To see the other types of publications on this topic, follow the link: World Information Systems Exchange.

Dissertations / Theses on the topic 'World Information Systems Exchange'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'World Information Systems Exchange.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Kanaparthy, Venu Madhav Singh. "GML represntation for interoperable spatial data exchange in a mobile mapping application." Master's thesis, Mississippi State : Mississippi State University, 2004. http://library.msstate.edu/etd/show.asp?etd=etd-07102004-133629.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Xiaoning. "Bluetooth information exchange network." Click here to access this resource online, 2008. http://hdl.handle.net/10292/722.

Full text
Abstract:
Bluetooth is a low cost and low power wireless technology for connecting portable and / or fixed Bluetooth enabled devices to form short-range wireless ad hoc personal area networks (PANs). As the Bluetooth specification does not specify a protocol to form ad hoc Bluetooth networks, a method for forming an efficient Bluetooth network under a practical networking scenario is still an open research problem. This thesis introduces an approach to implement an indoor ad hoc Bluetooth wireless network, Bluetooth information exchange network (BIEN). This network formation is based on Bluetooth and Java technologies. A set of Bluetooth enabled devices configured with the BIEN software application are able to spontaneously establish a dynamic multi-hop wireless network using Bluetooth technology without the need of formal network infrastructure, centralized administration, fixed routers or access points. In this study, the performance evaluation focuses on the relation between network capacity and topology by testing end-to-end performance in terms of throughput and the latency of communication links with various parameters, including the hop number between nodes and the number of slaves in piconets. The evaluation results show that the throughput reduces with the increased length of a path, and with an increase in the number of slaves in a piconet in the network. The latency also increases with path length, and with the number of slaves in a piconet in the different experimental BIENs, whether if there is traffic or not in the networks. Experimental results have further confirmed the necessity to minimize the number of bridge nodes in the Bluetooth networks due to their traffic bottleneck effect. This work is an attempt at implementation of a distributed multi-hop scatter net with an integrated routing protocol in the practical environments, while most of the literature focuses on covering the modelling of it. It intends to demonstrate how Bluetooth technology with Java technology can be used to design, develop and deploy ad hoc wireless networks with the commercial Bluetooth devices, and examine how well Bluetooth technology supports ad hoc multi-hop wireless network technology.
APA, Harvard, Vancouver, ISO, and other styles
3

Almalohi, Mussaad. "Implementing Health Information Exchange System: Saudi Arabia." Digital Commons at Loyola Marymount University and Loyola Law School, 2015. https://digitalcommons.lmu.edu/etd/350.

Full text
Abstract:
In Saudi Arabia, medical errors are at an alarming level. Lack of a Health Information Exchange (HIE) system is one the greatest reasons for medical errors in the Kingdom. Health care in many countries has evolved with the invention of electronic health information exchange system, henceforth HIE. This research paper purposes to implement HIE in Saudi Arabia, which entirely does not have a system of the sort. It is imperative instill HIE in the health care system in Saudi to allow physicians, nurses, health care facilities as well as patients to electronically share medical information in a safe and secure manner. Many countries such as United States, New Zealand and Germany have had great success with the HIE system and have reported vast benefits. Benefits of HIE are such as reduction of health care cost as well as decreasing medical errors. For Saudi Arabia to reach the same heights, many stakeholders will be involved in the triumph of the HIE system in the Kingdom of Saudi Arabia. The biggest contributor will be the Ministry of Health, which will be in charge of implementing as well as making the system mandatory in the main four hospitals in the country: Shomasy, Kind Saud University Hospital, Ministry of interior Hospital and Ministry of Defense Hospital. Each hospital having their own current medical information recording system, will now have one universal system that is made sure to be secure and safe for patients as well as other participating organizations who have access to the HIE system. The main concentration of the HIE system in Saudi Arabia will be in the emergency care of these four hospitals. It is crucial to have an organized and controlled way of recording as well as accessing patient medical records electronically, in a fast and effective way. This paper proposes that an HIE system in Saudi Arabia will reduce the cost of medical care and decrease medical errors. Through the use of Lean thinking and the use of quality tools, the HIE system will be able to change and increase the reliably as well as effectiveness of Urgent Care in the country and therefore have consequent benefits as well. Also, understanding who is going to play a great role in the triumph of the HIE system, such as the Ministry of Health and knowing what stakeholders will need to be affiliated and contribute will lead the project to a better success.
APA, Harvard, Vancouver, ISO, and other styles
4

Pokrzywa, Revonda Maria. "Systems Biology in an Imperfect World: Modeling Biological Systems with Incomplete Information." Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/39938.

Full text
Abstract:
One of the primary goals of systems biology is to understand the complex underlying network of biochemical interactions which allow an organism to respond to environmental stimuli. Models of these biological interactions serve as a tool to both codify current understanding of these interactions as well as a starting point for scientific discovery. Due to the massive amount of information which is required for this modeling process, systems biology studies must often attempt to construct models which reflect the whole of the system while having access to only partial information. In some cases, the missing information will not have a confounding effect on the accuracy of the model. In other cases, there is the danger that this missing information will make the model useless. The focus of this thesis is to study the effect which missing information has on systems level studies within several different contexts. Specifically, we study two contexts : when the missing information takes the role of incomplete molecular interaction network knowledge and when it takes the role of unknown kinetic rate laws. These studies yield interesting results. We show that when metabolism is isolated from gene expression, the effects are not limited to those reactions under strong control by gene expression. Thus, incomplete understanding of molecular interaction networks may have unexpected effects on the resulting analysis. We also reveal that under the conditions of the current study, mass action was shown to be the superior substitute when the true rate equations for a biological system are unknown. In addition to studying the effect of missing information in the aforementioned contexts, we propose a method for limiting the parameter search space of biochemical systems. Even in ideal scenarios where both the molecular interaction network and the relevant kinetic rate equations are known, obtaining appropriate estimates for the unknown system parameters can be challenging. By employing a method which limits the parameter search space, we are able to acquire estimates for parameter values which are much closer to the true values than those which could be obtained otherwise.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
5

Arunachalam, Subbiah. "What can ICTs do? Perpsectives from the developing world." Bohlau-Verlag, Koln, 2006. http://hdl.handle.net/10150/106004.

