The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Contemporary tools aimed at information system (IS) development often use models to generate system implementation. Starting from an IS model, these tools commonly generate database implementation schema as well as code for generic CRUD operations of business applications. On the other hand, at the level of platform-independent models (PIMs) there is a lack of support for specification of more complex...
The use of a computer in combination with measuring technology in clinical diagnostics allows creating effective means for providing collection of information about the patient's. In this study the specialized information system for analysis of data with assess the overall and relative risk of fatal outcome cardiovascular diseases is presented. This program was developed on the basis of collection...
Enterprise information systems are being widely and extensively used in many business domains. In fact, some of these domains cannot survive in operations without depending heavily on such systems. Although several research studies have been performed that explored the importance of enterprise information systems, only a few have been focusing on an effective and efficient end-to-end method to design...
Modern software are object-oriented program systems. Almost all software has a database. Some databases are object-oriented. In this case, object-oriented software and databases shall be designed in a consistent manner. In this article, we describe a UML profile for the programming environment. It is an environment for support of object-oriented databases. The UML profile allows describing an application...
Existing data modeling notations and methods of database development are dedicated to technicians. At the same time, there is a tendency to involve the end-user in the development process. This requires the creation of new modeling notations and development methods for databases area. These tools should be understandable both to end-users and to developers. Because of unified understanding, it is...
Electronic health information standards have been developed in several countries, which are in different formats. The Clinical Document Architecture (CDA) is the most acceptable and widely used. In addition, Hospital and Experience (HOSxP) is a Healthcare Information System (HIS) developed by Bangkok Medical Software (BMS), which is currently deployed by medium-sized hospitals in Thailand. However,...
Creation and maintenance of a computerized information system that not only manages agricultural field experiments data efficiently but also provides its statistical analysis is essential for researchers, planners and farmers. Generally data created by the researchers is collected, processed and stored in different physical locations and is poorly disseminated. Data is usually retained at the level...
The number of crime incidents that is reported per day in India is increasing dramatically. The criminals today use various advanced technologies and commit crimes in really tactful ways. This makes crime investigation a more complicated process. Thus the police officers have to perform a lot of manual tasks to get a thread for investigation. This paper deals with the study of data mining based systems...
In the article the architecture of group decision support system is described. The developed system differs from the existing ones by the presence of the subsystem for synthetic procedure of group decision, which allows to synthesize the required version of group decision method.
One of the most important problems in the evolution of legacy systems is the loss of knowledge about them. In this paper, we present an approach for extracting structural business rules from legacy databases. We used the technique to recover business rules from SIFI (SIstema Fiduciario Integra do), an existing legacy system, implemented mostly in PL/SQL and Oracle Forms. Four employees of the company...
This article analyses the basic features of graphic library and attribute library of the GIS software ARC/INFO, analyses the necessity to combine the work of grading land with the technique of GIS; and on the base of the two libraries' space analyzing function, summarizes the technical route of grading land supported by GIS; creates land graphic library, plots out the basic evaluating element, creates...
Considered the traditional methods of construction enterprise information systems architecture. The basic drawbacks of existing methods. Proposed architecture is based on design patterns and unit of storage. The results of a tool that automates the use of the proposed technology for the integrated development environment.
Modern information systems, such as enterprise applications and e-commerce applications, often consist of databases surrounded by a large variety of software applications depending on the databases. During the evolution and deployment of such information systems, developers have to ensure the global consistency between database schemas and surrounding software applications. However, in such situations...
Software companies need to develop high-quality products fast and with low cost. Development activities are typically distributed in different places and involve multiple stakeholders in different countries. Testing is an important way to ensure product quality but it is costly and takes ample time and resources. Sourcing testing services from specialized service providers is often the most viable...
Healthcare information systems include the information technologies and processes that support the healthcare providers in performing their services. Currently more and more healthcare organizations are converting their paper data to electronic format and keep them in computers' storage. This practice is partly due to government laws or regulations; it is also partly due to a need to effectively compete...
The paper describes a case study whose aim is to verify a set of hypotheses related to the management of documents during the evolution of Information Systems. The idea is to distinguish the evolution documents (documents that support the evolution of long living applications) from the development documents (related to a single development step of the application life). The evolution documents are...
Re-engineering a legacy software system to support new, modern technologies instead of old ones is not an easy task, especially for large systems with a complex architecture. The use of reverse engineering tools is crucial for different subtasks of the full process, such as re-documenting the old code or recovering its design. There are many tools available to assist developers, but most of these...
Most data infrastructure tend to focus on data access and not particularly spatial aspects of data and services especially data relating to natural resource management. This project will conceptualise and implement a geospatial information infrastructure to facilitate conservation and management of wetlands in Ghana, where a scalable, accessible and robust solution is urgently needed. Critically,...
With the advent of the web, more and more information systems are being built web-centric, and more recently, these systems are leveraging the advantages of online community practice as well. This paper describes a lightweight community-based software code review web solution that allows a user to easily upload source code, review, and vote on peer reviews and reviewers.
Security of airport operations has been a major concern during recent years. Information systems have become a critical source for protecting the internal operations of airports. As such, securing the airports against cyber attacks has become the first step to address heightened security concerns for airport operations. The purpose of this paper is to offer a practical approach for improving the security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.