• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 33
  • 3
  • Tagged with
  • 36
  • 36
  • 28
  • 24
  • 20
  • 18
  • 11
  • 7
  • 7
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Mažos įmonės apskaitos sistemos analizė ir įvertinimas / Analysis and rating of small company account system

Švažinskas, Marius 04 January 2005 (has links)
The main purpose of this project was to analyze financial activity of chosen small company and to create the appropriate software tool. Using it, data are centralized, collecting and distributing between various subsystems like stocks purchase and storage, price calculation, produce sale and etc. Also here is compared the functionality of separate financial systems, which are adjusted to small companies.
2

Veiklos modelio taikymas vartotojo reikalavimų specifikacijos generavime / Enterprise model based generation of user requirements specification

Krūgelis, Edvinas 27 June 2014 (has links)
Veiklos modelio taikymas vartotojo reikalavimų specifikacijos generavime. / Enterprice Model Based Generation of User Requirements Specification.
3

Smukaus verslo įmonių informacinių sistemų kūrimo procesas / Small business information system development process

Šliogeris, Andrius 29 May 2006 (has links)
The importance of Information Technologies is growing continually. Small and Medium-sized Enterprises (SME) form the large part of Economy of each country. As a whole SME is the biggest client of Information and Communication Technologies in spite the fact they don't carry out big projects as corporate clients. Currently SME is the fastest growing segment of IT market. It contains the biggest number of companies which make IT development and buying decisions by themselves. For SME's, it is not always effective to built their information systems on the base of large standart packages. This Master Thesis demonstrates how to analyze, design and build accounting information system for small enterprise Lumen, producing the stomatologic equipment. The system is implemented using Access 2003 Database Management System and successfully used by Lumen personnel.
4

Geografinės informacinės sistemos mokyklinėje geografijoje (mokomoji medžiaga) / Geographic information systems in schools geography (learning materials)

Repečka, Linas 13 June 2005 (has links)
In early 60-ies of XX th century the computer is born and begin to inculcate in various range of life. Text data have been changed into digital databases. In late nineties computers becomes concurrent with our daily life. In year of 2001 government begins to fund computerizing of secondary schools in Lithuania. According, to analysis of situation in secondary schools computerization, we can admit that the level of computerization is high. Situation with geography computerization is quite comfortable too. It is good situation to begin apply GIS to secondary education. In year of 2002 a document of “Geography education standards for secondary schools” was realized, and GIS, as a part of geography, has his place in this document. Talking about textbooks of geography, it is only one of them that includes information about GIS (prepared by David Waugh), but considering to geography standards, to form informational skills of students, information about GIS in this textbook is insufficient. Looking for information about GIS we regarded of qualitative information standards, that is set by Education evolutionary centre. Information about GIS is divined into several rubric, they are: definition of GIS, history and birth of GIS, shape of data used in GIS, usage of GIS in modern world. It is important to overview all of those rubric as a main information that is needed to gain a modern calibre of geography. Introduction to GIS programs is important too. Because, at the moment, we don’t... [to full text]
5

Smulkios teisinės įmonės apskaitos sistema / Small juristical companies financial system

Merkys, Justas 29 May 2006 (has links)
Small juristical companies financial system The main purpose of this project was to analyze financial activity of chosen small company and to create the appropriate software tool. Using it, data would be centralized, and well protected. This system works in the Local Area Network. Also here is compared the functionality of various financial systems, which are adjusted to small companies. There are three types of users in the system – director, accountant and workers. The modeled activities are: • Director – has ability to edit information about company, it’s members, and also to insert/edit/delete all the information in the database and of course print reports. • Accountant – has ability to manage everything in this program. • Workers – have ability to view data in the database. The modern CASE tool “Rational Rose 2003” was used to design, create and analyze necessary diagrams. PHP and HTML programming languages were chosen to implement this system.
6

Šablonų naudojimas kuriant duomenų apdorojimo sistemas internete / Using Patterns for Development of Data Processing System on the Web

Rutkauskaitė, Ramunė 22 September 2004 (has links)
In this work object-oriented patterns were used for development of gata processing system on the Web. Nowadays a lot of systems are developing for they use in internet. In my final work these patterns were used: MVC, Page Controller, Front Controller, Intercepting Filter and others. Model-View-Controller pattern separates the modeling of domain, the presentation, and the actions based on user input into three separate classes: Model, View, Controller. This pattern is a fundamental design pattern for separation of user interface logic from business logic. Unfortunately, the popularity of the pattern has resulted in a number of faulty descriptions. Using a Page controller for a Web application is such a common need that most Web application frameworks provide a default implementation of the page controller. Most frameworks incorporate the page controller in the front of server page. Server pages actually combine the functions of view and controller and do not provide the desired separation between the presentation code and controller code.A common implementation of Page Controller invokes creating a base class for behavior shared among individual pages. Front Controller solves the decentralization problem present i Page Controller by chanelling all requests through a single controller. The controller itself is usually implemented in two parts: a handler and a hierarchy of commands. A straightforward implementation of Interceptong Filter is a filter chain that iterates through a... [to full text]
7

Informacijos saugumo rizikos analizės metodas informacinės sistemos kūrimo procese / Information security risk analysis method in process of developing information system

Neverbickas, Dainius 25 November 2010 (has links)
INFORMACIJOS SAUGUMO RIZIKOS ANALIZĖS METODAS INFORMACINĖS SISTEMOS KŪRIMO PROCESE Magistro darbo objektas – informacinės sistemos saugumas. Darbo tikslas – sukurti informacijos saugumo rizikos analizės metodą, kuris būtų tikslingai pritaikytas naudoti informacinės sistemos kūrimo procese bei padėtų padidinti jos saugumo lygį. Darbo uždaviniai: nustatyti pagrindinius rizikos valdymo principus bei palyginti populiariausias metodikas ir įrankius; įvertinti plačiai paplitusius rizikos analizės metodus; apibrėžti kuriamo rizikos analizės metodo etapus remiantis geriausiomis egzistuojančių metodų savybėmis; eksperimentu įvertinti sukurto metodo efektyvumą. Naudojantis literatūros šaltinių analizės, lyginamuoju, ekstrapoliacijos ir eksperimento metodais, darbe pateikti pagrindiniai informacijos saugumo rizikos valdymo ir analizės principai, palyginti populiariausi rizikos valdymo bei vertimo metodai ir įrankiai, sukurtas naujasis RAISKP rizikos analizės metodas bei įvertintas jo efektyvumas. Nustačius pagrindinius rizikos valdymo principus, paaiškėjo, jog norint efektyviai valdyti rizikas, būtina pastoviai vykdyti tokius etapus kaip: rizikos apimties apibrėžimas, rizikos vertinimas, rizikos tvarkymas, informavimas apie riziką, rizikos stebėjimas ir peržiūrėjimas. Rizikos valdymas padidina organizacijos stabilumą, nes kiekviena galima grėsmė yra numatoma ir jai pritaikomos apsisaugojimo priemonės. Lyginant populiariausius rizikos valdymo metodus, išryškėjo jų skirtumai ir panašumai... [toliau žr. visą tekstą] / Information security risk analysis method in process of developing information system Modern companies directly deal and depend on information systems. These companies are facing with complex issues of integrity, privacy and accessibility of information. The most effective way to shade from arising threats is information security management system. One of the most important stages of information security management system is risk management and analysis. Main information risk management and analysis tasks is to identify existing risks, estimate the possible influence towards the organization and select most suitable preventive measures for minimizing risk level. The object of the paper – security of the information systems. The aim of the paper – to create an information security risk analysis method, this could be applied in developing information system process and could increase security level. The tasks of the paper – are to determine the main risk management principles; compare the most popular methods and tools; evaluate widely spread methods of risk analysis; define main stages of new risk analysis method according to the best features of the existing methods; rate the efficiency of new method by the experiment. According to the literature analysis; comparative; extrapolation and experimental methods in the paper are introduced the main principles of security risk management and analysis; compared the most popular tools and methods of risk management and evaluation... [to full text]
8

Žinių naudojimo verslo informacinėse sistemose tyrimas / Investigation of knowledge use in business information systems

Valatkaitė, Irma 21 December 2004 (has links)
In the research of the business IS development the business rules approach has achieved a lot of attention and already has a steady niche with a strong motivation behind. The usefulness of the approach and its advantages over the traditional IS development approaches call for the technology standards. Despite the work done towards standardization there is still a way to go – commercial products use their unique modeling languages for business rules, most of their rules processing and enforcement engines are stand-alone, even the embeddable ones use their unique rules representation format. In our research focusing on the business rules we have stepped towards employing the widely spread technology of active databases and have argued that it is feasible and possible to model business rules using conceptual graphs. Such a model having representations in visual and textual form (linear form and CGIF) and the possibility to translate the model to the near natural English language can be used both at conceptual and implementation levels. We have designed and implemented the automatic trigger generation component. Using the representative example from the real business organization (the representative example was comprised of structural domain knowledge and corresponding business rules) we have carried out the experiment during which the business rules model was transformed from visual notation to CGIF, then from CGIF to XML, and then from XML to MS SQL Server trigger. The... [to full text]
9

Žinių naudojimo verslo informacinėse sistemose tyrimas / Investigation of knowledge use in business information systems

Valatkaitė, Irma 21 December 2004 (has links)
In the research of the business IS development the business rules approach has achieved a lot of attention and already has a steady niche with a strong motivation behind. The usefulness of the approach and its advantages over the traditional IS development approaches call for the technology standards. Despite the work done towards standardization there is still a way to go – commercial products use their unique modeling languages for business rules, most of their rules processing and enforcement engines are stand-alone, even the embeddable ones use their unique rules representation format. In our research focusing on the business rules we have stepped towards employing the widely spread technology of active databases and have argued that it is feasible and possible to model business rules using conceptual graphs. Such a model having representations in visual and textual form (linear form and CGIF) and the possibility to translate the model to the near natural English language can be used both at conceptual and implementation levels. We have designed and implemented the automatic trigger generation component. Using the representative example from the real business organization (the representative example was comprised of structural domain knowledge and corresponding business rules) we have carried out the experiment during which the business rules model was transformed from visual notation to CGIF, then from CGIF to XML, and then from XML to MS SQL Server trigger. The... [to full text]
10

Informacinių sistemų analizės ir įvertinimo metodika / Methodology for analysis and evaluation of information systems

Bručaitė, Justina, Ragėnas, Aldas 28 January 2008 (has links)
Darbo tyrimo sritis yra informacinių technologijų vertinimo metodologijos ir jų praktinis taikymas, detaliau nagrinėjamos COBIT (angl. Control Objectives for Information and related Technology) ir CMM (angl. Capability Maturity Model). Tyrimo objektas - vertinimo proceso kompiuterizavimas, problema - informacinių technologijų atitikimo įmonių veiklos poreikiams nustatymas. Tikslas yra suteikti galimybes įvertinti įmonių informacinių technologijų atitikimą jų veiklos poreikiams, sukuriant kompiuterizuotą vertinimo sistemą. / The problem of identifying the adequacy beside information systems and business needs exists in enterprises. This research work analyzes a few evaluation methodologies and proposes supporting software tool developed for this purpose on the base of integration of two methodologies - Control Objectives for Information and related Technology (COBIT) and Capability Maturity Model (CMM). The developed software tool allows to approach to the main purpose of this research work – to provide the opportunity to evaluate the adequacy beside information systems and business needs.

Page generated in 0.081 seconds