• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 130
  • 123
  • 7
  • Tagged with
  • 130
  • 130
  • 67
  • 49
  • 35
  • 33
  • 31
  • 30
  • 28
  • 27
  • 26
  • 26
  • 24
  • 24
  • 22
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

以SDN為基礎之具服務品質感知的智慧家庭頻寬管理架構 / SDN based QoS aware bandwidth management framework for smart homes

林建廷, Lin, Jian Ting Unknown Date (has links)
隨著智慧家庭技術及物聯網的裝置大幅度地成長,智慧家庭的網路流量亦隨之升高。當大量成長的智慧家庭流量造成網路壅塞時,可能使緊急服務的警告機制失效,或是造成某些應用服務品質低劣而不堪使用。這些問題恐阻礙智慧家庭未來的發展性。 為改善上述問題,本文提出創新的物聯網智慧家庭頻寬配置管理架構。以ISP業者管理數以千計的物聯網智慧家庭為情境,針對智慧家庭多樣化的應用服務,利用具前瞻性的軟體定義網路,提供ISP業者對智慧家庭外部網路頻寬做最佳化的配置。 本研究依改良後的3GPP LTE QoS Class Identifier (QCI),分類智慧家庭的服務,並考量服務的優先權及延遲程度,提出BASH演算法。透過本研究,ISP業者能依定義好的服務類別,將匯集後的智慧家庭服務流量藉由配置訊務流(traffic flow)的權重,計算出不同服務的最佳頻寬分配量,達到提升QoS及使用者QoE的目的。 為確認本論文所提出之方法的有效性,實驗設計是利用Linux伺服器架設OpenvSwitch、Ryu控制器及Mininet模擬器,建構SDN網路環境。實驗結果顯示,本研究所提出的BASH與ISP所用的傳統頻寬分配方法相比,能有效提高30%的throughput,降低159%的delay time及967%的 jitter time。 / With the increasing number of IoT (Internet of Things) devices and advance of smart home technology, the network traffic of smart home is also raising rapidly. When network congestion occurs due to massive traffic, some emergent alert mechanisms might become invalid or cause some application services performance degraded. All kinds of these will dramatically hamper the future development of smart homes. In order to resolve these problems, we propose an innovative bandwidth allocation smart home management framework for IoT enabled smart homes. The application scope of this research assumes a scenario that an ISP (Internet Service Provider) should support thousands of IoT enabled smart homes for a variety of services. The proposed bandwidth allocation framework is based on the promising software defined networking (SDN) architecture and is responsible for optimizing bandwidth allocation on external Internet traffic. We modify the 3GPP LTE QoS Class Identifier (QCI) to adaptive to the services suitable for smart homes. The proposed bandwidth allocation smart home (BASH) algorithm considers service priority and delay at the same time. With this framework, ISP is able to optimize bandwidth allocation by aggregating thousands of classified services of smart homes and thus effectively enhance Quality of Service (QoS) and user experience (QoE). In order to verify the proposed methods, we implement a SDN environment by using Linux Ubuntu servers with Mininet, Open vSwitch and Ryu controller. The experiment results show that BASH outperforms ISP traditional method in increasing the throughput by 30%, reducing delay and jitter by 159% and 967%, respectively.
82

軟體商業生態系統中利基者經營模式之變遷:以資訊安全軟體公司為例 / Metamorphosis of Niche Players' Business Models in the Software Business Ecosystem: the Case of Information Security Software Firms

郭國泰, Kuo,Anthony Unknown Date (has links)
本研究採用「商業生態系統」觀點,以「利基者」的角度出發,來探討利基型軟體公司經營模式的變遷。研究對象為屬於「利基者」的資訊安全軟體公司,以及其所處的環境。研究分為「歷史分析」與「探索性個案研究」兩大部分。首先,本研究以「歷史分析」作為前導研究,探討資訊安全軟體由1986年至2007年的發展沿革,並釐清防毒軟體廠商、防火牆軟體廠商,以及入侵偵測/防禦軟體廠商所處的商業生態系統,以及廠商在其中的角色。此外,在歷史分析中,本研究也探討了主要商業生態系統之間的關係。而「探索性個案研究」,則選擇了五個成功的資訊安全軟體公司,以及五個失敗的資訊安全軟體公司,探討這些廠商在1986年至2000年之間經營模式的變遷,以了解成功及失敗的因素為何。此外,也描述繼續存活的成功廠商,如何在2001年之後,因應環境「擾動」而動態調整其經營模式。 在「歷史分析」的部份,本研究首先發現,資訊安全軟體自1986年開始出現,此時的資訊安全軟體廠商,主要為防毒軟體廠商,而廠商在「個人電腦商業生態系統」以及「區域網路商業生態系統」中扮演「利基者」的角色。在1994年後,「Internet商業生態系統」蓬勃發展,除了防毒軟體廠商之外,防火牆軟體廠商以及入侵偵測軟體廠商開始出現。而資安軟體廠商在「Internet商業生態系統」中扮演「利基者」的角色。之後,資訊安全軟體廠商逐漸形成了一個「邊界安全商業生態次系統」。在這個「次系統」中,不同的廠商分別扮演了次系統中的「關鍵者」、「支配者」,以及「利基者」。另一方面,三個「主系統」之間,存在「演替」的現象,後者的重要性,逐漸超越前者。而到了2001年之後,由於環境中的劇烈「擾動」,產生了新的生存空間,也改變了既有「物種」的「種間關係」。而另一方面,主要商業生態系統中「關鍵者」的跨入,也嚴重壓縮了既有「利基者」的生存空間。 「探索性個案研究」中,本研究又分為「規範性個案研究」與「描述性個案研究」兩部分。「規範性個案研究」探討五個成功的資訊安全軟體公司,包括Symantec、Trend Micro、McAfee、Check Point,以及Internet Security Systems(ISS),在1986年至2000年之間,調整經營模式的動態過程,並與五個失敗的公司,包括ACSI、ESaSS、EliaShim/eSafe、Raptor,以及Axent進行比較。研究首先發現,成功的「利基者」,充分「借助」了「關鍵者」的資源,包括「技術」、「夥伴」、「聲譽」,並透過學習,運用關鍵者的「知識」,提升組織的能力。其次,成功的「利基者」,都能建立以自己為中心的「商業生態次系統」,包括「通路次系統」或是「技術平台次系統」。此外,成功的「利基者」,也都能及時參與新興的商業生態系統,並察覺商業生態系統「演替」(亦即「消長」)的狀況,進而調整參與的重心。而失敗的五個「利基者」,均於2000年之前被其他公司購併,主要因為較欠缺這些作為,或在這些方面未能成功。「描述性個案研究」則描述在2001年之後繼續存活的成功「利基者」,如何因應環境「擾動」與其他廠商行為的改變,動態調整經營模式。這些廠商調整經營模式,以鞏固既有的生存空間,並掌握新的生存空間。同時,也多方參與由不同的「關鍵者」所主導,未來可能成為「主流設計」的技術架構。 綜合來說,成功的利基型軟體公司,由創立開始,隨著成長的過程,「參與」以其他關鍵者為中心的商業生態系統,同時也致力於「建立」以自己為中心的商業生態系統。「參與」及「建立」二者與時並進,並適時調整,利基者才得以維持長久生存。 / This study takes the view of niche players to explore their business model changes in the software business ecosystem. Software firms in the information security software industry and their environments are selected as research context. The research is comprised of two main parts: a historical analysis and an exploratory case study. The historical analysis serves as a pilot study, in which information security software industry’s historical development is scrutinized to clarify which business ecosystems these security software firms, including antivirus software firms, firewall software firms, and intrusion detection/prevention software firms, participate in as they grow, as well as these firms’ roles within the business ecosystems. Relationships between different busines ecosystems are also studied in the historical analysis. In the exploratory case study, five successful security software firms and five failed security software firms are selected as case companies. The case study explores how successful firms and failed firms, from 1986 to 2000, differ in the way they changed their business models, in order to understand why successful firms remain in existence after 2000. The case study also describes how these surviving firms have, responding to “disturbance” in the environments, been adjusting their business models dynamically since 2001. The historical analysis reveals that the “PC business ecosystem”, the “LAN (local area network) business ecosystem”, and the “Internet business ecosystem” are involved as security software firms grow. Information security software firms have participated in the “PC business ecosystem”, when antivirus software was brought to the world in 1986. Antivirus software firms played the role of “niche players” in the “PC business ecosystem” at that time. Later when local area network was getting prevalent, a few antivirus firms participated in the “LAN business ecosystem”, playing the role of “niche players” as well. When the Internet commercialized around 1994, firewall software firms and intrusion detection software firms emerged. All participating information software firms played the role of “niche players” in the “Internet business ecosystem”. In 1996, a “sub-system”—“perimeter security sub-system” —was formed within the “Internet business ecosystem” by various security software firms and hardware companies. This “sub-system” had its own “keystones”, “dominators”, “hub landlords”, and “niche players”. In addition, “ecosystem succession” phenomenon is observed between the three “main system” —the “PC business ecosystem”, the “LAN business ecosystem”, and the “Internet business ecosystem”. Importance of the latter gradually surpassed the former. Furthermore, “disturbance” has emerged since 2001, creating new living space, but at the same time altered the “inter-species relationship” between existing species. Some “keystones” in the main ecosystems turned into “dominators”, highly decreased existing niche players’ living space. The exploratory case study is divided into a “normative case study” and a “descriptive case study”. In the “normative case study”, five successful security software firms, including Symantec, Trend Micro, McAfee, Check Point, and Internet Security Systems (ISS) are compared with five failed firms—ACSI, ESaSS, EliaShim/eSafe, Raptor, and Axent in the way they adjusted their business models from 1986 to 2000. Evidences revealed that successful niche players sufficiently leveraged resources provided by keystones. Resources include technologies, partners, and reputation. Successful niche players also learn from keystones to acquire knowledge, which further improves niche players’ organization capabilities. In addition, successful niche players are capable of building up their own “sub-systems,” which can be “channel sub-systems” or “technological platform sub-systems.” Furthermore, successful niche players, in time, participate in every promising business ecosystems, and sense the “ecosystem succession” phenomenon when it takes place to adjust their efforts on different business ecosystems. Five unsuccessful case companies fail to achieve similar accomplishments. Consequently, all of them have been acquired or merged by other firms by 2000. Meanwhile, in the “descriptive case study,” I describe how five successful firms keep surviving after 2001, adjusting their business models to secure existing living space and seize emerging opportunities. These successful niche players also participated in all information security architectures proposed by different keystones, expecting that one of these architectures will turn out to be the “dominant design” in the future. Overall, successful niche players, as they grow, participate in business ecosystems led by other keystones, and build up their own business ecosystem as well. They advance and adjust both their “participating” and “builing up” activities to secure long-term survival.
83

多媒體電腦輔助教學系統開發與評估--以作業研究課程為例 / The development and assessment of the multimedia CAI - an example of operations research course

王精顯, Wang, Ching-Hsien Unknown Date (has links)
電腦輔助教學(Computer Assisted Instruction,簡稱CAI)係起源於1950年代末期的美國,並且在今日,CAI 儼然已成為全世界教育界共同的趨勢。 目前關於CAI的研究雖多,但尚無一多媒體作業研究教學輔助課程軟體,因此,本研究提出一以人類學習的基礎理論、資訊科技、使用者介面和傳播理論以及學科課程的內容與特質等五個構面和系統發展流程的多媒體CAI軟體發展 模式,以作為發展多媒體CAI軟體的理論與實作的依。 最後,本研究並依據此發展模式,實際製作一個作業研究課程教學軟體的雛形(prototype)系統,再針對此教學軟體系統進行評鑑,並藉由評鑑的結果以探討本研究教學軟體系統的可行性和本研究所提出的發展模式的有效性,以提供經驗作為日後發展多媒體CAI課程軟體的參考和依據。 / I first propose the multimedia CAI system develop model. And the model should contain the five factors, learning theory, communication theory, information technology, user interface, course and the system develop cycle. Then, I follow the multimedia CAI system develop model to develop the multimedia Operations Research CAI system. At last, the system has been assessed by the target user and the expert. And the result show the validity of the multimedia CAI system develop model.
84

運用OpenGIS及免費軟體輔助國有公用不動產管理之研究 / Application of OpenGIS and free software for management of state-owned real estate

陳志清, Chen, Chih Ching Unknown Date (has links)
隨著時代科技之進步,國有財產管理由圖簿管理邁向資訊化管理已行之有年,惟現今之財產管理系統僅能掌握地籍屬性資料及管理機關的產籍資料,單張地籍圖無法與土地使用現況等空間資料結合,以圖形顯示土地及建物的位置及其空間分佈的分析,並且隨時掌握最新異動情形,導致國有土地未能獲得有效管理運用,被占用情形屢見不鮮。 自從1960年代加拿大地理資訊系統(CGIS)開始運作至今,雖然已有50年之歷史,但在早期,主要工作平台均為價錢昂貴之工作站電腦,其軟硬體價位極高,只有政府或大型研究機構才能負擔,所以GIS始終定位在專業用途,小老百姓一直無緣享受到GIS的好處。不過在近十年來的發展,使用者介面及軟硬體功能均已有長足進步,目前國際標準組織(ISO)與OGC (Open Geospatial Consortium)分別致力於地理資訊系統相關標準制定,迄今已分別推出許多與地理資訊描述與應用之相關標準。且我國對於國土資訊系統(NGIS)之開發整合及流通亦已投注相當心力,種種跡象均顯示GIS之開發門檻已逐漸降低中,且其資料之流通性亦提昇許多,因此本研究將嘗試探討如何利用開放式地理資訊架構(OpenGIS)、免費軟體(Free Software)及開放源碼軟體(Open Source Software),結合Google Earth涵蓋廣闊之地理資源平台,用最經濟且符合實際需求之方式,以地籍圖、地形圖及現況照片,結合既有國有土地及建物的管理屬性資料及相關地理圖形資料,如臺灣基本圖及地形圖等,以GIS的圖形及地理分析功能,輔助國有土地及建物管理之運用。 / With the advance of technology, the management of the state-owned property has been shifted from using map and book to information-based management for some time. However, the property management system today can only get hold of the management of cadastral property information and property registration of producing agencies, yet the cadastral map is not able to integrate with the current land utilization and other spatial data to illustrate the location and to analyze spatial distribution of the lands or buildings. And the fact that cadastral maps cannot be updated in time to grasp the latest alterations has resulted in ineffective management and utilization of state-owned land and arbitrary occupation was not uncommon. It has been fifty years since the operation of the Canadian Geographic Information System (CGIS) in 1960s. However, in the early stage, the working platform were mainly expensive workstation computers, and the prices of hardware and software were so expensive that only the government or large research institutions could afford. Therefore, GIS had been used only for special purposes; the pubic had no access to enjoy the benefits of GIS. However, from the development of the past decade, user interface as well as the function of hardware and software has made a great progress. At present, International Organization for Standardization (ISO) and Open Geospatial Consortium (OGC) are separately dedicated to developing geographical information standards and they have launched many standards regarding the description and application of geographical information respectively. Much effort on the integration and the circulation of our National Geographic Information System (NGIS) sees that the threshold of GIS development has been reducing and its circulation of data also has considerably raised. Therefore, this research attempts to combine OpenGIS, Free Software and Open Source Software with Google Earth, a platform that covers a wide geographical resource, with the most economical and realistic approach to integrate cadastral maps, topographic maps and present-day photos with the data of land and building management, and related geospatial data such as base map and topographic maps, etc. By using graphics and geographic analysis functions of GIS, it can support the management of state-owned land and buildings.
85

軟體專利與商業方法專利適格性實證研究—以美國最高法院Alice v. CLS Bank判決後續影響為中心 / An Empirical Study of the Patent Eligibility of Software Patent and Business Method Patent:One and A Half Year After U.S. Supreme Court Alice v. CLS Bank Decision

黃莉婷 Unknown Date (has links)
美國最高法院於2014 年6 月對Alice v. CLS Bank 案作出判決,對於商業方法專利與軟體專利之專利適格性產生巨大之衝擊。最高法院在Alice v. CLS Bank案專利適格性的判斷上援用了Mayo 案的二步驟測試法則,首先判斷系爭專利是否使用了司法判定不予專利適格標的之類別,再者就專利請求項「個別」及「整體」綜合觀察判斷請求項是否存在發明概念,使其顯著不同於司法判定不予專利適格的類別。而最高法院認為,以消除交割風險為目的之系爭專利與Bilski 案的避險概念相似,屬於商業運作中的基礎經濟實施行為,而為抽象概念。且不論是系爭方法、系統或是媒介專利請求項,皆只是使用了一般電腦功能來完成習知的商業步驟,並未加入了實質的發明概念使其顯著不同於抽象概念,因此系爭專利應不具適格性。然而最高法院除了並未在判決中對於「抽象概念」進行定義外,在發明概念的判斷上,最高法院提出了不能僅是利用普通運算功能之電腦設備來完成抽象概念,而是需與「特定機器」加以結合才能符合專利適格性的要件,但仍未說明「特定機器」之定義,以及方法與「特定機器」間應達到何種程度的結合,才能具備顯著不同於抽象概念的發明概念。 根據實證研究結果之建議,「當下級法院能有機會探索並發展見解時,最高法院將得以在重新審視議題時從下級法院的經驗中得到啟發」。因此在最高法院尚未明確解釋專利適格性判斷的細部分析要件時,下級法院之判決經驗與見解不僅將得以協助最高法院對於「專利適格性」的議題做出更適切的詮釋,更是在短期內瞭解司法判決趨勢之方法。因此,本論文蒐集聯邦法院在「2014 年6 月19日最高法院判決日後至2015 年12 月31 日」間引用Alice. v. CLS Bank 案所作成之判決案件主文中判決結果為「系爭專利具備專利適格性」者,以及針對美國發明法案中對於專利適格性此一議題較切為相關之「涵蓋商業方法專利複審程序」(CBM)為實證研究範圍,藉由判決實證分析方法瞭解下級法院與專利審判暨訴願委員會(PTAB)如何在個案中詮釋與適用二步驟測試法則中的「抽象概念」與「發明概念」,並著重於通過適格性判斷之判決,試以對於軟體專利及商業方法專利權人及發明人未來的專利申請方向提出建議。 針對判決分析之結果,本論文認為通過二步驟測試法則的請求項要件包含:應在請求項限制中對於機器設備作更進一步的功能描述、對於電腦或機器加入「足夠且有意義」的限制條件(例如限定於特定的產業、使用對象或是機器設備)、並盡可能限縮於抽象概念中的一項特定應用方法。此外,企業在考慮申請軟體專利或商業方法專利時,更應將電腦或網路技術層面之功能提升做為主要的專利申請方向。
86

軟體元件電子市集突現:以代理人為基礎之計算經濟研究途徑 / The Emergence of Software Component Electronic Marketplaces: Through An Agent-based Computing Economics Approach

朱文禎, Chu, Wen-chen Unknown Date (has links)
軟體元件電子市集突現:以代理人為基礎之計算經濟研究途徑 摘 要 軟體發展與演進過程中,產生軟體危機問題,而軟體再用是解決軟體危機的重要因應之道。軟體元件電子市集的興起是軟體演進史上一個重要里程碑,提供軟體再用的核心基礎建設。 本文探討軟體元件電子市集突現的本質原因和信任關係的發展過程,以遺傳規劃法(Genetic Programming, GP)為主的代理人基礎的計算經濟 (Agent-based Computational Economics, ACE) 研究途徑,整合軟體元件特性、交易成本、滿意和信任關係建立模擬模式。藉以觀察和分析底層買賣雙方連續滿意交易與信任關係發展,和上層軟體元件電子市集行為突現(emerge)動態過程。 結果顯示:在市場力量下,具標準化軟體元件,電子市集行為突現過程中,謹慎型交易策略將會勝出,進而主導整個市場。當元件功能特殊性程度低時,電子市集行為的購買率將比元件功能特殊性程度高者更為顯著。如果考慮交易態度滿意與否,記憶型滿意者市集行為的購買率將顯著低於高滿意型,而顯著高於低滿意型。若考慮不同信任程度函數,高信任型電子市集購買率顯著高於低信任型,低信任型其電子市集購買率顯著高於不信任型,對於目錄型市集行為和忠誠目錄型市集行為,上述信任函數的形態亦依序顯著影響購買率的高低。 同時,在不同信任型之間,高信任型大多數有連續累積交易行為;而低信任型則同時採用連續和臨時交易行為;不信任型大多數是臨時交易行為,要花費更多時間的演化,以建立彼此信任關係才會出現連續交易乃至於連續累積交易行為。 關鍵字:軟體元件電子市集、交易成本、遺傳規劃法、代理人基礎計算經濟、信任、突現 / The Emergence of Software Component Electronic Marketplaces: Through An Agent-based Computing Economics Approach Abstract Software reuse plays a vital role in response to software crises in software evolution. An emergence of software component e-marketplace is one of the great milestones providing a core infrastructure for software reuse. The objective of this study involving features of s/w components, transaction costs and satisfaction-trust relations intends to understand why s/w component e-marketplaces emerge as well as demonstrate how they do. The model allows agents to develop their trust in the market as a function of continuation of a satisfied relation through an agent-based computational economics approach with genetic programming. The findings show that the agents with prudent strategies tend to dominate the market in evolution of e-marketplaces under the market power. In addition, the lower level the functional particularity of component is, the higher the buying rate is. As the satisfaction attitude is taken into consideration, the buying rate of recall-satisfied agents lies between that of low-satisfied agents and that of high-satisfied agents. Moreover, when the comparisons are made among the three types of trust function, the buying rate of the high-trust agent is higher than that of low-trust agents. And the buying rate of the low-trust agent is bigger than that of not-trust agents. Similarly, the sequences of the buying rate are strongly influenced by different type of trust function at the catalog market and the loyal catalog market. Meanwhile, almost all high-trust agents have continuous and loyal trade behavior. Either continuous or temporal trade behavior is usually found in the low-trust agents. The tentative trade behavior is seen among almost every not-trust agents. In another words, it is well obvious that it takes more time for the not-trust agents to accumulate trust from their possible trade partners. Keywords: Software component electronic marketplaces; Transaction costs; Genetic programming (GP); Agent-based computational economics (ACE); Trust, Emergence
87

軟體產業的顧客知識運用、產權與組織型式

王盈勛, Wang, Ying-hsun Unknown Date (has links)
摘要 開放原始碼軟體的出現,對軟體產業帶來巨大的衝擊。然而,針對開放原始碼軟體的研究,經常將開放原始碼軟體視為「沒有產權」的軟體,或是被更進一步提高到意識型態之爭,視為是爭取自由的「聖戰」。 本研究的成果指明,開放原始碼軟體之所以出現與茁壯,是回應軟體市場對個人化與差異化需求越來越高的有效方式。產品差異化的程度越高,對顧客知識的依賴程度越高,而開放原始碼軟體社群則是全然靠顧客的知識貢獻來開發軟體的一種組織形式。 開放原始碼授權協議作為一種產權制度,並非「沒有產權」或是「反對產權」,組織而是讓軟體開發社群成員的專質性知識與產權配置得以效率結合的制度發明。開放原始碼授權協議以著作權為基礎的制度安排,讓軟體開發者能夠自主地運用軟體原始碼、擴大社群成員間的知識共享、以及排除個人或商業公司在其間從事投機行為的可能性。 本研究對組織創新的三權假說於社群組織的運用,進行了初步的檢驗;此外,對於軟體產業該如何妥善運用顧客力量從事產品創新也提出了一些建議。 / Abstract The emergence of the open source software in the 1990s has made a huge impact on the software industry. However, the overall research on the open source software often regards it as “software without property right,” or even sees it a “holy war” fighting for freedom by heightening the ideological conflicts between liberalism and capitalism. The outcome of this research indicates that the initiation and development of the open source software serves as the effective response for the demanding software market of individualization and differentiation. The more the software product differentiates, the more the users’ knowledge has to be replied upon. The open source software community is a form of organization which entirely lives on the intellectual contribution of its customers. The licensing of the open source software as a system of property right does not mean that it has no property right or it is against property right; rather, it is an invention of system which allows the efficient combination of the community software developers and the distribution of property right. The licensing of the open source software based on the intellectual property right permits the software developers making use of the open source independently, expanding the communal share of knowledge among community members, and eliminating the possibilities of individuals and commercial companies who try to speculate in it. This study has made preliminary examinations on the application of the “hypothesis of the three powers” of the organizational innovation on communities and provides software industry with suggestions for how to make proper use of the power of customers.
88

資料交換機制之研究─以我國動植物防檢局為例 / A Study of Data Exchange Mechanisms─The Case of BAPHIQ in Taiwan

葉耿志, Yeh, Ken-Chih Unknown Date (has links)
由於我國加入世界貿易組織後,使得大量的動植物及其產品的進出口,將會迅速地增加,國外動植物疫情隨貨品引入的機會也大大增加了許多,所以行政院農業委員會動植物防疫檢疫局所演的角色便相當重要。因為它必須和國外重要貿易國家作資料的交換,而目前的方式有電話、傳真及紙本等傳統方式。隨著網際網路的盛行與普及,使用網際網路傳輸的資料的可行性增大,而究竟可以如何透過網際網路傳輸所需要的資料呢? 近年來我國政府推動大力「電子化政府」的政策,身為政府單位的防檢局當然也不例外,目前也正準備逐年更新其電子檢疫發證資訊系統,並且隨著各相關局處內外電子化的完成,和國外貿易國家防檢疫單位間,透過網際網路交換防檢疫資料的可能性,也大幅地向上提升許多。 本研究即是針對國外目前所使用的封閉性網路,以EDI為主;其他開放性網路下以XML為基礎的點對點方式與電子中心的方式,做一個探討。並試圖去思考如何參考國外目前資料交換的傳輸模式及電子商務上資料交換的經驗,並藉由本研究的資料交換模式設計,來進行資料交換的實現。用以解決點對點間的資料交換、異質系統間的資料傳遞及資料傳遞的安全性等,以建立一套共同的資料交換機制IQDE-Hub,使資料的交換成為可行。 / Recently it contains many types of data exchages in the application of electronic commerce. ECs are B-to-B (Business to Business), B-to-C (Business to Consumer) and C-to-C (Consumer to Consumer). So there are many types of data exchages in the world. They contain EDI of private network, XML based and E-Hub of public network. This study will establish a methodology. It provides many other countries to share common data with each other. The data exchange mechanisms of this study can solve three main problems of other data exchange mechanisms. They are point-to-point data exchange, data exchage between different information systems and security of data exchange. The exchange mechanisms of this study called IQDE-Hub (Inspection and Quaratine Data Exchange-Hub). In this study, we can see that it provides a method to exchange data between other countries. So we have not to use other methods which include telephone, fax, mail and so on by human. We can exchange data by using electronic type.
89

軟體專案度量與分析流程規劃~發展QMAP方法

林建妤, Lin, Chien Yu Unknown Date (has links)
為提升國內軟體專案生產力和品質,建立度量與分析的機制,本研究參考能力成熟度整合模式(Capability Maturity Model Integration, CMMI)之度量與分析流程領域作為指引,結合GQM (Goal-Question-Metric)及PSM (Practical Software & Systems Measurement)的度量方法論,發展一套提問式驅動度量與分析流程規劃法,稱為QMAP (Questions driven- Measurement & Analysis Process Planning)—運用5W1H (Why, Who, When, What, Where & How) 提問方式,有系統地依據CMMI度量與分析流程的要求,找出軟體專案的成功因素,逐步建立組織內部的度量與分析流程的基準。首先,以某公司之個案情境為例進行背景分析、目標分析和流程分析,接著以使用分析—使用案例及其描述之資訊需求,建議整合運用PSM Insight, MS Project及IBM Rational ClearQuest等工具來支援軟體專案度量與分析流程之自動化。經工具系統之實作展示,再以自我評鑑來檢視QMAP於CMMI度量與分析流程之目標及執行方法的符合程度,而部分未達成的項目則作為未來研究之方向。 / This research proposes a method called QMAP (Questions driven- Measurement and Analysis Process Planning) in order to meet goals and practices in Capability Maturity Model Integration (CMMI). QMAP is about 5W1H questions which begin with why, who, when, what, where and how. Before answering the 5W1H questions, we start with background analysis, goal analysis, and process analysis based on a sample company’s management context. Use Cases are then described as the formal information requirements of the MA process support system. In the implementation, we suggest to integrate some tools, such as MS Project, PSM Insight, and IBM Rational ClearQuest, to facilitate the measurement data collection and analysis activities during the software project development. After illustrating the implementation prototype, a checklist for self-appraisal is presented to identify the compliances of CMMI goals and practices, and the incomplete parts for future research extension.
90

以知識為基礎之軟體元件管理模式探討 / Development of the Knowledge-based Software Component Management Model

翁庭勇, Wong, Ting-Yung Unknown Date (has links)
一如個人電腦(PC)、筆記型電腦(NB)等硬體產業走向分工製造模式之際,近年來,台灣的軟體產業也試圖建置起一個完善的分工體系,以收專業化的實效;故現階段大型軟體專案的開發漸以多人、異地的團隊,在共同的軟體基礎架構上來進行。軟體業者分工的想法和硬體業者如出一轍,但在發展成果尚有一段的差距;透過Web Service技術,現階段之研究已能初步建立起以軟體元件為基礎之軟體產業的水平分工整合模式,然而在軟體元件的管理上(如元件的儲存、搜尋及檢索等),仍有很大的改善空間。 採行軟體元件分工模式來組裝、開發資訊系統,意味著系統整合廠商需能方便地取得符合其功能需求之軟體元件。基於此,若能建置一元件儲存庫,並提供完善的儲存、搜尋及檢索機制以提供系統整合廠商找尋其所需元件,應能提升軟體元件分工的成效。而一個良好的元件儲存庫應具備一系列完善的綱要(Schema),用來進行元件分類,並詳述儲存於元件庫內之元件的特性。 本研究之目的即在於發展出一個能支援軟體產業分工的軟體元件管理模式;以元件式軟體供應鏈水平整合為基礎,提出一軟體元件之分類綱要,及知識導向之元件儲存庫架構來儲存、搜尋、並檢索適用的軟體元件,同時,也期望透過元件知識推論專家系統的發展,來提升元件檢索之效益。另一方面,元件選擇流程中的元件評估階段也是本研究所要探討的主題。 / In recent years, the software industry in Taiwan attempts to build a complete system of division of labor to obtain the effectiveness of specialization as the computer hardware industry did in implementing the mechanism of supply chain management successfully. The idea of software component supply chain is similar to the concept of supply chain model of hardware industry. Although some models of horizontal integration of software industry have already been proposed, management mechanisms of software components are seldom considered in these models (ex: storage, searching, and retrieval). To effectively adopt the software component supply chain to achieve the horizontal division of labor, the system integration (SI) companies should be able to access software components, which conform to their functional requirements, conveniently. Therefore, if we can develop a component repository and a mechanism for storing, searching and retrieving the components in the repository. The purpose of this research is to develop a software component management model, which can support the division of labor in software component supply chain, based on the component-based software industry horizontal integration. Firstly, we will propose a descriptive schema to describe and to classify the software components. Secondly, we will use this schema to design a knowledge-based component repository, which is used for storing, searching and retrieving suitable software components. Also, we develop an expert system for inferring component knowledge in order to improve the performance of component retrieving. Finally, the component evaluation in the process of component selection will be important subjects to be addressed in this research.

Page generated in 0.0233 seconds