Full text
Abstract:
This chapter is from an invited presentation (15 pages long) given at the Aachen Colloquium on Click - A Split World, November 2004. It has appeared in the book [Gespaltene Welt? Technikzugange in der Wissensgesellschaft, edited by Max Kerner and Thomas Muller, and published by Bohlau Verlag, Koln, 2006] and is the author's final version. Introduction: I am asked to reflect on social and cultural consequences of technical development and try to answer a few questions: â ¢ In what different kind of ways access to knowledge is modified in an information technology-based society that is dominated by technical resources? â ¢ Does global exchange of information enable ubiquitous access to knowledge? â ¢ By which means do information technologies contribute to the solution or intensify global and local problems? â ¢ Which requirements arise from this problem for an IT-based society? I shall try to answer these questions from the point of view of a Third Worlder. Most other speakers at this colloquium are thinkers and experts known for their scholarship and academic achievements. I do not belong to the same league. I am not saying this out of humility; I am making a statement of fact. Then why am I here? Because I have felt the impact of information and communication technologies (ICTs) on the developing world and I have been working for many years to overcome the 1 deleterious consequences of ICTs in the context of the poor and the marginalized. I wish to share with you what I have learnt through working in the field. I am coming from India where we had a major election a few months ago. We are happy about the election for two reasons. One, contrary to what is happening in many parts of the developing world, democracy in India is vibrant and we have been holding free and fair elections consistently for more than 50 years. Two, despite outstanding achievements in the areas of high technology in general and information and communication technologies (ICTs) in particular, the ruling governments in the states of Karnataka and Andhra Pradesh belonging to two different parties have failed to return to power, largely because the rural poor voted against them. Thanks to rapid developments in indigenous capabilities combined with favorable policies by the governments in these two southern states of India, a number of IT industries and research laboratories â both Indian and multinational â sprung up, mainly in the capital cities Bangalore (referred to as the Silicon Valley of the East) and Hyderabad (half jocularly called Cyberabad). But these developments did not have a perceptible impact on the rural poor, who felt that they were neglected. What can information and communication technologies (ICTs) do to help the poor? Can they do anything at all? That is a question that dominates the development discourse. If poverty has been so persistent that we could not eliminate it with all our efforts till now, how can the use of ICTs make a difference? Poverty is much more than absence of money. Often generations in poverty lead people to a sense of utter hopelessness and deprive them of their sense of self-respect and dignity. They are deprived of access to essential assets and opportunities such as education, healthcare, employment, land and other natural resources, services, infrastructure and credit. They have little say in their polity and society. They are not empowered to participate in making the decisions that shape their lives. They become increasingly marginalized, excluded and vulnerable to exploitation. This exploitation manifests in several forms such as bonded labour, child labour, inadequate compensation for work if and when they get work, ill treatment and deprivation of basic rights. It will be naïve to believe that we can solve the problem of poverty by providing access to computers and telecommunication to the poor of the world.1 We have always lived in an unequal world, but now the gap between information â havesâ and â have-notsâ is widening fast. As Kofi Annan2 has noted, â there is a real danger that the worldâ s poor will be excluded from the emerging knowledge-based 2 global economy.â Virtually every new technology tends to exacerbate the inequalities that separate the rich from the poor. The last few years have seen many initiatives that deploy ICTs in rural communities in many developing countries. Many world leaders have spoken in glorious terms about the tremendous potential of these new technologies in transforming the lives of the poor. â Technology doesnâ t come after you deal with poverty, but is a tool you use to alleviate poverty,â says James D Wolfensohn, President of the World Bank. Says Mark Malloch Brown, Head of UNDP, â ICTs can help us reach the Millennium Development Goals including the goal of halving poverty by 2015.â It is mastery over technology that enabled the early adopters of industrial revolution technologies to colonize and exploit the rest of the world. If the developing countries fail to take advantage of the new ICTs, the consequences could be far more serious. If we want technology to work for the poor we must make special efforts. In this talk I will describe from my own personal experience two widely different programmes where we are attempting to bridge the gulf that divides the rich from the poor through innovative use of information and communication technologies. In the first part of my talk we will look at how we at the M S Swaminathan Research Foundation (MSSRF) are trying to harness ICTs as part of a holistic strategy for alleviating poverty in rural India. I will show why the emphasis should be on people and the public commons approach rather than on technology. In the second part, we will look at how the advent of new technologies has opened up the possibility for making knowledge distribution in science and scholarship a level-playing field. Here again the public commons approach is the key to success.
APA, Harvard, Vancouver, ISO, and other styles
6

Gross, Tom. "Supporting collaboration in global information systems /." Linz : Univ.-Verl. Trauner, 2003. http://www.gbv.de/dms/goettingen/375395733.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rosvall, Martin. "Information horizons in a complex world." Doctoral thesis, Umeå : Department of Physics, Umeå University, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-840.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rudin, Robert (Robert Samuel). "Using information technology to exchange health information among healthcare providers : measuring usage and understanding value." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/68514.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Engineering Systems Division, 2011.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 125-133).
Health information exchange (HIE) - the electronic exchange of health information among healthcare institutions - has been projected to hold enormous promise as an antidote to the fragmented healthcare delivery system in the United States. After decades of mostly failed attempts, we still do not know how to make HIE work. This thesis is the beginning of a systematic understanding of HIE, focusing on the clinical users and the context in which the users and the technology interact. It uses a systems approach to understand HIE from the perspectives of the core stakeholders including healthcare providers, patients, health IT vendor companies, public policy, and the HIE organizations that supply data exchange services. The core contributions of the thesis are contained in four studies. Values of healthcare providers as stakeholders in HIE In a stud y of three communities, healthcare provider organizations were found to expect regional HIE organizations to bring them benefits from the ability to measure care quality. However, one relatively larger community placed greater value on the strategic interests of its individual provider institutions, whereas two smaller communities valued the interests of the communities as a whole. Factors that affect clinicians' usage of HIE. In a study of clinician-users of an operational HIE, usage factors were categorized as motivators and moderators. Motivators for individual clinicians' usage of HIE included improving care quality and time savings. Moderators were numerous and included gaps in data, workflow complexity and usability issues. Several policy options and implications are discussed including: requiring HIE organizations to report metrics of HIE contributions and accesses; certifying HIE vendor companies to provide standardized usage metrics; and creating incentives for clinicians as well as HIE organizations and regional health IT extension centers to meet HIE usage targets. Analysis of opportunities to use HIE. In one community, 51% of visits involved "care transitions" among individual providers, and 36-41% involved care transitions between medical groups. The percentage of a provider's visits which involved care transitions varied considerably by clinical specialty and even within specialties. Within primary care, individual clinicians' "transition percentages" varied from 32% to 95%. This study discusses how policies designed to foster HIE usage should take this variation into account. Analysis of mergers and provider recruitment on HIE value. In a simulation study of patient visit patterns in 10 communities, the results suggest that even after substantial consolidation of medical groups, an HIE would still have considerable value as measured by the number of opportunities for data exchange. However, in each community a small number of medical groups were key: if absent from a community HIE, these groups would reduce the value by 50%. Conversely, if they were the only groups participating, the HIE's value would only achieve 10-20% of its value with all groups participating. The results of these studies suggest that HIE will be needed even in the event of the expected large-scale consolidation of healthcare providers. However, efforts will be needed to recruit medical groups to join HIE organizations, to improve HIE technology, and to train clinicians to integrate HIE into their workflows.
by Robert S. Rudin.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
9

Naumann, Felix. "Quality-driven query answering for integrated information systems /." Berlin [u.a.] : Springer, 2002. http://www.loc.gov/catdir/enhancements/fy0817/2002023684-d.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Herzog, Erik. "An approach to systems engineering tool data representation and exchange." Doctoral thesis, Linköping : Univ, 2004. http://www.ep.liu.se/diss/science_technology/08/67/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Nelson, T. "Integrating action research and journey making during real-world organizational strategy development." Thesis, University of Strathclyde, 2003. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=21248.

Full text
Abstract:
Information systems (IS) researchers and practitioners have for some time now been advocating the use of Action Research as an appropriate means of undertaking work in the field of information systems (Checkland and Scholes, 1990; Mansell, 1991; Stowell and West, 1994; Baskerville and Wood-Harper, 1996,1998; Stowell, West and Stansfield, 1997; Checkland and Holwell, 1998, West and Stansfield, 2001; Mumford, 2001). Yet little has been written about the application of Action Research during the real-world development of organizational strategic plans, where an important aim of the Action Researcher is also the attainment of an academic qualification. A possible explanation for this may be the amount of controversy that still surrounds the theoretical principles (Cady and Caster, 2000) and the practice and application (Stowell et. al, 1997) of Action Research. In particular, Action Research has been criticised for producing research with little action or action with little research (Foster, 1972), lacking in the rigor of true scientific research (Cohen and Manion, 1980), lacking in validity of data (Baskerville and Wood-Harper, 1996), lacking in internal and external control (Merriam and Simpson, 1984) and likely to be a problematic research method for doctoral students (Eden and Huxham, 1993,1995,1996). This doctoral research programme has been set up to investigate two 'themes'. The first, of more research/academic interest, concerns the development and testing of a diagrammatic Action Research Approach that will help to ensure the delivery of valid/robust research results. Also, because most existing diagrams don't describe Action Research at a more useful lower 'micro' level (Lau, 1997). The second research theme, of more practical interest, concerns understanding what can happen when a 'novice' practitioner attempts to use Action Research and JOURNEY Making (Eden and Ackermann, 1998) to solve a real-world organizational strategic problem. To ensure that the research is seen as 'valid' Action Research, Checkland and Holwell's (1998) 'FMA' model is applied because "This is the intellectual structure which will lead to findings and research lessons being recognised as such. Without that declaration, it is difficult to see how the outcome of Action Research can be more than anecdotal" (p. 13-14).
APA, Harvard, Vancouver, ISO, and other styles
12

Chow, Angelina. "A research on virtual money exchange systems." Thesis, University of Macau, 2009. http://umaclib3.umac.mo/record=b2130125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Barb, Adrian S. "Knowledge representation and exchange of visual patterns using semantic abstractions." Diss., Columbia, Mo. : University of Missouri-Columbia, 2008. http://hdl.handle.net/10355/6674.

Full text
Abstract:
Thesis (Ph. D.)--University of Missouri-Columbia, 2008.
The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on July 21, 2009) Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
14

Tansley, Carole. "Politics and exchange in the development of global human resource information systems." Thesis, Nottingham Trent University, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.314334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Norberg, Patricia A. "Managed profiles : the value of personal information in commercial exchange /." View online ; access limited to URI, 2003. http://0-wwwlib.umi.com.helin.uri.edu/dissertations/dlnow/3115636.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Tewari, Renu. "Architectures and algorithms for scalable wide-area information systems /." Digital version accessible at:, 1998. http://wwwlib.umi.com/cr/utexas/main.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Knight, Shirlee-ann. "User perceptions of information quality in world wide web information retrieval behaviour." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2007. https://ro.ecu.edu.au/theses/316.

Full text
Abstract:
In less than a generation, the World Wide Web has grown from a relatively small cyber play-ground of academic "geeks" into an 11.5 billion-page collection of heterogeneous, inter-connected, network of information and collective knowledge. As an information environment the World Wide Web is informatically representative of all that is good and bad about the human need to both absorb and transmit knowledge. The 'open' nature of the Web makes instantly available to anyone who can "log-on", a boundless digital library of information, the quality of which cannot be enforced before, during, or even after its publication. Scrutiny of Information Quality (IQ), is therefore left up to those publishers conscientious enough to care about the quality of the information they produce and the users who choose to employ the Web as an information retrieval tool. The following thesis is a qualitative investigation of how the users of information make value-judgments about the information they encounter and retrieve from the Web. Specifically, it examines perceptions of IQ from the perspective of eighty "academic" high-end users, who regularly engage the Web and its search engines to search for and retrieve high-quality information related to their research, teaching and learning. The investigation has adopted an inductive approach in the qualitative analysis of quantitative ( 10,080 separate pieces of user-data) data in the context of such established frameworks as Davis' ( 1986, I 989) Technology Acceptance Model (TAM), and Wang & Strong's ( 1996) contextual IQ framework that conceptualised dimensions of quality into four IQ categories, namely: intrinsic; representational; contextual; and accessibility IQ. Through the detailed analysis of the driving theory behind these, and other associated models of: (I) user IT acceptance; (2) Information Seeking Behaviour (ISB}; and (3) multi–dimensional characteristics of IQ; the researcher has sought to find synergies and develop an innovative framework by which to explore the impact of users' attitudes, expectations and perceptions of IQ on their Web information retrieval behaviours. The findings associated with the thesis are consistent with the proposal of a new Ongoing Technology Acceptance Model (OTAM), which facilitates the measurement of users perception of the predictability of their technology interactions, and has the capacity to more accurately investigate user individual differences. Importantly, the OTAM allows the constructs of the original TAM, along with a new construct “Perception of Interaction" (Pol) to be used to investigate users ongoing use of technologies. Findings associated with user perceptions of information quality are also explored and discussed in relation to a proposed life-cycle model of IQ.
APA, Harvard, Vancouver, ISO, and other styles
18

Kelly, Liam Patrick. "Hacking Systems, Hacking Values: Interactive Theories For An Interactive World." Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/36477.

Full text
Abstract:

Langdon Winner's article "Do Artifacts Have Politics?" (1986) has become a classic piece within Science and Technology Studies. While Winner was certainly not the first to consider the inherently political qualities of technology, his article has assumed the role of a touchstone for both supporters and critics of the idea that artifacts embody political and social relationships. In the chapters that follow, I shall try to answer Winner and his critics, by studying a particular technology that I believe to be capable of shedding some much-needed light on the issue. My aim is provide a restatement of Winner's question in the pages that follow, with the hope of getting past such problematic terms as "embodiment" and "encapsulation." My hope is to make the issue itself clearer, so that we can get to the heart of how technology, values, and human beings systematically interact.

I shall utilize in my discussion computer network scanning software. I shall first discuss the background to the question "Do Artifacts Have Politics?" and then describe some of the ethical and political forces alive in the computer security world. Next I shall closely examine two particular pieces of network scanning software and describe their interactions in terms of political and ethical motivations. Finally, I shall use this case study as a basis for a broader discussion of how values may be better conceived in terms of complex interactive systems of human beings and technologies.


Master of Science
APA, Harvard, Vancouver, ISO, and other styles
19

Persson, Robin. "Dataspelsberoende : - Och spelkomponenter i World of Warcraft." Thesis, Örebro University, Department of Business, Economics, Statistics and Informatics, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-1200.

Full text
Abstract:

Diskussionen i Sverige angående dataspelsberoende och att främst att ungdomar, spenderar

mycket av sin vakna tid framför spelen, har på senare tid tagit fart i media. Många har

diskuterat om inte detta är ett samhällsproblem. WoW (World of Warcraft) är ett av de

populäraste spelen i världen och lockar väldigt många individer.

Syftet med denna uppsats har varit att undersöka spelet WoW för att ta reda på vilken eller

vilka av dess spelkomponenter som kan ha ett samband med ett beroende. Detta har gjorts

genom experiment, observation och intervju av individer som spelar spelet.

Syftet anses uppnått och frågeställningen i arbetet har besvarats. De komponenter som ansågs

ha ett samband med beroende var Spelare (spelarna i spelet påverkade varandra på en social

nivå) och Karaktärsuppgraderingen (jakten efter att få sin karaktär att bli bättre och bättre).

APA, Harvard, Vancouver, ISO, and other styles
20

zhang, peng. "An Empirical Study of Health Information Exchange Success Factors." FIU Digital Commons, 2017. https://digitalcommons.fiu.edu/etd/3537.

Full text
Abstract:
The healthcare system in the US faces substantial challenges related to cost, access and quality. Health Information Exchange (HIE) has been widely viewed as a viable solution for dealing with those challenges. Despite the potential contributions to the healthcare system that HIE promises, adoption and use of HIE have always been difficult, and the past two decades have witnessed significant HIE implementation failures. The limited understanding of HIE is a major obstacle for HIE success. Only recently in-depth research about HIE starts to appear in top IS journals. In addition, the uniqueness of healthcare industry adds to the complexity to HIE. Our study attempts to address this research gap by systematically examining multiple factors that influence HIE adoption and use. Using social exchange theory (SET) and diffusion of innovations theory, a research model was developed to empirically test major factors that impact healthcare providers’ relative advantages and risks perceptions for adopting and using HIE. It is further proposed that relative advantages and risks in turn impact organizations’ intentions for adopting and continuously using HIE. As such, we posit that organizations’ assessments of relative advantages and risks associated with HIE mediate the impacts of organizational and technological factors on organizations’ adoption and use intentions. This study uses questionnaire surveys for data collection. Out of a total of 163 responses, 117 surveys were completed and were analyzed using Partial Least Square software SmartPLS 3. Data analysis finds that most of the relationships were in the hypothesized directions with some of the relationships being significant. Specifically, top management support, absorptive capacity, trust, and HIE innovation characteristics positively affect relative advantages and negatively affect risk. Furthermore, relative advantages positively affect adoption/continuance intentions, whereas risk negatively affects adoption/continuance intentions. This study contributes to the literature and offers important practical implications. It is one of the early empirical attempts to understand the key factors that affect HIE’s adoptions and use. The research can also serve as a starting point for more in-depth studies in the future. Moreover, practitioners can use the several newly-developed scales to empirically examine healthcare providers’ adoption and use intentions.
APA, Harvard, Vancouver, ISO, and other styles
21

Appaneni, Viri, and Yenus Likisa. "Using Virtual World in Education: The case of Second Life." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-13837.

Full text
Abstract:
With technology being advanced and many new teaching methods being implemented, considering virtual worlds for teaching is quite innovative and interesting. A virtual environment is an artificially constructed  representation of a natural or imagined environment. Virtual worlds consist of enactment for terrains, avatars, objects, textures, and other forms of digital assets. Many virtual worlds like Alpha World, Delta 3D, Second Life etc. are available today. An avatar can be defined as a computer user’s representation of him/her-self within the virtual environment.        Today, educational institutes have been using virtual worlds in various fields like designing user interfaces, nursing courses,  cooperate training, leadership training programmes. But certain aspects need to be examined thoroughly like how virtual spaces are influencing education, how students and teachers understand learning in virtual worlds while interacting through avatars where communication lacks body language and is limited to seeing, hearing and talking. Our study was conducted on a single course called Business Talking offered in Second Life by Linnaeus University.This course mainly emphasizes on technical and administrative presentations in English.         The main purpose of our study is to investigate how students and teachers understand learning in such environments and identifying the factors which are related to this. Relating to the purpose the research question “How do students and teachers perceive learning through avatar-based interaction in virtual world environments? ”  was investigated.     Pedagogy and general theories like constructivism, cognition, virtual world, synchronous versus asynchronous e-learning were used in our study.     A qualitative interpretative case study was conducted. Data was collected through observations and interviews. All the sessions of the course were observed and  interviews were made with five students and one teacher of the course.     The main results include students perceive more through avatar education as they get a sense of real feeling when compared  to other online education systems. Also, performing activities in different places of SL such as camp fire, near waterfalls, different cultural places etc. made them perceive well as they feel relaxed and less pressure. Second Life's environment helps to simulate real conditions and situations which help them to perceive more. But factors like usability of avatars, technical problems and getting adapted to the environment play an unfavourable role in perceiving learning.  Both the teachers and students have to be constructive and good pedagogical decisions have to be made when a problem arises. Another main result was that, lack of body language does effect in perceiving learning.
APA, Harvard, Vancouver, ISO, and other styles
22

Haq, Izaz ul. "Information and Communication Technologies, Globalization and Terrorism : An empirical analysis of terrorist attacks around the world from 1991-2006." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-11878.

Full text
Abstract:
Based on the empirical analysis of the terrorist activities, we can say that developed and globalized countries are more safer than the developing countries. The terrorist attacks are considerably low in these countries.To analyze the role of new technologies in terrorism and the actual use of ICT in terrorism, I have focused on the terrorist groups operating in Pakistan. These groups are taking advantage of these technologies in many ways like, Recruiting, Propaganda, Fund raising etc.Answer to the question of Islamic terrorist threat to the West again based on the empirical analysis. The analysis shows that Islamic terrorism is on continuous decline. Islamic terrorist groups are involved highly in other countries, especially Muslim majority countries. The analysis also showed that there is very less impact of the the new technologies on Islamic terrorism.
APA, Harvard, Vancouver, ISO, and other styles
23

Bachvarov, Boris Lyobomirov. "Analysis of the financial accounting sties on the World Wide Web." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FBachvarov.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Lee, Hojun. "ONTOLOGY-BASED DATA FUSION WITHIN A NET-CENTRIC INFORMATION EXCHANGE FRAMEWORK." Diss., The University of Arizona, 2009. http://hdl.handle.net/10150/193779.

Full text
Abstract:
With the advent of Network-Centric Warfare (NCW) concepts, Command and Control (C2) Systems need efficient methods for communicating between heterogeneous systems. To extract or exchange various levels of information within the networks requires interoperability between human and machine as well as between machine and machine. This dissertation explores the Information Exchange Framework (IEF) concept of distributed data fusion sensor networks in Network-centric environments. It is used to synthesize integrative battlefield pictures by combining the Battle Management Language (BML) and System Entity Structure (SES) ontology framework for C2 systems. The SES is an ontology framework that can facilitate information exchange in a network environment. From the perspective of the SES framework, BML serves to express pragmatic frames, since it can specify the information desired by a consumer in an unambiguous way. This thesis formulates information exchange in the SES ontology via BML and defines novel pruning and transformation processes of the SES to extract and fuse data into higher level representations. This supports the interoperability between human users and other sensor systems. The efficacy of such data fusion and exchange is illustrated with several battlefield scenario examples.A second intercommunication issue between sensor systems is how to ensure efficient and effective message passing. This is studied by using Cursor-on-Target (CoT), an effort to standardize a battlefield data exchange format. CoT regulates only a few essential data types as standard and has a simple and efficient structure to hold a wide range of message formats used in dissimilar military enterprises. This thesis adopts the common message type into radar sensor networks to manage the target tracking problem in distributed sensor networks.To demonstrate the effectiveness of the proposed Information Exchange Framework for data fusion systems, we illustrate the approach in an air defense operation scenario using DEVS modeling and simulation. The examples depict basic air defense operation procedure. The demonstration shows that the information requested by a commander is delivered in the right way at the right time so that it can support agile decision making against threats.
APA, Harvard, Vancouver, ISO, and other styles
25

Dillon, Andrew, and Michael G. Morris. "User acceptance of new information technology: theories and models." Medford, N.J.: Information Today, 1996. http://hdl.handle.net/10150/105584.

Full text
Abstract:
This item is not the definitive copy. Please use the following citation when referencing this material: Dillon, A. and Morris, M. (1996) User acceptance of new information technology - theories and models. In: M. Williams (ed.) Annual Review of Information Science and Technology, Vol. 31, Medford NJ: Information Today, 3-32. ABSTRACT: Understanding the factors that influence user acceptance of information technology is of interest both to researchers in a variety of fields as well as procurers of technology for large organizations. The present chapter reviews literature which demonstrates the nature of technological acceptance is mediated by distinct factor groups related to the psychology of the users, the design process of information technology, and the quality of the technology in user terms. It is concluded that current research offers insights that can support the derivation of reliable predictions of user acceptance. However, potentially overlapping theories seem to exist independently of each other and there exists scope for a unifying framework to extend innovation diffusion concepts and systems design models (particularly user-centered design) into a formal theory of user acceptance of information technology.
APA, Harvard, Vancouver, ISO, and other styles
26

Hodkinson, Christopher Stuart. "An exploratory study of World Wide Web consumer external information search behaviour /." [St. Lucia, Qld.], 2001. http://www.library.uq.edu.au/pdfserve.php?image=thesisabs/absthe16915.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Long, Margaret J. "E-Business Reporting: Towards a Global Standard for Financial Reporting Systems Using XBRL." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/221.

Full text
Abstract:
Reporting systems can provide transparency into financial markets necessary for a sustainable, prosperous global economy. The most widely used global platform for exchanging electronic information about companies to regulatory bodies is XBRL. Standards for this platform are in the process of becoming legally harmonized, but not all countries are mandating e-business reporting. A harmonized global standard for business reporting aligns practices between countries, while recognizing the need for flexibility within each social system and government, whereas international law would establish one standard for all. The research shows that goal of creating transparent global financial information in aggregate searchable form for the public remains elusive under the harmonized approach. The research explores the standardization process at the country level using a grounded theory approach in the G20 countries. The problem of a not having a global standard is framed in the financial reporting dimensions of Law, Accounting Standards, Information Standards, and Assurance Standards, which are existing standards integral to creating high quality transparent financial information. The dimensions exist to some extent in each country, and are in process of being harmonized. The research shows that current legal mandates for the XBRL standard impact the number of firms filing in XBRL to regulators. However, problems with data quality and data assurance have not been addressed with the current legislative initiatives. There is supply of data, but no public demand due to quality issues. There are three levels in the process where data alignment is needed for interoperability: taxonomy use must be consistent, taxonomy structure must be the same, and agreed upon minimum content must be useful for analysis. Currently, data sets between countries are not interoperable or comparable for aggregation due to local adoptions of XBRL taxonomies. Legal mandates alone have not produced quality electronic financial information. Additionally, accounting and assurance standards are not completely aligned. The contributions of this paper provide an understanding of how global standards are being harmonized in the G20 countries based on the common value of financial information transparency in e-business reporting.
APA, Harvard, Vancouver, ISO, and other styles
28

Rozich, Ryan Timothy. "A practical method for proactive information exchange within multi-agent teams." Thesis, Texas A&M University, 2003. http://hdl.handle.net/1969.1/1203.

Full text
Abstract:
Psychological studies have shown that information exchange is a key component of effective teamwork. In addition to requesting information that they need for their tasks, members of effective teams often proactively forward information that they believe other teammates require to complete their tasks. We refer to this type of communication as proactive information exchange and the formalization and implementation of this is the subject of this thesis. The important question that we are trying to answer is: under normative conditions, what types of information needs can agent teammates extract from shared plans and how can they use these information needs to proactively forward information to teammates? In the following, we make two key claims about proactive information exchange: first, agents need to be aware of the information needs of their teammates and that these information needs can be inferred from shared plans; second, agents need to be able to model the beliefs of others in order to deliver this information efficiently. To demonstrate this, we have developed an algorithm named PIEX, which, for each agent on a team, reasonably approximates the information-needs of other team members, based on analysis of a shared team plan. This algorithm transforms a team plan into an individual plan by inserting coomunicative tasks in agents' individual plans to deliver information to those agents who need it. We will incorporate a previously developed architecture for multi-agent belief reasoning. In addition to this algorithm for proactive information exchange, we have developed a formal framework to both describe scenarios in which proactive information exchange takes place and to evaluate the quality of the communication events that agents running the PIEX algorithm generate. The contributions of this work are a formal and implemented algorithm for information exchange for maintaining a shared mental model and a framework for evaluating domains in which this type of information exchange is useful.
APA, Harvard, Vancouver, ISO, and other styles
29

Borgqvist, André. "Reliable access to synchronized world state information in peer to peer networks." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5887.

Full text
Abstract:
Virtual environments where users can interact with each other as well as with the environment are today used in many application areas ranging from military simulations to massive multiplayer online games. But no matter the application area, as soon as the number of users reaches a certain threshold, hosting a virtual environment on a single machine can become problematic. Speed and quality of the network connection will limit the number of concurrently connected users in terms of acceptable visual quality and hardware requirements of the server will be strict. With a single point of failure, system reliability could easily be compromised by means of network or host failure. Distribution of the virtual environment therefore seems a reasonable approach in order to address this problem. Hardware and network requirements would not be so critical and it would increase reliability by having no single point of failure. Unfortunately distribution introduces new problems dealing with synchronization of the world state within the distribution network. A possible solution to these problems with the focus on reliability will be presented in this thesis. The solution uses a peer to peer platform that is able to adapt to changes in the network infrastructure as a base for all communication. To improve synchronization efficiency the network will be dynamically divided into multicast groups based on synchronization needs. The solution will be tested for performance with the network fully functioning and in a number of more of less broken states to determine the reliability. The results from the tests conclude that the system is able to perform with what must be seen as acceptable performance levels even in very problematic network environments. The scalability of the system did also meet the expectations but the results would have benefited from more experimentation with larger user populations.
Virtuella världar där användare kan träffas och interagera med både varandra och miljön används idag i inom flera områden så som militära simulatorer och online-spel. Men det spelar ingen roll vad användningsområdet är, när antalet anvädare når en viss gräns blir det problematiskt att hålla den virtuella världen på en maskin. Distribuering kan vara en lösning på detta problem men som i sin tur drar med sig nya problem i form av synkroniseringssvårigheter. En potentiell lösning presenteras i rapporten som använder peer-to-peer-tekniker för att hålla informationen synkroniserad och försöker upprätthålla en hög tillgänlighet under svåra nätverksförhållande. Lösningen har testats och uppvisade låvande resultat inom båda skalbarhet och pålitlighet men skulle behöva fler tester för att ge definitiva resultat.
APA, Harvard, Vancouver, ISO, and other styles
30

Deshpande, Shubhanan V. "Knowledge-based Cyberinfrastructures for Decision Making in Real-World Domains." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1293709851.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Beinhoff, Andreas. "Developer usability testing : A real world example." Thesis, Uppsala universitet, Institutionen för informatik och media, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-132227.

Full text
Abstract:
The iPhone has thanks to its multitouch interface, size and connectivity change the way we communicate. To fully utilize this technology we can involve users in the development process to help make highly usable software applications. One way to do this we somehow need to get the users to use our systems. What techniques are there to do this? And will they fit our product? Are there any way we can involve the users in the development process of an iPhone application, in this thesis I investigate if this can be accomplished by conducting usability tests with users on an iPhone application. The usability testing gives an insight into how the users work with and adapts to the users interface. The questionnaires given to the participants gave insight into how the users considered the usability and usefulness of the application. This data gave the development much needed data on the application to make it better and more usable. Since earlier research into user involvement have shown a strong connection to usable software and usability testing could be integrated successfully into the development by the single programmer, the conclusion can be drawn that single developer that incorporates usability testing into the development process as a form of user involvement makes more usable software. The usability was tested on an iPhone application built for an American online classified ads website.
APA, Harvard, Vancouver, ISO, and other styles
32

Tabatabai, Diana. "Modeling information-seeking expertise on the Web." Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=38522.

Full text
Abstract:
Searching for information pervades a wide spectrum of human activity, including learning and problem solving. With recent changes in the amount of information available and the variety of means of retrieval, there is even more need to understand why some searchers are more successful than others. This study was undertaken to advance our understanding of expertise in seeking information on the Web by identifying strategies and attributes that will increase the chance of a successful search on the Web. A model that illustrated the relationship between strategies and attributes and a successful search was also created. The strategies were: Evaluation, Navigation, Affect, Metacognition, Cognition, and Prior knowledge. Attributes included Age, Sex, Years of experience, Computer knowledge, and Info-seeking knowledge. Success was defined as finding a target topic within 30 minutes. Participants were from three groups. Novices were 10 undergraduate pre-service teachers who were trained in pedagogy but not specifically in information seeking. Intermediates were nine final-year master's students who had received training on how to search but typically had not put heir knowledge into extensive practice. Experts were 10 highly experienced professional librarians working in a variety of settings including government, industry, and university. Participants' verbal protocols were transcribed verbatim into a text file and coded. These codes, along with Internet temporary files, a background questionnaire, and a post-task interview were the sources of the data. Since the variable of interest was the time to finding the topic, in addition to ANOVA and Pearson correlation, survival analysis was used to explore the data. The most significant differences in patterns of search between novices and experts were found in the Cognitive, Metacognitive, and Prior Knowledge strategies. Based on the fitted survival model, Typing Keyword, Criteria to evaluate sites, and Information-Seeking Kno
APA, Harvard, Vancouver, ISO, and other styles
33

Ross, Victor B. "Integration of the Navy Tactical Environmental Database Service with the Joint Effects Model." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FRoss%5FCS.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Ross, Victor B. "Using rapid environmental assessment to improve the hazard prediction and assessment capability for weapons of mass destruction." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FRoss%5FMETOC.pdf.

Full text
Abstract:
Thesis (M.S. in Meteorology and Physical Oceanography)--Naval Postgraduate School, December 2003.
Thesis advisor(s): Carlyle Wash, Neil Rowe. Includes bibliographical references (p. 47-48). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
35

Kim, Sung S. "Toward a theory of user value of information systems : incorporating motivation and habit into a conceptual framework." Diss., Georgia Institute of Technology, 2001. http://hdl.handle.net/1853/30067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Fletcher, Gordon Scott, and n/a. "The Cultural Significance of Web-Based Exchange Practices." Griffith University. School of Arts, Media and Culture, 2006. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20070118.090425.

Full text
Abstract:
This thesis considers the cultural significance of Web-based exchange practices among the participants in contemporary western mainstream culture. The thesis argues that analysis of these practices shows how this culture is consumption oriented, event-driven and media obsessed. Initially, this argument is developed from a critical, hermeneutic, relativist and interpretive assessment that draws upon the works of authors such as Baudrillard and De Bord and other critiques of contemporary 'digital culture'. The empirical part of the thesis then examines the array of popular search terms used on the World Wide Web over a period of 16 months from September 2001 to February 2003. Taxanomic classification of these search terms reveals the limited range of virtual and physical artefacts that are sought by the users of Web search engines. While nineteen hundred individual artefacts occur in the array of search terms, these can classified into a relatively small group of higher order categories. Critical analysis of these higher order categories reveals six cultural traits that predominant in the apparently wide array of search terms; freeness, participation, do-it-yourself/customisation, anonymity/privacy, perversion and information richness. The these argues that these traits are part of a cultural complex that directly reflects the underlying motivations of contemporary western mainstream culture. The daily practices of Web-based search and exchange thus reproduce and reinforce this cultural complex. The empirical work of the thesis validates the critical assessment of western mainstream culture developed in the initial chapters of the thesis.
APA, Harvard, Vancouver, ISO, and other styles
37

Fletcher, Gordon Scott. "The Cultural Significance of Web-Based Exchange Practices." Thesis, Griffith University, 2006. http://hdl.handle.net/10072/365388.

Full text
Abstract:
This thesis considers the cultural significance of Web-based exchange practices among the participants in contemporary western mainstream culture. The thesis argues that analysis of these practices shows how this culture is consumption oriented, event-driven and media obsessed. Initially, this argument is developed from a critical, hermeneutic, relativist and interpretive assessment that draws upon the works of authors such as Baudrillard and De Bord and other critiques of contemporary 'digital culture'. The empirical part of the thesis then examines the array of popular search terms used on the World Wide Web over a period of 16 months from September 2001 to February 2003. Taxanomic classification of these search terms reveals the limited range of virtual and physical artefacts that are sought by the users of Web search engines. While nineteen hundred individual artefacts occur in the array of search terms, these can classified into a relatively small group of higher order categories. Critical analysis of these higher order categories reveals six cultural traits that predominant in the apparently wide array of search terms; freeness, participation, do-it-yourself/customisation, anonymity/privacy, perversion and information richness. The these argues that these traits are part of a cultural complex that directly reflects the underlying motivations of contemporary western mainstream culture. The daily practices of Web-based search and exchange thus reproduce and reinforce this cultural complex. The empirical work of the thesis validates the critical assessment of western mainstream culture developed in the initial chapters of the thesis.
Thesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Arts, Media and Culture
Full Text
APA, Harvard, Vancouver, ISO, and other styles
38

Chen, Shih-Kwang. "Searching for information on occupational accidents." Columbus, Ohio : Ohio State University, 2008. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1218551186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Parikh, Tapan S. "Designing an architecture for delivering mobile information services to the rural developing world /." Thesis, Connect to this title online; UW restricted, 2007. http://hdl.handle.net/1773/6965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Schnell, Felicia. "Multicast Communication for Increased Data Exchange in Data- Intensive Distributed Systems." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-232132.

Full text
Abstract:
Modern applications are required to handle and communicate an increasing amount of data. Meanwhile, distributed systems containing multiple computationally weak components becomes more common, resulting in a problematic situation. Choosing among communication strategies, used for delivering message between entities, therefore becomes crucial in order to efficiently utilize available resources. Systems where identical data is delivered to many recipients are common nowadays, but may apply an underlying communication strategy based on direct interaction between sender and receiver which is insufficient. Multicasting refers to a technique for group communication where messages can be distributed to participating nodes in a single transmission. This technique is developed to circumvent the problem of high workload on sender side and redundant traffic in the network, and constitutes the focus for this thesis. Within the area of Electronic Warfare and self-protection systems, time constitutes a critical aspect in order to provide relevant information for decision making. Self-protection systems developed by Saab, used in military aircrafts, must provide situational awareness to guarantee that correct decisions can be made at the right time. With more advanced systems, where the amount of data needed to be transmitted increases, the need of fast communication is essential to achieve quality of service. This thesis investigates how the deployment of multicast, in a distributed data-intensive system, could prepare a system for increased data exchange. The result is a communication design which allows for the system to distribute messages to a group of receivers with less effort from the sender and with reduced redundant traffic transferred over the same link. Comparative measurements are conducted between the new implementation and the old system. The result of the evaluation shows that the multicast solution both can decrease the time for message handling as well as the workload on endpoints significantly.
Nutidens applikationer måste kunna hantera och kommunicera en ökad datamängd. Samtidigt har distribuerade system bestående av många beräkningsmässigt svaga enheter blivit allt mer vanligt, vilket är problematiskt. Valet av kommunikationsstrategi, för att leverera data mellan enheter i ett system, är därför av stor betydelse för att uppnå effektivt utnyttjande av tillgängliga resurser. System där identisk information ska distribueras till flertalet mottagare är vanligt förekommande idag. Den underliggande kommunikationsstrategin som används kan dock baseras på direkt interaktion mellan sändare och mottagare vilket är ineffektivt. Multicast (Flersändning) syftar till ett samlingsbegrepp inom datorkommunikation baserat på gruppsändning av information. Denna teknik är utvecklad för att kringgå problematiken med hög belastning på sändarsidan och dessutom minska belastningen på nätverket, och utgör fokus för detta arbete. Inom telekrigföring och självskyddssystem utgör tiden en betydande faktor för att kunna tillhandahålla relevant information som kan stödja beslutsfattning. För självskyddssystem utvecklade av Saab, vilka används i militärflygplan, är situationsmedvetenhet av stor betydelse då det möjliggör för att korrekta beslut kan tas vid rätt tidpunkt. Genom utvecklingen av mer avancerade system, där mängden meddelanden som måste passera genom nätverket ökar, tillkommer höga krav på snabb kommunikation för att kunna åstadkomma kvalité. Denna uppsatsrapport undersöker hur införandet av multicast, i ett dataintensivt distribuerat system, kan förbereda ett system för ökat datautbyte. Arbetet har resulterat i en kommunikationsdesign som gör det möjligt för systemet att distribuera meddelanden till grupp av mottagare med minskad belastning på sändarsidan och mindre redundant trafik på de utgående länkarna. Jämförandet mätningar har gjorts mellan den nya implementationen och det gamla systemet. Resultaten visar att multicast-lösningen både kan reducera tiden för meddelande hantering samt belastningen på ändnoder avsevärt.
APA, Harvard, Vancouver, ISO, and other styles
41

Knopke, Ian. "Building a search engine for music and audio on the World Wide Web." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=85177.

Full text
Abstract:
The main contribution of this dissertation is a system for locating and indexing audio files on the World Wide Web. The idea behind this system is that the use of both web page and audio file analysis techniques can produce more relevant information for locating audio files on the web than is used in full-text search engines.
The most important part of this system is a web crawler that finds materials by following hyperlinks between web pages. The crawler is distributed and operates using multiple computers across a network, storing results to a database. There are two main components: a set of retrievers that retrieve pages and audio files from the web, and a central crawl manager that coordinates the retrievers and handles data storage tasks.
The crawler is designed to locate three types of audio files: AIFF, WAVE, and MPEG-1 (MP3), but other types can be easily added to the system. Once audio files are located, analyses are performed of both the audio files and the associated web pages that link to these files. Information extracted by the crawler can be used to build search indexes for resolving user queries. A set of results demonstrating aspects of the performance of the crawler are presented, as well as some statistics and points of interest regarding the nature of audio files on the web.
APA, Harvard, Vancouver, ISO, and other styles
42

Dervos, Dimitris A., Nikolaos Samaras, Georgios Evangelidis, Jaakko Hyvärinen, and Ypatios Asmanidis. "The Universal Author Identifier System (UAI_Sys)." TEI of Pireaeus, Greece, and the University of Paisley, UK, 2006. http://hdl.handle.net/10150/105755.

Full text
Abstract:
One common problem in the scientific research literature is that each one author cannot easily be identified uniquely. The problem arises when there are authors with identical names, authors who have changed their name(s) in the course of time, and authors whose names appear in alternative versions (for example: Jaakko Hyvärinen, and J. P. Hyvärinen) across the publications they have (co-) authored. The issue becomes more of a problem when data analysis utilizing author names is to be conducted, for example: in citation analysis. In this paper we introduce the Universal Author Identifier system, codenamed UAI_Sys. The system is web based and publicly available, enabling each one author to register/update his/her own metadata, plus acquire a unique identifier (UAI code), ensuring name disambiguation. As soon as UAI_Sys becomes accepted and enjoys worldwide use, selected author metadata will become globally available to all interested parties. Care is taken so that UAI_Sys comprises more than just a database for storing and handling author identifiers. Provision is taken for the system to incorporate web services facilitating communication with third party applications, thus expanding the possibilities for web based co-functionality. Last but not least, the system supports role-based access and management (i.e. different user roles for authors, librarians, publishers, and administrators) for efficient and effective information dissemination and management, promoting research and collaboration. UAI_Sys is being designed/developed along the lines of the Cascading Citations Analysis Project (C-CAP) which is co-funded by the Alexander Technology Educational Institute (ATEI), and the University of Macedonia (UoM).
APA, Harvard, Vancouver, ISO, and other styles
43

Morris, Michael G., and Andrew Dillon. "The Influence of User Perceptions on Software Utilization: Application and Evaluation of a Theoretical Model of Technology Acceptance." IEEE, Inc, 1997. http://hdl.handle.net/10150/106206.

Full text
Abstract:
This paper presents and empirically evaluates a Technology Acceptance Model (TAM) which can serve as a simple to use, and cost-effective tool for evaluating applications and reliably predicting whether they will be accepted by users. After presenting TAM, the paper reports on a study designed to evaluate its effectiveness at predicting system use. In the study the researchers presented 76 novice users with an overview and hands-on demonstration of Netscape. Following this demonstration, data on user perceptions and attitudes about Netscape were gathered based on this initial exposure to the system. Follow up data was then gathered two weeks later to evaluate actual use of Netscape following the demonstration. Results suggest that TAM is an effective and cost effective tool for predicting end user acceptance of systems. Suggestions for future research and conclusions for both researchers and practitioners are offered.
APA, Harvard, Vancouver, ISO, and other styles
44

Graham, James Knox. "The race for space : a spatial analysis and geovisualization of the Holocaust and World War Two /." View online, 2006. http://ecommons.txstate.edu/geogtad/2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Lei, Li. "Generating User-centric Dynamic and Adaptable Knowledge Models for World Wide Web." Digital Archive @ GSU, 2007. http://digitalarchive.gsu.edu/cis_diss/12.

Full text
Abstract:
GENERATING USER-CENTRIC DYNAMIC AND ADAPTABLE KNOWLEDGE MODELS FOR WORLD WIDE WEB By LEI LI JUNE, 2007 Committee Chair: Dr. Vijay Vaishnavi Major Department: Computer Information Systems In the current Internet age, more and more people, organizations, and businesses access the web to share and search for information. A web-based resource is often organized and presented based on its knowledge models (categorization structures). The static and inflexible knowledge models of web-based resources have become a major challenge for web users to successfully use and understand the information on the web. In this dissertation, I propose a research approach to generate user-centric dynamic and adaptable knowledge models for web-based resources. The user-centric feature means that a knowledge model is created based on a web user specified perspective for a web resource and that the user can provide feedback on the model building process. The dynamic feature means the knowledge models are built on the fly. The adaptable feature means the web user can have control of the user adaptation process by specifying his or her perspective for the web resource of interest. In this study, I apply a design science paradigm and follow the General Design Cycle (Vaishnavi and Kuechler 2004) during the course of research. A research prototype, Semantic Facilitator TM SM V2.0, has been implemented based on the proposed approach. A simulation-based experimentation is used to evaluate the research prototype. The experimental results show that the proposed research approach can effectively and efficiently create knowledge models on the fly based on a web user preferred perspective for the web resource. I found that incorporating user feedback into the modeling building process can greatly improve the quality of the knowledge models. At the end of the dissertation, I discuss the limitations and future directions of this research.
APA, Harvard, Vancouver, ISO, and other styles
46

Sauvinet, James A. "Semantic Services for Enterprise Data Exchange." ScholarWorks@UNO, 2013. http://scholarworks.uno.edu/td/1783.

Full text
Abstract:
Data exchange between different information systems is a complex issue. Each system, designed for a specific purpose, is defined using a vocabulary of the specific business. While Web services allow interoperations and data communications between multiple systems, the clients of the services must understand the vocabulary of the targeting data resources to select services or to construct queries. In this thesis we explore an ontology-based approach to facilitate clients’ queries in the vocabulary of the clients’ own domain, and to automate the query processing. A governmental inter-department data query process has been used to illustrate the capability of the semantic approach.
APA, Harvard, Vancouver, ISO, and other styles
47

Pack, Derik Leroi. "Rethinking the web structure focusing on events to create better information and experience management /." Thesis, Available online, Georgia Institute of Technology, 2004:, 2004. http://etd.gatech.edu/theses/available/etd-07092004-011223/unrestricted/pack%5Fderik%5Fl%5F200407%5Fmasters.pdf.

Full text
Abstract:
Thesis (M.S.)--School of Electrical and Computer Engineering, Georgia Institute of Technology, 2005. Directed by Jain Ramesh.
Ramesh Jain, Committee Chair ; Linda Wills, Committee Member ; Jim McClellan@ece.gatech.edu, Committee Member. Vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
48

Scannell, Peter. "Three-dimensional Information Space : An Exploration of a World Wide Web-based, Three-dimensional, Hierarchical Information Retrieval Interface Using Virtual Reality Modeling Language." Thesis, University of North Texas, 1997. https://digital.library.unt.edu/ark:/67531/metadc278715/.

Full text
Abstract:
This study examined the differences between a 3-D, VRML search interface, similar to Cone Trees, as a front-end to Yahoo on the World Wide Web and a conventional text-based, 1-Dinterface to the same database. The study sought to determine how quickly users could find information using both interfaces, their degree of satisfaction with both search interfaces, and which interface they preferred.
APA, Harvard, Vancouver, ISO, and other styles
49

Zhan, Pei. "An ontology-based approach for semantic level information exchange and integration in applications for product lifecycle management." Online access for everyone, 2007. http://www.dissertations.wsu.edu/Dissertations/Summer2007/P_Zhan_080607.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Dulaymi, Sawsan Taha. "Towards management information systems for strategic periodicals collection management for Saudi Academic Libraries in the world of electronic journals." Thesis, University of Sunderland, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.425236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography