To see the other types of publications on this topic, follow the link: Information technology programs.

Dissertations / Theses on the topic 'Information technology programs'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Information technology programs.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Randall, Michael H. "Information technology certification programs and perceptions of attitude and need by high school principals, information technology teachers, and information technology professionals in Ohio." Columbus, Ohio : Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1141334061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Brown, Steven Lee. "A study of persistence factors of nontraditional students enrolled in noncredit information technology programs in the Advantage Valley Community College Consortium." [Huntington, WV : Marshall University Libraries], 2008. http://www.marshall.edu/etd/descript.asp?ref=853.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chao, Hoi Ka. "Application of digital watermarking technology in Java programs." Thesis, University of Macau, 2005. http://umaclib3.umac.mo/record=b1445900.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Khan, Gillian. "Investigating the need for costing and estimating in information technology academic programs at technikons." Thesis, Peninsula Technikon, 2005. http://hdl.handle.net/20.500.11838/1380.

Full text
Abstract:
Thesis (MTech (Information Technology))--Peninsula Technikon, 2005<br>"This study was initiated to determine whether cost estimation is a necessary skill for an Information Technology (IT) consultant. The historic poor record in the software industry for delivering software projects within budget has highlighted a need for IT students to receive adequate preparation for future experiences in the world of work especially if they were to become self-employed. The literature revealed that a variety of employability skills are required when preparing students for entrepreneurship. In IT there is a particular need for project management skills when the entrepreneur is responsible for all aspects of the software project. Cost estimation is a key function of project management.
APA, Harvard, Vancouver, ISO, and other styles
5

Richardson, Patricia Mary. "A study of some effects of information technology programs on Emirati women students' lives." Thesis, University of Bristol, 2002. http://hdl.handle.net/1983/15db8b50-8312-49c1-8ba2-fcfcf9691bba.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Thomason, Gary W. "High throughput tactical wireless networking for surveillance and targeting in a coalition environment an analysis of the next generation IEEE 802.11n equipment and standard." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FThomason.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2005.<br>Thesis Advisor(s): James Ehlert, Brian Steckler. Includes bibliographical references (p. 63-65). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
7

Rehman, Saif. "The Perceptions of Costs and Benefits of Affirmative Action Public Procurement Programs by Racial Minority Business Owners." Thesis, Northcentral University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10131564.

Full text
Abstract:
<p> Affirmative action public procurement programs (AAPPP) stem from legislation related to the Civil Rights movement. Debates about program usefulness and relevance have occurred as well as court decisions challenging not only the legality of these programs, but their very existence. The problem is that, although minority small businesses are fast-growing, access to public procurement opportunities is minimal. An assessment of the perceived social and economic impact of affirmative action public procurement programs between participants and non-participants could provide needed information to inform stakeholders more about how these programs are experienced. The purpose of this quantitative quasi-experimental causal-comparative (ex post facto) study was to determine whether minority business owners who have participated in AAPPP perceive the economic benefits, economic costs, social benefits, and social costs in minority businesses differently than non-participants. A random sample of 128 minority business owners seeking government contracts in the information technology field participated in this study. The participants were requested to complete a survey to assess their perceptions of affirmative action public procurement program participation on its economic benefits, economic costs, social benefits, and social costs. The findings showed AAPPP participants and non-AAPPP participants perceived economic costs and economic benefits similarly. The findings also showed AAPPP participants perceived both the social costs and benefits significantly greater than non-participants. Although the findings lend support for the continued use of these programs, the results paradoxically lend some support for their discontinuance. Without any overwhelming evidence to the contrary, it can be argued that continuing with these programs is necessary, since an inherent form of discrimination based on race or gender within the economic system still appears to exist, although not coherently depicted or understood. </p>
APA, Harvard, Vancouver, ISO, and other styles
8

McClellan, Shirley M. "Decision-Making on Technology Deployment for Online Programs at Historically Black Institutions." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2611.

Full text
Abstract:
Historically Black colleges and universities (HBCUs) lag behind predominantly White institutions in their production of online courses and degree programs because of nonexistent or inadequate technology training for faculty members and limited financial resources. The purpose of this qualitative comparative case study was to obtain insight into how decisions are made on technology deployment and integration of online programs at HBCUs. Guided by Donaldson's contingency theory, this case study addressed how decisions are determined at HBCUs to integrate online learning programs into the curriculum and how the individuals who make these decisions perceive online learning programs. Survey responses were collected from 16 administrators, chief information officers, and faculty department heads at 3 HBCUs. Frequency data from the surveys led to themes were confirmed by the analysis of interviews and campus documents. Emergent themes included the integration of online programs, interest in online learning, incentives/compensation and release time, mission and goal statements, strategic plans, and professional development. All 3 HBCUs have a process in place for measuring progress and updating strategic plans. Only 1 HBCU had incentives to encourage faculty or administrators to participate in technology deployment, although all 3 HBCUs offered professional development courses and seminars. Online learning was not included in any of the 3 HBCUs' mission and goal statements. Faculty interest in teaching online courses was high at 2 of the HBCUs. Among the implications of these findings for research and practice was the possibility of promoting positive social change through developing and applying improved strategies for technology deployment at HBCUs that might provide better services to students.
APA, Harvard, Vancouver, ISO, and other styles
9

Vattam, Swaroop. "Interactive analogical retrieval: practice, theory and technology." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45798.

Full text
Abstract:
Analogy is ubiquitous in human cognition. One of the important questions related to understanding the situated nature of analogy-making is how people retrieve source analogues via their interactions with external environments. This dissertation studies interactive analogical retrieval in the context of biologically inspired design (BID). BID involves creative use of analogies to biological systems to develop solutions for complex design problems (e.g., designing a device for acquiring water in desert environments based on the analogous fog-harvesting abilities of the Namibian Beetle). Finding the right biological analogues is one of the critical first steps in BID. Designers routinely search online in order to find their biological sources of inspiration. But this task of online bio-inspiration seeking represents an instance of interactive analogical retrieval that is extremely time consuming and challenging to accomplish. This dissertation focuses on understanding and supporting the task of online bio-inspiration seeking. Through a series of field studies, this dissertation uncovered the salient characteristics and challenges of online bio-inspiration seeking. An information-processing model of interactive analogical retrieval was developed in order to explain those challenges and to identify the underlying causes. A set of measures were put forth to ameliorate those challenges by targeting the identified causes. These measures were then implemented in an online information-seeking technology designed to specifically support the task of online bio-inspiration seeking. Finally, the validity of the proposed measures was investigated through a series of experimental studies and a deployment study. The trends are encouraging and suggest that the proposed measures has the potential to change the dynamics of online bio-inspiration seeking in favor of ameliorating the identified challenges of online bio-inspiration seeking.
APA, Harvard, Vancouver, ISO, and other styles
10

Moore, Michael Courtney. "The CADET Training Program Versus the Student Certification Program: A Study of IT- Support Training Programs at Western Kentucky University." TopSCHOLAR®, 2014. http://digitalcommons.wku.edu/theses/1435.

Full text
Abstract:
Technology is a critical component of modern-day success. Advancements in technology have improved communication between individuals and companies. Technological advancements have allowed students to earn college degrees online. People who habitually use technology expect a high level of performance and support. As new technologies are implemented, such as complex web services or new operating systems, the dependence for information technology (IT) support grows in demand. Even learning curves can be cumbersome without proper assistance from IT professionals. Companies and institutions must accommodate user needs by implementing fast, efficient, and friendly support. In order to offer optimal customer support, representatives must be knowledgeable of the products and services that are supported. At Western Kentucky University’s (WKU) IT Helpdesk, a training program called Consultant Accelerated Development and Education in Technology (CADET) focuses on software, hardware, customer service, and procedures mandated by the IT Division. Prior to CADET, the Student Certification program was used to train student consultants. The Student Certification program was developed to satisfy training needs that allowed consultants to support end-user technical issues. CADET was developed in 2008 to replace the Student Certification program. This study explored the question if CADET training is more effective in preparing consultants to do their jobs than the Student Certification program. The study investigated the effectiveness of CADET training compared to the Student Certification program by surveying IT Helpdesk student consultants. The survey results indicated which program was more adequate. Both programs contained the same training content, but training delivery methods differed. A t-test was used to compare both programs and determine the outcome of the study’s hypotheses. The Student Certification program did not accommodate different learning styles. The teaching methods only included traditional classroom-style delivery. CADET training did accommodate different learning styles, delivering training through a wide variety of formats including video, audio, assessment, assignment, and face-to-face training. The research focused on the importance of addressing different learning behaviors. The study suggested that CADET is more adequate in preparing students to do their job duties. When both Student Certification survey and the CADET survey were compared, CADET training is more adequate in 26 out of the 27 training sessions. The results suggested that learning style accommodation is directly related in the success in the CADET training program over the Student Certification program.
APA, Harvard, Vancouver, ISO, and other styles
11

Mohleji, Nandita. "Decision Modeling Framework to Minimize Arrival Delays from Ground Delay Programs." Thesis, The George Washington University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3740141.

Full text
Abstract:
<p> Convective weather and other constraints create uncertainty in air transportation, leading to costly delays. A Ground Delay Program (GDP) is a strategy to mitigate these effects. Systematic decision support can increase GDP efficacy, reduce delays, and minimize direct operating costs. In this study, a decision analysis (DA) model is constructed by combining a decision tree and Bayesian belief network. Through a study of three New York region airports, the DA model demonstrates that larger GDP scopes that include more flights in the program, along with longer lead times that provide stakeholders greater notice of a pending program, trigger the fewest average arrival delays. These findings are demonstrated to result in a savings of up to $1,850 per flight. Furthermore, when convective weather is predicted, forecast weather confidences remain the same level or greater at least 70% of the time, supporting more strategic decision making. The DA model thus enables quantification of uncertainties and insights on causal relationships, providing support for future GDP decisions. </p>
APA, Harvard, Vancouver, ISO, and other styles
12

Gundrum, Kyle. "INTERalliance of Greater Cincinnati: Connecting High School Students with Information Technology Career Pathways." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1504871611177919.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Register, Michael G. "Justifying the means| Electronic domestic surveillance programs before and following the September 11, 2001 terrorist attack on the United States." Thesis, Utica College, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10155656.

Full text
Abstract:
<p> Throughout the years, the United States government and local law enforcement has used electronic domestic surveillance for criminal justice purposes. Shortly after World War II, the government began to abuse the power of electronic domestic surveillance for the purposes of gathering intelligence on American citizens. After the September 11, 2001 terrorist attacks on the United States, electronic domestic surveillance focused heavily on American citizens in the name of national security. The government has a duty to protect the United States and American citizens. The use of electronic domestic surveillance is a method for that purpose; however, the infringement of American&rsquo;s Fourth Amendment rights has become a conflict for the government while trying to maintain national security. Along with attempting to keep security for American citizens, the United States government has lacked transparency in their electronic domestic surveillance methods, causing controversy with American citizens. It is a question of how much privacy would Americans sacrifice for their security. The research in this paper focuses on the comparison of the electronic domestic surveillance methods, how these processes affected the Fourth Amendment rights of American citizens, and the response to these programs and violations by Americans and the United States government, respectively. </p>
APA, Harvard, Vancouver, ISO, and other styles
14

Dou, Jie. "Evaluating Microsoft .NET technology: Implementation online store." CSUSB ScholarWorks, 2006. https://scholarworks.lib.csusb.edu/etd-project/3060.

Full text
Abstract:
The purpose of this project is to design, develop and implement an e-commerce shopping cart system based on Microsoft.NET technology and to evaluate ASP.NET technology by developing a shopping cart system.
APA, Harvard, Vancouver, ISO, and other styles
15

Rydefelt, Calatayud Leonor. "A holistic model to create organizational information security awareness programs – iSAP." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-48050.

Full text
Abstract:
There is a large number of information security awareness programs (iSAP) found in the literature with multiple approaches. Considering that the number of security breaches performed by insiders is as high as 48%, the effectiveness of such programs is questionable. This leaves a considerable space for external, but also internal criminals, to perform and succeed in their attacks, something that can cause heavy losses (both economical and less tangible as reputation) to organizations. This thesis decided to study some of those iSAP to see their strengths and weaknesses. After studying the approaches in focus for this thesis, and following an inductive research method, a new model to develop iSAP from a holistic point of view was presented. The solution has been aligned with subject matter experts (SME) at “Company X” and with end-users external to that company. The model is now ready to be studied empirically in organizations to evaluate its effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
16

Lenhert, Lance Ronald. "The next generation: A look at where today's enterprise resource planning (ERP) systems came from and where technology is heading." CSUSB ScholarWorks, 2000. https://scholarworks.lib.csusb.edu/etd-project/1689.

Full text
Abstract:
"Currently, the largest barrier to any given market usually involves capital. If a company does not have enough investment capital to start with, it could fail before it even gets started. However, there is a new component that affects some of the largest corporations in the world. The problem relates to being able to sustain current internal processing, as well as adapt and grow in new markets with higher volumes. There are systems out there today that claim to address these issues along with e-commerce and other electronic sharing of information."
APA, Harvard, Vancouver, ISO, and other styles
17

Hadley, Barry J. "Matchmaker plus: Information management tool at a classroom level." CSUSB ScholarWorks, 1995. https://scholarworks.lib.csusb.edu/etd-project/1066.

Full text
Abstract:
This project will show how a computer-based information management system can be used by elementary school teachers. Using a desktop database manager software, FileMaker Pro, this project will describe how technology can help a classroom teacher manage information through an application model.
APA, Harvard, Vancouver, ISO, and other styles
18

Hart, Peter W. "A management perspective of the Department of Defense (DOD) Internet Protocol Version 6 (IPV6) transition plan, where it is today, and where it needs to be by the year 2008." Thesis, Monterey California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/2637.

Full text
Abstract:
Approved for public release, distribution unlimited<br>This thesis focused on the management aspects of the DoD IPv6 Transition Plan. It addressed the management required to transition the DoD computer systems from IPv4 to IPv6. The study identified how computer systems will be affected by the transition from IPv4 to IPv6. The advantages, disadvantages, and risks associated with the transition were analyzed to determine potential areas of improvement. The study provided recommendations that can be used before, during and after the transition. This thesis investigated the ramifications of transitioning to IPv6. It compared the Transition Plan to the current state of preparedness by DoD agencies. It determined whether or not IPv6 can be implemented by 2008. When possible, it identified where the DoD will have to concentrate its effort to ensure the transition goes smoothly and on time.
APA, Harvard, Vancouver, ISO, and other styles
19

Smith, Diane M. "Experimentation in a collaborative planning environment." Thesis, Monterey, California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/2822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Henry, Camilla. "Strategies to Reduce Information Technology Employee Absenteeism in the Manufacturing Industry." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6044.

Full text
Abstract:
Employee absenteeism costs organizations billions of dollars annually in losses in revenue and productivity, temporary labor costs, and low morale. The purpose of this qualitative single case study was to explore the strategies information technology (IT) managers in the manufacturing industry used to reduce employee absenteeism. The theory of planned behavior provided the conceptual framework for the study. Data collection included semistructured interviews with 5 IT managers in Maryland and a review of organizational documents addressing nutritional education information, employee participation rates in health programs, and physical activity. Data were analyzed using compilation, disassembly, reassembly, interpretation, and development of conclusions. Through thematic analysis, 4 themes emerged: workplace wellness and health programs, employee engagement, work-life balance programs, and organizational culture. Findings of this study may be used by IT managers to bring about positive change by reducing employee absences, encouraging employment opportunities, contributing to organizational sustainability, and improving quality of life for community members.
APA, Harvard, Vancouver, ISO, and other styles
21

Wang, Chia-Chi. "Online solicitation management system for the Office of Technology Transfer and Commercialization." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2950.

Full text
Abstract:
The Online Solicitation Management System (OSMS) is a web-based system designed for California State University, San Bernardino's Office of Technology Transfer and Commercialization (OTTC) to run grant proposal solicitations more efficiently. The system accepts grant proposals, finds the best matched evaluators, calculates evaluation scores, and generated reports. Users in the system are divided into five (5) different roles: system administrator, program officer, staff, evaluator and applicant.
APA, Harvard, Vancouver, ISO, and other styles
22

Ngo, Damian N. "Deployment of 802.15.4 sensor networks for C4ISR operations." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Jun%5FNgo.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, June 2006.<br>Thesis Advisor(s): Gurminder Singh "June 2006." Includes bibliographical references (p.71-73). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
23

FRANCA, TARCIS V. "Levantamento e prescricao das atividades de CRM para o Centro de Ciencia e Tecnologia de Materiais - CCTM / IPEN." reponame:Repositório Institucional do IPEN, 2002. http://repositorio.ipen.br:8080/xmlui/handle/123456789/11008.

Full text
Abstract:
Made available in DSpace on 2014-10-09T12:46:51Z (GMT). No. of bitstreams: 0<br>Made available in DSpace on 2014-10-09T13:58:29Z (GMT). No. of bitstreams: 1 08360.pdf: 6822646 bytes, checksum: 2d4f7f20b73007a1d1b912a501277f12 (MD5)<br>Dissertacao (Mestrado)<br>IPEN/D<br>Instituto de Pesquisas Energeticas e Nucleares - IPEN/CNEN-SP
APA, Harvard, Vancouver, ISO, and other styles
24

Powers, Edward C. "Design and implementation of a prototype Ontology Aided Knowledge Discovery Assistant (OAKDA) application." Thesis, Monterey, California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/2452.

Full text
Abstract:
The World Wide Web (WWW) has become a major source of easily accessible information for students, professionals, researchers and the general public. However, the volume of information available through the Web is so overwhelming that it is not unusual to get tens of thousands of "hits" when conducting a relatively simple search. Most existing search techniques use brute force based on keyword matches to find related Web pages. While the enormous speed of search engines improves the efficiency of such methods, effectiveness is not improved. The objective of this thesis is to construct and test an ontology-based application to help users identify the most pertinent keywords for a search. By navigating ontologies that describe domains of interest, users are assisted in finding a relevant set of key terms that will aid the search enginees in narrowing, widening or refocusing a Web search. Specifically, the thesis develops an ontology-aided Web search assistant prototype to help users enhance the relevance and precision of the returned results through the use of a context provided by ontologies associated with each search.
APA, Harvard, Vancouver, ISO, and other styles
25

Li, Ling. "Understanding the efficacy of test driven development a dissertation submitted to Auckland University of Technology in partial fulfilment of the requirements for the degree of Master of Computer and Information Sciences, 2009 /." Click here to access this resource online, 2009. http://hdl.handle.net/10292/775.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Вергеліс, В. О. "Інформаційні технології в управлінні персоналом на підприємстві". Thesis, ВНТУ, 2018. http://ir.lib.vntu.edu.ua//handle/123456789/21213.

Full text
Abstract:
Вивчено інформаційні технології, що застосовуються в управлінні соціальною складовою на підприємстві. Розглянуто спеціальні комп’ютерні програми для управління персоналом .<br>Studied information technology used in the management of the social component in the enterprise. Razganata special computer programs for personnel management. Advantages and disadvantages of the software. Developed recommendations and proposals on improvement of information technology in the management of the social component in the enterprise .
APA, Harvard, Vancouver, ISO, and other styles
27

Omar, Yunus. "Comparative analysis of selected Personal Bibliographic Management Software (PBMS) with special reference to the requirements of researchers at a University of Technology." Thesis, Link to the online version, 2005. http://hdl.handle.net/10019/1339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Van, der Linde P. L. "A comparative study of three ICT network programs using usability testing." Thesis, [Bloemfontein?] : Central University of Technology, Free State, 2013. http://hdl.handle.net/11462/186.

Full text
Abstract:
Thesis (M. Tech. (Information Technology)) -- Central University of technology, Free State, 2013<br>This study compared the usability of three Information and Communication Technology (ICT) network programs in a learning environment. The researcher wanted to establish which program was most adequate from a usability perspective among second-year Information Technology (IT) students at the Central University of Technology (CUT), Free State. The Software Usability Measurement Inventory (SUMI) testing technique can measure software quality from a user perspective. The technique is supported by an extensive reference database to measure a software product’s quality in use and is embedded in an effective analysis and reporting tool called SUMI scorer (SUMISCO). SUMI was applied in a controlled laboratory environment where second-year IT students of the CUT, utilized SUMI as part of their networking subject, System Software 1 (SPG1), to evaluate each of the three ICT network programs. The results, strengths and weaknesses, as well as usability improvements, as identified by SUMISCO, are discussed to determine the best ICT network program from a usability perspective according to SPG1 students.
APA, Harvard, Vancouver, ISO, and other styles
29

Kelley, Sean William. "An analysis of the use of medical applications required for complex humanitarian disasters and emergencies via Hastily Formed Networks (HFN) in the field." Thesis, Monterey, California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/1946.

Full text
Abstract:
This thesis analyzes the feasibility, efficacy and usability of medical operations working in concert with a Fly-Away Kit (FLAK) and the forming of Hastily Formed Networks (HFNs) in support of Humanitarian Assistance and Disaster Relief (HA/DR) operations. The initial focus of this research is on the requirements, situation, area of operations, and mission differences between nongovernmental organizations and governmental organizations. The thesis researches and discusses the possibilities for implementing medical technology in the field and the conditions and scenarios in HA/DR that may affect its success. This process will also define the requirements for medical operations as well as facilitate a methodology for ensuring those requirements are met. This thesis investigates the suitability of currently available COTS hardware and software components for medical operations. In addition, it includes a comprehensive review of the value of electronic medical records and telemedicine technologies. Virtually all organizations responding to the December 26, 2004 Southeast Asia tsunami did not have the benefit of large scale medical information technology. For example, the ability to ascertain the real extent of injuries due to the tsunami was hampered by the lack of a central database. Initial media reports claimed a death toll of over 300,000 people, when in fact hindsight now provides a more accurate tally of just over 200,000 dead. This disparity resulted from an archaic system of tracking and accounting. Undoubtedly, humanitarian medical organizations will greatly benefit from the implementation of medical information technology capabilities. This thesis lays the groundwork for further research into medical technologies that can be deployed in the field with humanitarian medical teams in the near future.
APA, Harvard, Vancouver, ISO, and other styles
30

Tumusiime, James. "Investigating a rural community's use of communication technology : a study of Nakaseke Community Multi-media centre in Uganda /." Thesis, Rhodes University, 2006. http://eprints.ru.ac.za/904/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Bell, Dianne Marie. "Bridging the Proficiency Gap: A Study of the Information and Communication Technology (ICT) Literacy of Nontraditional College Students in Accelerated Learning (AL) Programs." NSUWorks, 2009. http://nsuworks.nova.edu/gscis_etd/348.

Full text
Abstract:
In order to complete degrees faster, many nontraditional students enroll in Accelerated Learning (AL) programs where they often use communication software or devices, also called information communication technology (ICT). ICT literacy is the ability to use ICT appropriately to solve information problems. Gaps in ICT literacy can frustrate nontraditional students and distract them from learning course content. Due to AL programs` fast pace, there is little opportunity for students and educators to discover and fill ICT literacy gaps. Millions of nontraditional students enroll in programs designed for traditional students. Identifying ICT literacy gaps for students can help educators address specific academic needs. Identifying and bridging ICT literacy gaps is essential in preparing all students to succeed in the information age. While the mission of the National Higher Education ICT Initiative includes addressing the ICT literacy gaps of both traditional and nontraditional students, little effort or research exists to date, which examines the ICT literacy gap of nontraditional students. This lack of research makes it more difficult for institutions to recognize the issue of nontraditional students` ICT literacy gaps. This lack of research also makes it more difficult for institutions to address effectively these ICT literacy gaps. The goal of this research was to compare the ICT literacy gaps of traditionally aged students in traditional programs to the ICT literacy gaps of nontraditional students in AL programs and to help determine if nontraditional students in AL programs have unique ICT literacy gaps that warrant identification and remediation. This study expands the body of knowledge concerning ICT literacy gaps of nontraditional students in AL programs.
APA, Harvard, Vancouver, ISO, and other styles
32

Chang, Andrew Yee. "A web accessible clinical patient information networked system." CSUSB ScholarWorks, 2006. https://scholarworks.lib.csusb.edu/etd-project/2980.

Full text
Abstract:
Developed with the intention to make the patient data storage system in the clinical outpatient area more efficient, this system stores all pertinent and relevant patient data such as lab results, patient history and X-ray images. The system is accessible via the internet as well as operable over a local area network (LAN). The intended audience for this program is essentially the clinical staff (e.g., physicians, nursing staff, secretarial staff). The computer program was developed using Java Server Pages (JSP) and utilizes the Oracle 9i database.
APA, Harvard, Vancouver, ISO, and other styles
33

Foster, Susan L. "A Comparison of Student Success, Attrition, and Perceptions of Course Satisfaction in Online Courses with Face-to-Face Health Information Management Associate Degree Programs." Thesis, Lindenwood University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13811708.

Full text
Abstract:
<p> The purpose of this study is centered on health information management (HIM) student learning outcomes and attrition in an online learning environment as compared with that of a traditional face-to-face learning environment. Online education has become mainstream and enrollment continues to grow even though overall enrollment in higher education has decreased (Poulin &amp; Straut, 2016). In addition, colleges and universities retain fewer online students than traditional face-to-face students (Brown, 2017). Furthermore, student satisfaction has been labeled as a measure of quality for online education (Online Learning Consortium, 2017). The Community of Inquiry theory of student satisfaction with an online learning environment was utilized as the theoretical framework for this study (Garrison, Anderson, &amp; Archer, 2000). Quantitative data were collected from accredited two-year associate health information management program directors for analysis in this study. Students currently enrolled in health information management online courses were surveyed with a Community of Inquiry survey instrument to assess their perceptions of satisfaction with online courses. Descriptive analysis methods were utilized to answer the four research questions which guided this study. The findings of the study on differences between the national Registered Health Information Technician final exam scores and domain scores from graduates of traditional face-to-face courses with similar peers enrolled in online courses demonstrated a significant difference with lower overall scores for online graduates. On the other hand, there was no statistically significant difference between attrition rates of traditional face-to-face and online programs. Based on the analysis of the Community of Inquiry data, students of current online HIM courses have an above average degree of satisfaction.</p><p>
APA, Harvard, Vancouver, ISO, and other styles
34

Martins, Paulo Rodolfo de Oliveira. "Desenvolvimento de um protocolo de ensino adaptativo para apoio à disciplinas de graduação /." São José dos Campos, 2018. http://hdl.handle.net/11449/157332.

Full text
Abstract:
Orientador: Rogério Galante Negri<br>Coorientador: Jorge Kennety Silva Formiga<br>Banca: Vivian Silveira dos Santos Bardini<br>Banca: Lucas Hidenori Okamura<br>Resumo: Esta pesquisa buscou propor um protocolo para funcionamento de uma ferramenta de auxílio no processo de ensino/aprendizado. Tal protocolo é construído com base nos conceitos de identificação e preenchimento de lacunas de aprendizado, identificadas por intermédio de sucessivos testes rápidos (quiz) que são aplicados durante o desenvolvimento das disciplinas. A fim de verificar o potencial da proposta, e assim motivar a implementação da ferramenta em questão, foi realizado um estudo de caso envolvendo duas turmas de duas disciplinas distintas de graduação da Faculdade Anhanguera de São José dos Campos. A eficácia do processo de ensino investigado foi verificada mediante análises estatísticas, se utilizando dos testes de "Wilcoxon" que visava comparar se houve melhora entre os quizzes do mesmo assunto; "Iteração de uma amostra" que buscou verificar se as melhoras e pioras acontecem de forma aleatória; e "χ^2 para uma amostra" que verificou se a melhora difere com relação ao comportamento mediano esperado. E pôde-se observar resultados favoráveis ao método proposto, o que demonstra eficácia do protocolo, objeto desta pesquisa<br>Abstract : This project looked for a protocol for the operation of an aid tool in the teaching / learning process. The protocol is based on the concepts of identifying and filling learning gaps, high school sessions, quick tests and tests are applied during the development of the disciplines. In order to verify the potential of the proposal, as well as to motivate the implementation of the tool in question, a case study was carried out on the two classes of undergraduate courses of the Anhanguera Faculty of São José dos Campos. The investigation of the teaching process investigated was used as a statistical database using "Wilcoxon" tests that aimed to compare if there was improvement between the quizzes of the same subject; "Iteration of a sample" that sought to verify if the improvements and worsen happen in a random way; and "���� 2 for one sample" that verified if the improvement differs with respect to the expected median behavior. And it was possible to observe favorable results to the proposed method, which demonstrates effectiveness of the protocol, object of this reasearch<br>Mestre
APA, Harvard, Vancouver, ISO, and other styles
35

Emmel, William M. "Process improvement and information technology illustrated through the Naval Aviation Production Process Improvement (NAPPI) and the Flight Hour (FHP)/Flight Hour Other (FO) programs." Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/9896.

Full text
Abstract:
MBA Professional Report<br>Proper execution of appropriated funds is critical if the Navy hopes to maximize the optimization of their limited resources. The Navy's Flight Hour (FHP) and Flight hour Other (FO) programs are no exception. These programs are being managed by good people, utilizing inefficient and out dated practices that do not adequately take advantage of the many Process Change and Information Technology resources currently available in today's Navy. This project report will highlight the need for change in the FHP/FO budget management process, discuss successful process change efforts within the Navy, demonstrate the functionality of change in the FHP/FO management process through information technology, and provide a roadmap to a solution that is in alignment with the Navy's goals outlined in Naval Power 21p5sA Naval Vision. Process Change using Information Technology is a mandate in DoD. Information Technology can be the enabler to PC that allows more effective and efficient use of the Navy's most powerful resource - its people.
APA, Harvard, Vancouver, ISO, and other styles
36

Selva, Manuel. "Performance monitoring of throughput constrained dataflow programs executed on shared-memory multi-core architectures." Thesis, Lyon, INSA, 2015. http://www.theses.fr/2015ISAL0055/document.

Full text
Abstract:
Les progrès continus de la microélectronique couplés au problème de gestion de la puissance dissipée ont conduit les fabricants de processeurs à se tourner vers des puces dites multi-coeurs au début des années 2000. Ces processeurs sont composés de plusieurs unités de calcul indépendantes. Contrairement aux progrès précédents ces architectures multi-coeurs, le logiciel doit être en grande parti repensé pour tirer parti de toutes les unités de calcul. Il faut pouvoir paralléliser une application séquentielle en tâches le plus indépendantes possibles pour pouvoir les exécuter sur différentes unités de calcul. Pour cela, de nombreux modèles de programmations dits concurrents ont été proposés. Dans cette thèse nous nous intéressons aux programmes décrits à l’aide du modèle dataflow. Ce travail porte sur l’évaluation des performances de programmes dataflow (forme que revêtent typiquement des applications de types traitement de flux vidéos ou protocoles de communication) sur des architectures multi-coeurs. Plus particulièrement, le sujet de la thèse porte sur l’extension de modèles de programmation dataflow avec des éléments d’expression de propriétés de qualité de service ainsi que la prise en compte de ces éléments pour détecter, à l’exécution, les goulots d’étranglement de performance au sein des programmes. Les informations concernant les goulots d'étranglements collectées pendant l'exécution sont utilisées à la fois pour faire de l'analyse hors-ligne et pour faire des adaptations pendant l'exécution des programmes. Dans le premier cas, le programmeur utilise ces informations pour savoir quelles parties du programme dataflow il faut optimiser et pour savoir comment distribuer efficacement le programme sur les unités de calcul. Dans le second cas, les informations collectées sont utilisées par des mécanismes d'adaptation automatique afin de redistribuer le travail sur les différentes unités de calcul de façon plus efficace. Nous portons une attention particulière au profiling de l'utilisation faite par les applications dataflow du système mémoire. Les informations sur les échanges de données fournies par le modèle de programmation permettent d'exploiter de façon intelligente les architectures mémoires des machines multi-coeurs. Néanmoins, la complexité de ces dernières ne permet pas de façon générale d'évaluer statiquement l'impact sur les performances des accès mémoires. Nous proposons donc la mise en place d'un système de profiling mémoire pour des applications dataflow basé sur des mécanismes matériels<br>Because of physical limits, hardware designers have switched to parallel systems to exploit the still growing number of transistors per square millimeter of silicon. These parallel systems are made of several independent computing units. To benefit from these computing units, software must be changed. Existing sequential applications have to be split into independent tasks to be executed in parallel on the different computing units. To that end, many concurrent programming models have been proposed and are in use today. We focus in this thesis on the dataflow concurrent programming model. This work is about performance evaluation of dataflow programs on multicore architectures. We propose to extend dataflow programming models with the notion of throughput constraints and to take this information into account in the compilation tool chain to detect at runtime the throughput bottlenecks. The profiling results gathered during the execution are used both for off-line analyzes and to adapt the application during its execution. In the former case, the developer uses this information to know which part of the dataflow program should be optimized and to efficiently distribute the program on the computing units. In the later case, the profiling information is used by runtime adaptation mechanisms to distribute differently the work on the computing units. We give a particular focus on the profiling of the usage of the memory subsystem. The data exchange information provide by the programming model allows to efficiently used the memory subsystem of multicore architectures. Nevertheless, the complexity of modern memory systems doesn't allow to statically evaluate the impact of memory accesses on the global performances of the application. We propose to set up memory profiling dedicated to dataflow applications based on hardware profiling mechanisms
APA, Harvard, Vancouver, ISO, and other styles
37

Борисова, Ю. Ю. "Обґрунтування доцільності впровадження комп'ютерних програм у процес фізичного виховання". Thesis, Сумський державний університет, 2016. http://essuir.sumdu.edu.ua/handle/123456789/48246.

Full text
Abstract:
Створення сучасного навчального інформаційного середовища вимагає, насамперед, визначення мети впровадження і очікування відповідних результатів. На сьогодні серед багатьох шляхів впровадження інформаційних технологій важливе місце належить створенню комп’ютерних засобів пошуку та опрацювання інформації. Об’єднання окремих джерел інформації в один потік, який відкриває можливість роботи з нею. Проте такі засоби інформаційного супроводу практично не використовуються. Впровадження і використання таких програм буде значним кроком у поліпшенні умов сприйняття інформації.
APA, Harvard, Vancouver, ISO, and other styles
38

Ahciarliu, Cantemir M. "Multi-agent architecture for integrating remote databases and expert sources with situational awareness tools : humanitarian operations scenario /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FAhciarliu.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, March 2004.<br>Thesis advisor(s): Alex Bordetsky, Glenn Cook. Includes bibliographical references (p. 77-79). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
39

De, Waal Liezel. "Making the connection : the inclusion of information and communication technology in Western Cape Municipal integrated development plans." Thesis, Stellenbosch : University of Stellenbosch, 2006. http://hdl.handle.net/10019.1/17347.

Full text
Abstract:
Thesis (MA)--University of Stellenbosch, 2006.<br>ENGLISH ABSTRACT: The study examines the Western Cape municipal Integrated Development Plans (IDPs) and questions whether these IDPs include Information and Communication Technology (ICT) initiatives that promote development. IDPs are used by municipalities as multi-sectoral plans that provide situation analyses of municipal areas and determine development priorities in municipal areas. These development priorities must be met within certain budget and time constraints. Globalisation and the technological revolution have led to the rapid development and convergence of technology. Technology, such as the Internet and cellular telephones, has had various influences on society. One of these influences includes the possible application of ICT for the purpose of development. Therefore both IDPs and ICT can be applied for developmental purposes. The study thus brings together two seemingly unrelated concepts, namely Integrated Development Plans and Information and Communication Technology and aligns them with one another through the concept of development. The study includes three main objectives. Firstly, the Integrated Development Plans of the municipalities in the Western Cape were examined to ascertain whether these municipalities address ICT in their IDPs. Secondly, the nature of the ICT initiatives was determined. This refers to whether the ICT initiatives are for use in the community or for use in the municipality. Finally, a framework was developed, which includes the classification of the different types of municipalities, together with the different types of ICT initiatives. Recommendations were made based on this framework. The various theoretical issues discussed in this study include the transformation of local government in South Africa and the establishment of developmental local government. Various issues concerning the use of ICT for development are also discussed and they include the ‘Information Society’, the ‘Digital Divide’ and ICT for development. This discussion emphasises that success of ICT initiatives for development depends on the nature of the underlying policy agenda; this agenda must be demand-driven and pro-poor.<br>AFRIKAANSE OPSOMMING: Hierdie studie ondersoek die Wes-Kaap munisipale Geintegreerde Ontwikkelingsplanne (GOP’s) en bevraagteken of dié GOP’s Inligting en Kommunikasie Tegnologie (IKT) inisiatiewe wat ontwikkeling bevorder, insluit. GOP’s word deur munisipaliteite as multi-sektorale planne gebruik wat toestandsontledings van munisipale gebiede voorsien en die ontwikkelingsprioriteite in munisipale gebiede bepaal. Hierdie ontwikkelingsprioriteite moet binne sekere begrotings- en tydsbeperkings bevredig word. Globalisering en die tegnologiese revolusie het tot die spoedige ontwikkeling en samevoeging van tegnologie gelei. Tegnologie, soos die Internet en selulêre telefone, het verskeie uitwerkings op die samelewing teweeggebring. Een van die uitwerkings sluit die moontlike aanwending van IKT vir ontwikkelingsdoeleindes in. Beide GOP’s en IKT kan dus vir ontwikkelingsdoeleindes aangewend word. Die studie bring daarom twee oënskynlik onverwante onderwerpe, naamlik Geintegreerde Ontwikkelingsplanne en Informasie en Kommunikasie Tegnologie deur die konsep van ontwikkeling by mekaar uit. Die studie bevat drie hoof doelwitte. Eerstens om die Geintegreerde Ontwikkelingsplanne van die munisipaliteite in die Wes-Kaap te ondersoek om vas te stel of hierdie munisipaliteite IKT in hul GOP’s aanspreek. Tweedens is die aard van die IKT inisiatiewe vasgestel. Dit verwys na IKT inisiatiewe wat binne die gemeenskap óf binne die munisipaliteit plaasvind. Laastens is ’n raamwerk ontwikkel. Dit sluit ’n klassifikasie van die verskillende soorte munisipaliteite, asook die verskillende soorte IKT inisiatiewe in. Aanbevelings wat gemaak word, word op hierdie raamwerk gegrond. Verskeie teoretiese kwessies word ook verder in hierdie studie bespreek. Dit sluit die transformasie van plaaslike regering in Suid-Afrika en die totstandkoming van ontwikkelingsgerigte plaaslike regering in. Verskeie kwessies wat die gebruik van IKT vir ontwikkeling betref, word ook bespreek. Dit sluit die ‘Inligting-gedrewe Samelewing’, die ‘Digitale Gaping’ en IKT vir ontwikkeling, in. Hierdie bespreking beklemtoon dat die geslaagdheid van IKT inisiatiewe vir ontwikkeling van die aard van die onderliggende beleidsagenda afhang; dié agenda moet aanvraag-gedrewe en ten gunste van armes wees.
APA, Harvard, Vancouver, ISO, and other styles
40

Goode, Jodi. "Comparing Training Methodologies on Employee’s Cybersecurity Countermeasures Awareness and Skills in Traditional vs. Socio-Technical Programs." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1045.

Full text
Abstract:
Organizations, which have established an effective technical layer of security, continue to experience difficulties triggered by cyber threats. Ultimately, the cybersecurity posture of an organization depends on appropriate actions taken by employees whose naive cybersecurity practices have been found to represent 72% to 95% of cybersecurity threats and vulnerabilities to organizations. However, employees cannot be held responsible for cybersecurity practices if they are not provided the education and training to acquire skills, which allow for identification of security threats along with the proper course of action to mitigate such threats. In addition, awareness of the importance of cybersecurity, the responsibility of protecting organizational data, as well as of emerging cybersecurity threats is quickly becoming essential as the threat landscape increases in sophistication at an alarming rate. Security education, training, and awareness (SETA) programs can be used to empower employees, who are often cited as the weakest link in information systems (IS) security due to limited knowledge and lacking skillsets. Quality SETA programs not only focus on raising employee awareness of responsibilities in relation to their organizations’ information assets but also train on the consequences of abuse while providing the necessary skills to help fulfill these requirements. The main goal of this research study was to empirically assess if there are any significant differences on employees’ cybersecurity countermeasures awareness (CCA) and cybersecurity skills (CyS) based on the use of two SETA program types (typical & socio-technical) and two SETA delivery methods (face-to-face & online). This study included a mixed method approach combining an expert panel, developmental research, and quantitative data collection. A panel of subject matter experts (SMEs) reviewed the proposed SETA program topics and measurement criteria for CCA per the Delphi methodology. The SMEs’ responses were incorporated into the development of two SETA program types with integrated vignette-based assessment of CCA and CyS, which were delivered via two methods. Vignette-based assessment provided a nonintrusive way of measurement in a pre- and post-assessment format. Once the programs had been reviewed by the SMEs to ensure validity and reliability, per the Delphi methodology, randomly assigned participants were asked to complete the pre-assessment, the SETA program, and then the post-assessment providing for the qualitative phase of the study. Data collected was analyzed using analysis of variance (ANOVA) and analysis of covariance (ANCOVA) to address the proposed research hypothesis. Recommendations for SETA program type and delivery method as a result of data analysis are provided.
APA, Harvard, Vancouver, ISO, and other styles
41

Koranteng, Kesewaa. "Access and use of information and communication technology for teaching and learning amongst schools in under resourced communities in the Western Cape, South Africa." Thesis, Cape Peninsula University of Technology, 2012. http://hdl.handle.net/20.500.11838/1353.

Full text
Abstract:
Thesis (MTech(Information Technology)) --Cape Peninsula University of Technology, 2012<br>Due to the legacy of apartheid South Africa is facing developmental discrepancies with inequalities between the advantaged few in the more urban areas and the disadvantaged majority in the rural areas. With quality education being key, not only to the success of an individual but of a country’s development, efforts have been made to ensure equal access for all. ICT is seen as a key enabler to this end. The study investigated the status of ICT deployment and its integration into curricula in schools. The objective was to understand the factors affecting the efforts to achieve successful implementation of ICT integration into schools in underdeveloped areas, to understand the challenges that exist and ultimately, to inform solutions. A qualitative study was conducted, using a case study method. A purposive sampling method was used to select population elements; educators and school coordinators of ICT programs in Western Cape schools (i.e. Kulani Secondary, Sithembele Matiso Secondary, Macassar Secondary and Marvin Park Primary). To gain an understanding of the status quo, literature was explored and semi-structured interviews were conducted with ICT coordinators and educators within the 4 sampled schools. Activity theory was used to provide an analytical framework for the study. Through this framework the aims and objectives of the study were conceptualized and summarized to form a graphical representation of the phenomena under study. In spite of efforts to ensure universal access to ICT, the findings indicate that the status of ICT deployment and its integration into school curricula is far from favourable in underdeveloped schools.
APA, Harvard, Vancouver, ISO, and other styles
42

Kimbrell, Monica Renee. "Information Technology Career Decision Making: Validating Models of Self-Authorship in Middle and High School Students Enrolled in Upward Bound and Talent Search Programs in Rural Appalachia." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/52359.

Full text
Abstract:
Information Technology (IT) jobs are in demand in the United States and rural Appalachian communities are attracting IT businesses. The need to fill IT jobs creates a workforce opportunity for these communities where students have limited access to academic and career resources. The Upward Bound and Talent Search programs respond to the academic and career needs of disadvantaged students and aim to educate students about high skills jobs but little is known about interest in IT careers among middle and high school students in rural Appalachia. This study validates models of IT career interest and parental support of IT careers in girls and boys enrolled in Upward Bound or Talent Search in rural communities in Virginia using the theoretical framework of self-authorship. The theory of self-authorship explores the development of meaning-making in individuals and offers a context-specific way to study interest in IT careers. Results indicate interest in IT careers but the path to IT career interest is different among girls and boys. Girls are relying on others for career advice more often than boys and there is direct association between the information sources and interest in IT careers. Parental support is important in IT career interest for both girls and boys. Other important variables indicating an interest in IT careers are computer use and positive attitudes toward IT workers. Receiving information from sources such as parents, teachers, counselors, and friends is especially important to girls. Findings from this study can be used to inform practices and policies for Upward Bound and Talent Search.<br>Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
43

Русецька, Олександра Владиславівна. "Презентація як ефективний засіб мультимедіа в дистанційному навчанні". Thesis, Національний авіаційний університет, 2021. https://er.nau.edu.ua/handle/NAU/51683.

Full text
Abstract:
1. «Fundamentals of higher school pedagogy» / Tovazhnyansky L.L, Romanovsky O.G, Bondarenko V.V, Ponomarev O.S, Chervanyova Z.O - Kharkiv: NTU “KPI”, 2005. - Russian language.<br>У наш час питання якості та ефективності дистанційного навчання постало дуже гостро. У роботі досліджено правила складання презентації з метою найкращого сприйняття інформації, також здійснено аналіз ефективності викладання інформації у вигляді презентації.<br>Nowadays, the issue of quality and efficiency of distance learning has become very acute. The rules of making a presentation for the purpose of the best perception of information are investigated in the work, also the analysis of efficiency of teaching of the information in the form of the presentation is carried out.
APA, Harvard, Vancouver, ISO, and other styles
44

Fang, Li-Chuan. "Improvement and deployment of the web-based database management system for computer science graduate program." CSUSB ScholarWorks, 2006. https://scholarworks.lib.csusb.edu/etd-project/2988.

Full text
Abstract:
In 2005 Mr. Dung Tien Vu completed a master's project for the California State University, San Bernardino Computer Science Department in which he designed a web-based database of department graduate student information. This project was designed to alter the system so that it conforms with current campus regulations, to make some improvements to the system, and to deploy it.
APA, Harvard, Vancouver, ISO, and other styles
45

Herzig, Joseph F. Jr. "An analysis of the feasibility of implementing ultra wideband and mesh network technology in support of military operations." Thesis, Monterey California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/2285.

Full text
Abstract:
Approved for public release, distribution is unlimited<br>This thesis analyzes the feasibility, functionality, and usability of Ultra Wideband technology as an alternative to 802.11 in wireless mesh networks for multiple DoD contexts. Ultra wideband and wireless mesh network technologies and applications are researched and analyzed through multiple field and lab experiments for usability in current, real-world situations. Hardware and software investigations are conducted to determine any implementation issues between ultra wideband and wireless mesh networks. A detailed assessment is conducted of the various elements and operational constraints for developing an ultra wideband mesh network that can be utilized to improve situational awareness in network-centric operations. Through joint research with Lawrence Livermore National Laboratories, various hardware and software components are developed to create a test bed for tactical level ultra wideband and mesh networking experimentation in a highly mobile environment. This thesis also lays the groundwork into future ultra wideband and mesh networking applications.<br>Lieutenant, United States Navy
APA, Harvard, Vancouver, ISO, and other styles
46

Pace, Terrell M. "Perceptions of Florida school library media specialists relative to the saliency of collaboration, leadership, and technology tasks outlined in Information Power : changes since 1996." [Tampa, Fla] : University of South Florida, 2007. http://purl.fcla.edu/usf/dc/et/SFE0001930.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Orgill, Gregory Leavitt. "Java Performance of the Rijndael Encryption Algorithm Across Compilers and Virtual Machines." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd681.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Chipunza, Enciliah. "Quality management challenges in iterative software product development of a selected software development organisation in Cape Town, South Africa." Thesis, Cape Peninsula University of Technology, 2018. http://hdl.handle.net/20.500.11838/2779.

Full text
Abstract:
Thesis (MTech (Business Information Systems))--Cape Peninsula University of Technology, 2018.<br>Many software organisations using iterative software development approach use practices that relate to quality management. However, the quality management process has been inadequate. Despite many research studies conducted on quality management in iterative software product development none have adequately addressed the challenges and mitigation techniques to have an adequate process that leads to a quality software product. The objective of this study was to determine factors that affect the quality management process in iterative software development. The research followed a qualitative approach, a case of software organisation SasTech in Cape Town, South Africa. 22 interviews were conducted on three roles actively involved in the software product development process. These are product management, quality assurance and software developers. Themes were drawn from results and were tabulated. The duality of technology theory was used as a theoretical lens to data analysis. Several factors were identified to influence the software quality management process. These include planning, documentation, process ownership, technologies, testing, timelines and management support. Through the general proposed framework, facilities (human resources and technologies), interpretive schemes (architecture) and norms (practices) of software quality management can be institutionalised leading to adequate and effective quality management in iterative development for SasTech as well as other organisations in the same industry.
APA, Harvard, Vancouver, ISO, and other styles
49

Levy, Denise Sahyun. "Informatização e unificação dos programas de proteção radiológica: monitoramento das radiações ionizantes e sua otimização." Universidade de São Paulo, 2015. http://www.teses.usp.br/teses/disponiveis/85/85131/tde-15102015-090116/.

Full text
Abstract:
Um programa de monitoramento para fins de proteção radiológica deve mostrar como ele auxilia na obtenção e demonstração de um grau de proteção adequado e comprovar que as condições de trabalho continuam satisfatórias com o transcorrer do tempo. Para o controle operacional das exposições à radiação ionizante em qualquer local de trabalho, a Comissão Internacional de Proteção Radiológica (CIPR) recomenda um programa de proteção radiológica operacional, proporcional ao grau de risco, para garantir o gerenciamento efetivo das medidas necessárias para se satisfazer o principio da otimização. O presente trabalho de pesquisa tem como premissa o potencial das Tecnologias da Informação e Comunicação (TIC) como ferramenta para a comunicação e disseminação do conhecimento em Proteção Radiológica. O trabalho inclui a informatização da filosofia e técnica do monitoramento e sua otimização, unificando e inter-relacionando informações advindas de diversas publicações nacionais e internacionais, oferecendo às instalações radiativas brasileiras um veículo completo para informação e pesquisa, que permite dimensionar os esforços de otimização tornando-os eficazes e justificados. O sistema oferece ainda tópicos de discussões no intuito de ampliar o repertório dos profissionais do campo da proteção radiológica, suscitando novas reflexões a favor da segurança. Trata-se dos temas desenvolvidos nesta tese, a saber: a necessidade de um monitoramento auditor e discussões mais aprofundadas sobre as exposições potenciais. As reflexões propostas na presente tese vêm ao encontro das novas exigências internacionais, propondo ações passíveis de serem incorporadas na prática laboral. Dentro dos princípios da proteção radiológica, a implementação de um programa de monitoramento auditor permite avaliar se os critérios e ações previamente estabelecidas pelo Serviço de Proteção Radiológica são ou não atendidos, se foram implementados com eficácia e se permanecem adequados. Os fatos resultantes dos procedimentos de auditoria auxiliam a detectar deficiências no processo, possibilitando conclusões e recomendações diante de possíveis fatores desencadeadores de exposições indevidas. Por meio de exames sistemáticos das atividades realizadas em cada tipo de monitoramento, a auditoria infere segurança ao processo, respaldando o trabalhador na realização do monitoramento relacionado com a tarefa e respaldando a instalação, que empreende ações responsáveis a favor da segurança. Em relação às exposições potenciais, somente duas publicações da CIPR são expressivas e desenvolvem o assunto. Entretanto, ainda que forneçam a fundamentação teórica, são incompletas em seus exemplos. Há uma grande falta de conhecimento das probabilidades de falhas, o que atualmente constitui um vasto campo de pesquisa da proteção radiológica. A presente tese propõe, a partir de árvores de falhas, caminhos que auxiliam a quantificar probabilisticamente a ocorrência das exposições potenciais e a probabilidade de se atingir um determinado valor da dose. Acreditamos que o potencial das TIC contribuirá largamente para a disseminação da informação para as instalações radiativas, estimulando o desenvolvimento neste país de grandes extensões territoriais, onde permanece um desafio oferecer o acesso à informação ao maior número de pessoas possível, minimizando custos e maximizando resultados.<br>A monitoring program for the purposes of radiological protection should demonstrate an adequate protection degree and prove that working conditions remain appropriate as time goes by. For operational control of exposures to ionizing radiation in any workplace, the International Comission on Radiation Protection (ICRP) recommends establishing a program of operational radiation protection, proportional to the risk, to ensure the effective management of all necessary measures to satisfy the principle of optimization. This research work focus on the potential value of Information and Communication Technologies (ICTs) to enhance communication and education on Radiological Protection throughout Brazil. The work includes the informatization of the monitoring policy and techniques, interrelating information currently scattered in several documents, providing Brazilian radioactive facilities a complete repository for research, consultation and information, which allows to size optimization efforts by technology, enabling them to be effective and justified. The content of monitoring programs involves not only the collection and interrelationship of existing information in the publications, but also new approaches from some recommendations, presenting some initiatives towards safety. In this sense, the two contents researched and expanded are: the need for an auditor monitoring and discussions on potential exposures. The recommendations proposed in this thesis meet the new international requirements stablished by the International Agency of Nuclear Energy (IAEA) and propose appropriate actions to be incorporated into labor practice. Respecting the scope of the principles of radiological protection, an auditing program permits to evaluate whether criteria and actions previously established by Radiological Protection Service are effectively implemented and remain appropriate as time goes by. The results of auditing procedures help to detect deficiencies in the process, enabling conclusions and recommendations, avoiding possible triggers of undue exposures. Through systematic examinations of activities in each type of monitoring, auditing attempt to ensure the process, supporting the employee in performing task-related monitoring and support the facility that choose responsible actions towards safety. Furthermore, regarding potential exposures, only two publications of ICRP develop expressively the issue. Even though these publications provide the fundamental theory, they are incomplete in their examples. There is still lack of knowledge of failure probabilities, which currently constitutes a broad research field in radiological protection. This research work proposes the development of fault trees, suggesting paths to quantify probabilistically the occurrence of potential exposures, as well as probabilities to reach a certain level of dose. We believe that the potential of ICT shall contribute greatly to provide information where it is needed, stimulating development in this large country where it is a strong challenge to ensure access to information to as many people as possible, minimizing costs and optimizing results.
APA, Harvard, Vancouver, ISO, and other styles
50

Kanai, Rieko. "Case study: Applied Digital Solutions I3 services platform." CSUSB ScholarWorks, 2001. https://scholarworks.lib.csusb.edu/etd-project/1734.

Full text
Abstract:
The purpose of this project is to analyze whether i3 Strategy of Applied Digital Solutions (ADS) was necessary to meet the fast-moving IT industry. i3 Services Strategy is an integrated corporate strategy to reengineer the organizational structure of ADS.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography