To see the other types of publications on this topic, follow the link: Computer based information systems.

Dissertations / Theses on the topic 'Computer based information systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Computer based information systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Onyino, Walter. "Rearchitecting legacy information systems : a service based method." Thesis, Lancaster University, 2001. http://eprints.lancs.ac.uk/11941/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Katoma, Victor. "A framework for computer-based knowledge management systems." Master's thesis, University of Cape Town, 2007. http://hdl.handle.net/11427/6406.

Full text
Abstract:
Includes bibliographical references (leaves 83-92).
This study aims at investigating a framework that utilises the latest advances in KMS technology. This research outlines the framework and describes a system developed around this. The framework is based on fundamental knowledge management concepts, Resource Description Framework (RDF) and basic modeling concepts and tools. It also incorporates notions of knowledge quality measure and a simple inference mechanism in order to probe, learn and adapt the KMS with the changing needs of its users.
APA, Harvard, Vancouver, ISO, and other styles
3

Blair, Garry John. "A management framework for implementing computer-based information systems." Thesis, Manchester Metropolitan University, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.418125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Clarke, Stephen Allen. "Critical complementarism and information systems : a total systems approach to computer-based information systems strategy and development." Thesis, Brunel University, 1997. http://bura.brunel.ac.uk/handle/2438/4284.

Full text
Abstract:
This thesis is about intervening in organisations to improve both operational and strategic computer-based information systems. It addresses a particular situation, in which human activity is seen to be a key factor in the success of the system. A stance is taken regarding current approaches to such development, supported by historical analysis of both the theory and practice of such approaches: in particular, the failure of traditional information systems development methodologies to address these situations is seen to question their validity. A review of existing theory and practice shows that computer-based information systems development appears to be dominated by functionalist, reductionist, engineering methods, marginally challenged by soft, interpretivist approaches. Analysis of the computer-based information systems development domain shows this to be an impoverished view, and indicates that an approach based on social systems is likely to be more representative of the problem situations faced. As a result, computer-based information systems development is taken beyond the 'hard-soft' debate, into a search for theoretical underpinning and practical approaches informed from social theory. However, whilst the theory is readily available, the application of that theory to computer-based information systems development is seen to be problematic. Potential improvement is achieved by the development of an interventionist framework which is based on a branch of social systems theory, that of critical social theory, and which draws heavily on work already undertaken in the domain of management science under the headings of critical systems thinking and total systems intervention. This framework is applied to two case studies and a major, longitudinal action research based investigation. The findings strongly support computer-based information systems development based on social, and especially critical social, theories. These findings are critiqued within the study, and from this emerge clear conclusions, and recommendations for future development.
APA, Harvard, Vancouver, ISO, and other styles
5

Gregory, Frank Hutson. "A logical analysis of soft systems modelling : implications for information system design and knowledge based system design." Thesis, University of Warwick, 1993. http://wrap.warwick.ac.uk/2888/.

Full text
Abstract:
The thesis undertakes an analysis of the modelling methods used in the Soft Systems Methodology (SSM) developed by Peter Checkland and Brian Wilson. The analysis is undertaken using formal logic and work drawn from modern Anglo-American analytical philosophy especially work in the area of philosophical logic, the theory of meaning, epistemology and the philosophy of science. The ability of SSM models to represent causation is found to be deficient and improved modelling techniques suitable for cause and effect analysis are developed. The notional status of SSM models is explained in terms of Wittgenstein's language game theory. Modal predicate logic is used to solve the problem of mapping notional models on to the real world. The thesis presents a method for extending SSM modelling in to a system for the design of a knowledge based system. This six stage method comprises: systems analysis, using SSM models; language creation, using logico-linguistic models; knowledge elicitation, using empirical models; knowledge representation, using modal predicate logic; codification, using Prolog; and verification using a type of non-monotonic logic. The resulting system is constructed in such a way that built in inductive hypotheses can be falsified, as in Karl Popper's philosophy of science, by particular facts. As the system can learn what is false it has some artificial intelligence capability. A variant of the method can be used for the design of other types of information system such as a relational database.
APA, Harvard, Vancouver, ISO, and other styles
6

Susarapu, Santa Ram. "ALIGNING SECURITY AND USABILITY OBJECTIVES FOR COMPUTER BASED INFORMATION SYSTEMS." VCU Scholars Compass, 2012. http://scholarscompass.vcu.edu/etd/2866.

Full text
Abstract:
With extensive use of information systems in day-to-day business operations, many organizations are facing challenges to develop robust computer-based information systems that are secure and widely used by the user community. In order to develop information systems that are secure and useful, understanding what stakeholders consider important and value about the security and usability is critical. Security refers to confidentiality, integrity and availability and usability refers to efficiency, effectiveness and user satisfaction. Using Value Focused Thinking approach, this research first proposes the usability objectives based on the values of system developers and users. Using the security objectives proposed by Dhillon & Torkzadeh (2006) and the usability objectives, this research proposes hierarchies with the overall/over-arching goals of security (confidentiality, integrity, availability) and/or usability (efficiency, effectiveness and satisfaction). This research also analyzes a case of computer hacking and identifies which of the security and usability objectives that have not been met in that case study. The research contributions which include the usability objectives and security and usability hierarchies can be useful for theoretical as well as practical purposes.
APA, Harvard, Vancouver, ISO, and other styles
7

Mancuso, Vincent M. "Fighter Pilot Ground-Based Information Acquisition: A Conceptual Model for Information Systems Design." NSUWorks, 1993. http://nsuworks.nova.edu/gscis_etd/696.

