Dissertations / Theses on the topic 'Other Information, Computing and Communication Sciences'

To see the other types of publications on this topic, follow the link: Other Information, Computing and Communication Sciences.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Other Information, Computing and Communication Sciences.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Ashwell, Douglas James. "Reflecting diversity or selecting viewpoints : an analysis of the GM debate in New Zealand's media 1998-2002 : a thesis presented in partial fulfilment of the requirements for the degree of PhD in Communication at Massey University, Palmerston North, New Zealand." Massey University, 2009. http://hdl.handle.net/10179/1200.

Full text
Abstract:
The advent of genetically modified (GM) food in New Zealand in 1998 saw the beginning of a highly politicised debate about GM use in the country. The concern over GM and the political situation after the 1999 general election saw the Government establish a Royal Commission of Inquiry on Genetic Modification in May, 2000. The Royal Commission and strong public opposition to GM, evident in large public protests and other actions, made the issue highly newsworthy. The aim of this study was to explore how newspapers reported the GM debate, in particular, examining whether the reportage facilitated greater public debate and awareness about GM through journalists adhering to the ideals of the theory of social responsibility and enacting their watchdog role as encapsulated in the Fourth Estate tradition of the media. To achieve these aims the overall tone of the reportage and also which news source types and themes were most frequently reported were examined. In addition, the relationship and perceptions of scientists and journalists involved in the reporting were explored to examine how these relationships may have influenced the reportage. Content analysis showed the reportage had a pro-GM bias with policy-makers, scientists and industry spokespeople the most frequently cited news sources. The themes of Science, Economics and Politics dominated the reportage. Other source types and themes were less represented, especially themes dealing with ethical and environmental arguments. This lack of representation occurred despite the Royal Commission offering a space for all interested parties to speak. The interviews illustrated that scientists believed the quality of newspaper coverage of GM lacked depth and that important issues were unreported. Journalists found the issue complex to report and said they took care not to oversimplify the science and issues surrounding GM. The relationship between scientists and journalists indicated particular tensions existing between the two groups. The thesis concludes that if robust public debate is to occur within New Zealand regarding GM and other scientific developments, then the media should reflect a greater diversity of opinion by citing other potential news sources offering alternative arguments based on, for example, ethical or environmental grounds.
APA, Harvard, Vancouver, ISO, and other styles
2

Mani, Sindhu. "Empirical Performance Analysis of High Performance Computing Benchmarks Across Variations in Cloud Computing." UNF Digital Commons, 2012. http://digitalcommons.unf.edu/etd/418.

Full text
Abstract:
High Performance Computing (HPC) applications are data-intensive scientific software requiring significant CPU and data storage capabilities. Researchers have examined the performance of Amazon Elastic Compute Cloud (EC2) environment across several HPC benchmarks; however, an extensive HPC benchmark study and a comparison between Amazon EC2 and Windows Azure (Microsoft’s cloud computing platform), with metrics such as memory bandwidth, Input/Output (I/O) performance, and communication computational performance, are largely absent. The purpose of this study is to perform an exhaustive HPC benchmark comparison on EC2 and Windows Azure platforms. We implement existing benchmarks to evaluate and analyze performance of two public clouds spanning both IaaS and PaaS types. We use Amazon EC2 and Windows Azure as platforms for hosting HPC benchmarks with variations such as instance types, number of nodes, hardware and software. This is accomplished by running benchmarks including STREAM, IOR and NPB benchmarks on these platforms on varied number of nodes for small and medium instance types. These benchmarks measure the memory bandwidth, I/O performance, communication and computational performance. Benchmarking cloud platforms provides useful objective measures of their worthiness for HPC applications in addition to assessing their consistency and predictability in supporting them.
APA, Harvard, Vancouver, ISO, and other styles
3

Feary, Mark S. "Statistical frameworks and contemporary Māori development." Lincoln University, 2008. http://hdl.handle.net/10182/664.

Full text
Abstract:
Māori have entered a period of development that, more than ever before, requires them to explore complex options and make careful decisions about the way forward. This complexity stems from three particular areas. First, from having essentially two sets of rights, as New Zealanders and as Māori, and being active in the struggle to retain those rights. Second, from trying to define and determine development pathways that are consistent with their traditional Māori values, and which align with their desire to participate in and enjoy a modern New Zealand and a global society. Third, from attempting development within a political and societal environment that is governed by a different and dominant culture. Māori, historically and contemporarily, have a culture that leads them to very different views of the world and development pathways than pakeha New Zealanders (D. Marsden, 1994, p. 697). Despite concerted effort and mis placed belief the Māori world view has survived and is being adopted by Māori youth. The Māori worldview sometimes collides with the view of the governing pakeha culture of New Zealand, which values rights, assets and behaviours differently. Despite these differences and the complexities it remains important to measure progress and inform debate about best practice and future options. In this regard, statistical information is crucial, and is generally recognised as one of the currencies of development (World Summit of the Information Society, 2003). Māori increasingly desire to measure and be informed about the feasibility and progress of their development choices in a way that is relevant to their values and culture. Where a Māori view of reality is not present there is a high risk that decisions and actions will reflect a different worldview, will fail to deal with cultural complexities, and ultimately will not deliver the intended development outcomes.
APA, Harvard, Vancouver, ISO, and other styles
4

Mupparaju, Naveen. "Performance Evaluation and Comparison of Distributed Messaging Using Message Oriented Middleware." UNF Digital Commons, 2013. http://digitalcommons.unf.edu/etd/456.

Full text
Abstract:
Message Oriented Middleware (MOM) is an enabling technology for modern event- driven applications that are typically based on publish/subscribe communication [Eugster03]. Enterprises typically contain hundreds of applications operating in environments with diverse databases and operating systems. Integration of these applications is required to coordinate the business process. Unfortunately, this is no easy task. Enterprise Integration, according to Brosey et al. (2001), "aims to connect and combines people, processes, systems, and technologies to ensure that the right people and the right processes have the right information and the right resources at the right time"[Brosey01]. Communication between different applications can be achieved by using synchronous and asynchronous communication tools. In synchronous communication, both parties involved must be online (for example, a telephone call), whereas in asynchronous communication, only one member needs to be online (email). Middleware is software that helps two applications communicate with one another. Remote Procedure Calls (RPC) and Object Request Brokers (ORB) are two types of synchronous middleware—when they send a request they must wait for an immediate reply. This can decrease an application’s performance when there is no need for synchronous communication. Even though asynchronous distributed messaging using message oriented middleware is widely used in industry, there is not enough work done in evaluating the performance of various open source Message oriented middleware. The objective of this work was to benchmark and evaluate three different open source MOM’s performance in publish/subscribe and point-to-point domains, functional comparison and qualitative study from developers perspective.
APA, Harvard, Vancouver, ISO, and other styles
5

Craveiro, António Manuel Balazeiro Cascão. "O hipercorpo-tecnologias da carne : do culturista ao cyborg." Master's thesis, Instituições portuguesas -- UP-Universidade do Porto -- -Faculdade de Ciências do Desporto e de Educação Física, 2000. http://dited.bn.pt:80/29212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Beckhusen, Benedict. "Mobile Apps and the ultimate addiction to the Smartphone : A comprehensive study on the consequences of society’s mobile needs." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Informatik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-31159.

Full text
Abstract:
The smartphone is omnipresent and is cherished and held close by people. It allows for constant connection within a digitally connected society, as well as for many other purposes such as leisure activity or informational purpose. Within the Information Systems studies deeper investigation is required as to what impact this “taken – for – granted” mobile access to information and mobile apps has for individuals and society and if a “technological addiction”can be developed when using the smartphone for everything during the day on such a constant basis. The aim of this study was to understand the role of the smartphone in society and to shed light on this unclear relationship between the constant use of a smartphone and its development towards an addictive quality. To reach a conclusion, in depth – interviews were conducted with participants about their relationship to the smartphone and their smartphone use based on questions derived from literature on mobile communication technologies and the types of digital addictions existing. The results are that the smartphone is a device that seamlessly integrates into our daily lives in that we unconsciously use it as a tool to make our daily tasks more manageable, and enjoyable. It also supports us in getting better organized, to be in constant touch with family and friends remotely, and to be more mobile which is a useful ability in today’s mobility driven society. Smartphones have been found to inhabit a relatively low potential to addiction. Traits of voluntary behaviour, habitual behaviour, and mandatory behaviour of smartphone use have been found. All of these behaviours are not considered a true addiction. In the end, it seems that the increase of smartphone use is mainly due to the way we communicate nowadays digitally,and the shift in how we relate to our social peers using digital means.
APA, Harvard, Vancouver, ISO, and other styles
7

Chinnam, S. "MULTI-WAY COMMUNICATION SYSTEM." CSUSB ScholarWorks, 2017. https://scholarworks.lib.csusb.edu/etd/443.

Full text
Abstract:
Videoconferencing is increasingly becoming a trend worldwide in applications where clients need to access lectures, meeting proceedings, communicating with family and friends etc. It provides a platform enabling the visual, audio and video communication between clients. The aim of this project is to utilize the open source Java software to build a desktop application enabling communication between clients. When a user needs to transfer a secured file, it’s unsafe to send it using social networking sites because of lack of security. So, with the “Multi-Way Communication System” (MWCS) we resolve some security issues. The MWCS is a highly secure way for file transfer, text and video conferencing.
APA, Harvard, Vancouver, ISO, and other styles
8

Soni, Neha. "An Empirical Performance Analysis Of IaaS Clouds With CloudStone Web 2.0 Benchmarking Tool." UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/583.

Full text
Abstract:
Web 2.0 applications have become ubiquitous over the past few years because they provide useful features such as a rich, responsive graphical user interface that supports interactive and dynamic content. Social networking websites, blogs, auctions, online banking, online shopping and video sharing websites are noteworthy examples of Web 2.0 applications. The market for public cloud service providers is growing rapidly, and cloud providers offer an ever-growing list of services. As a result, developers and researchers find it challenging when deciding which public cloud service to use for deploying, experimenting or testing Web 2.0 applications. This study compares the scalability and performance of a social-events calendar application on two Infrastructure as a Service (IaaS) cloud services – Amazon EC2 and HP Cloud. This study captures and compares metrics on three different instance configurations for each cloud service such as the number of concurrent users (load), as well as response time and throughput (performance). Additionally, the total price of the three different instance configurations for each cloud service is calculated and compared. This comparison of the scalability, performance and price metrics provides developers and researchers with an insight into the scalability and performance characteristics of the three instance configurations for each cloud service, which simplifies the process of determining which cloud service and instance configuration to use for deploying their Web 2.0 applications. This study uses CloudStone – an open-source, three-tier web application benchmarking tool that simulates Web 2.0 application activities – as a realistic workload generator and to capture the intended metrics. The comparison of the collected metrics indicate that all of the tested Amazon EC2 instance configurations provide better scalability and lower latency at a lower cost than the respective HP Cloud instance configurations; however, the tested HP Cloud instance configurations provide a greater storage capacity than the Amazon EC2 instance configurations, which is an important consideration for data-intensive Web 2.0 applications.
APA, Harvard, Vancouver, ISO, and other styles
9

Senjov-Makohon, Natalie. "Digital immigrant teachers learning for the information age." full-text, 2009. http://eprints.vu.edu.au/2063/1/senjov_makohon.pdf.

Full text
Abstract:
This study investigated how experienced teachers learned Information and Communication Technologies (ICT) during their professional development. With the introduction of ICT, experienced teachers encountered change becoming virtually displaced persons – digital immigrants; new settlers – endeavouring to obtain digital citizenship in order to survive in the information age. In the process, these teachers moved from learning how to push buttons, to applying software, and finally to changing their practice. They learned collectively and individually, in communities and networks, like immigrants and adult learners: by doing, experimenting and reflecting on ICT. Unfortunately, for these teachers-as-pedagogues, their focus on pedagogical theory during the action research they conducted, was not fully investigated or embraced during the year-long study. This study used a participant observation qualitative methodology to follow teachers in their university classroom. Interviews were conducted and documentation collected and verified by the teacher educator. The application of Kolb‘s, Gardner‘s, and Vygotsky‘s work allowed for the observation of these teachers within their sociocultural contexts. Kolb‘s work helped to understand their learning processes and Gardner‘s work indicated the learning abilities that these teachers valued in the new ICT environment. Meanwhile Vygotsky‘s work – and in particular three concepts, uchit, perezhivanija, and mislenija – presented a richer and more informed basis to understand immigration and change. Finally, this research proposes that teachers learn ICT through what is termed a hyperuchit model, consisting of developments; action; interaction; and reflection. The recommendation is that future teacher university ICT professional learning incorporates this hyperuchit model.
APA, Harvard, Vancouver, ISO, and other styles
10

Qi, Ziming. "Real-time adaptive noise cancellation for automatic speech recognition in a car environment : a thesis presented in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Engineering at Massey University, School of Engineering and Advanced Technology, Auckland, New Zealand." Massey University, 2008. http://hdl.handle.net/10179/812.

Full text
Abstract:
This research is mainly concerned with a robust method for improving the performance of a real-time speech enhancement and noise cancellation for Automatic Speech Recognition (ASR) in a real-time environment. Therefore, the thesis titled, “Real-time adaptive beamformer for Automatic speech Recognition in a car environment” presents an application technique of a beamforming method and Automatic Speech Recognition (ASR) method. In this thesis, a novel solution is presented to the question as below, namely: How can the driver’s voice control the car using ASR? The solution in this thesis is an ASR using a hybrid system with acoustic beamforming Voice Activity Detector (VAD) and an Adaptive Wiener Filter. The beamforming approach is based on a fundamental theory of normalized least-mean squares (NLMS) to improve Signal to Noise Ratio (SNR). The microphone has been implemented with a Voice Activity Detector (VAD) which uses time-delay estimation together with magnitude-squared coherence (MSC). An experiment clearly shows the ability of the composite system to reduce noise outside of a defined active zone. In real-time environments a speech recognition system in a car has to receive the driver’s voice only whilst suppressing background noise e.g. voice from radio. Therefore, this research presents a hybrid real-time adaptive filter which operates within a geometrical zone defined around the head of the desired speaker. Any sound outside of this zone is considered to be noise and suppressed. As this defined geometrical zone is small, it is assumed that only driver's speech is incoming from this zone. The technique uses three microphones to define a geometric based voice-activity detector (VAD) to cancel the unwanted speech coming from outside of the zone. In the case of a sole unwanted speech incoming from outside of a desired zone, this speech is muted at the output of the hybrid noise canceller. In case of an unwanted speech and a desired speech are incoming at the same time, the proposed VAD fails to identify the unwanted speech or desired speech. In such a situation an adaptive Wiener filter is switched on for noise reduction, where the SNR is improved by as much as 28dB. In order to identify the signal quality of the filtered signal from Wiener filter, a template matching speech recognition system that uses a Wiener filter is designed for testing. In this thesis, a commercial speech recognition system is also applied to test the proposed beamforming based noise cancellation and the adaptive Wiener filter.
APA, Harvard, Vancouver, ISO, and other styles
11

Mugridge, Warwick Bruce. "Enhancements to an object-oriented programming language." Thesis, University of Auckland, 1990. http://hdl.handle.net/2292/1997.

Full text
Abstract:
The objective of this thesis has been to explore the value and limitations of Class, an object-oriented programming language, in order to further the development of the language. The pivot for this thesis is WallBrace, a code-checking system. The development of the WallBrace system is the basis of a critique of Class, and leads to a number of language extensions being proposed. An important aim in this work has been the careful integration of these enhancements with the rest of the language, avoiding unnecessary additions. A number of functional and object-oriented extensions to the language are proposed. Discrimination functions, which may be higher-order and polymorphic, add considerable functional power. Generic classes allow for abstract data types, such as sets and lists, to be defined within the language. The forms interface proposed will greatly enhance the quality of user interfaces to Class programs. An external interface will allow Class programs to communicate with files, databases, and specialist user-interface programs, such as for plan entry.
APA, Harvard, Vancouver, ISO, and other styles
12

Sluti, Donald George. "Linking process quality with performance: an empirical study of New Zealand manufacturing plants." Thesis, University of Auckland, 1992. http://hdl.handle.net/2292/2028.

Full text
Abstract:
This study was conducted to assess the impacts of quality on operational and business performance in manufacturing firms. Data were provided by 184 diversified New Zealand manufacturing plants- Quality is defined as the degree of conformance to specifications. The first phase of the research was the construction of a theoretical model to incorporate the impacts of quality on manufacturing performance, manufacturing productivity and business performance. The relationships of the model are based on the quality management literature. The second phase of the research was the design and administration of a survey instrument for the collection of empirical performance data. The data were then used to evaluate the relationships represented in the model. The final phase of the research used structural equations modelling in order to evaluate the relationships of the model. Quality was found to have significant and positive impacts on operational performance measures for process utilization, process output, production costs, work-in-process inventory levels and on-time delivery rate. The analysis found that change in quality level was most strongly associated with change in process utilization. The findings for the impacts of quality on operational performance were compatible with the quality management literature. The impacts of quality on business performance given by structural equations analysis were significant and positive for productivity-induced improvements of quality. Generally, the support for the impacts of quality on business performance which occur through other aspects of, operational performance was not significant. The limitations of the study were specified. The implications of the findings of the study for manufacturers were reviewed, along with the directions for future research.
APA, Harvard, Vancouver, ISO, and other styles
13

Gutmann, Peter. "The Design and Verification of a Cryptographic Security Architecture." Thesis, University of Auckland, 2000. http://hdl.handle.net/2292/2310.

Full text
Abstract:
A cryptographic security architecture constitutes the collection of hardware and software which protects and controls the use of encryption keys and similar cryptovariables. This thesis presents a design for a portable, flexible high-security architecture based on a traditional computer security model. Behind the API it consists of a kernel implementing a reference monitor which controls access to security-relevant objects and attributes based on a configurable security policy. Layered over the kernel are various objects which abstract core functionality such as encryption and digital signature capabilities, certificate management and secure sessions and data enveloping (email encryption). The kernel itself uses a novel design which bases its security policy on a collection of filter rules enforcing a cryptographic module-specific security policy. Since the enforcement mechanism (&e kernel) is completely independent of the policy database (the filter rules), it is possible to change the behaviour of the architecture by updating the policy database without having to make any changes to the kernel itself. This clear separation of policy and mechanism contrasts with current cryptographic security architecture approaches which, if they enforce controls at all, hardcode them into the implementation, making it difficult to either change the controls to meet application-specific requirements or to assess and verify them. To provide assurance of the correctness of the implementation, this thesis presents a design and implementation process which has been selected to allow the implementation to be verified in a manner which can reassure an outsider that it does indeed function as required. In addition to producing verification evidence which is understandable to the average user, the verification process for an implementation needs to be fully automated and capable of being taken down to the level of running code, an approach which is currently impossible with traditional methods. The approach presented here makes it possible to perform verification at this level, something which had previously been classed as "beyond Al" (that is, not achievable using any known technology). The versatility of the architecture presented here has been proven through its use in implementations ranging from l6-bit microcontrollers through to supercomputers, as well as a number of unusual areas such as security modules in ATMs and cryptographic coprocessors for general-purpose computers.
Note: Updated version of the thesis now published as Gutmann, P (2004). Cryptographic security architecture: design and verification. New York: Springer. ISBN 9780387953876.
APA, Harvard, Vancouver, ISO, and other styles
14

Walker, Geoffrey. "Communities of practice, networks & technologies : the dynamics of knowledge flows within third sector organisations in the North East of England." Thesis, Northumbria University, 2008. http://nrl.northumbria.ac.uk/3385/.

Full text
Abstract:
The purpose of this research is to assess the function, form and content of knowledge sharing in communities of practice, social networks and the use of collaborative technologies in Third Sector community networks in the North East of England. This is a significant area worthy of detailed examination due to the acknowledged relationship between communities of practice, social networks and the use of collaborative technologies. These three domains have been examined separately by others and suggestions have been made as to relationships between them but few, if any, studies appear to have used case-based evidence to explore how these relationships add value to knowledge sharing. The research addresses the following research question: To what extent does the use of collaborative technologies in communities of practice and social networks, in the Third Sector of the North East region, add value to face- to-face knowledge sharing and how may this be measured? In order to answer the research question a qualitative holistic case study approach based upon three case studies in Newcastle upon Tyne, South Tyneside and Sunderland has been utilised and grounded theory is used to formulate theory from the observed and analysed practice of the case studies under investigation. The conclusion is drawn that when value is added to knowledge sharing it is relative to the strength of several key variables, including, reciprocity, trust, the strength of network ties and the ability to integrate the use of collaborative technologies into ongoing activities. To aid analysis of the presence and strength of these variables a working paradigm has been designed and developed. Case studies are analysed through this paradigm leading to the development of a theory of knowledge sharing in the Third Sector.
APA, Harvard, Vancouver, ISO, and other styles
15

Le, hir Boris. "Capturing Information and Communication Technologies as a General Purpose Technology." Phd thesis, Ecole Centrale Paris, 2012. http://tel.archives-ouvertes.fr/tel-00997417.

Full text
Abstract:
This thesis aims to study Information and Communication Technologies (ICT) as a General Purpose Technology (GPT) and their role in the labor productivity evolution in the United States and Europe during recent decades. This thesis is organized in three parts corresponding to the fundamental GPT features: the wide possibilities for development, the ubiquity of the technology and the ability to create large technological opportunities. The first part depicts, at first, the innovation in ICT, beginning with a short historical review of ICT inventions followed by the analysis of current data on innovation in this field. In particular, it shows how the US was better than the European countries in inventing ICT until now. Second, this first part makes an inventory of measurement difficulties due to the rate and the nature of the change created by such technologies. The second part of the thesis deals with the ubiquitous nature of ICT. It first describes the ICT diffusion across countries and industries and reviews the economic literature on the direct contribution of ICT on labor productivity growth in the US and Europe. The next chapter studies the factor demand's behaviour in sectors that are either ICT producers or ICT intensive users. The third part focuses on the ICT ability to create opportunities for complementarity innovations. Firstly, it identifies the nature of ICT complementary innovations and the corresponding efforts. It shows, then, that national accounts must be improved in order to take these efforts into account as investments. Secondly, this part shows that, among the eleven European countries studied, the problem is highly concentrated in a few countries that invest less both in ICT and in innovative assets and that these two types of effort are complementary.
APA, Harvard, Vancouver, ISO, and other styles
16

Hakim, Zadok. "Factors That Contribute to The Resistance to Cloud Computing Adoption by Tech Companies vs. Non-Tech Companies." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1034.

Full text
Abstract:
Cloud computing (CC) may be the most significant development in recent history for businesses seeking to utilize technology. However, the adoption of CC hinges on many factors, and can have a greater positive impact on organizational performance. This study examined the different factors that contribute to the resistance to CC adoption. Anchored in The Theory of Technology-Organization-Environment (TOE), the study used a qualitative, grounded theory approach to develop a theoretical model for the acceptance of CC across firms. CC can have significant effects on efficiency and productivity for firms, but these effects will only be realized if IT usage becomes utilized globally. Thus, it was essential to understand the determinants of IT adoption, which was the goal of this research. The central research question involved understanding and examining the factors of resistance that contribute to cloud computing adoption across firms. Data was collected through semi-structured interviews with 22 chief information officers (CIOs) of various firms, including those considered technology companies (TCs) and those considered non-technology companies (NTCs). Data was analyzed using qualitative thematic analysis to determine what factors influence the adoption of CC systems and, moreover, to determine what factors create resistance to the adoption of CC in firms despite its well-documented advantages and benefits. Additionally, by examinging and focusing on the factors of resistance, the rsults of this study were generalized across a wider array of firms located in the Southeastern region of the US. A total of 12 categories were identified. These were organized into two groups. The core category being financial risks represented the probability of loss inherent in financing methods which may impair the ability to provide adequate return. The categories lack of knowledge, resistance to change, excessive cost to adopt, and cost saving fit under financial risks. Together these categories were indicators of the factors of resistance to adopt cloud computing technology. The core category security risks represented the overall perception of privacy in online environment. The categories process of research, accessing organization fit, perceived security risks, phased deployment, approval to adopt, and increase flexibility fit under security risks. Together these categories were direct indicators of the factors of resistance that contribute to the adoption of cloud computing technology by both TC and NTC. The result of this study showed that the predominant and critical factors of resistance that contribute to cloud computing adoption by TC were financial risks and security risks vs. security risks by NTC. A critical distinction between TC and NTC is that 86.4% of NTC’s participants did not care about cost, they only cared about data security. A model was subsequently developed based on the lived experiences of Chief Information Officers (CIOs) who have been faced with challenges regarding cloud acceptance, and cloud computing adoption. The theoretical model produced by this study may guide future researchers and enhance the understanding and implementation of cloud computing technologies. The results of this study will add to the body of literature and may guide companies attempting to implement cloud computing to do so more successfully.
APA, Harvard, Vancouver, ISO, and other styles
17

Shafabakhsh, Benyamin. "Research on Interprocess Communication in Microservices Architecture." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277940.

Full text
Abstract:
With the substantial growth of cloud computing over the past decade, microservices has gained significant popularity in the industry as a new architectural pattern. It promises a cloud-native architecture that breaks large applications into a collection of small, independent, and distributed packages. Since microservices-based applications are distributed, one of the key challenges when designing an application is the choice of mechanism by which services communicate with each other. There are several approaches for implementing Interprocess communication (IPC) in microservices, and each comes with different advantages and trade-offs. While theoretical and informal comparison exists between them, this thesis has taken an experimental approach to compare and contrast common forms of IPC communications. In this the- sis, IPC methods have been categorized into Synchronous and Asynchronous categories. The Synchronous type consists of REST API and Google gRPC, while the Asynchronous type is using a message broker known as RabbitMQ. Further, a collection of microservices for an e-commerce scenario has been designed and developed using all the three IPC methods. A load test has been executed against each model to obtain quantitative data related to Performance Efficiency, and Availability of every method. Developing the same set of functionalities using different IPC methods has offered a qualitative data related to Scalability, and Complexity of each IPC model. The evaluation of the experiment indicates that, although there is no universal IPC solution that can be applied in all cases, Asynchronous IPC patterns shall be the preferred option when designing the system. Nevertheless, the findings of this work also suggest there exist scenarios where Synchronous patterns can be more suitable.
Med den kraftiga tillväxten av molntjänster under det senaste decenniet har mikrotjänster fått en betydande popularitet i branschen som ett nytt arkitektoniskt mönster. Det erbjuder en moln-baserad arkitektur som delar stora applikationer i en samling små, oberoende och distribuerade paket. Eftersom microservicebaserade applikationer distribueras och körs på olika maskiner, är en av de viktigaste utmaningarna när man utformar en applikation valet av mekanism med vilken tjänster kommunicerar med varandra. Det finns flera metoder för att implementera Interprocess-kommunikation (IPC) i mikrotjänster och var och en har olika fördelar och nackdelar. Medan det finns teoretisk och in- formell jämförelse mellan dem, har denna avhandling tagit ett experimentellt synsätt för att jämföra och kontrastera vanliga former av IPC-kommunikation. I denna avhandling har IPC-metoder kategoriserats i synkrona och asynkrona kategorier. Den synkrona typen består av REST API och Google gRPC, medan asynkron typ använder en meddelandemäklare känd som RabbitMQ. Dessutom har en samling mikroservice för ett e-handelsscenario utformats och utvecklats med alla de tre olika IPC-metoderna. Ett lasttest har utförts mot var- je modell för att erhålla kvantitativa data relaterade till prestandaeffektivitet, och tillgänglighet för varje metod. Att utveckla samma uppsättning funktionaliteter med olika IPC-metoder har erbjudit en kvalitativ data relaterad till skalbarhet och komplexitet för varje IPC-modell. Utvärderingen av experimentet indikerar att även om det inte finns någon universell IPC-lösning som kan tillämpas i alla fall, ska asynkrona IPC-mönster vara det föredragna alternativet vid utformningen av systemet. Ändå tyder resultaten från detta arbete också på att det finns scenarier där synkrona mönster är mer lämpliga.
APA, Harvard, Vancouver, ISO, and other styles
18

Ashouri, Majid. "Towards Supporting IoT System Designers in Edge Computing Deployment Decisions." Licentiate thesis, Malmö universitet, Malmö högskola, Institutionen för datavetenskap och medieteknik (DVMT), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-37068.

Full text
Abstract:
The rapidly evolving Internet of Things (IoT) systems demands addressing new requirements. This particularly needs efficient deployment of IoT systems to meet the quality requirements such as latency, energy consumption, privacy, and bandwidth utilization. The increasing availability of computational resources close to the edge has prompted the idea of using these for distributed computing and storage, known as edge computing. Edge computing may help and complement cloud computing to facilitate deployment of IoT systems and improve their quality. However, deciding where to deploy the various application components is not a straightforward task, and IoT system designer should be supported for the decision. To support the designers, in this thesis we focused on the system qualities, and aimed for three main contributions. First, by reviewing the literature, we identified the relevant and most used qualities and metrics. Moreover, to analyse how computer simulation can be used as a supporting tool, we investigated the edge computing simulators, and in particular the metrics they provide for modeling and analyzing IoT systems in edge computing. Finally, we introduced a method to represent how multiple qualities can be considered in the decision. In particular, we considered distributing Deep Neural Network layers as a use case and raked the deployment options by measuring the relevant metrics via simulation.
APA, Harvard, Vancouver, ISO, and other styles
19

Adolfsson, Zandra, and Michaela Karlsson. "Barnvaccinationer : BHV-sjuksköterskans kommunikation och information till föräldrar." Thesis, Linnéuniversitetet, Institutionen för hälso- och vårdvetenskap (HV), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-78943.

Full text
Abstract:
Bakgrund: Barnvaccinationsprogrammet är den mest framgångsrika medicinska insatsen för folkhälsan. Information kring barnvaccinationer sprids snabbt och lätt via media och informationskanaler, så som Facebook och YouTube. Denna information är inte alltid kritiskt granskad och misstänkta biverkningar kan då tendera att överskattas. Det finns en rad olika anledningar till att vissa föräldrar är tveksamma till barnvaccination. BHV-sjuksköterskans uppgift är att möta alla föräldrar med respekt och genom korrekt information ge föräldrarna ett beslutsunderlag inför vaccinationen. En bristande kommunikation mellan BHV-sjuksköterskan och föräldrarna kan bidra till ökad oro, vilket kan leda till att föräldrarna väljer att avstå vaccination. Syfte: Syftet var att beskriva BHV-sjuksköterskors erfarenheter av kommunikation med föräldrar inför barnvaccinationer. Metod: Semistrukturerade intervjuer med nio BHV-sjuksköterskor. Studien har analyserats med hjälp av en kvalitativ innehållsanalys. Resultat: I resultatet framkom att samtliga deltagare i studien upplevde att de flesta föräldrarna hade en positiv inställning till barnvaccination. Studien visade att BHV-sjuksköterskorna ansåg att de gav en bra och tydlig information till föräldrarna. Samtidigt menade deltagarna att spridningen av information kunde förbättras. Det framkom att det finns skillnader i när BHV-sjuksköterskorna ger information till föräldrarna. Deltagarna i studien kände sig trygga i mötet med föräldrar och kring kommunikation av information inför vaccination. Slutsats: Studien visar att BHV-sjuksköterskorna känner trygghet kring kommunikation, både med information inför vaccination och att bemöta tveksamma föräldrar. BHV-sjuksköterskorna beskriver att de inom organisationen har en bra och tydlig information.
Background: The childhood vaccination program is the most successful medical response to public health. Despite this, there have always been negative voices about vaccination. Information about childhood vaccinations is spread quickly and easily through media and information channels, such as Facebook and YouTube. This information is not always critically reviewed and suspected sideeffects may then be overestimated. Evidence shows that there is a variety of reasons why some parents have doubt about childhood vaccination. Child Health nurse's task is to meet all parents with respect and give correct information so the parents have a decision basis for vaccination. A lack of communication between the Child Health nurse and the parents can contribute to increased concern, which may lead to the parents choosing to abstain from vaccination. Aim: The aim was to describe Child Health nurse's experiences of communicating with parents before childhood vaccinations. Method: Semi-structured interviews with nine Child Health nurses. The study has been analyzed using a qualitative content analysis. Results: The result showed that all participants in the study felt that most parents had a positive attitude towards childhood vaccination. The study showed that the Child Health nurses felt that they provided a good and distinct information to the parents. At the same time, participants believed that the dissemination of information could be improved. It showed that there are differences in when Child Health nurses present information to the parents. The participants in the study felt safe in the meeting with parents and about communication of information prior to vaccination. Conclusion: The study showed that Child Health nurses felt secure about communication, both with information before vaccination and in meeting hesitent parents. Child Health nurses described that they had good and distinct information within the organization.
APA, Harvard, Vancouver, ISO, and other styles
20

Zhang, Jun. "Using computers to facilitate formative assessment of open-ended written assignments : a thesis presented in partial fulfillment of the requirements for the degree of Master of Science in Computer Science at Massey University, Palmerston North, New Zealand." Massey University. Institute of Information Sciences and Technology, 2005. http://hdl.handle.net/10179/245.

Full text
Abstract:
This thesis presents an e-learning solution to facilitate formative assessment of electronically submitted open-ended written assignments.It is widely accepted that formative assessment is highly beneficial to student leaning. A number of researchers are active in developing specialized approaches and software systems for assisting formative assessment of student work. However, no comprehensive e-learning solution exists for facilitating formative assessment of students' open-ended written work. The project presented in this thesis has developed a new approach for using computers to facilitate formative assessment of electronically submitted open-ended written assignments.Based on the literature review of the education theories around formative assessment and current computer software technologies, this project has developed three principles for e-learning support for formative assessment of open-ended written assignments:1. It needs to facilitate all the activities that are potentially required for formative assessment of student assignments (for example, the creation of assessment criteria, the submission of assignments, and the analysis of the assessment results), not only the marking activity to create feedback on assignments.2. It needs to provide an onscreen marking tool which enables human markers to mark open-ended written assignments in an intuitive and efficient way by replicating their paper-based assessment approaches.3. It needs to provide a generic solution for facilitating formative assessment of open-ended written assignments from all disciplines, not a limited solution restricted to some specific domains (for example, computers science or business courses).Based on these principles, a specification of an e-learning system for facilitating formative assessment of open-ended written assignment was developed and a system was implemented accordingly. This system, called the Written Assignment Assessment (WAA) system, has been already used in the assignment marking of several courses at Massey University.
APA, Harvard, Vancouver, ISO, and other styles
21

Kaza, Bhagavathi. "Performance Evaluation of Data Intensive Computing In The Cloud." UNF Digital Commons, 2013. http://digitalcommons.unf.edu/etd/450.

Full text
Abstract:
Big data is a topic of active research in the cloud community. With increasing demand for data storage in the cloud, study of data-intensive applications is becoming a primary focus. Data-intensive applications involve high CPU usage for processing large volumes of data on the scale of terabytes or petabytes. While some research exists for the performance effect of data intensive applications in the cloud, none of the research compares the Amazon Elastic Compute Cloud (Amazon EC2) and Google Compute Engine (GCE) clouds using multiple benchmarks. This study performs extensive research on the Amazon EC2 and GCE clouds using the TeraSort, MalStone and CreditStone benchmarks on Hadoop and Sector data layers. Data collected for the Amazon EC2 and GCE clouds measure performance as the number of nodes is varied. This study shows that GCE is more efficient for data-intensive applications compared to Amazon EC2.
APA, Harvard, Vancouver, ISO, and other styles
22

Middleton, Cassandra Romae. "Successful Strategies for Retaining Profitability in an Education-Sector IT Project." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7042.

Full text
Abstract:
Many information technology (IT) project managers (PMs) and other business leaders lack effective strategies for enhancing communication among their project team members, thereby reducing profitability and organizational cohesion. The purpose of this multiple case study was to explore communication strategies that IT PMs used to successfully complete IT mobile device projects. The conceptual framework for this study was McQuail's mass communication, Craig's communication, and Deming's profound knowledge theory. Purposive sampling method was used to identify 6 successful IT PMs and leaders who worked at 2 leading educations settings located in southeastern South Carolina. Data gathered from the semistructured interviews and collected from publicly available documents were analyzed using coding techniques, constant comparison, and keyword phrases. After methodological triangulation of the data sources collected and completion of Yin's 5-step process of data analysis, 3 key themes emerged from data analysis: standardized project communication, project team building, and positive customer focus. Findings from this study may contribute to positive social change by providing IT PMs with evidence to support efficient communication strategies in the education sector to increase organizational performance and profitability, which may positively contribute to improving quality of life for employees, driving economic development, and improving community relations.
APA, Harvard, Vancouver, ISO, and other styles
23

Yang, Chun Chieh. "Evaluating online support for mobile phone selection : using properties and performance criteria to reduce information overload : a thesis presented in partial fulfilment of the requirements for the degree of Master of Information Science in Information Systems at Massey University, Auckland, New Zealand." Massey University, 2008. http://hdl.handle.net/10179/844.

Full text
Abstract:
The mobile phone has been regarded as one of the most significant inventions in the field of communications and information technology over the past decade. Due to the rapid growth of mobile phone subscribers, hundreds of phone models have been introduced. Therefore, customers may find it difficult to select the most appropriate mobile phone because of information overload. The aim of this study is to investigate web support for customers who are selecting a mobile phone. Firstly, all the models of mobile phones in the New Zealand market were identified by visiting shops and local websites. Secondly, a list of all the features of these mobile phones was collated from local shops, websites and magazines. This list was categorised into mobile phone properties and performance criteria. An experiment then compared three different selection support methods: A (mobile phone catalogue), B (mobile phone property selection) and C (mobile phone property and performance criteria selection). The results of the experiment revealed that selection support methods B and C had higher overall satisfaction ratings than selection support method A; both methods B and C had similar satisfaction ratings. The results also suggested that males and females select their mobile phones differently, though there was no gender preference in selection support methods.
APA, Harvard, Vancouver, ISO, and other styles
24

Cosgrove, Stephen Richard. "Mobile data services adoption in New Zealand future predictions : a thesis submitted to the graduate faculty of Design and Creative Technologies, Auckland University of Technology, School of Computer and Information Sciences in partial fulfilment of the requirements for the degree of Master of Computing Information Systems, Auckland, New Zealand, 2007." Click here to access this resource online, 2007. http://hdl.handle.net/10292/402.

Full text
Abstract:
Thesis (MCIS - Computer and Information Sciences) -- AUT University, 2007.
Includes bibliographical references. Also held in print (xii, 100 leaves : ill. ; 30 cm.) in the Archive at the City Campus (T 384.5 COS)
APA, Harvard, Vancouver, ISO, and other styles
25

Wang, Lei. "Effectiveness of text-based mobile learning applications: case studies in tertiary education : a thesis presented to the academic faculty, submitted in partial fulfilment of the requirements for the degree of Master of Information Sciences in Information Technology, Massey University." Massey University, 2009. http://hdl.handle.net/10179/1092.

Full text
Abstract:
This research focuses on developing a series of mobile learning applications for future 'beyond' classroom learning environments. The thesis describes the general use pattern of the prototype and explores the key factors that could affect users‘ attitudes towards potential acceptance of the mobile learning applications. Finally, this thesis explores the user acceptance of the mobile learning applications; and investigates the mobility issue and the comparison of applying learning activities through mobile learning and e-learning.
APA, Harvard, Vancouver, ISO, and other styles
26

Zhang, Yang. "An empirical study on the relationship between identity-checking steps and perceived trustworthiness in online banking system use : submitted in partial fulfilment of the requirements for the Degree of Master of Information Sciences in Information Technology." Massey University, 2009. http://hdl.handle.net/10179/982.

