Academic literature on the topic 'Control Objects for Information and related Technology'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Control Objects for Information and related Technology.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Control Objects for Information and related Technology"

1

Mukhachev, S. V. "INCIDENTS RELATED TO INFORMATION SECURITY AT NUCLEAR INFRASTRUCTURE OBJECTS." Journal of the Ural Federal District. Information security 20, no. 1 (2020): 72–76. http://dx.doi.org/10.14529/secur200108.

Full text
Abstract:
The article discusses the chronology and features of incidents related to information secu-rity at nuclear infrastructure facilities. A brief description of incidents in various countries, the motives of the attacks, measures taken to neutralize the measures and consequences are given. The features inherent in each of the cyberattacks are highlighted. It is shown that the problem of the existence of incidents related to information security at nuclear infrastructure facilities arose with the development and implementation of information and control systems usicomputer technology. This is clearly seen in the analysis of the chronology of the described inci-dents. The adoption of the federal law of the Russian Federation “On the security of critical infor-mation infrastructure of the Russian Federation” allows legal means to combat cyber attacks on nuclear infrastructure facilities
APA, Harvard, Vancouver, ISO, and other styles
2

Abbasi, Suhni, Hameedullah Kazi, Ahmed Waliullah Kazi, Kamran Khowaja, and Ahsanullah Baloch. "Gauge Object Oriented Programming in Student’s Learning Performance, Normalized Learning Gains and Perceived Motivation with Serious Games." Information 12, no. 3 (February 26, 2021): 101. http://dx.doi.org/10.3390/info12030101.

Full text
Abstract:
Serious Games (SG) provide a comfortable learning environment and are productive for various disciplines ranging from Science, Technology, Engineering, and Mathematics (STEM) to computer programming. The Object Oriented (OO) paradigm includes objects related to real life, and is considered a natural domain that can be worked with. Nonetheless, mapping those real-life objects with basic Object-Oriented Programming (OOP) concepts becomes a challenge for students to understand. Therefore, this study is concerned with designing and developing an SG prototype to overcome students’ difficulties and misconceptions in learning OOP and achieving positive learning outcomes. An experimental evaluation was carried out to show the difference between the experimental group students’ performance, who interact with the developed game, and students of the control group, who learn via the traditional instructional method. The experimental evaluations’ main finding is that the experimental group’s performance is better than the control group. The experimental group’s Normalized Learning Gain (NLG) is significantly higher than the control group (p < 0.005, pairedt-test). The evaluation study results show that the developed prototype’s perceived motivation on the Instructional Materials Motivation Survey (IMMS) 5-point Likert scale resulted in the highest mean score for attention (3.87) followed by relevance (3.66) subcategories. The results of this study show that the developed SG prototype is an effective tool in education, which improves learning outcomes and it has the potential to motivate students to learn OOP.
APA, Harvard, Vancouver, ISO, and other styles
3

Giri, Gowri Shankar, Yaser Maddahi, and Kourosh Zareinia. "An Application-Based Review of Haptics Technology." Robotics 10, no. 1 (February 5, 2021): 29. http://dx.doi.org/10.3390/robotics10010029.

Full text
Abstract:
Recent technological development has led to the invention of different designs of haptic devices, electromechanical devices that mediate communication between the user and the computer and allow users to manipulate objects in a virtual environment while receiving tactile feedback. The main criteria behind providing an interactive interface are to generate kinesthetic feedback and relay information actively from the haptic device. Sensors and feedback control apparatus are of paramount importance in designing and manufacturing a haptic device. In general, haptic technology can be implemented in different applications such as gaming, teleoperation, medical surgeries, augmented reality (AR), and virtual reality (VR) devices. This paper classifies the application of haptic devices based on the construction and functionality in various fields, followed by addressing major limitations related to haptics technology and discussing prospects of this technology.
APA, Harvard, Vancouver, ISO, and other styles
4

Barannik, Volodymyr V., Mykola V. Dvorsky, Valeriy V. Barannik, and Anton D. Sorokun. "METHOD OF EFFICIENT REPRESENTATION AND PROTECTION OF DYNAMIC OBJECTS IN VIDEO POTOTICS BASED ON THE TECHNOLOGY OF THEIR ROCKUM COMPENSATION." Cybersecurity: Education, Science, Technique, no. 2 (2018): 90–97. http://dx.doi.org/10.28925/2663-4023.2018.2.9097.

Full text
Abstract:
Recently, special attention at implementation of the necessary level of information security is given to wireless technologies. Their use contributes to the growing demand for video information services. This is accompanied by an increase in the intensity of video streams and an increase in the processing time of video information, resulting in them far beyond the bandwidth of networks. Consequently, there is a contradiction that is caused: on the one hand, the growth of requirements for the quality of video information; on the other hand, difficulties in providing services of the given quality using wireless technologies.The article deals with issues related to the speed of the video stream of video information, depending on the quality of video data required, from spatial resolution and frame rate. The article concludes that with the trend of increasing the amount of video information in the complexes of the Hellenic Republic - it is necessary to improve the coding methods. In order to increase the efficiency of management and operational activities, it is proposed to improve the existing methods of encoding dynamic video streaming object with algorithms for motion compensation for video conferencing in the system of troop control. As a result, the article proposes a six-point algorithm for search, which can increase the efficiency and reduce the processing time of video information between subscribers. This approach, in the future, by improving the existing methods for encoding dynamic video streaming objects with algorithms of motion compensation, will improve the efficiency of using videoconferencing, for example, in the control system of troops.
APA, Harvard, Vancouver, ISO, and other styles
5

Meidow, Jochen, Thomas Usländer, and Karsten Schulz. "Obtaining as-built models of manufacturing plants from point clouds." at - Automatisierungstechnik 66, no. 5 (May 25, 2018): 397–405. http://dx.doi.org/10.1515/auto-2017-0133.

Full text
Abstract:
Abstract The capability to adapt a manufacturing plant to changing requirements gains increasing importance in industrial production environments, e. g., triggered by Industrie 4.0 scenarios. A virtual as-built model of a manufacturing plant and its surrounding factory building provides important decision support and relevant information for digital twins, e. g., to trace assets and asset types across their whole lifetime, planning of renovations, plant and machine topology changes, or the simulation-based analysis of production processes. Based on point clouds obtained by terrestrial laser scanning or photogrammetric acquisition, reverse engineering can be applied to extract and to reconstruct relevant objects in a form suitable for CAD programs. In this article, we review approaches to capture a scene by point measurements and to reconstruct the geometry of its components given specific object models. This comprises the discussion of various representation schemes for objects and their relations, strategies for object recognition, and the explication of methods for model instantiation. Furthermore, depending on the requirements for specific tasks, we identify technology gaps and specify the degree of maturity of the related techniques.
APA, Harvard, Vancouver, ISO, and other styles
6

Kolybenko, E. N. "Distinction between the concepts of mathematical and logical modeling." Vestnik of Don State Technical University 19, no. 3 (October 4, 2019): 262–67. http://dx.doi.org/10.23947/1992-5980-2019-19-3-262-267.

Full text
Abstract:
Introduction. Technologies of mathematical and logical modeling of problem solving according to the existing practice of their distribution are divided into two areas: widespread mathematical modeling and infological modeling which is currently underdeveloped, especially for sophisticated systems. Fundamental differences between these technologies, in particular for the machining preproduction, are that logical modeling is informationally and logically related to organization systems, and mathematical modeling is associated with control processes in the organization systems. Logical modeling is used to operate with geometric objects in the technological schemes of their interaction through basing methods, geometric shaping in a static (ideal) setting of the corresponding schemes. Mathematical simulation is used to operate material objects in the control processes of their transformations through cutting methods, i.e. imperfectly, considering heterogeneous errors. Between the organization systems under study and management processes in them, there are information and logical links of their organic unity, which deny their separate consideration. In the information deterministic technology for solving problems of a high-level automation, the distinction between the concepts of “mathematical” and “logical” modeling is relevant; it has scientific novelty and practical significance.Materials and Methods. To characterize the properties of the concepts of “mathematical modeling”, “logical modeling” and the knowledge functions resulting from the formulation of these concepts, fundamentally different methods and appropriate tools are used. The differentiation of the concepts under consideration is based on the differentiation of technologies (methods, appropriate tools, algorithms, operations) for solving applied problems of any knowledge domain.Research Results. The ideas of “logical modeling” and “mathematical modeling” are conceptual general-theoretical notions with invariant properties required for solving practical problems of any application domain. In accordance with the distinction between these concepts, the problem solving technologies are divided into two types: system engineering technology – in the organization of information object systems, and system science – in the management processes of transformation of the corresponding material objects. These areas should exist in the information and logical link of their organic unity.Discussion and Conclusions. The author distinguishes between the concepts of “logical modeling” and “mathematical modeling”, which is a key condition for a successful transition to the deterministic information technology of a high-level automation in solving practical problems of any knowledge domain, for example, of the production design machining
APA, Harvard, Vancouver, ISO, and other styles
7

Prima Sakti, Popy. "Tata Kelola Sistem Manajemen Informasi Obyek Pajak Menggunakan Kerangka Kerja Cobit 5.0." Jurnal Ilmiah Betrik 8, no. 01 (March 27, 2017): 35–41. http://dx.doi.org/10.36050/betrik.v8i01.64.

Full text
Abstract:
SISMIOP is the heart of the United Nations because all aspects of administrative management that can manage data objects and tax subjects that have been computerized start from the process of data collection, assessment, penyangihan, acceptance and service. The existence of SISMIOP is intended to create an accurate and up to date database by intercepting all UN administration activities into a container, so that the implementation is more uniform, simple, fast and efficient. To know how far the management of the Tax Object Management Information System (SISMIOP) that has been used by the Financial and Asset Management Revenue Service, it is necessary to measure by using good method and framework. The tools or tools used to evaluate the governance of SISMIOP are using Control Objective For Information and Related Technology 5 (COBIT 5.0). The COBIT 5.0 maturity model does not intend to measure a level very accurately or certify when a level is achieved, but rather to a relevant picture or condition of some level of maturity to be achieved, this model is appropriate when management wants to see conformity to the conditions of information technology development And proper maturity.
APA, Harvard, Vancouver, ISO, and other styles
8

Horváth, László. "Supporting Lifecycle Management of Product Data by Organized Descriptions and Behavior Definitions of Engineering Objects." Journal of Advanced Computational Intelligence and Intelligent Informatics 11, no. 9 (November 20, 2007): 1107–13. http://dx.doi.org/10.20965/jaciii.2007.p1107.

Full text
Abstract:
Engineering for design, analysis, and manufacturing planning of products has been integrated with other product related engineering activities such as control of manufacturing equipment, marketing, sales and customer services in product lifecycle management systems (PLM). This challenging complex of activities would be impossible without the support of recent information technology (IT). Descriptions of various engineering objects have been integrated into very complex product models. Main area of development in the next future is enhanced assistance of decisions in product modeling. Approach to high level of modeling and application of the highly integrated product model for simulation will be the virtual intelligent space where all outside and inside effects are reacted. In order to join this tendency, this paper introduces a methodology for integrated application of analysis of behaviors of modeled objects, adaptive actions for controlled modifications of engineering objects, and definition of optimal sets of parameters. In order to establish a virtual intelligent space, sensor signals in physical intelligent space are replaced by received change information and actuators are replaced by adaptive actions. In this paper, new concept of intelligent virtual product space (IVPS) as integrated description of physical product and other objects and processes is introduced. Following this, a method is proposed to include computational intelligence in product models in the form of control of behaviors of modeled product objects. Change management methods are explained in close connection with behavior analysis. Finally, some methods for control of the work of a virtual intelligent product space are detailed.
APA, Harvard, Vancouver, ISO, and other styles
9

Слезко and Vyacheslav Slezko. "Reduction of intellectual property items’ economic losses." Management of the Personnel and Intellectual Resources in Russia 2, no. 3 (July 1, 2013): 57–60. http://dx.doi.org/10.12737/557.

Full text
Abstract:
In article it is spoken about the necessity related to creation of mechanism of optimal state funding for R&amp;D. In this mechanism structure shall be included the systems of technical and economic audit of intellectual property objects. In accordance with part IV of the Russian Federation Civil code (art. 1225), it is possible to obtain the following two groups of intellectual property items as a result of R&amp;D on the area of information technologies: the items of patent law and copyright law. It is possible to carry out the information technologies’ technical audit with application of COBIT [Control Objectives for Information and related Technology] and PCI DSS [Payment Card Industry Data Security Standard] standards. Economic audit during R&amp;D in the area of information resources shall include the carrying out expert examinations on the costs of research and assessment of intellectual property items’ market value. All this shall lead to significant reduction of economic losses in the process of state financing related to research and development.
APA, Harvard, Vancouver, ISO, and other styles
10

Lakhno, Valeriy, Volodimir Malyukov, Berik Akhmetov, Dmytro Kasatkin, and Liubov Plyska. "Development of a model for choosing strategies for investing in information security." Eastern-European Journal of Enterprise Technologies 2, no. 3 (110) (April 30, 2021): 43–51. http://dx.doi.org/10.15587/1729-4061.2021.228313.

Full text
Abstract:
This paper has proposed a model of the computational core for the decision support system (DSS) when investing in the projects of information security (IS) of the objects of informatization (OBI). Including those OBI that can be categorized as critically important. Unlike existing solutions, the proposed model deals with decision-making issues in the ongoing process of investing in the projects to ensure the OBI IS by a group of investors. The calculations were based on the bilinear differential quality games with several terminal surfaces. Finding a solution to these games is a big challenge. It is due to the fact that the Cauchy formula for bilinear systems with arbitrary strategies of players, including immeasurable functions, cannot be applied in such games. This gives grounds to continue research on finding solutions in the event of a conflict of multidimensional objects. The result was an analytical solution based on a new class of bilinear differential games. The solution describes the interaction of objects investing in OBI IS in multidimensional spaces. The modular software product "Cybersecurity Invest decision support system " (Ukraine) for the Windows platform is described. Applied aspects of visualization of the results of calculations obtained with the help of DSS have been also considered. The Plotly library for the Python algorithmic language was used to visualize the results. It has been shown that the model reported in this work can be transferred to other tasks related to the development of DSS in the process of investing in high-risk projects, such as information technology, cybersecurity, banking, etc.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Control Objects for Information and related Technology"

1

Grewal, Sandeep Kaur, and n/a. "Issues in IT Governance & IT service management - a study of their adoption in Australian universities." University of Canberra. Information Sciences & Engineering, 2006. http://erl.canberra.edu.au./public/adt-AUC20060804.092632.

Full text
Abstract:
IT service management (ITSM) has emerged as one of the approaches to implementing IT Governance in Australian Universities. A number of ITSM frameworks have been proposed however, IT Infrastructure Library (ITIL) and Control OBjectives for Information and related Technology (COBIT) have been most widely accepted and implemented internationally and within Australia. The research reported in this thesis was undertaken to shed light on the issues related to ITIL adoption and implementation within Australian universities. To date academic research in ITIL adoption and implementation has not been extensive as it is comparatively a new framework, especially within Australian universities. The theoretical framework proposed in this thesis has IT service management as the central concept, implementing IT Governance to align the university and technology. This framework is used to examine the experience of ITIL adoption in seven Australian universities, plus a detailed case study on one university�s experience. This research reveals a complex web of factors relating to ITIL implementation including; the pre-implementation process; processes implemented; order of implementation; hiring external expertise;, tool selection;, staff training; ongoing assessments; managing cultural change; managing learning curve and resource strain. The findings provide an insight into practical lessons for other Australian universities or similar organisations considering implementing IT Governance through IT Service management frameworks. The method used in this research may be useful for other organisations and researchers analysing universities and similar organisations implementing ITIL. IT Governance and IT service management frameworks are diverse and important areas which open a poorly researched field for further work.
APA, Harvard, Vancouver, ISO, and other styles
2

Steenkamp, Gretha, Willie Boshoff, and Rika Butler. "Mapping the Information Technology (IT) governance requirements contained in the King III Report to the IT domains and processes of the Control Objectives for Information and Related Technology (COBIT) framework." Thesis, Stellenbosch : University of Stellenbosch, 2009. http://hdl.handle.net/10019.1/15050.

Full text
Abstract:
Thesis (MAcc)--University of Stellenbosch, 2009.
ENGLISH ABSTRACT: Due to the integration of IT into all aspects of modern-day businesses, it is vital that the risks associated with IT are governed as an integral element of enterprise-wide corporate governance. The Third King Report on Corporate Governance (King III) was issued by the South African Chapter of the Institute of Directors in September 2009 and becomes operational on 1 March 2010. This marks the first time that the King Report has specifically addressed IT governance. King III will apply to all corporate entities. Such entities could benefit from applying an IT governance framework to ensure that they adequately address all aspects of IT governance, as required by King III. One of the comprehensive frameworks available is COBIT (Control Objectives for Information and Related Technology) issued by ISACA (previously known as the Information Systems Audit and Control Association). King III mentions the fact that COBIT could be used to assess and implement IT governance within an entity. The aim of this research is to determine whether the use of COBIT ensures compliance with King III’s requirements relating to IT governance. It was found that the main requirements in King III relating to IT governance and the processes of COBIT are well aligned, and, as a result, COBIT could be used effectively to ensure compliance with King III in relation to IT governance. However, an entity would still have to pay attention to certain King III-specific requirements. Furthermore, it was found that the application of the principles in COBIT could further strengthen the IT governance of an entity, as COBIT also addresses the more detailed activities, such as the implementation and operation of the IT system, which is not specifically addressed by King III.
APA, Harvard, Vancouver, ISO, and other styles
3

Holford, John William. "The concept of self-defending objects and the development of security aware applications." Queensland University of Technology, 2006. http://eprints.qut.edu.au/16227/.

Full text
Abstract:
The self-defending object (SDO) concept is an extension to the object-oriented programming paradigm, whereby those objects that encapsulate the protected resources of a security aware application (SAA), are made aware of, and responsible for, the defence of those resources. That defence takes two forms, the enforcement of mandatory access control on protected resources and the generation of the corresponding portion of the SAA's audit trail. The SDO concept acts as the philosophy that guides the application level mandatory access control within SAAs which ensures that the provided access control is both complete and non bypassable. Although SDOs accept responsibility for controlling access to the protected data and functionality that they encapsulate, an SDO delegates the responsibility for making authorisation decisions to an associated authorisation object. Thus, SDOs fulfill their access control obligations by initiating the authorisation check and then enforcing the decision made on their behalf. A simple, yet effective mechanism for enforcing that access control at the object level involves controlling the ability to invoke those SDO methods that access protected resources. In the absence of previous research on this approach to the enforcement of application level access control, the primary aim of this research was to demonstrate that the SDO concept is a viable paradigm for developing SAAs. That aim was achieved in two stages. The first stage targeted the provision of a 'proof of concept', that demonstrated that the SDO concept could be applied to the development of non-distributed SAAs. The second stage demonstrated its applicability to the development of distributed SAAs. In the second stage, two versions of a distributed prototype were developed, one based on a traditional (proprietary) distributed computing model, (Java RMI), and the second using the currently popular Web services model, to demonstrate the general applicability of the SDO concept. Having already demonstrated that the SDO concept could be applied to SAAs executing on a single machine, the major focus of that research was to devise a mechanism by which SDOs could be transferred between machines. The research then concentrated on determining what impacts the adoption of the SDO concept would have on SAA development. Experimentation carried out using the distributed prototypes demonstrated that (1) the adoption of the SDO does not restrict the use of inheritance hierarchies that include SDOs, (2) the restriction of the lifetime of SDOs can be supported, (3) usage rights enforcement can be employed, and (4) the use of cryptographic techniques to provide additional security guarantees is not affected. A key feature of the SDO concept, is that no major changes need to be made to current development tools or methodologies, so its adoption is not hampered by significant financial or training impediments. This research demonstrated that the SDO concept is practical and constitutes a valuable extension to the object oriented paradigm that will help address the current lack of security in information systems. The SDO approach warrants additional research and adoption.
APA, Harvard, Vancouver, ISO, and other styles
4

Johansson, Kling Erika. "Trafikinducerade vibrationer : En studie om busskuddars påverkan på vibrationsnivåer i mark och byggnader." Thesis, Uppsala universitet, Institutionen för geovetenskaper, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-382877.

Full text
Abstract:
Trafikinducerade vibrationer: En studie om busskuddars påverkan på vibrationsnivåer i mark och byggnader. Erika Johansson Kling I Uppsala används busskuddar som en form av medveten ojämnhet i vägbanan för att sänka hastigheten och öka trafiksäkerheten på olycksdrabbade vägsträckor. Boende i bostäder belägna nära busskuddar har dock rapporterat att de ibland kan uppleva vibrationer kopplade till då tunga fordon passerar busskuddar som störande. Denna studie syftade till att kvantifiera vibrationsnivåer i mark och byggnader nära busskuddar samt utreda centrala faktorer som kan påverka vibrationsnivån och vibrationsutbredningen. Genom vibrationsmätningar i fält på fyra platser i Uppsala samlades data in och analyserades utifrån angivna frågeställningar. Resultatet bekräftade det som litteraturstudien belyste, att det är svårt att på ett generellt sätt beskriva vibrationsutbredningen och att den tydligt är platsspecifik. Vid samtliga undersöka platser kunde dock konstateras att vibrationsnivån i marken tenderar att vara en faktor mellan 2,5–32 högre då ett tungt fordon passerar en busskudde, jämfört med då det passerar en opåverkad referenspunkt längs med samma väg. Generellt avtog dessutom vibrationsnivån i marken med ökat avstånd från källan. Vilken vibrationsled som dominerade varierade dock både mellan platserna och för olika avstånd från källan. Vid en av de fyra mätplatserna förstärktes vibrationsnivån i byggnaden, jämfört med i marken utanför. Vid samma mätplats överskreds dessutom känseltröskeln inomhus, och en skyddsvibrationsnivå på 0,5 mm/s kan behöva tillämpas vid busskudden för att förhindra detta. Mätningarna visade att både vibrationer med låga och höga frekvenser kan uppstå i marken nära busskudden då tunga fordon passerar. Dock var det enbart vibrationer med låga frekvenser som spreds vidare i marken vid ett ökat avstånd från källan. Studien visade dessutom att det kan krävas ett skyddsavstånd mellan busskudde och byggnad på cirka 100 meter för att känseltröskeln inte ska riskera att överskridas inomhus. Trots att ett sådant avstånd är platsspecifikt, belyser det vilka krav det skulle kunna ställa på samhällsbyggnaden i ett växande Uppsala. Det faktum att busskuddar kan förhöja vibrationsnivån i marken vid passage av tunga fordon ter sig något märkligt, då busskuddarna ska vara utformade på ett sätt som tillåter tunga fordon att passera relativt obehindrat. Fler studier kring busskuddarnas utformning och/eller grundläggning är därför av stor relevans. Det är vidare relevant att exempelvis utreda hur fordonens hastighet över busskuddar påverkar vibrationsnivån i marken, då litteraturstudien belyser att det främst är då tunga fordon passerar ojämnheter med hög hastighet som betydande vibrationer kan uppstå. Busskuddar anses vara en av de mest effektiva hastighetssänkande åtgärderna, men studien visar att det kan ske på bekostnad av ökade vibrationsnivåer. En grundläggande helhetsbedömning bör därför göras av busskuddarnas lämplighet vid kommande stadsplanering. Nyckelord: markvibration, vibrationsmätning, busskudde, trafik, samhällsbyggnad. Institutionen för geovetenskaper, Uppsala Universitet, Villavägen 16, SE-752 36 Uppsala. ISSN 1401–5765.
Traffic induced vibrations: A study on the effect of speed control cushions on vibration levels in surrounding land and buildings. Erika Johansson Kling In Uppsala, speed control cushions are used as a form of conscious unevenness in the road surface to reduce speed and increase road safety on accident-affected road sections. However, housing in residences located near speed control cushions have reported that they can sometimes experience vibrations linked to when heavy vehicles pass speed control cushions as disturbing. This study aimed to quantify vibration levels in land and buildings near speed control cushions and to investigate key factors that can affect the vibration level and vibration propagation. Through vibration measurements at four places in Uppsala, data was collected and analyzed based on the stated research questions. The result confirmed what the literature study highlighted, that it is difficult to describe the propagation of vibrations in a general way and that it is clearly site-specific. However, it was found at all the measurement sites that the vibration level in the ground tends to be a factor between 2.5 and 32 higher when a heavy vehicle passes a speed control cushion, compared to when it passes an unaffected reference point along the same road. Generally, the vibration level in the ground also decreased with increased distance from the source. However, the level of vibration that dominated varied between the locations and for different distances from the source. At one measurement site, the vibration level in the building was amplified compared to in the ground outside. At the same measurement site, the sensing threshold was also exceeded indoors, and a protection vibration level of 0.5 mm/s may have to be applied nearby the speed control cushions to prevent this from happening. The measurements showed that both vibrations with low and high frequencies can occur in the ground near the speed control cushions when heavy vehicles pass. However, it was only vibrations with low frequencies that propagated further in the ground at an increased distance from the source. The study also showed that a safety distance between speed control cushions and buildings of approximately 100 meters may be required in order for the sensitivity threshold not to be exceeded indoors. Although such a distance is sitespecific, it highlights what requirements it could put on the urban planning in a growing Uppsala. The fact that speed control cushions can increase the level of vibration in the ground when heavy vehicles pass seems somewhat strange, since the speed control cushions are supposed to be designed in a way that allows heavy vehicles to pass relatively unobstructed. Additional studies on the design and/or foundation of the speed control cushions are therefore of great relevance. It is furthermore relevant to investigate, for example, how the speed of the vehicles when passing over speed control cushions affects the vibration level in the ground, since the literature study highlights that it is primarily when heavy vehicles pass an unevenness in the road surface at high speed that significant vibrations can occur. Speed control cushions are considered to be one of the most effective speed reducing measures, but the study shows that they may lead to increased vibration levels. An overall 3 evaluation should therefore be made regarding the suitability of speed control cushions in future urban planning. Keywords: ground vibration, vibration measurement, speed control cushion, traffic, urban planning. Department of Earth Sciences, Uppsala University, Villavägen 16, SE-752 36 Uppsala. ISSN 1401–5765.
APA, Harvard, Vancouver, ISO, and other styles
5

Naidoo, Vijayndren. "Capability level of information technology processes at a company using the control objectives for information and related technology framework." 2013. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001146.

Full text
Abstract:
M. Tech. Business Administration
The advent of information technology has significantly influenced and changed how businesses are being managed and monitored today. Information technology functions have strived tirelessly to understand demand, set priorities, deliver effectively, and capture value, yet the results still disappoint. Company ABC is currently operating within a market that calls for better use of its assets in order to reduce costs and improve its operations. The information technology function is seen as a strategic asset for ABC and needs to be assessed to determine the level of capability so that it can make a meaningful contribution towards achieving various business objectives. This study sought to assess various information technology functions to determine their level of capability. An analysis was done of the company's information technology processes based on the control objectives for information and related technology (COBIT) framework. The study also highlights the status of ABC's information technology systems and determines what control should be established. Finally it sought to assist the organisation in satisfying its quality, fiduciary and security requirements for their information assets.
APA, Harvard, Vancouver, ISO, and other styles
6

Santos, Rui Almeida. "Data Warehouse: modelo de auditoria e controlo interno." Master's thesis, 2009. http://hdl.handle.net/10071/2881.

Full text
Abstract:
O objectivo central desta investigação consiste em apresentar um modelo que permita avaliar eficazmente o sistema de controlo interno e auditoria de um Data Warehouse (DW). Para que seja facilmente aceite por auditores e auditados, propõe-se que a construção deste modelo tenha como referência os principais standards de controlo interno especialmente concebidos para avaliar tecnologias de informação (TI), nomeadamente as metodologias do CobiT® 4.1, do ITIL® V3 e do ISO/IEC 27002. Assim, a presente investigação assentará em três pilares: I. O Estado da Arte de: a. Data Warehouse Os componentes desta arquitectura são o principal objecto de avaliação; b. Controlo Interno e Auditoria Interna Meios para conseguir optimizar a prestação do DW; c. Modelo de governação das tecnologias de informação (IT-Governance) Resumo das melhores e mais recentes práticas internacionais de controlo e gestão de tecnologias e sistemas de informação. II. Desenvolvimento de um modelo de análise e avaliação do controlo interno das componentes e fases do Data Warehouse III. Validação do modelo através de um estudo de caso constituído por uma acção de auditoria ao Data Warehouse de uma Instituição financeira. As conclusões da investigação incidirão sobre as vantagens que as organizações poderão obter se utilizarem um modelo específico para avaliar e controlar a gestão do Data Warehouse.
The main purpose of this research is to present a model to effectively assess the internal control of Data Warehouse. For this template to be easily accepted by auditors and audited, we propose the use of a reference set of control standards and methodologies specially conceived to assess information technology environments, such as, CobiT® 4.1, ITIL® V3 and ISO/IEC 27002. Therefore, this research will be based on three pillars: I. The State of the Art: a. Data Warehouse The components of this architecture are the primary object of evaluation; b. Internal Control and Audit Means to achieve optimum performance of a DW; c. IT Governance Summary of the most recent and international accepted best practices to control and manage IT environment II. Development of a framework to assess the DW internal control, all its components and stages III. Model validation through a case study comprising an internal auditory action to a Financial Institution Data Warehouse environment The research findings will focus on the advantages that organizations may obtain from using a specific template to assess and control the Data Warehouse management.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Control Objects for Information and related Technology"

1

Information Systems Audit and Control Foundation (Rolling Meadows). COBIT: Governance, control and audit for information and related technology. 3rd ed. Rolling Meadows (Ill.): Information Systems Audit and Control Foundation, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Odincov, Boris. Models and intelligent systems. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1060845.

Full text
Abstract:
The monograph consists of three chapters, the first of which outlines the theoretical foundations of intelligent information systems. Special attention is paid to the disclosure of the term "model" as the intended meaning depends on the understanding of the material. Introduces and examines the new concepts such as the associative and intuitive knowledge while in the creation of intellectual information systems are not used. The second Chapter contains the analysis of problems of development of artificial intelligence (AI), developed in two directions: classical and statistical. Discusses difficulties in the development of the classical approach, associated with identifying the meaning of words, phrases, text, and formulating thoughts. The analysis of problems arising in the play of imagination and insight, machine understanding of natural language texts, play, verbalization and reflection. The third Chapter contains examples of the development of intelligent information systems and technologies in practice of management of economic objects. Theoretical bases of construction of information robots designed to support the task hierarchy of the knowledge base and generating control regulations. The technology of their creation and application in the management of the business efficiency of enterprise business processes and its investment activities. Focused on researchers and developers, AI and intelligent information systems, as well as graduate students and faculty in related academic disciplines.
APA, Harvard, Vancouver, ISO, and other styles
3

B, Laming Peter, and TNO Building and Construction Research. Centre for Timber Research., eds. Physical and related properties of 145 timbers: Information for practice. Dordrecht: Kluwer Academic Publishers, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Office, General Accounting. Executive guide: Best practices in achieving consistent, accurate physical counts of inventory and related property. Washington, D.C. (P.O.Box 37050, Washington 20013): GAO, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Office, General Accounting. Executive guide: Best practices in achieving consistent, accurate physical counts of inventory and related property. Washington, DC: GAO, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bowlin, Samuel W. FAA's voice switching and control system: Statement for the record by Samuel W. Bowlin, Director, Defense and Aeronautics Mission Systems, Information Management and Technology Division, before the Subcommittee on Transportation and Related Agencies, Committee on Appropriations, United States Senate. [Washington, D.C.?]: U.S. General Accounting Office, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Montana. Legislature. Office of the Legislative Auditor. Performance audit report: Foster care facility licensing and other related issues, Department of Family Services. Helena, Mont: The Office, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Office, General Accounting. Medicare: Antifraud technology offers significant opportunity to reduce health care fraud : report to the Ranking Minority Member, Subcommittee on Labor, Health and Human Services, Education, and Related Agencies, Committee on Appropriations, U.S. Senate. Washington, D.C: The Office, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Office, General Accounting. Medicare: Excessive payments for medical supplies continue despite improvements : report to the Ranking Minority Member, Subcommittee on Labor, Health and Human Services, Education, and Related Agencies, Committee on Appropriations, United States Senate. Washington, D.C: The Office, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Information Systems Audit and Control Foundation., ed. COBIT: Governance, control and audit for information and related technology. 2nd ed. Rolling Meadows, Ill: The Foundation, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Control Objects for Information and related Technology"

1

Markus, M. Lynne. "Toward an Integrated Theory of It-Related Risk Control." In Organizational and Social Perspectives on Information Technology, 167–78. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-0-387-35505-4_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Boyko, Regina, Dmitriy Shumyhai, and Miroslava Gladka. "Сoncept, Definition and Use of an Agent in the Multi-agent Information Management Systems at the Objects of Various Nature." In Recent Advances in Systems, Control and Information Technology, 59–63. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-48923-0_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Volodina, E. V., P. A. Kudryashova, and E. A. Studentova. "Optimization of Logistics Business Processes Based on the Implementation of Cognitive Information Technology." In Smart Technologies and Innovations in Design for Control of Technological Processes and Objects: Economy and Production, 455–64. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15577-3_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jarke, Juliane. "Co-Creating Digital Public Services." In Public Administration and Information Technology, 15–52. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52873-7_3.

Full text
Abstract:
Abstract This chapter reviews key literature and concepts relating to the co-creation of digital public services. For this task, it is firstly important to consider what kind of digital public services may be suitable for co-creation. In order to do so, the first section of this chapter defines what a digital public service is (e.g. with respect to different types of service providers, different types of services and service delivery) and considers what kind of digital public services allow for meaningful citizen participation. To better conceptualise different degrees of participation, the subsequent section reviews Arnstein’s (1969) “ladder of citizen participation” and related work. This allows distinguishing between different degrees of non-participation, (consultative) participation and beyond. Thirdly, the chapter reviews traditional participatory approaches that provide the basis to co-creating of digital public services: (1) co-production of public services, (2) co-design and (3) civic open data use. The chapter summarises and compares the different rationales for participation in these approaches, and reviews how they understand the sharing of control, the sharing of knowledge and the enabling of change.
APA, Harvard, Vancouver, ISO, and other styles
5

Troia, Sebastian. "Machine-Learning Defined Networking: Towards Intelligent Networks." In Special Topics in Information Technology, 3–12. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62476-7_1.

Full text
Abstract:
AbstractWith the advent of 5G technology and an ever-increasing traffic demand, today Communication Service Providers (CSPs) experience a progressive congestion of their networks. The operational complexity, the use of manual configuration, the static nature of current technologies together with fast-changing traffic profiles lead to: inefficient network utilization, over-provisioning of resources and very high Capital Expenditures (CapEx) and Operational Expenses (OpEx). This situation is forcing the CSPs to change their underlying network technologies, and have started to look at new technological solutions that increase the level of programmability, control, and flexibility of configuration, while reducing the overall costs related to network operations. Software Define Networking (SDN), Network Function Virtualization (NFV) and Machine Learning (ML) are accepted as effective solutions to reduce CapEx and OpEx and to boost network innovation. This chapter summarizes the content of my Ph.D. thesis, by presenting new ML-based approaches in order to efficiently optimize resources in 5G metro-core SDN/NFV networks. The main goal is to provide the modern CSP with intelligent and dynamic network optimization tools in order to address the requirements of increasing traffic demand and 5G technology.
APA, Harvard, Vancouver, ISO, and other styles
6

Szeto, Kimmy. "Metadata Standards in Digital Audio." In Encyclopedia of Information Science and Technology, Fourth Edition, 6447–63. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-2255-3.ch560.

Full text
Abstract:
Audio metadata are an essential tool that supports control and management of systems that create, transmit, describe, manage, and store digital audio. Throughout the lifecycle of digital audio objects—pre-production, acquisition and production, post-production, distribution, storage, transmission, and archiving—metadata “describe the attributes of a resource, characterize resource relationships, and support resource discovery, management, and effective use” (Vellucci, 1999). Technical and structural metadata enable audio in devices and software applications; descriptive metadata provide context. Metadata also relate and incorporate audio in a multimedia environment resulting in profound effects on conception, reception, and consumption.
APA, Harvard, Vancouver, ISO, and other styles
7

Michell, Vaughan. "The Internet of Things and Opportunities for Pervasive Safety Monitored Health Environments." In Advances in Healthcare Information Systems and Administration, 382–420. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4546-2.ch020.

Full text
Abstract:
This chapter discusses the opportunities for new ubiquitous computing technologies, with concentration on the Internet of Things (IoT), to improve patient safety and quality. The authors focus on elective or planned surgical interventions, although the technology is applicable to primary and trauma care. The chapter is divided into three main sections with section 1 covering medical error issues and mechanisms, section 2 introducing Internet of Things, and section 3 discussing how IoT capabilities may address and reduce medical errors. The authors explore the existing theory of errors expounded by Reason (Reason, 2000, 1998; Leape, 1994) to identify perception-, decision-, and knowledge-based medical errors and related processes, environments, and cultural drivers causing error. The authors then introduce the technology of the Internet of Things and identify a range of capabilities from sensing, tracking, control, cooperative, and semantic reasoning. They then show how these new capabilities might be applied to reduce the errors expounded by the discussed error theories. They identify that: IoT enables augmentation of objects, which provides a massive increase in information transfer, thus improving clinician perception and support for decision-making and problem solving; IoT provides a host of additional observers and opportunities, which can shift the focus of overworked clinicians from constant monitoring to undertaking complex actions, such as decision making and care; IoT networks of sensors and actuators, through the addition of semantic and contextual rules, support decision making and facilitate automated monitoring and control of pervasive safety-monitored health environments, thus reducing clinician workload.
APA, Harvard, Vancouver, ISO, and other styles
8

Adl, P., Z. A. Memon, and R. T. Rakowski. "HANDLING OBJECTS OF UNKNOWN CHARACTERISTICS." In Information Control Problems in Manufacturing Technology 1989, 63–68. Elsevier, 1990. http://dx.doi.org/10.1016/b978-0-08-037023-1.50016-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Asgari, Abolghasem (Hamid). "A Platform for Pervasive Building Monitoring Services Using Wireless Sensor Networks." In Wireless Technologies, 361–89. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-101-6.ch207.

Full text
Abstract:
At the core of pervasive computing model, small, low cost, robust, distributed, and networked processing devices are placed, which are thoroughly integrated into everyday objects and activities. Wireless Sensor Networks (WSNs) have emerged as pervasive computing technology enablers in several field, including environmental monitoring and control. Using this technology as a pervasive computing approach, researchers have been trying to persuade people to be more aware of their environment and energy usage in the course of their every day life. WSNs have brought significant benefits as far as monitoring is concerned, since they are more efficient and flexible compared to wired sensor solutions. In this chapter, the authors propose a Service Oriented Architecture for developing an enterprise networking environment used for integrating enterprise level applications and building management systems with other operational enterprise services and functions for the information sharing and monitoring, controlling, and managing the enterprise environment. The WSN is viewed as an information service provider not only to building management systems but also to wider applications in the enterprise infrastructure. The authors also provide specification, implementation, and deployments of the proposed architecture and discuss the related tests, experimentations, and evaluations of the architecture.
APA, Harvard, Vancouver, ISO, and other styles
10

"Information Related to Soil Pollution Topics." In Handbook of Chemical Technology and Pollution Control, 759–66. Elsevier, 2005. http://dx.doi.org/10.1016/b978-012088796-5/50027-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Control Objects for Information and related Technology"

1

Michaloski, John L., Johannes A. Soons, and Frederick M. Proctor. "Accessing the Performance of Model-Based Control in a Distributed Machine Tool Control Environment." In ASME 2004 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/detc2004-57792.

Full text
Abstract:
Although Computerized Numerical Controller (CNC) machine tools have greatly improved precision, quality and productivity, there are still many areas where inaccuracies and inefficiencies remain. Model-Based Control (MBC) is a technique to advance machine tool accuracy and part quality by compensating for machine and process errors. Nominal Differential Expansion (NDE) thermal compensation is one MBC approach which we have integrated into a CNC turning machine testbed. To allow portability and redeployment of the CNC technology, the MBC testbed was implemented as a component-based system using a distributed programming infrastructure. This paper looks at software and performance issues related to distributed MBC architecture, which is slower due to increased overhead from network communication. We look at the requirements of distributed infrastructure as implemented by the Distributed Component Object Model (DCOM), and assess the performance of various DCOM configurations matching the MBC requirements. Results from our analysis of the distributed performance using MBC-based DCOM configurations are presented.
APA, Harvard, Vancouver, ISO, and other styles
2

Angadi, Arun Shivappa, G. Senbagavalli, Nitin Awasthi, and V. Chandrakanth. "Head up display for pertinent information about environment and other related objects." In 2017 International Conference on Intelligent Computing and Control (I2C2). IEEE, 2017. http://dx.doi.org/10.1109/i2c2.2017.8321949.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Samylovskiy, Ivan A., and Anastasia K. Samylovskaya. "On the First- and Second-Order Conditions in Optimal Control Problems Related to Autonomous Objects Group lifecycle." In 2019 6th International Conference on Control, Decision and Information Technologies (CoDIT). IEEE, 2019. http://dx.doi.org/10.1109/codit.2019.8820630.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Yong, and Wengang Hou. "A fast image encryption algorithm using plaintext-related confusion." In 2016 IEEE Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). IEEE, 2016. http://dx.doi.org/10.1109/itnec.2016.7560368.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Basuhail, Abdullah Ahmad. "A Model for Implementing E-Teaching Objects for the Holy Quran and Related Sciences Using Animations." In 2013 Taibah University International Conference on Advances in Information Technology for the Holy Quran and Its Sciences. IEEE, 2013. http://dx.doi.org/10.1109/nooric.2013.28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Charoensuk, Kriangkrai, Nitisak Numanoy, and Jiraphon Srisertpol. "Verifying objects inside packaging box on belt conveyor by weight estimator." In 2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC). IEEE, 2015. http://dx.doi.org/10.1109/iaeac.2015.7428597.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yan, Jianfeng, Qian Cai, Hongfang Han, Weiqiang Gong, and Haixian Wang. "Two-directional discriminative spatial patterns for movement-related EEG classification." In 2021 IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC). IEEE, 2021. http://dx.doi.org/10.1109/iaeac50856.2021.9390645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Blaskovic, K., and D. Milovan. "Remote Control System Concept in Electric and Hybrid Marine Propulsion Objects." In 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, 2019. http://dx.doi.org/10.23919/mipro.2019.8756838.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sainan, Zhang, and Zheng Changyou. "Research and Application of Rigorous Access Control Mechanism in Distributed Objects System." In 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). IEEE, 2019. http://dx.doi.org/10.1109/itnec.2019.8728968.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mitra, Anirban, Somasis Roy, and Sanjit Kumar Setua. "Shape analysis of decisive objects from an image using mathematical morphology." In 2015 3rd International Conference on Computer, Communication, Control and Information Technology (C3IT). IEEE, 2015. http://dx.doi.org/10.1109/c3it.2015.7060220.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography