• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 95
  • 45
  • 21
  • 20
  • 19
  • 4
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 223
  • 223
  • 93
  • 89
  • 80
  • 53
  • 38
  • 37
  • 34
  • 31
  • 22
  • 21
  • 20
  • 20
  • 19
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Programų sistemos vartotojų teisių valdymo modelis ir jo tyrimas / The software system users authorization management model development and research

Janulevičius, Kęstutis 31 May 2006 (has links)
In security engineering and computer security, authorization, is a part of the operating system that protects computer resources by only allowing those resources to be used by resource consumers that have been granted authority to use them. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the computer. Authorization process makes use of the authentication process to identify consumers. When a consumer tries to use a resource, the authorization process checks that the consumer has been granted permission to use that resource. Permissions are generally defined by the computer's system administrator in some types of "security policy application", such as an access control list or a capability, on the basis of the "principle of least privilege": consumers should only be granted permissions they need to do their jobs. Older and single user operating systems often had weak or non-existent authentication and authorization systems. "Anonymous consumers" or "guests", are consumers that have not been required to authenticate. They often have very few permissions. On a distributed system, it is often desirable to grant access without requiring a unique identity. Familiar examples of authorization tokens include keys and tickets: they grant access without proving identity.
52

Veiklos procesų vykdymo modeliavimas, taikant UML veiklos grafus / Workflow modelling using UML activity diagrams

Gudonavičius, Linas 31 May 2004 (has links)
In this thesis are analysed correctness for verification ability of UML activity diagrams by using hypergaphs. There suggested the transformation from UML activity diagram to hypergraph and verification algorithm of hypergraph, which can be used for expanding the capabilities of CASE tools for workflow and e-business modelling.
53

Kompiuterizuotas mokyklos administravimas ir vadyba / Computerized administrating and management of the school

Kairiūkštis, Tomas 08 June 2005 (has links)
In theoretic part of the postgraduate final work, there are analysed administrating and management problems, desirable objects of the school. Considerating software, that will be used to create system. Reviewing similar existing products. In practical part , the created system is descriptive, it‘s operations, user settings, testing results, problems that came during the development process and conclusions.
54

Verslo analizės metodų taikymas mažų įmonių informacinėse sistemose / Application of business analysis methods for small enterprises

Reipas, Artūras 15 January 2007 (has links)
In current work problems and requirements for demand forecasting in commercial or manufacturing enterprises are analyzed and suitable forecasting algorithms are proposed. In enterprises with multidimensional and heterogeneous demand it is advisable to use different algorithms for different demand constituents and to readjust parameters used for forecasting. Existing forecasting packages are not practical as they are not integrated with commodities or materials supply orders management activities and business processes of enterprise. The orders management system is developed with forecasting component using adopted time series forecasting techniques such as moving average, exponential smoothing, double exponential smoothing. These techniques ensure reliable forecasting results for different time series models: random, trend and are integrated with other business management activities. It is possible to calculate deviations of forecasted demand from factual values, to select algorithms giving minimal perсentage error, and to adjust algorithms parameters to changing demand. The system can help managers to choose forecasting algorithms and to adapt their parameters in the course of time. The system is designed using UML CASE tool and implemented in Microsoft .Net environment using MS SQL Server 2005 for data storage.
55

Mėsos perdirbimo įmonės gamybos valdymo sistemos "Meat Master" prekių ženklinimo modulis / Manufacturing Execution System "Meat Master" for Meat Processing Company Labeling Module

Grėbliūnas, Rimantas 05 June 2006 (has links)
Manufacturing execution system "MeatMaster" for meat processing company - labeling module Most of meat processing companies in Lithuania and other Baltic countries are sophisticated and their productivity have increased. Strong competition in market motivates the companies to seek for methods how to raise efficiency in accounting. ERP systems implemented in most of companies doesn’t secure the effective management of production and accounting. Therefore the companies are investing in a development of Manufacturing execution systems and their installation. In this project the process of production labeling in meat processing company “Utenos mėsa” is analysed. Equally, the main problems are described and are offered the solutions. In this project the requirements for the software were specified, described the designed part of Manufacturing execution system "MeatMaster" labeling module, user documentation and system installation process at a company and the results of installation.
56

Fizikinių reiškinių kompiuterinio modeliavimo technologijos / Computer Simulation Technologies of the Physical Phenomena

Eičinaitė, Sandra 09 June 2006 (has links)
Computer technologies progressively penetrate into the education, have influence to learning and teaching of various subjects, and to all the training process. When teaching physics, computer technologies extend facility. There can be made many experiments, which practically are very expensive or sometimes even dangerous, and take a long period of time. There can also be created computer simulators, explored phenomena, which cannot be investigated realistically. Simulators and simulation are very important in physics. Experimentation and simulation programs can be useful for the development of the computer simulators. Using these programs the parameters of the simulating phenomena can be changed, their operating can be observed, the phenomena can be simulated and their consistent pattern can be investigated. The teaching computer simulation is important as it makes the educational process more attractive and dynamic. In the master’s work “Computer Simulation Technologies of the Physical Phenomena”, there is the analysis of the usage of computer simulator’s method at schools and universities of Lithuania. With reference to the general programs of Lithuanian education and its standards, there is made the analysis of knowledge of simulation during the lessons of different subjects. With the reference to the 2004/2005 years university programs of Lithuania, there is made the analysis of the simulation courses in different faculties of Lithuanian universities. When building the... [to full text]
57

Adaptyvaus atlyginimų skaičiavimo modelio sudarymas ir tyrimas / Development and Research of Adaptive Model of Salary Calculation

Zlatkauskas, Giedrius 09 January 2007 (has links)
The work provides the results of the survey on the present situation of salary calculation information systems in the market trying to distinguish advantages and disadvantages of the usable systems, their compatibility with organizations’ administrative information systems as well as possibilities to adjust them to the requirements of users. The survey confirmed that most of examined information systems are either old, or cause many problems then combining them with organizations’ administrative information systems. Moreover, only some of the examined salary calculation information systems provide users with a possibility to change calculation formulas, reports or other properties of information system. This work presents the description of adaptive salary calculation model. This model gives the version of a possible solution of a problem which reduce the influence of determinate salary calculation information systems’ drawbacks. In this work preferred basic diagrams and descriptions of adaptive model of salary calculation. Late was created project of adaptive model of salary calculation according to diagrams and descriptions. Development of adaptive model of salary calculation gives possibility to change calculation formulas, reports and other properties of information system. Analysis gives that adaptive model of salary calculation information system solves the problem and is more comfortable for the user then other salary calculation information systems. According to this... [to full text]
58

Elektroninių komunikacijų ir dokumentų valdymo sistema / Electronic communications and document management system

Babilius, Povilas 16 January 2005 (has links)
In this work designs document management and communication system for small office or average company. This system operation is based on internet technologies and allows to use it form any remote computer. Also there is drafted reporting to concerned persons about changes via various ways. This electronic communications and document management system is an unique work, originally coming out of a PHP and MySQL web application. It was the first time to directly learn the differences between Microsoft and Open Source modeling; to understand technology methods aim to accomplish the same thing in different ways. This project turned out quite as expected coming from using a working web version of this application. The flow of the web application is directed and purposeful, while the web application doesn’t require additional scripting to enforce user login, grouped permission setting, and actual file upload capability.
59

OLAP sistemų analizė / The analysis of OLAP systems

Rukavičius, Valdas 25 May 2005 (has links)
The amount of information exchange is constantly growing. All this gathered data is a perfect material for analysis, although it is only partially used. Most common problem is the method how to organize this data to the form necessary for business analysis. Usually these functions are provided by decision support systems. These systems use functions and tool that are not flexible and cannot give the answers in real time. OLAP systems provide the ability to analyse data in all aspects online. OLAP technology includes tools and measures to transform and store information, create and execute queries as well as graphic user interface. As OLAP systems get more affordable to companies new issues are discussed. Main problems are how to choose the best OLAP products available in the marker and how to design and implement OLAP system according to business requirements. The aims of this work are to identify most important criterias and to compare different OLAP systems in product and data structure level and to design and implement OLAP system to Telecommunication Company according to the analysis results. The analysis of OLAP systems was divided into the analysis of OLAP products available in the market and the analysis of individual OLAP system. The analysis showed that the choice of OLAP products depends on software equipment and analysis capacities of the company, and separate OLAP system must be designed according to specific analysis needs. According to the analysis results... [to full text]
60

Digital transformation of the healthcare organizations: The resilience of developing countries post-Covid-19 : How digital transformation builds stronger resilience abilities for healthcare organizations in developing countries in the post-COVID-19 outbreak?

An, Nguyen, Tuong, Ho, Hien, Bui January 2022 (has links)
Background: Covid-19 is disrupting the healthcare industry. Policies and regulatory changes in general necessitate adaptation from the healthcare industry, particularly those affecting the payment system, clients, and the environment. On the other hand, as policymakers around the world look to digital transformation to make healthcare systems more resilient, affordable, and accessible, a rare and remarkable opportunity for the information systems research community to leverage its in-depth knowledge to both advance theory and influence practice and policy has emerged.    Problem discussion: The changes brought by Covid necessitate resilience in the healthcare industry, which most countries are not yet prepared for, as it will necessitate a large number of workers and effective policies for the recovery process in the post of Covid 19. Crucially, many people lack the resources to scale up health interventions as well as the financial resources to implement support measures and improve resilience. This research will answer the following considerable question, how can countries now build more resilient healthcare systems capable of withstanding pandemics? What role can technology play in these efforts?    Purpose: The thesis will aim to discover how the healthcare industry in developing countries will be resilient as they digitize their operations in the post of Covid disruption situations. The finding in this research will be identified by the combination of the HIT framework following four major sectors of health information technology: financial, functional, user, and environmental, and the resilience capabilities such as anticipating, monitoring, responding, and learning. The result of the finding will be involved in chapter 4.    Method: In this paper, a qualitative method was used to answer the research question. Inductive and deductive techniques were used to expand the research by moving from individual data to broader generalizations and ideas. The detail of all the methodology steps will be explained in chapter 3.  First, we began with specific observations and measurements by interviewing organizations and individuals related to the healthcare industry in one highlighted developing country for the primary data and used reliable websites such as Google Scholar, Microsoft Academic, Academic databases, etc for the secondary data. Due to the limitation of the interview responses, we chose Vietnam as our sample. Then we started noticing the HIT strategies, then we went a step further with interpretation to explain these preliminary discoveries that we wanted to investigate, and finally ended up developing some general digital conclusions or theories. Conclusion: Putting these innovations in place now helps the healthcare sector build a stronger resilience health ability, allowing it to be better prepared for future peaks and valleys. In conclusion, some innovative technology solutions from HIT strategies have been proposed, such as the top-down governance system which has been used to support the leaders to reach all levels of government. Aside from that, the effectiveness of the information system's preparation and the role of the surveillance system are critical in the early stages of resilience.  All of the detail from the HIT recommendation strategies will be explained in chapter 5.

Page generated in 0.0875 seconds