Full text
Abstract:
Online banking systems have become more common and widely used in daily life, bringing huge changes in modern banking transaction activities and giving us a greater opportunity to access the banking system anytime and anywhere. At the same time, however, one of the key challenges that still remain is to fully resolve the security concerns associated with the online banking system. Many clients feel that online banking is not secure enough, and to increase its security levels, many banks simply add more identity-checking steps or put on more security measures to some extent to give users the impression of a secure online banking system. However, this is easier to be said than done, because we believe that more identity-checking steps could compromise the usability of the online banking system, which is an inevitable feature in design of usable and useful online banking systems. Banks can simply enhance their security level with more sophisticated technologies, but this does not seem to guarantee the online banking system is in line with its key usability concern. Therefore, the research question raised in this thesis is to establish the relationships between usability, security and trustworthiness in the online banking system. To demonstrate these relationships, three experiments were carried out using the simulation of an online banking logon procedure to provide a similar online banking experience. Post questionnaires were used to measure the three concepts, i.e. usability, security and trustworthiness. The resulting analyses revealed that simply adding more identity-checking steps in the online banking system did not improve the customers? perceived security and trustworthiness, nor the biometric security technique (i.e., fingerprints) did enhance the subjective ratings on the perceived security and trustworthiness. This showed that the systems designer needs to be aware that the customer?s perception of the online banking system is not the same as that conceived from a technical standpoint.
APA, Harvard, Vancouver, ISO, and other styles
27

Banks, Tara. "Evaluation of an Interactive Health Communication Trans Fat Website." DigitalCommons@USU, 2008. https://digitalcommons.usu.edu/etd/160.

Full text
Abstract:
In order to evaluate the short-term educational and behavioral impact of the American Heart Association's "Face the Fats" web application had upon college students, a study involving 116 Utah State University undergraduate students was conducted. A one-group pre-posttest design was utilized to answer eight research questions focusing on: health risks associated with trans fat, general trans fat knowledge, ability to identify foods containing trans and saturated fats, food label information, healthy alternatives to trans fat, and readiness to change trans fat intake. Participants completed an online pretest survey and then viewed the "Face the Fats" website at their own pace. After viewing the website, participants completed an online posttest survey. Data were analyzed using Microsoft Excel. Statistical analysis of a paired sample t test revealed that "Face the Fats" was successful in changing the general trans fat knowledge of participants (p = < 0.00). Results also showed participants increasing their knowledge of health risks associated with different types of fat (p = < 0.00). Knowledge of trans fat nutritional information on food labels also significantly increased (p = < 0.00) and participants were more able to name foods containing trans fat, although some confusion remained among foods that contained both saturated and trans fat. Using a chi-square test, it was found that participants were more likely to state they were seriously considering reducing trans fat intake within the next 30 days after viewing "Face the Fats" (p = < 0.00). Results of a paired sample t test also showed an increase in the impact that trans fat information had on participants' decision to purchase and consume food (p = < 0.00).
APA, Harvard, Vancouver, ISO, and other styles
28

Mohanarajah, Selvarajah. "Designing CBL systems for complex domains using problem transformation and fuzzy logic : a thesis presented in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science at Massey University, Palmerston North, New Zealand." Massey University, 2007. http://hdl.handle.net/10179/743.

Full text
Abstract:
Some disciplines are inherently complex and challenging to learn. This research attempts to design an instructional strategy for CBL systems to simplify learning certain complex domains. Firstly, problem transformation, a constructionist instructional technique, is used to promote active learning by encouraging students to construct more complex artefacts based on less complex ones. Scaffolding is used at the initial learning stages to alleviate the difficulty associated with complex transformation processes. The proposed instructional strategy brings various techniques together to enhance the learning experience. A functional prototype is implemented with Object-Z as the exemplar subject. Both objective and subjective evaluations using the prototype indicate that the proposed CBL system has a statistically significant impact on learning a complex domain. CBL systems include Learner models to provide adaptable support tailored to individual learners. Bayesian theory is used in general to manage uncertainty in Learner models. In this research, a fuzzy logic based locally intelligent Learner model is utilized. The fuzzy model is simple to design and implement, and easy to understand and explain, as well as efficient. Bayesian theory is used to complement the fuzzy model. Evaluation shows that the accuracy of the proposed Learner model is statistically significant. Further, opening Learner model reduces uncertainty, and the fuzzy rules are simple and resemble human reasoning processes. Therefore, it is argued that opening a fuzzy Learner model is both easy and effective. Scaffolding requires formative assessments. In this research, a confidence based multiple test marking scheme is proposed as traditional schemes are not suitable for measuring partial knowledge. Subjective evaluation confirms that the proposed schema is effective. Finally, a step-by-step methodology to transform simple UML class diagrams to Object-Z schemas is designed in order to implement problem transformation. This methodology could be extended to implement a semi-automated translation system for UML to Object Models.
APA, Harvard, Vancouver, ISO, and other styles
29

Gibbs, S. F. "An examination of near-graduates' computer self-efficacy in light of business employers' expectations." Diss., Lincoln University, 2009. http://hdl.handle.net/10182/1448.

Full text
Abstract:
The use of computers has become part of every day life. The high prevalence of computer use may lead employers to assume university graduates will have good computing skills. Such assumptions may be the reason that employers use broad terms to advertise the computing tasks required for graduate-level positions. This thesis investigates how well the expectations of employers match the perceptions of near-graduates about their computer skills. Four graduate-level positions were identified from advertisements placed in order to recruit graduates. The employers who placed these advertisements were surveyed by interview and questionnaire. Twenty-one students about to graduate from a university commerce programme were also interviewed and surveyed. It was found that the wording of the advertisements did not satisfactorily portray the requirements and intentions of the employers. It was also found that skills the near-graduates perceived they possessed frequently did not meet the expectations of employers. Results also show that the near-graduates did not fully understand which computing skills would be expected in the workplace. This study highlights implications for three groups: employers, graduates and educators.
APA, Harvard, Vancouver, ISO, and other styles
30

Maor, Amit. "Using a Data Warehouse as Part of a General Business Process Data Analysis System." Scholarship @ Claremont, 2016. http://scholarship.claremont.edu/cmc_theses/1383.

Full text
Abstract:
Data analytics queries often involve aggregating over massive amounts of data, in order to detect trends in the data, make predictions about future data, and make business decisions as a result. As such, it is important that a database management system (DBMS) handling data analytics queries perform well when those queries involve massive amounts of data. A data warehouse is a DBMS which is designed specifically to handle data analytics queries. This thesis describes the data warehouse Amazon Redshift, and how it was used to design a data analysis system for Laserfiche. Laserfiche is a software company that provides each of their clients a system to store and process business process data. Through the 2015-16 Harvey Mudd College Clinic project, the Clinic team built a data analysis system that provides Laserfiche clients with near real-time reports containing analyses of their business process data. This thesis discusses the advantages of Redshift’s data model and physical storage layout, as well as Redshift’s features directly benefit of the data analysis system.
APA, Harvard, Vancouver, ISO, and other styles
31

Persson, Mathias. "Communication Protocol for a Cyber-Physical System : Using Bluetooth, NFC and cloud." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-175159.

Full text
Abstract:
The focus of this thesis is to utilize many of today’s current technologies to design a communication protocol that allows different devices to be incorporated into a system that can facilitate the flow of information between a user and a world of digital data. The protocol will take advantage of individual benefits from NFC, Bluetooth and cloud computing in its design to make the underlying complexity as transparent to the user as possible. Some of the main problems, such as security and reliability, are discussed and how they are incorporated into the core design of the protocol. The protocol is then applied to a case study to see how it can be utilized to create an integrity preserving system for managing medical records in a healthcare environment. The results from the case study gives merit to guidelines provided by the protocol specifications, making a system implementation based on the protocol theoretically possible. A real system implementation is required to verify the results extracted from the case study.
Denna uppsats fokuserar på att använda många av dagens teknologier för att konstruera ett kommunikationsprotokoll som möjliggör för olika enheter att inkorporeras i ett system som underlättar informationsflödet mellan en användare och en värld av digital data. Protokollet utnyttjar olika individuella fördelar hos NFC, Bluetooth and molntjänster i dess design för att göra den underliggande komplexiteten så transparant som möjligt för användaren. Några av de främsta problemen, så som säkerhet och tillförlitlighet, diskuteras och hur de inkorporeras i hjärtat av protokollet. Protokollet appliceras sedan i en fallstudie för att se hur det kan användas för att skapa ett system för sjukjournaler som bevarar integriteten hos patienter. Resultatet från fallstudien pekar mot att de riktlinjer som gavs av protokollspecifikationerna fungerar för att göra en systemimplementation på en teoretisk nivå. En verklig systemimplementation skulle behövas för att verifiera de resultat som framgår ur fallstudien.
APA, Harvard, Vancouver, ISO, and other styles
32

Kaddour, Inan. "Mobile Cloud Computing: A Comparison Study of Cuckoo and AIOLOS Offloading Frameworks." UNF Digital Commons, 2018. https://digitalcommons.unf.edu/etd/785.

Full text
Abstract:
Currently, smart mobile devices are used for more than just calling and texting. They can run complex applications such as GPS, antivirus, and photo editor applications. Smart devices today offer mobility, flexibility, and portability, but they have limited resources and a relatively weak battery. As companies began creating mobile resource intensive and power intensive applications, they have realized that cloud computing was one of the solutions that they could utilize to overcome smart device constraints. Cloud computing helps decrease memory usage and improve battery life. Mobile cloud computing is a current and expanding research area focusing on methods that allow smart mobile devices to take full advantage of cloud computing. Code offloading is one of the techniques employed in cloud computing with mobile devices. This research compares two dynamic offloading frameworks to determine which one is better in terms of execution time and battery life improvement.
APA, Harvard, Vancouver, ISO, and other styles
33

Jonnavithula, Lalitha. "Improving the interfaces of online discussion forums to enhance learning support : a thesis presented in partial fulfilment of the requirements for the degree of Master of Information Science in Information Systems at Massey University, Palmerston North, New Zealand." Massey University, 2008. http://hdl.handle.net/10179/968.

Full text
Abstract:
This thesis describes a research work aimed at improving the interfaces of online discussion forums (ODFs) in relation to their functional support to enhance learning. These ODFs form part of almost all Learning Management Systems (LMSs) such as WebCT, Moodle and Blackboard, which are widely used in education nowadays. Although ODFs are identified as valuable sources to learning, their interfaces are limited in terms of providing support to students, such as in the areas of managing their postings as well as in facilitating them to quickly locate and obtain specified information. In addition, these systems lack features to support inter-institutional cooperation that could potentially increase knowledge sharing between students and educators of different institutions. The interface design objective of this study therefore was to explore and overcome the limitations identified as above, and enhance the effectiveness and efficiency of ODFs’ support to learning. Using a task centered design approach; the required features were developed, and implemented in a working prototype called eQuake (electronic Question answer knowledge environment). eQuake is a shared online discussion forum system developed as an add-on to a well-known open source e-learning platform (Moodle). This system was intended for use among interinstitutional students in New Zealand tertiary institutions that teach similar courses. The improved interface functionalities of eQuake are expected to enhance learning support in terms of widening communication among users, increasing knowledge base, providing existing matching answer(s) quickly to students, and exposing students to multiple perspectives. This study considers such improvements to ODF interfaces as vital to enable users to enjoy the benefits of technology-mediated environment. The perceived usefulness and ease-of-use of improved features in eQuake were evaluated using a quantitative experimental research method. The evaluation was conducted at three tertiary institutions in New Zealand, and the overall results indicated positive response, although some suggestions for improvement have been made in the evaluation. This thesis presents a review of the related literature, describes the design and development of a user interface, followed by its implementation in eQuake, and a description of the evaluation. The thesis concludes with recommendations for better interface design of ODFs and provides suggestions for future research in this area.
APA, Harvard, Vancouver, ISO, and other styles
34

Alder, Simone. "CoMIC : an exploration into computer-mediated intercultural communication." Scholarly Commons, 2007. https://scholarlycommons.pacific.edu/uop_etds/682.

Full text
Abstract:
This thesis explores how cultural differences manifest themselves in computermediated intercultural communication (CoMIC). This study particularly looks at the role and use of digital nonverbals (DNVs) and their regulatory functions. The data analyzed is from a global virtual team working together for a period of three months. The grounded theory method has been employed to code the electronic transcript of the team's communication. Furthermore, the participants were surveyed regarding their personal backgrounds, their work, and their perception of the communication processes that took place. The study shows that in an intercultural communication process DNVs are used to avoid intercultural misunderstandings and to underline the various communication styles. The different styles, hand in hand with the DNVs used, vary depending on the team's overall situation. However, the absence of DNVs can be an indicator for a state of crisis.
APA, Harvard, Vancouver, ISO, and other styles
35

Thompson, Errol Lindsay. "How do they understand? Practitioner perceptions of an object-oriented program : a thesis presented in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Education (Computer Science) at Massey University, Palmerston North, New Zealand." Massey University, 2008. http://hdl.handle.net/10179/854.

Full text
Abstract:
In the computer science community, there is considerable debate about the appropriate sequence for introducing object-oriented concepts to novice programmers. Research into novice programming has struggled to identify the critical aspects that would provide a consistently successful approach to teaching introductory object-oriented programming. Starting from the premise that the conceptions of a task determine the type of output from the task, assisting novice programmers to become aware of what the required output should be, may lay a foundation for improving learning. This study adopted a phenomenographic approach. Thirty one practitioners were interviewed about the ways in which they experience object-oriented programming and categories of description and critical aspects were identified. These critical aspects were then used to examine the spaces of learning provided in twenty introductory textbooks. The study uncovered critical aspects that related to the way that practitioners expressed their understanding of an object-oriented program and the influences on their approach to designing programs. The study of the textbooks revealed a large variability in the cover of these critical aspects.
APA, Harvard, Vancouver, ISO, and other styles
36

Chetsumon, Sireerat. "Attitudes of extension agents towards expert systems as decision support tools in Thailand." Lincoln University, 2005. http://hdl.handle.net/10182/1371.

Full text
Abstract:
It has been suggested 'expert systems' might have a significant role in the future through enabling many more people to access human experts. It is, therefore, important to understand how potential users interact with these computer systems. This study investigates the effect of extension agents' attitudes towards the features and use of an example expert system for rice disease diagnosis and management(POSOP). It also considers the effect of extension agents' personality traits and intelligence on their attitudes towards its use, and the agents' perception of control over using it. Answers to these questions lead to developing better systems and to increasing their adoption. Using structural equation modelling, two models - the extension agents' perceived usefulness of POSOP, and their attitude towards the use of POSOP, were developed (Models ATU and ATP). Two of POSOP's features (its value as a decision support tool, and its user interface), two personality traits (Openness (0) and Extraversion (E)), and the agents' intelligence, proved to be significant, and were evaluated. The agents' attitude towards POSOP's value had a substantial impact on their perceived usefulness and their attitude towards using it, and thus their intention to use POSOP. Their attitude towards POSOP's user interface also had an impact on their attitude towards its perceived usefulness, but had no impact on their attitude towards using it. However, the user interface did contribute to its value. In Model ATU, neither Openness (0) nor Extraversion (E) had an impact on the agents' perceived usefulness indicating POSOP was considered useful regardless of the agents' personality background. However, Extraversion (E) had a negative impact on their intention to use POSOP in Model ATP indicating that 'introverted' agents had a clear intention to use POSOP relative to the 'extroverted' agents. Extension agents' intelligence, in terms of their GPA, had neither an impact on their attitude, nor their subjective norm (expectation of 'others' beliefs), to the use of POSOP. It also had no association with any of the variables in both models. Both models explain and predict that it is likely that the agents will use POSOP. However, the availability of computers, particularly their capacity, are likely to impede its use. Although the agents believed using POSOP would not be difficult, they still believed training would be beneficial. To be a useful decision support tool, the expert system's value and user interface as well as its usefulness and ease of use, are all crucially important to the preliminary acceptance of a system. Most importantly, the users' problems and needs should be assessed and taken into account as a first priority in developing an expert system. Furthermore, the users should be involved in the system development. The results emphasise that the use of an expert system is not only determined by the system's value and its user interface, but also the agents' perceived usefulness, and their attitude towards using it. In addition, the agents' perception of control over using it is also a significant factor. The results suggested improvements to the system's value and its user interface would increase its potential use, and also providing suitable computers, coupled with training, would encourage its use.
APA, Harvard, Vancouver, ISO, and other styles
37

Blakey, Jeremy Peter. "Database training for novice end users : a design research approach : a thesis presented in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Information Systems at Massey University, Albany, New Zealand." Massey University, 2008. http://hdl.handle.net/10179/880.

Full text
Abstract:
Of all of the desktop software available, that for the implementation of a database is some of the most complex. With the increasing number of computer users having access to this sophisticated software, but with no obvious way to learn the rudiments of data modelling for the implementation of a database, there is a need for a simple, convenient method to improve their understanding. The research described in this thesis represents the first steps in the development of a tool to accomplish this improvement. In a preliminary study using empirical research a conceptual model was used to improve novice end users’ understanding of the relational concepts of data organisation and the use of a database software package. The results showed that no conclusions could be drawn about either the artefact used or the method of evaluation. Following the lead of researchers in the fields of both education and information systems, a design research process was developed, consisting of the construction and evaluation of a training artefact. A combination of design research and a design experiment was used in the main study described in this thesis. New to research in information systems, design research is a methodology or set of analytical techniques and perspectives, and this was used to develop a process (development of an artefact) and a product (the artefact itself). The artefact, once developed, needed to be evaluated for its effectiveness, and this was done using a design experiment. The experiment involved exposing the artefact to a small group of end users in a realistic setting and defining a process for the evaluation of the artefact. The artefact was the tool that would facilitate the improvement of the understanding of data modelling, the vital precursor to the development of a database. The research was conducted among a group of novice end users who were exposed to the artefact, facilitated by an independent person. In order to assess whether there was any improvement in the novices’ understanding of relational data modelling and database concepts, they then completed a post-test. Results confirmed that the artefact, trialled through one iteration, was successful in improving the understanding of these novice end users in the area of data modelling. The combination of design research and design experiment as described above gave rise to a new methodology, called experimental design research at this early juncture. The successful outcome of this research will lead to further iterations of the design research methodology, leading in turn to the further development of the artefact which will be both useful and accessible to novice users of personal computers and database software. This research has made the following original contributions. Firstly, the use of the design research methodology for the development of the artefact, which proved successful in improving novice users’ understanding of relational data structures. Secondly, the novel use of a design experiment in an information systems project, which was used to evaluate the success of the artefact. And finally, the combination of the developed artefact followed by its successful evaluation using a design experiment resulted in the hybrid experimental design research methodology. The success of the implementation of the experimental design research methodology in this information systems project shows much promise for its successful application to similar projects.
APA, Harvard, Vancouver, ISO, and other styles
38

AGARWAL, Rachit. "Towards enhancing information dissemination in wireless networks." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00919417.

Full text
Abstract:
In public warning message systems, information dissemination across the network is a critical aspect that has to be addressed. Dissemination of warning messages should be such that it reaches as many nodes in the network in a short time. In communication networks those based on device to device interactions, dissemination of the information has lately picked up lot of interest and the need for self organization of the network has been brought up. Self organization leads to local behaviors and interactions that have global effects and helps in addressing scaling issues. The use of self organized features allows autonomous behavior with low memory usage. Some examples of self organization phenomenon that are observed in nature are Lateral Inhibition and Flocking. In order to provide self organized features to communication networks, insights from such naturally occurring phenomenon is used. Achieving small world properties is an attractive way to enhance information dissemination across the network. In small world model rewiring of links in the network is performed by altering the length and the direction of the existing links. In an autonomous wireless environment such organization can be achieved using self organized phenomenon like Lateral inhibition and Flocking and beamforming (a concept in communication). Towards this, we first use Lateral Inhibition, analogy to Flocking behavior and beamforming to show how dissemination of information can be enhanced. Lateral Inhibition is used to create virtual regions in the network. Then using the analogy of Flocking rules, beam properties of the nodes in the regions are set. We then prove that small world properties are achieved using average path length metric. However, the proposed algorithm is applicable to static networks and Flocking and Lateral Inhibition concepts, if used in a mobile scenario, will be highly complex in terms of computation and memory. In a mobile scenario such as human mobility aided networks, the network structure changes frequently. In such conditions dissemination of information is highly impacted as new connections are made and old ones are broken. We thus use stability concept in mobile networks with beamforming to show how information dissemination process can be enhanced. In the algorithm, we first predict the stability of a node in the mobile network using locally available information and then uses it to identify beamforming nodes. In the algorithm, the low stability nodes are allowed to beamform towards the nodes with high stability. The difference between high and low stability nodes is based on threshold value. The algorithm is developed such that it does not require any global knowledge about the network and works using only local information. The results are validated using how quickly more number of nodes receive the information and different state of the art algorithms. We also show the effect of various parameters such as number of sources, number of packets, mobility parameters and antenna parameters etc. on the information dissemination process in the network. In realistic scenarios however, the dynamicity in the network is not only related to mobility. Dynamic conditions also arise due to change in density of nodes at a given time. To address effect of such scenario on the dissemination of information related to public safety in a metapopulation, we use the concepts of epidemic model, beamforming and the countrywide mobility pattern extracted from the $D4D$ dataset. Here, we also propose the addition of three latent states to the existing epidemic model ($SIR$ model). We study the transient states towards the evolution of the number of devices having the information and the difference in the number of devices having the information when compared with different cases to evaluate the results. Through the results we show that enhancements in the dissemination process can be achieved in the addressed scenario
APA, Harvard, Vancouver, ISO, and other styles
39

Zha, Xi. "Supporting multiple output devices on an ad-hoc basis in visualisation." Lincoln University, 2010. http://hdl.handle.net/10182/1391.

Full text
Abstract:
In recent years, new visualisation techniques and devices, such as remote visualisation and stereoscopic displays, have been developed to help researchers. In a remote visualisation environment the user may want to see visualisation on a different device, such as a PDA or stereo device, and in different circumstances. Each device needs to be configured correctly, otherwise it may lead to an incorrect rendering of the output. For end users, however, it can be difficult to configure each device without a knowledge of the device property and rendering. Therefore, in a multiple user and multiple display environment, to obtain the correct display for each device can be a challenge. In this project, the focus on investigating a solution that can support end users to use different display devices easily. The proposed solution is to develop an application that can support the ad-hoc use of any display device without the system being preconfigured in advance. Thus, end users can obtain the correct visualisation output without any complex rendering configuration. We develop a client-server based approach to this problem. The client application can detect the properties of a device and the server application can use these properties to configure the rendering software to generate the correct image for subsequent display on the device. The approach has been evaluated through many tests and the results show that using the application is a useful in helping end users use different display devices in visualisation.
APA, Harvard, Vancouver, ISO, and other styles
40

Engelbrecht, Judith Merrylyn. "Electronic clinical decision support (eCDS) in primary health care: a multiple case study of three New Zealand PHOs : a thesis presented in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Information Systems at Massey University, Palmerston North, New Zealand." Massey University, 2009. http://hdl.handle.net/10179/1107.

Full text
Abstract:
Health care providers internationally are facing challenges surrounding the delivery of high quality, cost effective services. The use of integrated electronic information systems is seen by many people working in the health sector as a way to address some of the associated issues. In New Zealand the primary health care sector has been restructured to follow a population based care model and provides services through not-for-profit Primary Health Organisations (PHOs). PHOs, together with their District Health Boards (DHBs), contributing service providers, and local communities, are responsible for the care of their enrolled populations. The Ministry of Health (MoH) is streamlining information sharing in this environment through improvements to computer based information systems (IS). By providing health professionals with improved access to required information within an appropriate time frame, services can be targeted efficiently and effectively and patient health outcomes potentially improved. However, the adoption of IS in health care has been slower than in other industries. Therefore, a thorough knowledge of health care professionals’ attitudes to, and use of, available IS is currently needed to contribute to the development of appropriate systems. This research employs a multiple case study strategy to establish the usage of IS by three New Zealand PHOs and their member primary health care providers (PHPs), with a focus on the role of IS in clinical decision support (CDS). A mixed method approach including semi-structured interviews and postal surveys was used in the study. Firstly, the research develops and applies a survey tool based on an adaptation of an existing framework, for the study of IT sophistication in the organisations. This provides the foundation for an in-depth study of the use of computerised CDS (eCDS) in the PHO environment. Secondly, a conceptual model of eCDS utilisation is presented, illustrating the variation of eCDS use by member general practitioner (GP) practices within individual organisations. Thirdly, five areas of importance for improving eCDS utilisation within PHO’s are identified, contributing information of use to organisations, practitioners, planners, and systems developers. Lastly, the research provides a structure for the study of the domain of eCDS in PHOs by presenting a research approach and information specific for the area.
APA, Harvard, Vancouver, ISO, and other styles
41

Sankaranarayanan, Suresh. "Studies in agent based IP traffic congestion management in diffserv networks." 2006. http://arrow.unisa.edu.au:8081/1959.8/46358.

Full text
Abstract:
The motivation for the research carried out was to develop a rule based traffic management scheme for DiffServ networks with a view to introducing QoS (Quality of Service). This required definition of rules for congestion management/control based on the type and nature of IP traffic encountered, and then constructing and storing these rules to enable future access for application and enforcement. We first developed the required rule base and then developed the software based mobile agents using the Java (RMI) application package, for accessing these rules for application and enforcement. Consequently, these mobile agents act as smart traffic managers at nodes/routers in the computer based communication network and manage congestion.
APA, Harvard, Vancouver, ISO, and other styles
42

Ng-Kruelle, Seok Hian. "The price of convenience : implications of socially pervasive computing for personal privacy." 2006. http://arrow.unisa.edu.au:8081/1959.8/46369.

Full text
Abstract:
Literature has identified the need to study socially pervasive ICT in context in order to understand how user acceptability of innovation varies according to different inputs. This thesis contributes to the existing body of knowledge on innovation studies (Chapter 2) and proposes a methodology for a conceptual model, for representing dynamic contextual changes in longitudinal studies. The foundation for this methodology is the 'Price of Convenience' (PoC) Model (Chapter 4). As a theory development Thesis, it deals with two related studies of socially pervasive ICT implementation: (1) voluntary adoption of innovations and (2) acceptance of new socially pervasive and ubiquitous ICT innovations (Chapters 6 and 7).
APA, Harvard, Vancouver, ISO, and other styles
43

Beckett, Jason. "Forensic computing : a deterministic model for validation and verification through an ontological examination of forensic functions and processes." 2010. http://arrow.unisa.edu.au:8081/1959.8/93190.

Full text
Abstract:
This dissertation contextualises the forensic computing domain in terms of validation of tools and processes. It explores the current state of forensic computing comparing it to the traditional forensic sciences. The research then develops a classification system for the disciplines functions to establish the extensible base for which a validation system is developed.
Thesis (PhD)--University of South Australia, 2010
APA, Harvard, Vancouver, ISO, and other styles
44

Barretto, Sistine. "Designing guideline-based workflow-integrated electronic health records." 2005. http://arrow.unisa.edu.au/vital/access/manager/Repository/unisa:28366.

Full text
Abstract:
The recent trend in health care has been on the development and implementation of clinical guidelines to support and comply with evidence-based care. Evidence-based care is established with a view to improve the overall quality of care for patients, reduce costs, and address medico-legal issues. One of the main questions addressed by this thesis is how to support guideline-based care. It is recognised that this is better achieved by taking into consideration the provider workflow. However, workflow support remains a challenging (and hence rarely seen) accomplishment in practice, particularly in the context of chronic disease management (CDM). Our view is that guidelines can be knowledge-engineered into four main artefacts: electronic health record (EHR) content, computer-interpretable guideline (CiG), workflow and hypermedia. The next question is then how to coordinate and make use of these artefacts in a health information system (HIS). We leverage the EHR since we view this as the core component to any HIS.
PhD Doctorate
APA, Harvard, Vancouver, ISO, and other styles
45

Miliszewska, Iwona. "A Multidimensional Model for Transnational Computing Education Programs." 2006. http://eprints.vu.edu.au/579/1/Template.pdf.

Full text
Abstract:
As transnational education is becoming firmly embedded as a part of the distance education landscape, governments and universities are calling for meaningful research on transnational education. This study involved the development and validation of a model for effective transnational education programs. The study used student experience as a key indicator of program effectiveness and, following a holistic approach, took into consideration various dimensions of the transnational education context including student, instructor, curriculum and instruction design, interaction, evaluation and assessment, technology, and program management and organisational support. This selection of dimensions, together with their attributes, formed the proposed model for transnational education programs. The model was applied for validation against three transnational computing education programs currently offered by Australian universities in Hong Kong. Two methods of data collection - a survey, and group interviews with students - were used to validate the model; data was obtained from approximately three hundred subjects. The model was evaluated in terms of the perceived importance, to the students, of the various attributes of each program dimension on program effectiveness. The results of the validation indicated that the students in all the programs participating in the evaluation were in agreement as to the factors they consider most important to the effectiveness of transnational programs. The validation of the model led to its refinement; first, the least important attributes were removed from dimensions; second, a new dimension, pre-enrolment considerations, was introduced to the model; and finally, the attributes within each of the dimensions were ordered in terms of their perceived importance.
APA, Harvard, Vancouver, ISO, and other styles
46

Abrahams, Brooke. "Tourism information systems integration and utilization within the semantic web." 2006. http://eprints.vu.edu.au/1477/1/Abrahams.pdf.

Full text
Abstract:
The objective of this research was to generate grounded theory about the extent to which the Semantic Web and related technologies can assist with the creation, capture, integration, and utilization of accurate, consistent, timely, and up-to-date Web based tourism information. Tourism is vital to the economies of most countries worldwide (developed and lessdeveloped). Advanced Destination Marketing Systems (DMS) are essential if a country’s tourism infrastructure, facilities and attractions are to receive maximum exposure. A necessary prerequisite here is that relevant data must be captured, ‘cleansed’, organized, integrated and made available to key industry parties (e.g. travel agents and inbound tour operators). While more and more tourists are using the Internet for travel planning, the usability of the Internet as a travel information source remains a problem, with travellers often having trouble finding the information they seek as the amount of online travel related information increases. The problem is largely caused by the current Web’s lack of structure, which makes the integration of heterogeneous data a difficult time consuming task. Traditional approaches to overcoming heterogeneity have to a large extent been unsuccessful. In the past organizations attempted to rectify the problem by investing heavily in top-down strategic information systems planning projects (SISP), with the ultimate aim of establishing a new generation of systems built around a single common set of enterprise databases. An example of this approach to integration is that undertaken by the Bell companies (Nolan, Puryear & Elron 1989), whose massive investment in computer systems turned out to be more of a liability than an asset. The Semantic Web offers a new approach to integration. Broadly speaking, the Semantic Web (Berners-Lee, Hendler & Lassila 2001) refers to a range of standards, languages, development frameworks and tool development initiatives aimed at annotating Web pages with welldefined metadata so that intelligent agents can reason more effectively about services offered at particular sites. The technology is being developed by a number of scientists and industry organizations in a collaborative effort led by the Worldwide Web Consortium (W3C) with the goal of providing machine readable Web intelligence that would come from hyperlinked vocabularies, enabling Web authors to explicitly define their words and concepts. It is based on new markup languages such as such as Resource Description Framework (RDF) (Manola & Miller 2004), Ontology Web Language (OWL) (McGuinness & Harmelen 2004), and ontologies which provide a shared and formal description of key concepts in a given domain. The ontology driven approach to integration advocated here might be considered ‘bottom-up’, since individual enterprises (and parts of the one enterprise) can apply the technology (largely) independently – thereby mirroring the processes by which the Web itself evolved. The idea is that organizations could be provided with a common model (the Semantic Web ontology), and associated (easy-to-use) software could then be employed to guide them in the development of their Websites. As such, because Website production is driven by the common ontology, consistency and convenient integration is almost an automatic by-product (for all companies that take advantage of the technology and approach). In many cases, organizations would not have to change their present data structures or naming conventions, which could potentially overcome many of the change management issues that have led to the failure of previous integration initiatives. Many researchers (e.g. (El Sawy 2001)) have stressed the necessity to take a holistic view of technology, people, structure and processes in IT projects and, more specifically, Sharma et al. (2000, p. 151) have noted that as significant as DMS technological problems are, they may well pale into insignificance when compared with the managerial issues that need to be resolved. With this in mind, a systems development research approach supported by a survey of tourism operators and secondary interviews was used to generate grounded theory. The systems development and evaluation were designed to uncover technical benefits of using the Semantic Web for the integration and utilization of online tourism information. The survey of tourism operators and secondary data interviews were aimed at providing an understanding of attitudes towards adoption of a radical new online technology among industry stakeholders. A distinguishing feature of this research was its applied and pragmatic focus: in particular, one aim was to determine just what of practical use can be accomplished today, with current (albeit, extended) technology, in a real industry setting.
APA, Harvard, Vancouver, ISO, and other styles
47

Danthuluri, Ravi. "Investigation on the quality of videoconferencing over the Internet and intranet environments." 2003. http://eprints.vu.edu.au/271/1/02whole.pdf.

Full text
Abstract:
This study deals with the scope and feasibility of video-conferencing on the Internet and Intranet, for a real-time implementation of a classroom atmosphere linking different universities. I have considered the effects of various factors on video conferencing and different tests have been performed to study the data transfer during the online sessions. Readings of send rate, received rate and CPU load have been considered during these tests and the results have been plotted in the form of graphs. The study also gives conclusions at regular intervals on the tests performed and the limitations on various video confencing sessions. From the statistics collected I have concluded on the hardware requirements for optimized performance of video conferencing over the Internet. The study also states the scope of research to be undertaken in future for much better performance and understanding of different types of protocols. This thesis includes the study of various network-monitoring tools.
APA, Harvard, Vancouver, ISO, and other styles
48

AlShihi, Hafedh. "Critical Factors in the Adoption and Diffusion of E-Government Initiatives in Oman." 2006. http://eprints.vu.edu.au/483/1/483contents.pdf.

Full text
Abstract:
Many significant barriers must be faced in the adoption and dissemination of e-government systems regardless of how advanced or modest a country is in terms of ICT infrastructure and deployment. This research has endeavored to investigate the impediments associated with the development and diffusion of e-government with a concentration on non-technical and country-specific factors. The focus of the research was on Oman's efforts to develop an e-government system, using advanced nations' experiences in the same domain to establish benchmarks. Initially, this research undertook a general literature review to define the barriers to the uptake of e-government and to set and refine aims, scope and questions asked of the research. Subsequently, a more focused literature review was conducted on the experiences of advanced nation with e-government, to identify possible lessons for and solutions to barriers facing the take-up of e-government. In parallel, an exploratory case study of the Oman e-government project was conducted that aimed to test the extent to which the barriers and solutions drawn from the largely Western-centric literature apply in the Omani situation, and to investigate other possible cultural and country-specific barriers. Semi-structured interviews and face-to-face administered questionnaires were the primary data collection strategies used throughout the case study phase. The study found that non-technical barriers in Oman, such as users' lack of IT knowledge and the absence of marketing campaigns, have negatively affected people's decisions to use the technology and inhibited decision makers from implementing or adopting technology initiatives. In addition, several country-specific limits to e-government growth were identified. Government decision makers in Oman were found to be prone to short-term planning, which prevents them from anticipating the long-term potential of e-government. Additionally, frequent structural changes within ministries, and the fact that the e-government project is not given high priority nor urgently needed at present, have contributed in delaying development of and improvements to such a system. Ultimately, this research delivered a socio-technical framework for adoption, detailing causes and effects of the critical factors in the adoption and diffusion of e-government initiatives in Oman.
APA, Harvard, Vancouver, ISO, and other styles
49

Kripanont, Napaporn. "Examining a technology acceptance model of internet usage by academics within Thai business schools." 2007. http://eprints.vu.edu.au/1512/1/Kripanont.pdf.

Full text
Abstract:
Information Technology has been a significant research area for some time, but its nature has changed considerably since the Internet became prominent just over a decade ago. Many researchers have studied and proposed theories and models of technology acceptance in order to predict and explain user behaviour with technology to account for rapid change in both technologies and their environments. Each theory or model has been proposed with different sets of determinants and moderators and most of them have been developed in the U.S. It is therefore questioned whether the theories and models of technology acceptance that have been developed, modified, and extended in the U.S. can be used in other countries, especially in Thailand. It is also questioned whether there might be other determinants and moderators that also play important roles in this specific environment. This thesis (1) reviewed literature in respect of nine prominent theories and models, (2) reviewed previous literature about IT acceptance and usage within four contexts of study, (3) investigated the extent to which academics use and intend to use the Internet in their work, (4) investigated how to motivate academics to make full use of the Internet in their work, (5) investigated to what extent using the Internet helps in improving academics’ professional practice, professional development and quality of working life, (6) formulated a research model of technology acceptance regarding Internet usage by Thai academics, and (7) generated and validated the research model that best describes Thai academics’ Internet usage behaviour and behaviour intention. These last two objectives represent the main focus of the thesis. Questionnaire survey method was used to collect primary data from 927 academics within Business Schools in 20 Public Universities in Thailand. The survey yielded 455 usable questionnaires, with a response rate of 49%. Statistical analysis methods and Structural Equation Modelling with AMOS version 6.0 were used to analyse data. The research model was formulated with five core determinants of usage and up to nine moderators of key relationships. It was then tested and modified, the final modified model evidenced by goodness of fit of the model to the data, explained 31.6% (Square Multiple Correlation) of the variance in usage behaviour in teaching , 42.6% in usage behaviour in other tasks, 55.7% in behaviour intention in teaching and 59.8% in behaviour intention in other tasks. From the findings, three core determinants: perceived usefulness, perceived ease of use and self-efficacy significantly determined usage behaviour in teaching. Two core determinants: perceived usefulness and self-efficacy significantly determined usage behaviour in other tasks. Finally, usage behaviour significantly influenced behaviour intention. In addition three moderators: age, e-university plan and level of reading and writing, impacted the influence of key determinants toward usage behaviour. Only two moderators: age and research university plan, impacted the influence of usage behaviour toward behaviour intention. The rest including gender, education level, academic position, experience and Thai language usage did not impact the influence of the key determinants toward usage behaviour and did not impact the influence of usage behaviour toward behaviour intention. Consequently, the final modified research model which is called the “Internet Acceptance Model” or “IAM” has the power to explain and predict user behaviour in a Thai Business Schools environment. A thorough understanding of the model may help practitioners to analyse the reasons for resistance toward the technology and also help them to take efficient measures to improve user acceptance and usage of the technology.
APA, Harvard, Vancouver, ISO, and other styles
50

Grundy, John (John Collis). "Multiple textual and graphical views for interactive software development environments." 1993. http://www.cs.auckland.ac.nz/~john-g/papers/thesis93.pdf.

Full text
Abstract:
Diagram construction can be used to visually analyse and design a complex software system using natural, graphical representations describing high-level structure and semantics. Textual programming can specify detailed documentation and functionality not well expressed at a visual level. Integrating multiple textual and graphical views of software development allows programmers to utilise both representations as appropriate. Consistency management between these views must be automatically maintained by the development environment. MViews, a model for such software development environments, has been developed. MViews supports integrated textual and graphical views of software development with consistency management. MViews provides flexible program and view representation using a novel object dependency graph approach. Multiple views of a program may contain common information and are stored as graphs with textual or graphical renderings and editing. Change propagation between program components and views is supported using a novel update record mechanism. Different editing tools are integrated as views of a common program repository and new program representations and editors can be integrated without affecting existing views. A specification language for program and view state and manipulation semantics, and a visual specification language for view appearance and editing semantics, have been developed. An object-oriented architecture based on MViews abstractions allows environment specifications to be translated into a design for implementing environments. Environment designs are implemented by specialising a framework of object-oriented language classes based on the MViews architecture. A new language is described which provides object-oriented extensions to Prolog. An integrated software development environment for this language is discussed and the specification, design and implementation of this environment using MViews are described. MViews has also been reused to produce a graphical entity-relationship/textual relational database schema modeller, a dialogue painter with a graphical editing view and textual constraints view, and various program visualisation systems.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography