• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 479
  • 268
  • 38
  • 35
  • 30
  • 22
  • 12
  • 11
  • 10
  • 9
  • 7
  • 4
  • 3
  • 3
  • 3
  • Tagged with
  • 1076
  • 459
  • 409
  • 368
  • 367
  • 343
  • 129
  • 127
  • 123
  • 122
  • 108
  • 108
  • 106
  • 102
  • 101
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
181

Specifying Class constraint and operation using Object Constraint Lanugage

Liu, Chi-liang 03 February 2006 (has links)
Today, modeling the software with unified modeling language (UML), model driven architecture (MDA) concept, and computer-aided software engineering (CASE) tool are the main trend for the objected-oriented systems analysis and design. Furthermore, to enhance the degree of transformation automation and design reuse in the system development process, object constraint language (OCL) is used in UML modeling to specify the navigation, constraint, operation specification, and so forth. However, the guideline for using OCL in class diagram specification and its transformation to JAVA code is lacking. This research presents an approach utilizing the OCL to specify the constraint and operation specification for the class diagram when modeling the platform independent model (PIM), which can then be transformed into the JAVA platform specific model (PSM) and code using a CASE tool. A real-world case using the integrated techniques is presented and a CASE tool is used to illustrate the concepts, application, and the advantages of using the proposed approach. With this approach, the system developer can transform PIM into PSM and code automatically and thereby enhance the efficiency of system development.
182

A Study of Employee¡¦s Acceptance on Enterprise Knowledge Management System - The case of China Steel Corporation.

Hsieh, Ying-pin 24 May 2006 (has links)
In the age of knowledge-based economy, knowledge has been replacing land, labor, capital and equipment and becoming one of the most important production factor. Facing the global, violent competition and management environments like rapid technology improvement, fast speedy, service and customer orientation, employee dispersion and high levels of manpower flow, and close corporation relation, enterprises which can create, accumulate, manage and use knowledge efficiently will develop forever. This is why more and more enterprises implement knowledge management to transfer employees¡¦ experiences and knowledge into organizational knowledge. Enterprises use knowledge management as the foundation of organizational development and innovation to shorten learning curve, promote firms¡¦ productivities and to innovate economy value. Knowledge management has become the mainly management strategy. Enterprise¡¦s installation of knowledge management system is the important part of knowledge management, and it is inevitable to enhance the efficiency of knowledge management. The expenses are high for knowledge management system in software, hardware, installation and training, while the profits depend on employees¡¦ acceptance and actual use. This study uses the ¡§Unified Theory of Acceptance and Use of Technology/ UTAUT¡¨ as the basis, and considers the characters of knowledge management system and users to determine the structure. So enterprises can use it for reference in planning, installing and valuing knowledge management system. After analyzing the data, the main results of this study are as follows: 1. Influencing employees¡¦ acceptance factors on system are job performance, ease of use, corporation support and facilitating conditions. 2. Significant positive correlations are identified among job performance, ease of use, corporation support, facilitating conditions, intension to use and actual use. 3. The factors of influencing on system¡¦s intension to use are job performance and ease of use. And the factors influencing system¡¦s actual use are job performance and facilitating conditions. Intension to use influences actual use directly. 4. Employees with different characters have different degrees of attention on different factors. 5. Job performance is the mainly influencing factor for employees on the degree of system acceptance.
183

A Study of Employee¡¦s Acceptance on Supply Chain Management System - The case of China Steel Corporation.

Cheng, Ying-Chou 30 May 2006 (has links)
Facing the change of administration environment and the impact of business globalization, it is getting clear that the trend of taking transnational administration and work allocation by firms. Developments in process reengineering and information technology result that Supply Chain Management(SCM) offers an excellent approach for firms to create higher competitiveness. So, in the emerging supply chain versus supply chain competitive environment, the ultimate success of the individual businesses will depend not only on the advantage in competitiveness they posses, but on management¡¦s ability to enhance powerful SCM system. Posco, CSC¡¦s main competitor, in Korea has implemented process innovation and SCM system recently. Both NSC in Japan and Boa Steel in mainland China are establishing SCM system. CSC also establishes SCM system now to accelerate the promotion of his productivity. Based on ¡§the Unified Theory of Acceptance and Use of Technology¡¨(known as UTAUT), this study considered the property of CSC and applied existing measurement scale with some modifications. Totally, 170 samples were collected from the department related to SCM system. In this study, we analyzed the employee¡¦s acceptance by means of Factor Analysis, Correlation Analysis and Multiple Linear Regression. The major conclusions derived from this research are: 1.The employee¡¦s acceptance of SCM system is high. 2.There are 4 key factors: Usefulness, Supporting, Ease of Use, and Incentives, which are extracted from this study significantly and positively related to employee¡¦s behavior intention. 3.Usefulness and Supporting both influence employee¡¦s behavior intention significantly. Moreover,Usefulness is the most important factor of all. 4.Different control variables influence employee¡¦s acceptance indirectly on each dimension.
184

The Theory and Practice of The Veto Power At Taiwan Local Government

Luo, Ryh-chuen 15 June 2006 (has links)
Taiwan area has administered local autonomy for over fifty years. At first its authority was mainly based on an administrative order called the Guidelines for Local Autonomy and then the Local System Law at present. Among the powers vested by the law, veto is an important weapon for the local administration to balance legislative power. However, the veto power has yet to be further elaborated for it was used in just a little more than 500 cases all over Taiwan area in the past sixty years. This essay tries to probe both the theoretical and practical facets of the veto system. The local system of this country adopted an administration and legislature separation system. In case a conflict should occur between the two powers, its time for veto to help solve the dilemma. As a matter of fact, government is responsible for proposing important bills, the officials can defend its policies while attending the legislature for interpellation or proposal deliberation. In addition, budgets are only proposed by local administrations. Local legislatures are restrained from increasing the sizes of the proposed budgets by law. So while deliberating on draft resolutions, the legislature would consider officials¡¦ opinions and not to make less feasible resolutions. Despite an unfeasible resolution should be made, the administration would rather seek other ways out than veto it in order to maintain the harmony between the two powers. More over, the content of the Local System Law has put more weight on administration power so as to make the legislature conservative in enforcing its power lest its resolutions should be vetoed. In recent years, democracy has enrooted into the daily lives of the society; Local political environment change drastically and divided government is now a commonplace; Local cliques have either reformed or vanished; Gangsters and money politics enter local legislatures and struggle for personal interests. The administrations are facing an overwhelmingly new eco system in local legislatures. Comparing the factors that induce a veto, it is found that the conflict for personal interest is the most common cause. The veto system is a mechanism of instrument equilibrium. Administration and legislation should stand on an equal position to discuss veto dispute to reach the purposes of the separation of powers between the executive and legislature. This essay suggests the central government that the time limit, quorum, scope and method in deliberating a veto should be explicitly defined in law so as to make sure a healthier veto system.
185

Modeling the User Interface of Web Application with UML For MDA Transformation

Jhan, Yin-Yun 21 June 2006 (has links)
This study presents a systematic methodology which integrated the model driven architecture with object-oriented technique to transform the user interface (UI) platform independent model (PIM) into Web-based UI platform specific model (PSM), and then into code model. A real-world case using the integrated techniques is presented and the Rational Rose is used to illustrate the concepts, application, and the advantages of using the proposed methodology. With this approach, the system developer can transform UI PIM into Web-based UI PSM and code automatically and thereby enhance the efficiency of system development.
186

Specifying Design Patterns with Object Constraint Language

Hsieh, Kun-Ta 19 July 2007 (has links)
Today, unified modeling language (UML) has become a standard modeling language in object-oriented systems analysis and design. Over the past few years a considerable effort has been made in synthesizing UML, MDA (model driven architecture), design patterns and CASE tool to increase the productivity of the system development. Specifying the design patterns with object constraint language (OCL) has become a main trend in this area. This study classifies the OCL expressions and design patterns and presents a method to specify each design pattern with the OCL and UML when modeling the platform independent model which can then be transformed into the platform dependent model, and to a code model. A real-world case using the integrated techniques is presented and a CASE tool is used to illustrate the concepts, application, and the advantages of using the proposed approach. With this approach, the system developer can transform PIM into code automatically and thereby enhance the efficiency and reusability of system development.
187

An Alternative Normal Form For Elliptic Curve Cryptography: Edwards Curves

Mus, Koksal 01 September 2009 (has links) (PDF)
A new normal form x2 + y2 = c2(1 + x2y2) of elliptic curves was introduced by M. Harold Edwards in 2007 over the field k having characteristic different than 2. This new form has very special and important properties such that addition operation is strongly unified and complete for properly chosen parameter c . In other words, doubling can be done by using the addition formula and any two points on the curve can be added by the addition formula without exception. D. Bernstein and T. Lange added one more parameter d to the normal form to cover a large class of elliptic curves, x2 + y2 = c2(1 + dx2y2) over the same field. In this thesis, an expository overview of the literature on Edwards curves is given. First, the types of Edwards curves over the nonbinary field k are introduced, addition and doubling over the curves are derived and efficient algorithms for addition and doubling are stated with their costs. Finally, known elliptic curves and Edwards curves are compared according to their cryptographic applications. The way to choose the Edwards curve which is most appropriate for cryptographic applications is also explained.
188

Modeling the User Interfaces: A Component-based Interface Research for Integrating the Net-PAC Model and UML

Tsai, Shuen-Jen 06 June 2002 (has links)
Graphical user interface (GUI) has become the key element of modern information systems and is commonly viewed as one of the decisive factors for the success of an information system project. To help develop effective GUIs, many tools have been introduced by software vendors to meet the needs of designing a variety of interfaces. Such modern design tools offer system developer vehicles to create sophisticated GUI with a few codes. However, the complicity of many GUIs and the varying expectations among users, designers and developers make the communication among them and the use of most prevailing design tools a real challenge. An integrated tool for better design and development of GUIs may help alleviate the problems caused by the mis-communication and the knowledge gaps existing among users, designers and developers. In this paper, a new design tool, which integrates the GUI design techniques embedded in Unified Modeling Language (UML) and the Presentation-Abstraction-Control (PAC) model in Web environment (Net-PAC) is proposed. The potential problems of using vendor-provided design methodology will be presented. Special features of the proposed integrated tool will then be discussed. Some real-world cases using the integrated techniques will be presented to illustrate the advantages of using proposed methodology.
189

The Research of Instant-Messaging User Behavior

Hung, Jung-chih 14 May 2008 (has links)
Instant Messaging ¡]IM¡^ has becomes an important tool of communication. Currently, eighty percent of the Internet users use IM to communicate each other. This study uses the dimensions of performance expectancy and effort expectancy of the Unified Theory of Acceptance and Use of Technology and the interpersonal communication need to investigate factors that influence IM acceptance. There are 211 completed questionnaires were returned and analyzed. It¡¦s found that performance expectancy, effort expectancy, and interpersonal communication show significantly positive and significant impacts on IM users¡¦ intention. The intention significantly and positively affects their IM usage. According to the results, it¡¦s suggestted that IM software should make the IM more user-friendly and the software interface is not too complicated, so that users might feel that IM software is easy to use.
190

A Unified Approach to Quantitative Software Lifecycle Modeling

Rao, Vijay D 08 1900 (has links)
An evolutionary process currently taking place in engineering systems is the shift from hardware to software where the role of software engineering is becoming more central in developing large engineering systems. This shift represents a trend from a piece-meal vision of software development to a holistic, system-wide vision. The term "software crisis" of 1960's and 1970's was the observation that most software development projects end up with massive cost overruns and schedule delays. The growing complexity of software projects led to Waterfall, Spiral and other models to depict the software development lifecycle. These models are qualitative and study the product, process and project issues in isolation, and do not provide a quantitative framework to depict the various facets of development, testing, maintenance and reuse. In this thesis, a generic, unified lifecycle model (ULM) integrating the product, process and project view of software development based on re-entrant lines is proposed. A reentrant line is a multi-class queueing network that consists of several types of artifacts visiting a set of development teams more than once. An artifact is a general term for any object of information created, produced, changed or used by development teams and it includes items such as requirements specification documents, preliminary and detailed module designs and design documents, code, components, test plans and test suites. The artifacts visit the development teams several times before exiting the system, thus making the flow of artifacts non-acyclic. The main consequence of the re-entrant flow is that several artifacts at different stages of completion compete with each other for service by a development team. The ULM model output is obtained by using the criticality, complexity and usage of artifacts. The model is solved using linear programming and simulation methods. The software development process in a software organisation is represented by the proposed re-entrant line model. The model is used to predict project metrics such as the development time, cost and product quality for any new project to be taken up by the organization. The routing matrix of the artifacts in the ULM can be modified to derive different types of lifecycle models such as Waterfall, Prototyping, Spiral and Hybrid models. The ULM may be modified to include software reuse and component-based development. We investigate certain issues involved in software reuse. Reuse of components is modeled as an external arrival of artifacts at different stages in the ULM. Two distinct lifecycles in component based software development, namely, 'development for reuse' and 'development with reuse', are distinguished and the development time and cost for projects are estimated using LP bounds and simulation. The 'development for reuse' lifecycle involves reusable components development that is stored in a reuse library. As the number of components in the reuse library grows over time and with projects, the problem of effective and efficient retrieval of candidate components in order to facilitate systematic reuse becomes the bottleneck. A novel approach where components are stored in a case-base is proposed. The retrieval process is based on a reasoning approach that relies on similar cases (components) in the past to find solutions to the current problem (new software requirements in projects). The selection of candidate components for decisions pertaining to four levels of reuse {reuse as-is, reuse with minor code modifications, reuse of specifications, no reuse or develop afresh} in the current application is modeled using Rough and Fuzzy sets. These methodologies are illustrated with suitable case studies. Maintenance of legacy systems, representing a massive, long-term business investment, is an important but relatively new research area. The ULM is modified to depict the complex set of activities associated with software maintenance. Quantitative metrics such as release time of versions, cost, time and effort for maintenance are estimated using this model. Some of the specific contributions of this thesis are: 1. A unified quantitative lifecycle model (ULM) depicting the software development process is used to obtain project metrics such as development cost, development time and quality based on the product and process attributes for the Waterfall, Prototyping, Spiral and Hybrid lifecycle models. 2. Analytic hierarchy process (AHP) methodology is used to rank order the suitability of different lifecycle models for a new development project at hand, based on the metrics obtained from ULM. 3. The ULM is modified to depict component-based software development and to integrate reuse as an important basis for software development. Two distinct lifecycles for development for reuse and development with reuse are studied. The 'development for reuse' strategy generates reusable components that are organized and stored in a reuse library. The selection-decision regarding candidate components from this library for reuse in the current application is derived using a Rough and Fussy set methodology. 4. The ULM is adapted to represent the various activities associated with software maintenance. Estimates of maintenance metrics for different strategies of maintenance of legacy systems are obtained.

Page generated in 1.4107 seconds