Full text
Abstract:
The primary purpose of this dissertation was to develop a conceptual model for information systems design based on a qualitative analysis of the fighter pilot's environment. The model was derived from the fighter pilot's conceptions and perceptions of his informational environment. The resultant model and the corresponding environmental specification can serve as the conceptual cornerstones for further development by providing the designers a common conceptual focal point for further information system design. The model used for overall information systems design was the Rolland & Cauvet development model. This model identifies two independent development domains: requirements engineering and design engineering. This dissertation represents the requirements engineering work. The approach selected in developing the requirements engineering aspect was Checkland's Soft Systems approach. Checkland's approach was suited to this project due to its model building orientation and its ability to handle the complexity and flexibility dictated by real-world human activity. The cognitive model, recommendations, hypotheses, and conclusions serve as an important step toward development of the fighter pilot's ground-based information system. There had been very little research, however, that addressed the cognitive structure and processes pilots use to develop memory frames necessary for airborne situational awareness. The goal of this project was to develop the first stage of a process leading to an inquiry system that will be used to augment the pilot's inquiry and conceptual structure building to capture the inherent complexity of this multidimensional environment, the researcher observed fighter pilots in their natural environment utilizing the multiple-site case study methodology supplemented by other qualitative data sources. The researcher utilized these data to develop the conceptual model. In addition, findings were derived, recommendations were generated and hypotheses were extracted using the Checkland model as a guide. The Glaser and Struass Constant Comparative Method was used for data analysis. The researcher identified the information environment as having two distinctly different components: structure and process. Seven versions of the model were presented in this iterative development effort. The dissertation is concluded with a series of recommendations, implications and conclusions that serve as the link between the conceptual model and the future work on the information system that will be completed by design engineers.
APA, Harvard, Vancouver, ISO, and other styles
8

Lycett, Mark Geoffrey. "The development of component-based evolutionary information systems." Thesis, Brunel University, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.266634.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mena, Eduardo Illarramendi Arantza. "Ontology-based query processing for global information systems /." Boston [u.a.] : Kluwer Acad. Publ, 2001. http://www.loc.gov/catdir/enhancements/fy0813/2001029621-d.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Booth, Ronald L. "An Information Systems Project Delivery Methodology for Implementing Web-Based Program Management Systems." NSUWorks, 2003. http://nsuworks.nova.edu/gscis_etd/420.

Full text
Abstract:
In this study the researcher applied an Information Systems Project Delivery Methodology (ISPDM) for implementing a Web-based Program Management System in an organization that did not have one. The problem investigated in this study was the difficulty encountered when organizations implement ISPDMs. The research questions were (1) what is the role of each of Roberts' et al. five factors in the implementation of an ISPDM? And (2) how effective is a Web-based program management system implemented using an ISPDM in meeting the participants desired outcomes? The general approach utilized to address the research questions was to describe the implementation of a Web-based program management ISPDM using a single descriptive case study. A survey, focus group, and usability testing were utilized at three different stages of the Web-based program management module's implementation. In conducting this study research, multiple sources of data were collected to develop an in-depth description of the case as it developed. The open-ended survey was given at three different points, the beginning, the middle and the end of the ISPDM Web based program management module implementation. A focus group was conducted for planning evaluation to assess the participant's desired outcomes for the Web-based program management system. A focus group for in-process evaluation assessed the extent to which the Web-based program management module achieved the outcome measures. A focus group for summative evaluation determined whether or not the final product met the expectations of the users. In addition, a usability survey was conducted in conjunction with the in-process and summative evaluation focus groups. The results of this study indicated the role of organizational transition when implementing a Web-based program management system using an ISPDM is to provide training, education, and communications. The role of functional management involvement/support during the implementation process is to provide resources and lead the process of adopting the new methodology. The role of the ISPDM during the transition stage is to communicate the change and to foster cultural integration, provide a framework for using the product, and to provide training. The role of the use of software development models in the implementation process is to provide guidelines, framework, metrics, and to lend credibility to the value of the methodology. The role of external support during the implementation process is to provide an industry-wide knowledge base, oversight, and an independent review of the new methodology.
APA, Harvard, Vancouver, ISO, and other styles
11

Gursel, Guney. "Expectation Based Evaluation Framework For Hostpital Information Systems." Phd thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12614151/index.pdf.

Full text
Abstract:
Evaluation is essential for Medical Informatics as well as many other disciplines. There is a growing interest and investment for evaluation researches and self evaluation works. Hospital Information System (HIS) evaluation frameworks have largely been discussed in the literature. However, existing frameworks lack one important aspect, to what extent user expectations from HIS are met. To complement this deficiency we designed an evaluation farmework for evaluating the user expectation in HIS. User expectation data are collected by means of &ldquo
Expectation Questionnaire&rdquo
. Fuzzy logic methodologies are used to evaluate the expectation meeting in the proposed evaluation framework. The evaluation variables are not represented in the result equally
they are reflected by the weights assigned by the users. Our proposed framework provides the overall degree to what extent user expectations are met. It also gives the opportunity to analyze to what extent each expectation is met and degree to what extent different user groups&rsquo
expectations are met. Education, sex and business title is determinants of general expectations about HIS. IS experience is not a determinant of medical users&rsquo
expectations in any expectations. The proposed framework is not a rival but an alternative or complementary to the existing frameworks. It is a different approach and has different computation methodology supported by fuzzy logic. The framework can give detail to the each variable level. These results are just a photo of the current situation
a deeper analysis of these findings must be done for further information about the causes of these results.
APA, Harvard, Vancouver, ISO, and other styles
12

Lin, Francis. "Microcomputer based management information system." Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9929.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Anton, Ana I. "Goal identification and refinement in the specification of software-based information systems." Diss., Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/8130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Chen, Yi. "A palm computer based mobile information system for clinical headache research." Ohio : Ohio University, 2001. http://www.ohiolink.edu/etd/view.cgi?ohiou1173808095.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Wazzan, Wajdi. "COGNITIVE LEARNING FROM COMPUTER-BASED INFORMATION SYSTEMS BY INCORPORATING KNOWLEDGE CONSTRUCTION INTERVENTIONS." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2714.

Full text
Abstract:
The aim of the present study was to develop and empirically evaluate different categories of instructional activities, which stimulate the generation and construction of knowledge on the part of an individual student. These generative activities are primed by prompts or scaffolds, which can easily be inserted into specific curriculum addressing any domain of knowledge. To assess the manner in which the knowledge construction interventions influence the learning outcomes from computerized information systems, we have developed an online computer-based information system that describes the functions and mechanisms associated with the bus system of the US army Abrams M1A2 tank. Seven versions of this interactive instructional computer system were developed for this research; the type of prompt was manipulated among the seven experimental conditions. The seven experimental conditions were control, sentence completion, sentence generation, system provided questions, self-generated questions and answers, system provided advanced organizers, and generated advanced organizers. The results from this study provided strong evidence that the integration of knowledge construction interventions within the curriculum material have improved understanding of the curriculum content and reasoning about such content over and above the mere presentation and study of the curriculum. The research also delineated a practical way on how to incorporate and operationally integrate the knowledge construction interventions within computer-based information systems.
Ph.D.
Department of Industrial Engineering and Management Systems
Engineering and Computer Science
Industrial Engineering PhD
APA, Harvard, Vancouver, ISO, and other styles
16

Thomson, Steven Michael. "A standards-based security model for health information systems." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/718.

Full text
Abstract:
In the healthcare environment, various types of patient information are stored in electronic format. This prevents the re-entering of information that was captured previously. In the past this information was stored on paper and kept in large filing cabinets. However, with the technology advancements that have occurred over the years, the idea of storing patient information in electronic systems arose. This led to a number of electronic health information systems being created, which in turn led to an increase in possible security risks. Any organization that stores information of a sensitive nature must apply information security principles in order to ensure that the stored information is kept secure. At a basic level, this entails ensuring the confidentiality, integrity and availability of the information, which is not an easy feat in today’s distributed and networked environments. This paved the way for organized standardization activities in the areas of information security and information security management. Throughout history, there have been practices that were created to help “standardize” industries of all areas, to the extent that there are professional organizations whose main objective it is to create such standards to help connect industries all over the world. This applies equally to the healthcare environment, where standardization took off in the late eighties. Healthcare organizations must follow standardized security measures to ensure that patient information stored in health information systems is kept secure. However, the proliferation in standards makes it difficult to understand, adopt and deploy these standards in a coherent manner. This research, therefore, proposes a standards-based security model for health information systems to ensure that such standards are applied in a manner that contributes to securing the healthcare environment as a whole, rather than in a piecemeal fashion.
APA, Harvard, Vancouver, ISO, and other styles
17

Chung, Edward C. "The implementation of a personal computer-based digital facsimile information distribution system." Ohio : Ohio University, 1991. http://www.ohiolink.edu/etd/view.cgi?ohiou1183661772.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Takagaki, Ken. "A formalism for object-based information systems development." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/31016.

Full text
Abstract:
Most current approaches to Information Systems Development (ISD) tend to derive from past experience and practice, rules of thumb and technology trends. The lack of theoretical foundations hinders the systematic development and evaluation of new ISD methodologies. The research undertaken in this thesis addresses this issue by proposing a formal, theory-based model, Ontology/Object-Based Conceptual Modelling (OBCM), for conceptually representing IS applications. The formalism is novel in that it is grounded in first principles derived from metaphysics, in particular the system of Ontology developed by Mario Bunge. Underlying this approach is the premise that an Information System is a model of reality and that model should be therefore rooted in a theory of reality, ie. a metaphysics. As a result, basic assumptions in reality such as thing, substance, property, attribute, time, state and change are explicitly and rigorously addressed. OBCM features an ontologically well-defined construct, "object", which is used to directly represent entities in reality, thus lending theoretical credence to the so-called object-oriented paradigm found in recent programming languages and databases. In addition, the thesis presents a framework, Ontology/Object-Based Information System (OBIS), for systems implementation based on this model. This framework directly implements the object construct so that it can be immediately utilized by the information systems user in a "direct manipulation" style of end-user interaction. Further, OBIS strives for a single, homogeneous concept of system operation drawn from ontology rather than in terms of IS or computing technology. In principle, this one concept can be applied to any object in the IS, this simplifying the understanding and use of the Information System. In this way, the model attempts to unify the analysis, implementation and user-interface aspects of Information Systems Development, thereby reducing the so-called "semantic gap" which has often been observed between the reality of the application and its final implementation in an IS. A "proof of concept" prototype is described which illustrates the main principles and explores practical applications of the proposed model. This prototype is implemented as a single, stand-alone "shell" which can be used to support a wide variety of applications as well as providing the basis of a rapid prototyping or CASE tool. The prototype is used to implement sample problems including the well-known IFIP Working Conference problem, thus demonstrating the feasibility of the overall approach.
Business, Sauder School of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
19

Lane, Victor P. "The evolution of computer-based information systems in specialist activities in the professions." Thesis, London South Bank University, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.336803.

Full text
Abstract:
In the first chapter, the author explains his interest in computer-based information systems combined with their interactions with and use by members of the professions, as an on-going research focus and topic. After basic definitions, the discussion moves to the professions that are considered in the thesis and the organisational contexts in which their interactions with information systems occur. Finally, the chapter considers (1) the relevance of dissemination of research results as an integral and essential part of the research process and (2) the author's value framework, within which the studies described in the thesis are presented. The following chapter contains a review of research approaches employed in information systems and software engineering research. These approaches are examined to indicate how and where they have been used in the studies presented in the author's published papers reprinted in chapters three to nine. Because of the predominance of the action research perspective taken by the author, the rationale and results that can be achieved from the action research approach are specifically examined. Finally, chapter two considers the advantages of problem-driven research and the need for a diverse range of research approaches in information systems research. The following seven chapters are reprinted copies of published papers, four from journals and three from conferences. Chapter 3 describes a management problem related to ancillary works of the Thames Barrier; chapter 4 describes optimisation techniques and minimum cost design as used by engineers; chapter 5 describes an accountant's management information system; chapter 6 describes a knowledge-based system related to the selection of pacemakers for a cardiologist; chapter 7 relates to education of engineers in mid-career; and chapters 8 and 9 relate to the education of medical students and doctors in mid-career. The final chapter, chapter 10, reflects on the work described in the earlier chapters; and on factors which might have affected the outcomes of the research. These factors include (1) the role of the author who for periods operated as a consultant-researcher, and (2) the fact that the studies were undertaken in organisations and situations in which a managerialist climate existed. This is followed by research conclusions and implications for future research.
APA, Harvard, Vancouver, ISO, and other styles
20

Barfoursh, Ahmad Abdollahzadeh. "The design and implementation of distributed information systems based on heterogeneous data bases." Thesis, University of Bristol, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.314511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Diergardt, Martin. "Modeling scenarios for analyzing the risks of complex computer based information systems." Berlin dissertation.de, 2006. http://www.dissertation.de/buch.php3?buch=5105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Yung, Kai-chiu, and 容啓超. "Success factors of computer-based information systems in Hong Kong secondary schools." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1996. http://hub.hku.hk/bib/B42574535.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Amos, A. O. "The choice of computer-based management information systems in a developing country." Thesis, University of East Anglia, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.373089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Yung, Kai-chiu. "Success factors of computer-based information systems in Hong Kong secondary schools." Click to view the E-thesis via HKUTO, 1996. http://sunzi.lib.hku.hk/hkuto/record/B42574535.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Atalag, Koray. "Archetype Based Domain Modeling For Health Information Systems." Phd thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608671/index.pdf.

Full text
Abstract:
A major problem to be solved in health informatics is high quality, structured and timely data collection. Standard terminologies and uniform domain conceptual models are important steps to alleviate this problem which are also proposed to enable interoperability among systems. With the aim of contributing to the solution of this problem, this study proposes novel features for the Archetypes and multi-level modeling technique in health information and knowledge modeling. The study consists of the development of a research prototype for endoscopic data management, and based on that experience, the extension of Minimal Standard Terminology in Digestive Endoscopy (MST). A major contribution of the study consists of significant extensions to the modeling formalism. The proposed modeling approach may be used in the design and development of health information systems based on archetypes for structured data collection, validation and dynamic user interface creation. The thesis work is aimed to make considerable contribution to the emerging Electronic Health Records (EHR) standards and specifications.
APA, Harvard, Vancouver, ISO, and other styles
26

Gopal, Burra 1968. "Integrating content-based access mechanisms with hierarchical file systems." Diss., The University of Arizona, 1997. http://hdl.handle.net/10150/282291.

Full text
Abstract:
We describe a new file system that provides, at the same time, both name and content based access to files. To make this possible, we introduce the concept of a semantic directory. Every semantic directory has a query associated with it. When a user creates a semantic directory, the file system automatically creates a set of pointers to the files in the file system that satisfy the query associated with the directory. This set of pointers is called the query-result of the directory. To access the files that satisfy the query, users just need to de-reference the appropriate pointers. Users can also create files and sub-directories within semantic directories in the usual way. Hence, users can organize files in a hierarchy and access them by specifying path names, and at the same time, retrieve files by asking queries that describe their content. Our file system also provides facilities for query-refinement and customization. When a user creates a new semantic sub-directory within a semantic directory, the file system ensures that the query-result of the sub-directory is a subset of the query-result of its parent. Hence, users can create a hierarchy of semantic directories to refine their queries. Users can also edit the set of pointers in a semantic directory, and thereby modify its query-result without modifying its query or the files in the file system. In this way, users can customize the results of queries according to their personal tastes, and use customized results to refine queries in the future. Our file system has many other features, including semantic mount-points that allow users to access information in other file systems by content. The file system does not depend on the query language used for content-based access. Hence, it is possible to integrate any content-based access mechanism into our file system.
APA, Harvard, Vancouver, ISO, and other styles
27

Andersson, Anna. "Management information systems in process-oriented healthcare organisations." Licentiate thesis, Linköping : Univ, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5689.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Alghamedy, Fatemah. "ENHANCE NMF-BASED RECOMMENDATION SYSTEMS WITH AUXILIARY INFORMATION IMPUTATION." UKnowledge, 2019. https://uknowledge.uky.edu/cs_etds/79.

Full text
Abstract:
This dissertation studies the factors that negatively impact the accuracy of the collaborative filtering recommendation systems based on nonnegative matrix factorization (NMF). The keystone in the recommendation system is the rating that expresses the user's opinion about an item. One of the most significant issues in the recommendation systems is the lack of ratings. This issue is called "cold-start" issue, which appears clearly with New-Users who did not rate any item and New-Items, which did not receive any rating. The traditional recommendation systems assume that users are independent and identically distributed and ignore the connections among users whereas the recommendation actually is a social activity. This dissertation aims to enhance NMF-based recommendation systems by utilizing the imputation method and limiting the errors that are introduced in the system. External information such as trust network and item categories are incorporated into NMF-based recommendation systems through the imputation. The proposed approaches impute various subsets of the missing ratings. The subsets are defined based on the total number of the ratings of the user or item before the imputation, such as impute the missing ratings of New-Users, New-Items, or cold-start users or items that suffer from the lack of the ratings. In addition, several factors are analyzed that affect the prediction accuracy when the imputation method is utilized with NMF-based recommendation systems. These factors include the total number of the ratings of the user or item before the imputation, the total number of imputed ratings for each user and item, the average of imputed rating values, and the value of imputed rating values. In addition, several strategies are applied to select the subset of missing ratings for the imputation that lead to increasing the prediction accuracy and limiting the imputation error. Moreover, a comparison is conducted with some popular methods that are in common with the proposed method in utilizing the imputation to handle the lack of ratings, but they differ in the source of the imputed ratings. Experiments on different large-size datasets are conducted to examine the proposed approaches and analyze the effects of the imputation on accuracy. Users and items are divided into three groups based on the total number of the ratings before the imputation is applied and their recommendation accuracy is calculated. The results show that the imputation enhances the recommendation system by capacitating the system to recommend items to New-Users, introduce New-Items to users, and increase the accuracy of the cold-start users and items. However, the analyzed factors play important roles in the recommendation accuracy and limit the error that is introduced from the imputation.
APA, Harvard, Vancouver, ISO, and other styles
29

Chmielewski, Phil. "Implementation of Internet based courses in computer information systems at Milwaukee Area Technical College." Online version, 2000. http://www.uwstout.edu/lib/thesis/2000/2000chmielewskip.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Bruhn, Cecilia, and Linda Mozgira. "What is the Perception of Computer-Based Business Simulation Games as a Tool for Learning?" Thesis, Jönköping University, JIBS, Business Informatics, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-865.

Full text
Abstract:

Computer-based business simulation games are rather commonly used tools for learning in business courses in Sweden. However, not always expectations of teachers are achieved with respect to the simulation game as a learning tool. There are number of aspects that students are not satisfied with when it comes down to the use of simulation game and as a result, a gap between these parties evolves. Thus, we have tried to identify the benefits and drawbacks seen by teachers and students and derived critical success factors for achieving higher learning outcome from the use of simulation games.

In order to do that, we have carried out 6 interviews with teachers across Sweden who have been using simulation games in their courses. Furthermore, student opinions were gathered through questionnaire and class observation.

It was concluded that teachers see the simulation game as a very good tool for learning. Still, students are not fully satisfied, since they are expecting more feedback and support from teachers when they are using the game. Further-more, although the game is supposed to give a good reflection of reality, not always it was seen so by students. Thus, it is important to communicate and introduce the game properly in the course as well as have an assignment that en-courage learning and helps students to apply their theoretical knowledge in practice that would be closely linked to reality.

APA, Harvard, Vancouver, ISO, and other styles
31

DeMaio, Genene Marie. "Factors contributing to the use of computer-based information systems in student services." W&M ScholarWorks, 1990. https://scholarworks.wm.edu/etd/1539618557.

Full text
Abstract:
The purpose of this study was to determine what factors facilitate and what factors inhibit computer use in the Student Affairs Divisions of James Madison University (JMU), Virginia Polytechnic Institute (VPI), and Mary Washington College (MWC).;The population for this study was student affairs officials and related personnel deliberately selected from three Virginia public institutions.;The following conclusions were drawn from the findings of this study. (1) MWC is in the beginning stages of automation, JMU is moving in the direction of state-of-art technology while VPI's current status has reached the level regarded as state-of-art. (2) The status of CBISs at MWC, JMU, and VPI is affected by the time period in which automation occurred. (3) Student affairs' users at MWC, JMU, and VPI perceive CBISs positively. (4) Respondents believe using CBISs on the job simplifies tasks, helps monitor data flow, increases efficiency, makes output professional, makes data timely and accurate, improves the communication process, and does not significantly affect changes in policy. (5) No significant organizational changes have occurred at MWC or JMU while several organizational changes were identified at VPI. (6) The institution's mission and size influence the direction institutions take in regard to computer technology. (7) Respondents were satisfied with the microcomputer support and training received. (8) All users mentioned mainframe computer support was slow and uneven and many outside influences seem to impact the quality of this service. (9) It is clear that at JMU and VPI the integrator's role positively affects the use of computers. (10) The role, professional background, and personal characteristics of integrators were indentified and summarized. (11) Institutions of higher education should identify the integrators on their campuses and promote and support their role. (12) Top leadership commitment plays a crucial factor in facilitating computer use. (13) The lack of long range plans for the improved use of computers do not significantly affect the use of CBISs at MWC, JMU, or VPI.;Since very little research has been conducted on Student Affairs Divisions' use of CBISs, future research should focus on how data collected on students improve the effective operation of student affairs offices.
APA, Harvard, Vancouver, ISO, and other styles
32

Grant, Gerald G. "The strategic dimensions of information systems capability : case studies in a developing country context." Thesis, London School of Economics and Political Science (University of London), 1996. http://etheses.lse.ac.uk/2854/.

Full text
Abstract:
This research addresses the issue of how organisations can build capabilities to acquire, deploy, exploit and sustain computer-based information systems. With the application of information technology dramatically altering the strategies, structure, and processes of organisations, capabilities in acquiring and deploying computer-based information systems are considered critical to organisational success. It is often presumed that firms have similar capabilities to derive maximum value from deploying computer- based information systems. However, they have been shown to exhibit disparate capacities to successfully implement and exploit such systems. The concept information systems capability is introduced and refers to an organisation's capacity to effectively orchestrate the processes of acquiring, deploying, exploiting and sustaining computer-based information systems to support its strategic and functional objectives. Emphasising evolutionary and resource-based perspectives of the firm the research stresses the firm-specific, cumulative, and path-dependent nature of organisational IS capability. Three strategic dimensions of IS capability are identified. These are routines, resources, and contexts. Routines refer to the IS-related processes and practices of the organisation. Resources are its endowments. Contexts reflect the environmental factors influencing IS investment opportunities and decisions. Capabilities develop through a prescient understanding of the contexts, the strategic acquisition and deployment of IS resources and the establishment and enaction of effective organisational routines. Researchers are concerned about the persistence of ineffective information technology transfer and diffusion in developing countries. This research seeks to explicate the concept of information systems capability by drawing on examples from a developing country context. Through case studies and surveys done in Zimbabwe it explores organisational efforts to develop IS capability. The findings of the case studies confirm the significant impact of macro-contextual and organisational factors on capability building. A framework for IS capability building is proposed.
APA, Harvard, Vancouver, ISO, and other styles
33

Kopanas, Vassilios. "Relational database support for a rule based approach to information systems." Thesis, University of Manchester, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.358052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Riabacke, Ari. "Computer based prescriptive decision support." Licentiate thesis, Mid Sweden University, Department of Information Technology and Media, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-5497.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Faxö, Elias. "Trusted terminal-based systems." Thesis, Linköpings universitet, Institutionen för systemteknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-69589.

Full text
Abstract:
Trust is a concept of increasing importance in today’s information systems where information storage and generation to a higher extent is distributed among several entities throughout local or global networks. This trend in information science requires new ways to sustain the information security in the systems. This document defines trust in the context of a terminal-based system and analyzes the architecture of a distributed terminal-based system using threat modeling tools to elicit the prerequisites for trust in such a system. The result of the analysis is then converted into measures and activities that can be performed to fulfill these prerequisites. The proposed measures include hardware identification and both hardware and software attestation supported by the Trusted Computing Group standards and Trusted Platform Modules that are included in a connection handshake protocol. The proposed handshake protocol is evaluated against a practical case of a terminal-based casino system where the weaknesses of the protocol, mainly the requirement to build a system-wide Trusted Computing Base, are made evident. Proposed solutions to this problem such as minimization of the Trusted Computing Base are discussed along with the fundamental reason of the problem and the future solutions using the next generation of CPUs and Operating System kernels.
APA, Harvard, Vancouver, ISO, and other styles
36

Mick, Alan A. "Knowledge based text indexing and retrieval utilizing case based reasoning /." Online version of thesis, 1994. http://hdl.handle.net/1850/11715.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Gabor, Brian. "EXP-WF : a workflow management module for web-based laboratory information management systems." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=82234.

Full text
Abstract:
Specialized laboratory information management systems (LIMS) are widely used by scientific research groups to store and manage experimental data. Smaller research laboratories' LIMS often lack support for automatic task execution, an omission that becomes more critical as experiments become increasingly automated. This thesis describes Exp-WF, a workflow management module specifically designed to be easily incorporated into a typical small-scale LIMS. Scientists describe the execution order of experiments as a workflow model. Exp-WF then automatically selects experiments for execution and dispatches them to the people or machines responsible for performing them. Exp-WF can be incorporated into an existing web-based LIMS in a non-intrusive way by using servlet filter technology to observe user actions and act upon them. Exp-WF uses agent-based technology with asynchronous communication to dispatch tasks to remote machines. This guarantees correctness even if the machines are not available all the time.
APA, Harvard, Vancouver, ISO, and other styles
38

Shi, Wei. "Web-based geographic information system for the archives of the Water Resources Institute." CSUSB ScholarWorks, 2007. https://scholarworks.lib.csusb.edu/etd-project/3312.

Full text
Abstract:
This project is focused on the goal of improving access to the Water Resources Institute (WRI) archives using a web-based GIS architecture. This project uses the newest version of ArcGIS Server as a method to support an internet-based map search environment, improved information management and data sharing.
APA, Harvard, Vancouver, ISO, and other styles
39

Kim, Tae Woo. "A Green Form-Based Information Extraction System for Historical Documents." BYU ScholarsArchive, 2017. https://scholarsarchive.byu.edu/etd/6375.

Full text
Abstract:
Many historical documents are rich in genealogical facts. Extracting these facts by hand is tedious and almost impossible considering the hundreds of thousands of genealogically rich family-history books currently scanned and online. As one approach for helping to make the extraction feasible, we propose GreenFIE—a "Green" Form-based Information-Extraction tool which is "green" in the sense that it improves with use toward the goal of minimizing the cost of human labor while maintaining high extraction accuracy. Given a page in a historical document, the user's task is to fill out given forms with all facts on a page in a document called for by the forms (e.g. to collect the birth and death information, marriage information, and parent-child relationships for each person on the page). GreenFIE has a repository of extraction patterns that it applies to fill in forms. A user checks the correctness of GreenFIE's form filling, adds any missed facts, and fixes any mistakes. GreenFIE learns based on user feedback, adding new extraction rules to its repository. Ideally, GreenFIE improves as it proceeds so that it does most of the work, leaving little for the user to do other than confirm that its extraction is correct. We evaluate how well GreenFIE performs on family history books in terms of "greenness"—how much human labor diminishes during form filling, while simultaneously maintaining high accuracy.
APA, Harvard, Vancouver, ISO, and other styles
40

Hylton, Kenrie. "An Experiment Using Webcam-Based Surveillance to Deter Information Systems Misuse." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/182.

Full text
Abstract:
There have been growing concerns regarding the misuse of academic information systems such as misconduct within Web-based assessments. A number of studies have reported significant levels of deception and dishonesty within Web-based activities that are confined by a strict code of conduct. These have been noted to be facilitated through the unmonitored nature of Web-based assessments where users have the opportunity to collaborate or utilize unauthorized resources during the assessment. Studies from criminology that utilize deterrence theory have reported that video surveillance can be useful in deterring misconduct. As such, this study explored the use of Webcam based surveillance during Web-based assessments as a potential countermeasure to deter the misuse of these information systems. The primary goal of this study was to investigate the deterrent effect of Webcam based proctoring on Information Systems (IS) misuse such as misconduct during Web-based assessments. Therefore, this study involved an experiment in which the results from an experimental group and a control group were examined. Both groups took the same set of Web-based assessments, with the only distinction being that one group was monitored by a Web-based proctor while the other was not monitored. The results of this study found no statistical significant difference between the scores of each group. However, there was a statistical significant difference between each group on the time taken to complete the Web-based assessments. A post-experiment survey was also administered to help assess the level that participants admit about the perceived opportunity they had to collaborate and utilize unauthorized resources during the Web-based assessments. This further helped to determine the deterrent effect of Webcam based surveillance. The survey analysis indicated that those who were not monitored perceived to have experienced greater levels of opportunity to engage in misconduct than those who were monitored by a Web-based proctor. This study is unique in its application of deterrence theory as well as its approach to the problem as other potential technology based solutions have focused on authentication and identity verification whereas this study seeks to address the problems of misconduct that occur after authentication. As such, contributions will be made to multiple domains regarding deterrence and surveillance within specific Web-based information systems. The results of this study may also provide practical guidance to academia and relevant industry experts particularly those involved with Web-based assessments.
APA, Harvard, Vancouver, ISO, and other styles
41

Owolabi, Olumide. "Hardware and software approximate string matching and pattern recognition for intelligent knowledge based systems." Thesis, University of Strathclyde, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.280018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Valente, Ronald R. "Analysis of virtual environments through a web based visualization tool /." Online version of thesis, 2009. http://hdl.handle.net/1850/10826.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Park, Jaeyong. "Perfective and corrective UML pattern-based design maintenance with design constraints for information systems." Fairfax, Va. : George Mason University, 2007. http://hdl.handle.net/1920/2917.

Full text
Abstract:
Thesis (Ph. D.)--George Mason University, 2007.
Title from PDF t.p. (viewed Jan. 21, 2008). Thesis directors: David C. Rine, Elizabeth White. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Vita: p. 230. Includes bibliographical references (p. 222-229). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
44

Hjertström, Andreas. "Information Centric Development of Component-Based Embedded Real-Time Systems." Licentiate thesis, Mälardalen University, School of Innovation, Design and Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-7582.

Full text
Abstract:

This thesis presents new techniques for data management of run-time data objectsin component-based embedded real-time systems. These techniques enabledata to be modeled, analyzed and structured to achieve data managementduring development, maintenance and execution.The evolution of real-time embedded systems has resulted in an increasedsystem complexity beyond what was thought possible just a few years ago.Over the years, new techniques and tools have been developed to manage softwareand communication complexity. However, as this thesis show, currenttechniques and tools for data management are not sufficient. Today, developmentof real-time embedded systems focuses on the function aspects of thesystem, in most cases disregarding data management.The lack of proper design-time data management often results in ineffectivedocumentation routines and poor overall system knowledge. Contemporarytechniques to manage run-time data do not satisfy demands on flexibility,maintainability and extensibility. Based on an industrial case-study that identifiesa number of problems within current data management techniques, bothduring design-time and run-time, it is clear that data management needs to beincorporated as an integral part of the development of the entire system architecture.As a remedy to the identified problems, we propose a design-time data entityapproach, where the importance of data in the system is elevated to beincluded in the entire design phase with proper documentation, properties, dependenciesand analysis methods to increase the overall system knowledge.Furthermore, to efficiently manage data during run-time, we introduce databaseproxies to enable the fusion between two existing techniques; ComponentBased Software Engineering (CBSE) and Real-Time Database ManagementSystems (RTDBMS). A database proxy allows components to be decoupledfrom the underlying data management strategy without violating the componentencapsulation and communication interface.


INCENSE
APA, Harvard, Vancouver, ISO, and other styles
45

Thanguturi, Naren. "Automatic News Generation System based on Natural Language." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1525973404437239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Bengtsson, Jonna. "Scenario-Based Evaluation of a Method for System Security Assessment." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-6004.

Full text
Abstract:

This thesis evaluates a method for system security assessment (MASS), developed at the Swedish Defence Research Agency in Linköping. The evaluation has been carried out with the use of scenarios, consisting of three example networks and several modifications of those. The results from the scenarios are then compared to the expectations of the author and a general discussion is taken about whether or not the results are realistic.

The evaluation is not meant to be exhaustive, so even if MASS had passed the evaluation with flying colors, it could not have been regarded as proof that the method works as intended. However, this was not the case; even though MASS responded well to the majority of the modifications, some issues indicating possible adjustments or improvements were found and commented on in this report.

The conclusion from the evaluation is therefore that there are issues to be solved and that the evaluated version of MASS is not ready to be used to evaluate real networks. The method has enough promise not to be discarded, though. With the aid of the issues found in this thesis, it should be developed further, along with the supporting tools, and be re-evaluated.

APA, Harvard, Vancouver, ISO, and other styles
47

Abukrisha, Taha Zakaria. "Socio technical perspective on computer based AIS development and implementation : reflections on recent changes in Egypt." Thesis, University of Essex, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.274305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Tiwari, Prava. "Updating the web-based geographic information system of the Water Resources Institute." CSUSB ScholarWorks, 2008. https://scholarworks.lib.csusb.edu/etd-project/3407.

Full text
Abstract:
The main scope of this project is to rebuild and deploy web applications that will help share historical artifacts related to the Santa Ana watershed. This project is designed to give a consistent user interface and add extra tools to enhance the functionality of existing applications at the Water Resources Institute (WRI) at California State University San Bernardino (CSUSB). The purpose of this project is to migrate all applications to a single server and update the applications using ArcGIS Server 9.2. Also to give a consistent look to the applications and to make them user friendly.
APA, Harvard, Vancouver, ISO, and other styles
49

Turkmendag, Gokce. "Web Based Geographical Information Systems For Middle East Technical University Campus." Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12610592/index.pdf.

Full text
Abstract:
Middle East Technical University (METU) campus has such an extensive area that reaching the necessary information which affects campus life, such as the locations of the buildings, classrooms, computer labs, and etc. may be very difficult for anyone who does not know the campus well, and even for a student, personnel or a graduate who had a long time in the campus. An interactive campus map and a database structure related to this map which can be accessed by multiple types of users on the Internet can display this information with its geographical locations, and will reduce the "
difficulty for reaching information"
widely. For this purpose, data of METU were collected from various sources, edited, organized, and inserted into data tables. An interactive campus map displaying the locations of the physical structures and facilities in the campus was created in Scalable Vector Grapics (SVG) standard, and published on the Internet. By JavaScript functions, the map can be browsed with map navigation tools, including zoom in, zoom out, move and information buttons, and layers control. There is a search section on the user interface, which allows users make queries to find building and classroom names, and list the buildings and facilities according to their usage and category types. Data are stored in PostgreSQL database, transmitted through PHP scripts, and can be edited by authorized users through the specialized web interfaces. Lastly, web-based implementation of the application is entirely based on open-source standards.
APA, Harvard, Vancouver, ISO, and other styles
50

Shi, Xun, and 施迅. "Integrating case-based reasoning and geographic information system forurban planning." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1997. http://hub.hku.hk/bib/B31221592.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography