The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In 2015, Zheng & Carter warned that the Internet of Things (IoT) would have an exponential deployment in all types of industry in order to improve the efficiency and effectiveness of its operations. In the military sphere, it has not been different. The Ecuadorian Armed Forces are trying to equip their soldiers with IoT Technology to monitor and visualize in real time the state of health during...
This report shows that the architecture of Big Banks' Management Control Systems can be presented as a two or three-tier structure without separating the functional components to the front and back office. The report also examines the key legislative and regulatory documents that define the specific requirements for the Big Banks' Management Control Systems' Software. Functional components' classification...
By using a virtual campus, users can not only immerse in the campus scene, but also interact with the system, which helps them understand the campus rapidly and deeply. But the virtual campus itself doesn't provide the relevant data information of the campus scene, which severely limits its application to a certain extent. To solve this problem, oriented to Beijing Institute of Petrochemical Technology...
The purpose of the following study is present the MOOC Information System Generic Architecture as a result of the analysis of quality characteristics found in the literature concerning of MOOC, and the application of the Discovering Hybrid ARchitectures by Modelling Actors (DHARMA) method based on the use of i∗. Generic Architecture refers to the identification of MOOC system actors, the services...
One of the biggest challenges of organizations in contemporary times is the ability to manage rapid changes in business environment. Software and expert information systems can help to manage changes and thus contribute to addressing this challenge. The initial, and perhaps, most important activities in software and expert systems development are to elicit, analyze, specify, and validate requirements...
While in waterfall-like processes changes are expected to happen mostly after the main development has finished, agile approaches have incorporated response to changes into the main development itself, which raises the importance of the ability to respond to changes effectively to a sine qua non. Changes are specified from the perspective of how users actually use systems, i.e., usage scenarios, which...
Contemporary tools aimed at information system (IS) development often use models to generate system implementation. Starting from an IS model, these tools commonly generate database implementation schema as well as code for generic CRUD operations of business applications. On the other hand, at the level of platform-independent models (PIMs) there is a lack of support for specification of more complex...
Requirements taxonomies help to classify and channel the requirements in a project. A very simple taxonomy is the distinction between functional and non-functional requirements. Furthermore, a taxonomy helps to decide if a statement is a requirement at all or just something else (e.g., 'information'). The quality of a taxonomy is important as we do not want to put a statement in the wrong category...
At given article implemented analysis of basic approaches to realization of automation of control by enterprise finances. According to results of analysis and consideration of new approaches to successful processing of management by funds flow, proposed development of new intellectual information system of finance management. The purpose of which is to present to user only necessary information —...
The use of a computer in combination with measuring technology in clinical diagnostics allows creating effective means for providing collection of information about the patient's. In this study the specialized information system for analysis of data with assess the overall and relative risk of fatal outcome cardiovascular diseases is presented. This program was developed on the basis of collection...
The main idea in this research is the utilization of Fuzzy C Means (FCM) method as the determination of patient's nutritional status, which is implemented, in mobile application. Parameters used to cluster nutritional status are height, weight and age. The result of the decision will give 3 clusters on nutritional status is good nutrition, malnutrition and better nutrition. Mobile apps are used as...
Agile software development methodologies have been widely adopted by the software industry during the last decade. Agility assessment is an approach to measure the success of this adoption as well as to satisfy the further demands. In response, a number of agile maturity self-assessment surveys have been developed. However, software organizations do not widely utilize existing self-assessment surveys...
Agile software development approaches have emerged to overcome the inherent challenges of the traditional software development methodologies. With that in mind, they offer a set of simple yet effective practices based on the values and supporting principles of the Agile Manifesto. Today, more and more organizations are practicing Agile but transitioning to Agile is not as straightforward as it might...
The demand for commodities of houseplant in the world are indeed enormous, especially the kind aglonema, bromille, anthorium. The relatively large volume of national production and harvest area — compared with other crops — has placed the aglonema, bromille, anthorium a main houseplant in Indonesia, especially in West Java. But, unfortunately, the marketing system of houseplant needs some improvement...
Software vulnerability detecting is an important way of discovering the existing loopholes in software in order to ensure the information security. With the rapid development of the information technology in our society, a large variety of application software with various potentially vulnerabilities has emerged. Therefore, a timely discovery and repair of these loopholes before they are exploited...
Program invariant is formal description of properties that should hold at certain program location in every valid execution. It is very useful for program analysis and verification. In this paper, we introduce an abstraction interpretation approach for generating program invariant efficiently and precisely. A polynomial interval domain is proposed for representing abstract state and precise loop effect...
An information service (IT service) in the context of the company informatics supports to execute business processes. Business processes need to be supported by targeted and relevant information services to ensure high performance. Company management perceives the information services as a necessary part of the business process and expects their error-free performance. An IT service does not represent...
Although working in teams is an effective method for students to learn skills necessary for information systems, the optimal combination of team members to maximize the learning effectiveness has yet to be clarified. This study investigates the relationship between the combination of students' personality characteristics and learning effectiveness in three information system lecture courses. Two Five...
This study intends to report a review of the literature on the evolution of the systems information success model, specifically the DeLone & McLean model (1992) during the last twenty-five years. It is also intended to refer the main critics to the model by the various researchers who contributed to its updating, making it one of the most used until today.
The information system audit developed in a data center it was based on the study of the domains of COBIT; for this reason the survey for each component it was developed with the goal of obtain the necessary information for audit. The analysis of this information, permited to establish the degree of compliance with international standards, and determine the maturity, risk levels of each of the components...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.