he wonders what the effects of a sensemaking support system would have, but he does not have the answer because they state that it has not been asked. This dissertation answers the call of Weick and Meader as well as other scholars that have called for sensemaking and human intuition to be included in our information systems. This is accomplished by viewing sensemaking from an inquiring systems perspective (Churchman 1971) to develop a kernel theory that will be used in the context of design science to develop design requirements and principles for a sensemaking system. These design principles are then used to build an instantiation of the system in the form of SenseMan, a system designed to help a local government agency deal with complexity in the context of software updates. Finally the design is evaluated for its effectiveness in dealing with the complexity of in this context using both quantitative and qualitative methods.
Ph.D.
Department of Management Information Systems
Business Administration
Business Administration PhD
APA, Harvard, Vancouver, ISO, and other styles
42

Ko, Pui S. "Dimensions of information technology governance: A study of theory and practice." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2008. https://ro.ecu.edu.au/theses/1609.

Full text
Abstract:
The emergence of corporate governance is the response to recent high profile collapses of organisations such as Enron and WorldCom. Because of the ubiquitous nature of Information Technology (IT) and its influence on organisational activities, IT governance is increasingly seen as an integral part of corporate governance. However, existing literature shows the lack of a common understanding of IT governance due to various perspectives held amongst academics and practitioners. For example, schools of thought group IT governance according to structure with an emphasis on control and co-ordination or process with an emphasis on capability and continuity. The purpose of this research was to identify the key dimensions of IT governance from existing best practice frameworks and academic literature and to examine how they are reflected in the IT governance practices of organisations. Various legislations (e.g. Sarbanse-Oxley Act, 2002), best practice frameworks (e.g. Val IT, COBIT) and the writings of academic researchers (e.g. Van Grembergen, Weill & Ross) were reviewed which resulted in the synthesis of the following four key IT governance dimensions: Structures, People, Processes and IT Decision Domains, which were further divided into a set of sub-dimensions. Among the domains of IT governance, risk management and value delivery are regarded as core and, as such, provided the focus for the empirical part of the research. Four major universities located in Perth, Western Australia, chosen as case studies, constituted two equal groups based on their relative emphasis of IT governance, viz. risk management or value delivery. The case study methodology was justified on the basis of the relative newness of the research domain and enabling "how", "what" and "why" questions to be explored. Semi-structured interviews with the IT Directors I CIOs of the four case organisations were conducted in which their IT governance (risk management/value delivery) practices were mapped against the identified theoretical dimensions. Data triangulation enhanced validity and reliability by using multiple data sources such as data from organisations' websites. Interviews were transcribed and computer-based qualitative data analysis software (NVivo) was used to build the case study database and to analyse data against the theoretical IT governance dimensions. First, a within case analysis provided "what" and "how" insights followed by cross case analysis in which "why" aspects are discussed. This study found that IT governance is shaped by a number of sub dimensions, particularly organisational culture and leadership. They drive how IT governance is implemented and accepted within the participating organisations and influence whether or not an IT governance culture will be ingrained into the organisation. In addition, a strategy balancing formal, such as committee meetings, and informal communications, such as dialogues and networks, seemed to influence IT governance. lt was notable that performance tracking was a weak and immature dimension and further attention is required from the participants to clarify what and how to measure the progress of IT governance. Finally, it was generally accepted that IT governance should be viewed from a holistic perspective to be able to oversee, coordinate and integrate all the constituents including processes, tools, structures and resources. The study findings enabled recommendations to be formulated to provide practical advice to other, similar organisations. The thesis recognises a number of limitations which provide opportunities for further research. Among them are the nature of IT governance dimensions developed for this study and the research design which limits the potential for generalisation. By using this study as a reference point, future research can be expanded into different directions, such as examining IT governance in a wider context (e.g. different domains and sectors), establishing the influences of the characteristics of IT managers I CIOs (e.g. management traits) and developing progress towards IT governance maturity (i.e. a longitudinal study).
APA, Harvard, Vancouver, ISO, and other styles
43

Yeldener, Suat. "Sinusoidal model based low bit rate speech coding for communication systems." Thesis, University of Surrey, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.359842.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Backhouse, James. "The use of semantic analysis in the development of information systems." Thesis, London School of Economics and Political Science (University of London), 1991. http://etheses.lse.ac.uk/2079/.

Full text
Abstract:
This research has accomplished a clarification of what exactly constitutes semantic analysis using the specification language NORMA. Having clarified the essential elements of the language, this work has shown how the language can be put into practice. The technique has been exemplified on three applications. This process of indicating how the technique can be applied to a case is necessary if we are to show the practical usability. Another important contribution has been the setting out of more precise rules for the constraints; the sketching out of a metaschema. Although more work is needed here to express the full range of metaphysical relationships that underlie any semantic schema in NORMA, a start has been made. This work will support the building of a computer system to aid the analyst. With the large range of constraints and fundamental assumptions associated with NORMA, the need for a method of applying them was paramount. In this work we have attempted to set out a rational agenda of work comprised in the performing of semantic analysis, and in a manner which is easily accessible. A simple set of ten stages in the work spans the range of tasks that are required. At no stage has there existed such a straightforward introduction, rather, the tendency has been to point to the possibility of beginning the analysis in a number of ways. As a further contribution this work has examined some of the examples of semantic analysis and identified a few 'classic' errors. The importance of this is to focus on what are likely to be common mistakes that spring from an inadequate grasp of the language, which if corrected can lead to better results quite quickly and avoid a significant part of the problems associated with the 'learning curve'.
APA, Harvard, Vancouver, ISO, and other styles
45

Huang, Xiangji. "A probabilistic approach for Chinese information retrieval : theory, analysis and experiments." Thesis, City University London, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.390951.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Constaninides, George Anthony. "High level synthesis and word length optimization of digital signal processing systems." Thesis, Imperial College London, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.252020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Atungsiri, Samuel Asangbeng. "Joint source and channel coding for low bit rate speech communication systems." Thesis, University of Surrey, 1991. http://epubs.surrey.ac.uk/989/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Al-Rawas, Layth. "The design of synchronisation and tracking loops for spread-spectrum communication systems." Thesis, University of Bath, 1985. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.370459.

Full text
Abstract:
The work reported in this thesis deals with aspects of synchronisation and tracking in direct sequence spread spectrum systems used in ranging and communications applications. This is regarded as a major design problem in such systems and several novel solutions are presented. Three main problem areas have been defined: i) reduction of the acquisition time of code sychronisation in the spread spectrum receiver; ii) reduction of the receiver complexity; iii) improvement of the signal to noise ratio performance of the system by better utilisation of the power spectrum in the main lobe of the transmitted signal. Greater tolerance to Doppler shift effects is also important. A general review of the spread spectrum concept and past work is first given in Chapter One, and common methods of synchronisation and tracking are reviewed in Chapter Two. There, current performance limitations are also included. In Chapter Three a novel method is given for increasing the speed of synchronisation between locally generated and received codes, using a technique of controlling the loop's error curve during acquisition. This method is applied to different width delay lock loops, and a significant increase in maximum search rate is obtained. The effect of the width of the discriminator characteristics and damping ratio on the maximum search rate are also examined. The technique is applied to data modulated spread spectrum systems which use either synchronous or asynchronous data communication systems. All methods have been tested experimentally and found to perform as predicted theoretically. Several novel spread sprectrum configurations are given in Chapter Four which employ multi-level sequences. Some configurations have reduced the complexity and cost of the spread spectrum receivers. Others show some improvement in the maximum search rate as well as the signal to noise ratio performance. Some of these configurations have been implemented experimentally. In Chapter Five, the generation and properties of the composite (Kronecker) sequences are explained. Several types of component sequences are examined. And the reception of these composite sequences are discussed. In particular, a technique is introduced for achieving a rapid acquisition of phase synchronisation using these codes. The effect of white Gaussian noise on the acquisition performance of the delay lock loop is given in Chapter Six. Experimental results are obtained for both digital and analogue correlators. Chapter Seven gives a final summary of the conclusions, and further work suggestions.
APA, Harvard, Vancouver, ISO, and other styles
49

Robbin, Alice, and Lee Frost-Kumpf. "Extending theory for user-centered information systems: Diagnosing and learning from error in complex statistical data." John Wiley & Sons, Inc, 1997. http://hdl.handle.net/10150/105746.

Full text
Abstract:
Utilization of complex statistical data has come at great cost to individual researchers, the information community, and to the national information infrastructure. Dissatisfaction with the traditional approach to information system design and information services provision, and, by implication, the theoretical bases on which these systems and services have been developed has led librarians and information scientists to propose that information is a user construct and therefore system designs should place greater emphasis on user-centered approaches. This article extends Dervinâ s and Morris's theoretical framework for designing effective information services by synthesizing and integrating theory and research derived from multiple approaches in the social and behavioral sciences. These theoretical frameworks are applied to develop general design strategies and principles for information systems and services that rely on complex statistical data. The focus of this article is on factors that contribute to error in the production of high quality scientific output and on failures of communication during the process of data production and data utilization. Such insights provide useful frameworks to diagnose, communicate, and learn from error. Strategies to design systems that support communicative competence and cognitive competence emphasize the utilization of information systems in a user centered learning environment. This includes viewing cognition as a generative process and recognizing the continuing interdependence and active involvement of experts, novices, and technological gatekeepers.
APA, Harvard, Vancouver, ISO, and other styles
50

Burgos, Andrés C. "Information-theoretic models of communication in biological systems." Thesis, University of Hertfordshire, 2017. http://hdl.handle.net/2299/19509.

Full text
Abstract:
This thesis aims to find general principles governing the behaviour of biological systems, with a particular emphasis in the communicational (social) aspect of these systems. Communication between biological entities plays a major role in their evolution, enabling them to exchange information about their environment and thereby improving their chances of survival. Communication also plays a pivotal role in the organisation of populations of organisms, clearly observed in social insects, but present also at least in bacteria, plants, fungi, animals and humans. It is also theorised that the genetic code is a by-product of the establishment of an innovation-sharing protocol between primitive cells [Vetsigian et al., 2006]. This thesis is mainly concerned with identifying necessary conditions for the emergence of communicational codes, and the problems that arise with their establishment. For this purpose, we introduce an information-theoretic framework where species maximise their growth rate by following a Kelly-gambling strategy to bet on environmental conditions. Information theory provides a powerful tool for abstracting away mechanisms and for focusing on hard limits of a system's dynamics which cannot be circumvented. We begin by exploring the relation between information exchange and limited resources. We show that a transition from cooperation to antagonism in the exchange of environmental information follows from a change in the availability of resources, from abundant to scarce. We then assume a non-competitive scenario with abundance of resources, where conflicts in a population occur only at a communicational (informational) level, rather than on the physical level, such as competing for (physical) resources. However, traditional Shannon communication is non-semantic, as opposed to the semantic communication observed in biological systems, which is necessary for capturing conflicts in communication. In the traditional use of information theory, it is assumed that every organism knows how to \interpret" the information offered by other organisms. However, this assumes that one \knows" which other organisms one observes, and thus which code they use. In our model, however, we wish to preclude that: namely, we will do away with the assumption that the identity of the organisms who send the messages and those who receive them is known, and the resulting usable information is therefore influenced by the universality of the code used and by which organisms an organism is \listening" to. We introduce a model which captures semantic communication in information-theoretic terms, where organisms talk to each other in a communication network. We show that, for particular population structures, when organisms cannot identify which other organisms they talk to, the adoption of a universal code emerges as a solution for full interpretation of the shared information. However, the evolution and establishment of universal codes for communication introduces vulnerabilities: organisms can be exploited by parasites. We de ne two types of parasites whose strategies have different levels of complexity and study the co-evolution of a host (the population) and a parasite by optimising their respective objective functions in stages. First, we consider a disruptive parasite (a troll) that inflicts harm in a host by minimising a population's mutual understanding, and then a more complex parasite, which manipulates the members of the population via their codes (the puppetmaster). We show emergent characterisations of both parasites, as well as which host configurations are robust against parasites and show adaptive properties. This thesis introduces a framework which allows the study of informational properties in the host-parasite co-evolution, where the rules of the parasite's habitat, the host, are the outcome of an evolutionary process, and where these very same rules are those that allow the parasite to exploit the host.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography