Spelling suggestions: "subject:"technologijos"" "subject:"technologijoms""
71 |
Efektyvus bevielio ryšio technologijų panaudojimas informacinėse sistemose / Effective use of wireless technologies in information systemsKunigėnas, Vygintas 08 September 2009 (has links)
Magistro darbo objektas – bevielės technologijos ir efektyvus jų panaudojimas informacinėse sistemose. Darbo tikslas – sukurti bevielėmis technologijomis grįstos informacinės sistemos modelį, kuriame atsižvelgiama į technologinius bei ekonominius veiksnius. Pagrindiniai darbo uždaviniai: išanalizuoti versle naudojamas bevielio ryšio technologijas, ištirti jų panaudojimo informacinėse sistemose galimybes bei panaudojimą įtakojančias savybes; išnagrinėti galimus bevielio ryšio technologijomis grįstų informacinių sistemų modelius, nustatyti, kokią įtaką jiems turi specifinės šių technologijų savybės bei ekonominiai veiksniai; sukurti bevielėmis technologijomis grįstos informacinės sistemos modelį, kuriame atsižvelgiama į technologinius bei ekonominius aspektus; atlikti mokslinį bevielių technologijų panaudojimo įmonėse tyrimą. Prieita prie išvados, kad bevielių technologijų panaudojimo verslo aplinkoje galimybės vertintinos atsižvelgiant ne tik į techninius faktorius, bet ir į finansinio sprendimo atsiperkamumo vertinimo rezultatus, panaudojimo galimybių analizę teoriniu pagrindu. Taigi, siekiant užtikrinti efektyvų bevielio ryšio technologijų panaudojimą tikslinga esamą modelių bazė praplėsti naujais modeliais, kuriuose apibrėžiami bevielių technologijų galimo panaudojimo aspektai. Suformuoti bevielėmis technologijomis grįstų IS modeliai, iš kurių analizės nustatyta, kad efektyvus bevielio ryšio technologijų IS panaudojimas galimas tik esant tvirtam teoriniam sprendimo... [toliau žr. visą tekstą] / While wireless technologies gain popularity in business environment they are rarely used as part of information systems. Lack of complex solutions covering technical aspects of technologies and theoretical aspects of information systems is felt, while new wireless technologies gain quick adoption in business. Fast spread of WiFi is followed by “WiMAX” – number of this technology based solutions is growing fast. But there is still lack of information systems models which would fit possibilities of current technologies and requests of modern business. Analysis of most popular wireless technologies is followed by conclusion, that only analysis of “WiMAX” and WiFi is logical considering native qualities of technologies analysed. Review of current information system models reveals, that decision making and expert systems can be treated as working on same model same as information and data processing systems can be also threaded. Analysis of existing information system models is fulfilled by adding qualities of wireless technologies and two new models of wireless technologies based information systems are formed. They both are based on essential models of decision making and information processing systems but use wireless technologies where its possible keeping in mind technical possibilities – in connecting input/output parts with main information systems components. These conclusions are followed by research of Lithuanian IT companies which concludes, that there is a high... [to full text]
|
72 |
Medicininių atliekų tvarkymo aspektai Lietuvoje / The management aspects of medicals wastes in the lithuaniaPetrikonytė, Inga 25 November 2010 (has links)
Darbo tikslas - išanalizuoti medicininių atliekų tvarkymo teisinius reikalavimus ir esamą jų tvarkymo padėtį Lietuvoje. Reikšmingiausias teisės aktas medicininių atliekų tvarkyme yra Lietuvos higienos norma HN 66:2008 „Medicininių atliekų tvarkymo saugos reikalavimai“. kurioje nustatyti konkretūs reikalavimai, nurodantys kaip išvengti medicininių atliekų neigiamo poveikio aplinkai bei žmonių sveikatai. Tačiau joje nereglamentuojama vieninga medicininių atliekų tvarkymo sistema visose asmens sveikatos priežiūros įstaigose. Lietuvos pagrindiniai teisiniai reikalavimai prilyginti Europos Sąjungos direktyvoms 2006/12/EB dėl atliekų ir 91/689/EEB dėl pavojingų atliekų. Būtina LR teisės aktus papildyti tais direktyvų punktais, kurie liko neįtraukti ir konkrečiai įrašyti: • kad atliekos būtų panaudotos ar pašalintos nesukeliant pavojaus vandeniui, orui, dirvožemiui, augalams ir gyvūnams; nesukeliant triukšmo ar kvapų; nedarant ar nesukeliant neigiamo poveikio kraštovaizdžiui ar ypatingai svarbioms vietovėms; • LR Atliekų tvarkymo įstatyme ir LR Atliekų tvarkymo taisyklėse, kad valstybės narės imasi reikiamų priemonių, kad surenkamos atliekos būtų tinkamai supakuotos ir paženklintos pagal galiojančius tarptautinius ir Bendrijos standartus. Lietuvos medicininių atliekų tvarkymo raida yra panaši į išsivysčiusiose užsienio valstybėse vykusią raidą. Dabartiniu metu Lietuvoje medicinines atliekas degina tik specializuoti jų deginimo įrenginiai, tam tikrose ligoninėse naudojamos... [toliau žr. visą tekstą] / The purpose of the work is traverse management jurisdicals demands of medicals wastes and theirs management situation in Lithuania. The most important the rule of law in medical wastes management is the Lithuania hygiene rule HN 66:2008 „The safety demands of medicals wastes management“, where fixed concretes demands, which is directing how escape negative impact for environment and human health from medicals wastes. But in it is not directing solid management system of medicals wastes, in all personal medical care house. The principals juridicals demands in Lithuania are equates for Europe Union directives 2006/12/EB for wastes and 91/689/EEB for dangerous wastes. It is essential to replace the jurisdicals acts the Respublic of Lithuania thats directives articles, some stay is not including, and specifically enter: • that wastes it would be used or elimintes unprovoke danger for water, air, soil, plants and animals; unprovoke noise or smells; do not negative impact for the landscape or specially for important localitys; • in the wastes management act of the Respublic of Lithuania, and in the wastes management rules, that the state members will have been starting propers means, that the electives wastes would be in due to packed and marked by the international and standard standing of Community. The medicals wastes development of Lithuania is liking to quondam development in the developments foreigns states. For the present in Lithuania the medicals wastes are incinerate only... [to full text]
|
73 |
Informacinių technologijų naudojimas šiuolaikiniame civiliniame procese / Use of information technology in nowadays civil procedurePetravičiūtė, Agnė 09 July 2011 (has links)
Magistro darbo tema – „Informacinių technologijų naudojimas šiuolaikiniame civiliniame procese“. Darbe analizuojama, kokiais būdais informacinės technologijos gali būti panaudojamos civiliniame procese, kokią tai turėtų įtaką kai kuriems civilinio proceso principams – proceso operatyvumui, ekonomiškumui, greitumui, efektyvumui ir kitiems. Daugiausia dėmesio magistro darbe skiriama atskiriems informacinių technologijų panaudojimo civiliniame procese klausimams: procesinių dokumentų rengimui ir įteikimui, informacinių technologijų naudojimui įrodinėjimo procese, vaizdo ir telekonferencijų naudojimui, teismo proceso fiksavimui moderniomis priemonėmis, bylos medžiagos kaupimui elektronine forma bei teismų darbo kompiuterizavimui. Atskirai aptariama, kokią įtaką informacinės technologijos, naudojamos civiliniame procese, turi asmens duomenų ir teisės į privatumą apsaugai. Darbe naudojami loginis, sisteminis, aprašomasis, analitinis metodai, remiamasi dabar galiojančių teisės aktų analize bei teisės aktų projektais. Ypač daug dėmesio skiriama užsienio valstybių praktikai analizuojamų klausimų aspektu, aptariant kai kurių autorių mokslinius straipsnius. / The thesis of the master degree paper work is “Use of information technology in nowadays civil procedure“. Work analyses the possibilities of usage of information technology in civil procedure, and how it would impact some principles of civil procedure – efficiency of the process, cost-effectiveness, time-efficiency, effectiveness and other. Paper work mostly concentrates on separate issues of usage of information technology in civil procedure: preparation and service of procedural documents, usage of electronic evidence in the court process, usage of video and teleconferencing, using modern technologies to capture the process of the case, collecting all related documents of the case in electronic form, and computerizing management of courts. Separately the work discusses the impact of information technology usage in the civil procedure to the protection of personal data and right to privacy. Logical, systematical, descriptive, and analytical methods are used in the paper work, besides the work is based on the analysis of the current law and the projects of laws. Very big attention is for analysis of practice of foreign countries in the view of the considered issues, also taking into consideration the articles of some scientists.
|
74 |
Kompiuterinės ir biuro technikos apskaitos sistema / Stocktaking information system of computer and office equipmentKulieša, Remigijus 08 January 2006 (has links)
The information system created performs the following functions: standardizes the process of failure registration and management; allows monitoring and receiving information in different sections adapted for certain groups; provides opportunity to evaluate the existing situation of provision with equipment and plan future investments within time scale; allows service of a whole group of users in one time. The information system has been created by using open source software – which enables to avoid additional investments.
|
75 |
Nekilnojamojo turto informacinė sistema / Information system of real estateKučiauskas, Artūras 18 January 2006 (has links)
Nowadays, the work of any concern or organisation that uses modern methods is highly related to computerised information system, which helps the organisation in solving and implementing various tasks that arise during its work. The prototype of Lithuanian interface software that was created during the project is dedicated to small real estate agencies to collect and manage the information on real estate objects and orders that were registered in the agency. The product suits managers of real estate agencies best. Using the following software it is possible to search through the real estate objects that are registered in the system, print the information needed, view the records, register orders, objects related to the orders and all the information related to the implementation of an order. This software will give the managers of organisations the possibility of fast comparing between the real estate objects under various criteria and to select the variants that suit the customer best. The creation of the system involved several main stages. First, it was necessary to specify the requirements for the future system. The second stage involved designing and programming of the system itself using Microsoft Visual Studio 2005 tools and Visual Basic programming language. At the end, the process involved testing of the system and writing the thorough user manual.
|
76 |
Programų sistemos vartotojų teisių valdymo modelis ir jo tyrimas / The software system users authorization management model development and researchJanulevičius, Kęstutis 31 May 2006 (has links)
In security engineering and computer security, authorization, is a part of the operating system that protects computer resources by only allowing those resources to be used by resource consumers that have been granted authority to use them. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the computer. Authorization process makes use of the authentication process to identify consumers. When a consumer tries to use a resource, the authorization process checks that the consumer has been granted permission to use that resource. Permissions are generally defined by the computer's system administrator in some types of "security policy application", such as an access control list or a capability, on the basis of the "principle of least privilege": consumers should only be granted permissions they need to do their jobs. Older and single user operating systems often had weak or non-existent authentication and authorization systems. "Anonymous consumers" or "guests", are consumers that have not been required to authenticate. They often have very few permissions. On a distributed system, it is often desirable to grant access without requiring a unique identity. Familiar examples of authorization tokens include keys and tickets: they grant access without proving identity.
|
77 |
Geometrinių transformacijų sistema / Geometrical transformation systemStaugaitis, Žygimantas 05 June 2006 (has links)
The main aim of the project is to develop a 2D and 3D geometrical transformation training program. The goal of research is to analyse geometrical transformation practical usage. The existing geometrical transformation systems and new developed system are reviewed. The object oriented design was used to develop a system. 2D and 3D geometrical transformation viewing, task generating and its solving training system was developed.
|
78 |
Bendrojo lavinimo mokyklos intranetinės mokymo(si) sistemos kūrimas ir tyrimas / Implementation and investigation of intranet-band teaching system in general education schoolRudžionienė, Ineta 05 June 2006 (has links)
School is the most important organization in the process of creating educational community, because there is a place where citizens of this community are raised. Schools computerization gets most attention. Analyzing existing intranet based learning systems and creating system, witch is designed for general education schools to improve their students ant teachers work, are object of postgraduate studies work. This system allow schools to corporate, share information, studying plans and information. Created system can be used in all general education schools. This system can be reused in schools which has special purpose. System is designed for virtual learning and communications between students and teachers, for sharing and using educational information, for analyzing marking and learning results, creating summaries. Teachers can: • create studying plans; • deliver theoretical educational information; • create tests; • mark students work at lessons and tests. Students can: • use educational information, which teacher offer them; • communicate with other students and teachers; • take tests; • check for their marks. System can be useful for parents of students. Trey can check their child marks from their home.
|
79 |
Lazerio spinduliuotės ir ultragarso kombinuotas poveikis plienui / The combined influence of laser radiation and ultrasound on steelValys, Saulius 12 June 2006 (has links)
Recently among different ways of processing of materials the combined processing is applied. Applying different complex methods of processing of a surface of materials, it is possible to reduce a roughness of a processable surface, to increase thickness of a layer of the processed surface, to increase stability to wear process and microhardness. The further prospects in processing metals are opened with use of laser radiation and ultrasonic fluctuations. It is possible to notice, that complex ways of processing of metals are still not so widely investigated. This work is intended for research of a structure of steel in the field of influence of the combined laser radiation and ultrasonic fluctuations. It is established, that applying ultrasonic fluctuations at technologies of laser processing metals, it is possible to reach more uniform distribution of impurity in a surface of metal, to level a relief of the processed surface.
|
80 |
Veiklos procesų vykdymo modeliavimas, taikant UML veiklos grafus / Workflow modelling using UML activity diagramsGudonavičius, Linas 31 May 2004 (has links)
In this thesis are analysed correctness for verification ability of UML activity diagrams by using hypergaphs. There suggested the transformation from UML activity diagram to hypergraph and verification algorithm of hypergraph, which can be used for expanding the capabilities of CASE tools for workflow and e-business modelling.
|
Page generated in 0.0515 seconds