Recommendation Information Systems(RIS)are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet.Graph Convolution Network(GCN)algorithms have been ...Recommendation Information Systems(RIS)are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet.Graph Convolution Network(GCN)algorithms have been employed to implement the RIS efficiently.However,the GCN algorithm faces limitations in terms of performance enhancement owing to the due to the embedding value-vanishing problem that occurs during the learning process.To address this issue,we propose a Weighted Forwarding method using the GCN(WF-GCN)algorithm.The proposed method involves multiplying the embedding results with different weights for each hop layer during graph learning.By applying the WF-GCN algorithm,which adjusts weights for each hop layer before forwarding to the next,nodes with many neighbors achieve higher embedding values.This approach facilitates the learning of more hop layers within the GCN framework.The efficacy of the WF-GCN was demonstrated through its application to various datasets.In the MovieLens dataset,the implementation of WF-GCN in LightGCN resulted in significant performance improvements,with recall and NDCG increasing by up to+163.64%and+132.04%,respectively.Similarly,in the Last.FM dataset,LightGCN using WF-GCN enhanced with WF-GCN showed substantial improvements,with the recall and NDCG metrics rising by up to+174.40%and+169.95%,respectively.Furthermore,the application of WF-GCN to Self-supervised Graph Learning(SGL)and Simple Graph Contrastive Learning(SimGCL)also demonstrated notable enhancements in both recall and NDCG across these datasets.展开更多
COVID-19 pandemic restrictions limited all social activities to curtail the spread of the virus.The foremost and most prime sector among those affected were schools,colleges,and universities.The education system of en...COVID-19 pandemic restrictions limited all social activities to curtail the spread of the virus.The foremost and most prime sector among those affected were schools,colleges,and universities.The education system of entire nations had shifted to online education during this time.Many shortcomings of Learning Management Systems(LMSs)were detected to support education in an online mode that spawned the research in Artificial Intelligence(AI)based tools that are being developed by the research community to improve the effectiveness of LMSs.This paper presents a detailed survey of the different enhancements to LMSs,which are led by key advances in the area of AI to enhance the real-time and non-real-time user experience.The AI-based enhancements proposed to the LMSs start from the Application layer and Presentation layer in the form of flipped classroom models for the efficient learning environment and appropriately designed UI/UX for efficient utilization of LMS utilities and resources,including AI-based chatbots.Session layer enhancements are also required,such as AI-based online proctoring and user authentication using Biometrics.These extend to the Transport layer to support real-time and rate adaptive encrypted video transmission for user security/privacy and satisfactory working of AI-algorithms.It also needs the support of the Networking layer for IP-based geolocation features,the Virtual Private Network(VPN)feature,and the support of Software-Defined Networks(SDN)for optimum Quality of Service(QoS).Finally,in addition to these,non-real-time user experience is enhanced by other AI-based enhancements such as Plagiarism detection algorithms and Data Analytics.展开更多
In recent years, the increasingly complexity of the logistic and technical aspects of the novel manufacturing environments, as well as the need to increase the performance and safety characteristics of the related coo...In recent years, the increasingly complexity of the logistic and technical aspects of the novel manufacturing environments, as well as the need to increase the performance and safety characteristics of the related cooperation, coordi-nation and control mechanisms is encouraging the development of new information management strategies to direct and man- age the automated systems involved in the manufacturing processes. The Computational Intelligent (CI) approaches seem to provide an effective support to the challenges posed by the next generation industrial systems. In particular, the Intelligent Agents (IAs) and the Multi-Agent Systems (MASs) paradigms seem to provide the best suitable solutions. Autonomy, flexibility and adaptability of the agent-based technology are the key points to manage both automated and information processes of any industrial system. The paper describes the main features of the IAs and MASs and how their technology can be adapted to support the current and next generation advanced industrial systems. Moreover, a study of how a MAS is utilized within a productive process is depicted.展开更多
Research on the intersection of the areas of aviation and management of information systems is scarce. Airports, more than ever before need to align their information systems to gain a competitive advantage and become...Research on the intersection of the areas of aviation and management of information systems is scarce. Airports, more than ever before need to align their information systems to gain a competitive advantage and become more efficient in their operations. A proper classification is a prerequisite to systems alignment. The purpose of this paper is to provide descriptions of some of the airport management information systems, connections to or interoperability with other systems, and the key uses and users of each system. There are many types of management information systems and they can be organized or classified in a number of different ways. Furthermore, each system may or may not be necessary for a particular airport depending on the business goals and objectives and the certificate which the airport is operating under. Consequently, the system classification schema presented in this paper is neither all-inclusive nor exclusive;however, a number of leading aviation practitioners, business professionals, and educators in the industry were instrumental in both proposing and validating the schema. The study used interviews, documentation, and observation as the primary sources of data.展开更多
Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively g...Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively guarantees the efficiency and quality.At present,due to the wide variety of external information that Chinese citizens are exposed to,in addition to the variegated and mixed content,it is easy for information to be leaked or stolen.In order to avoid similar situations,it is necessary for people to pay more attention to network system security,so as to ensure that the quality of life of citizens can be guaranteed.In view of that,this paper discusses and analyzes the application of computer network technology in electronic information engineering.展开更多
Research on the intersection of the areas of aviation and management information systems is sparse. Just as within other economic sectors, members of the aviation sector must incorporate new and existing technologies ...Research on the intersection of the areas of aviation and management information systems is sparse. Just as within other economic sectors, members of the aviation sector must incorporate new and existing technologies as they grow to maintain their competitive edge whether in aircraft systems, airports or other aerospace and aviation related industries. A proper classification is a prerequisite to systems alignment. This paper reviews landside airport information management systems, and their connections and interoperability with other systems and who the key airport users are. The information presented in this paper is based on interviews and data collection at a number of representative airports across the United States. Airport size and function are key considerations in the acquisition of information management system airside or land side. The implication is that not all airports are equipped in the same manner and therefore these systems can only be considered as representative of what exists “on the ground”. This paper represents a point of departure or a reference for those researchers interested in a more indepth study of airport information systems on the landside.展开更多
The plain of Mascara includes groundwater resources, heavily exploited for the needs of the population, industry and agriculture. However, this resource is under threat from the point of view of quality and quantity. ...The plain of Mascara includes groundwater resources, heavily exploited for the needs of the population, industry and agriculture. However, this resource is under threat from the point of view of quality and quantity. The degradation of water quality comes from water discharges untreated (domestic and/or industrial) and from the irrational use of fertilizers and pesticides in agriculture. The decrease in reserves is due to the effects of intensive exploitation. Several studies on the water resources of the plain generated a mass of very important data. In most cases, these data are disparate at different institutions managers (water resources, environment, etc.), and are found recorded in paper documents, difficult to exploit. For this reason, it would be essential to use reliable new techniques, namely the GIS (geographic information systems). The implementation of the GIS of the plain of Mascara (with extension to all the sub-basin of Wadi Fekan) must permit to organize the data and transform it into information. Integration, crossing and superposition of the data with other variables may contribute to spatial analysis and generate very important thematic maps. The GIS constitutes a very effective decision aid tool for the management, exploitation, preservation and protection of water resources. The exploitation possibilities of GIS are multiple, direct or indirect. We give an example as the coupling with a groundwater flow model that may be the subject of additional work.展开更多
Escalation of commitment has been linked to losses in information systems (IS) projects. Understanding the nature and the rationality of escalation allows the firm to promote optimal project management practices. Th...Escalation of commitment has been linked to losses in information systems (IS) projects. Understanding the nature and the rationality of escalation allows the firm to promote optimal project management practices. This study takes an inter-disciplinary approach and draws on research from economics and management to create a model of irrational escalation and a model of rational escalation. The forces that contribute to irrational escalation include the responsibility of the same manager for both the project selection and project continuation decisions that create proneness to self-justification, the potential for negative framing of decision options due to large sunk costs, the proximity of project completion and the presence of organizational inertia. Identifying these irrational escalation factors helps design appropriate de-escalation techniques. The rational escalation model draws on the real option theory and the bandit process theory to identify conditions when project continuation is justified by the value of information and the value of flexibility that the firm receives from continuing the project.展开更多
Before Information Systems are developed, they must have undergone a process called Systems Development Life Cycle (SDLC) using appropriate methodology. The SDLC consists of phases varying from author to author. Howev...Before Information Systems are developed, they must have undergone a process called Systems Development Life Cycle (SDLC) using appropriate methodology. The SDLC consists of phases varying from author to author. However, an information systems project can only be successful with intense interaction amongst project manager, systems analyst, system designers and the end users. Viewed from the project manager’s perspective, the SDLC lacks the essence of project management activities. Similarly, end users involvement is not clearly specified. The main aim of this paper is to propose a framework for information systems management and development process which accommodates the views of the different participants. Furthermore, the paper sharpens the concept of conventional SDLC, on the basis of the proposed framework. In addition, tools and methods that are appropriate for the implementation of the framework are herein discussed.展开更多
This paper describes the implementation of an Information Systems (IS) capstone project management course that is a requirement for graduating seniors in an undergraduate Computer Information Systems (CIS) program...This paper describes the implementation of an Information Systems (IS) capstone project management course that is a requirement for graduating seniors in an undergraduate Computer Information Systems (CIS) program at a regional university. The description provides a model which includes the culmination of students' academic training in an IS curriculum which is part of a Bachelor of Business Administration (BBA) program in an accredited college of business. The course requires an application of technical and business skills, as well as systems development and project management skills--while students are working on an actual IS project for an external sponsoring organization. Rationale for implementing this type of course includes the benefits it provides to the students, the project sponsors, and the IS department providing the course. Feedback from the course is used as integral part of the C1S curriculum assessment process used for accreditation purposes.展开更多
本文运用Citespace文献计量分析软件,以《Information Systems Research》(简称ISR)期刊在1998年至2017年近20年收录的747篇文献为研究对象,从文献产出分析、国家合作网络分析、机构合作网络分析和引文网络聚类分析四个方面进行研究,研...本文运用Citespace文献计量分析软件,以《Information Systems Research》(简称ISR)期刊在1998年至2017年近20年收录的747篇文献为研究对象,从文献产出分析、国家合作网络分析、机构合作网络分析和引文网络聚类分析四个方面进行研究,研究结果表明:1) 根据文献产出分析,ISR期刊的文献产出量呈现波动性增长;2) 根据国家合作网络分析,美国在国家合作网络中是核心节点,中国需要加强国际合作,提高自身影响力;3) 在研究机构合作网络中,文献产出量前五所高校均位于美国,同时根据合作网络中心性分析,中心性在0.1以上的12所机构中,9所位于美国,中国只有香港城市大学列于其中,另外,德克萨斯大学达拉斯分校、佐治亚理工学院、新加坡国立大学和德克萨斯大学奥斯汀分校,在信息系统领域研究潜力巨大;4) 根据引文网络聚类分析,研究热点的演变可分为三个阶段:1998年至2001年期间信息系统领域研究的重心在信息系统的企业应用,2002年至2011年期间研究重心由传统的组织转移到虚拟组织的测量指标、信任和影响因素,2012年至2017年期间由电子口碑研究转向在线知识社区中的知识扩散研究。展开更多
New sensing and wireless technologies generate massive data. This paper proposes an efficient Bayesian network to evaluate the slope safety using large-quantity field monitoring information with underlying physical me...New sensing and wireless technologies generate massive data. This paper proposes an efficient Bayesian network to evaluate the slope safety using large-quantity field monitoring information with underlying physical mechanisms. A Bayesian network for a slope involving correlated material properties and dozens of observational points is constructed.展开更多
A kind of networked control system is studied; the networked control system with noise disturbance is modeled based on information scheduling and control co-design. Augmented state matrix analysis method is introduced...A kind of networked control system is studied; the networked control system with noise disturbance is modeled based on information scheduling and control co-design. Augmented state matrix analysis method is introduced, and robust fault-tolerant control problem of networked control systems with noise disturbance under actuator failures is studied. The parametric expression of the controller under actuator failures is given. Furthermore, the result is analyzed by simulation tests, which not only satisfies the networked control systems stability, but also decreases the data information number in network channel and makes full use of the network resources.展开更多
Advanced traveler information systems (ATIS) can not only improve drivers' accessibility to the more accurate route travel time information, but also can improve drivers' adaptability to the stochastic network cap...Advanced traveler information systems (ATIS) can not only improve drivers' accessibility to the more accurate route travel time information, but also can improve drivers' adaptability to the stochastic network capacity degradations. In this paper, a mixed stochastic user equilibrium model was proposed to describe the interactive route choice behaviors between ATIS equipped and unequipped drivers on a degradable transport network. In the proposed model the information accessibility of equipped drivers was reflected by lower degree of uncertainty in their stochastic equilibrium flow distributions, and their behavioral adaptability was captured by multiple equilibrium behaviors over the stochastic network state set. The mixed equilibrium model was formulated as a fixed point problem defined in the mixed route flows, and its solution was achieved by executing an iterative algorithm. Numerical experiments were provided to verify the properties of the mixed network equilibrium model and the efficiency of the iterative algorithm.展开更多
Secure sensor networks has received much attention in the last few years.A sensor network always works unattended possibly in a hostile environment such as a battlefield.In such environments,sensor networks are subjec...Secure sensor networks has received much attention in the last few years.A sensor network always works unattended possibly in a hostile environment such as a battlefield.In such environments,sensor networks are subject to node capture.Constrained energy,memory,and computational capabilities of sensor nodes mandate a clever design of security solutions to minimize overhead while maintaining secure communication over the lifespan of the network.In this paper,an authenticated dynamic key management scheme,ADKM has been proposed.It provides efficient,scalable,and survivable dynamic keying in a clustered sensor network with a large number of sensor nodes.ADKM employs a combinatorial exclusion basis system (EBS) for efficiency and one-way hash chains for authentication.Analysis of security and performance demonstrate that ADKM is efficient in security of sensor networks.展开更多
Information security is the backbone of current intelligent systems,such as the Internet of Things(IoT),smart grids,and Machine-to-Machine(M2M)communication.The increasing threat of information security requires new m...Information security is the backbone of current intelligent systems,such as the Internet of Things(IoT),smart grids,and Machine-to-Machine(M2M)communication.The increasing threat of information security requires new models to ensure the safe transmission of information through such systems.Recently,quantum systems have drawn much attention since they are expected to have a significant impact on the research in information security.This paper proposes a quantum teleportation scheme based on controlled multi-users to ensure the secure information transmission among users.Quantum teleportation is an original key element in a variety of quantum information tasks as well as quantum-based technologies,which plays a pivotal role in the current progress of quantum computing and communication.In the proposed scheme,the sender transmits the information to the receiver under the control of a third user or controller.Here,we show that the efficiency of the proposed scheme depends on the properties of the transmission channel and the honesty of the controller.Compared with various teleportation scheme presented recently in the literature,the most important difference in the proposed scheme is the possibility of suspicion about the honesty of the controller and,consequently,taking proper precautions.展开更多
Information-centric networking(ICN) aims to improve the efficiency of content delivery and reduce the redundancy of data transmission by caching contents in network nodes. An important issue is to design caching metho...Information-centric networking(ICN) aims to improve the efficiency of content delivery and reduce the redundancy of data transmission by caching contents in network nodes. An important issue is to design caching methods with better cache hit rate and achieve allocating on-demand. Therefore, an in-network caching scheduling scheme for ICN was designed, distinguishing different kinds of contents and dynamically allocating the cache size on-demand. First discussing what was appropriated to be cached in nodes, and then a classification about the contents could be cached was proposed. Furthermore, we used AHP to weight different contents classes through analyzing users' behavior. And a distributed control process was built, to achieve differentiated caching resource allocation and management. The designed scheme not only avoids the waste of caching resource, but also further enhances the cache availability. Finally, the simulation results are illustrated to show that our method has the superior performance in the aspects of server hit rate and convergence.展开更多
Now, GISs are popular at most major cities along the coast in China. The lack of available digital geographic data is a serious bottleneck problem. This article first analyses the development characteristics of urban ...Now, GISs are popular at most major cities along the coast in China. The lack of available digital geographic data is a serious bottleneck problem. This article first analyses the development characteristics of urban planning and management information system in China, and proposes a method for establishing a planning and management information system for small town. By using GIS as core and integrating with microcomputer network, office automation (OA), computer aided design (CAD), and multimedia technology, a microcomputer information system (TownMIS) is implemented after 3 year design and development. It may be a first comprehensive system for the planning and management of small towns. Since the January of 1996, TownMIS has been actually used in Xiaolan Town, a coastal rich town in South China. This has provided perfect technical, managerial, operational and institutional references for resolving the contradiction of the fast growing installation of GIS sites and fewer actually running system.展开更多
In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also gen...In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also generated the problem that it is not fully functioning as a means for the information sharing in a governmental agency. So, the purpose of this research is to find how the administrative document management system can function as information sharing in administrative organization. For this purpose, this paper considers the current status and some problems firstly. And secondary, this paper proposes the idea and constructs some information systems using administrative official Website. This is the method and approach of this research. As a conclusion, this proposal information system junctions as information sharing support systems.展开更多
基金This work was supported by the Kyonggi University Research Grant 2022.
文摘Recommendation Information Systems(RIS)are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet.Graph Convolution Network(GCN)algorithms have been employed to implement the RIS efficiently.However,the GCN algorithm faces limitations in terms of performance enhancement owing to the due to the embedding value-vanishing problem that occurs during the learning process.To address this issue,we propose a Weighted Forwarding method using the GCN(WF-GCN)algorithm.The proposed method involves multiplying the embedding results with different weights for each hop layer during graph learning.By applying the WF-GCN algorithm,which adjusts weights for each hop layer before forwarding to the next,nodes with many neighbors achieve higher embedding values.This approach facilitates the learning of more hop layers within the GCN framework.The efficacy of the WF-GCN was demonstrated through its application to various datasets.In the MovieLens dataset,the implementation of WF-GCN in LightGCN resulted in significant performance improvements,with recall and NDCG increasing by up to+163.64%and+132.04%,respectively.Similarly,in the Last.FM dataset,LightGCN using WF-GCN enhanced with WF-GCN showed substantial improvements,with the recall and NDCG metrics rising by up to+174.40%and+169.95%,respectively.Furthermore,the application of WF-GCN to Self-supervised Graph Learning(SGL)and Simple Graph Contrastive Learning(SimGCL)also demonstrated notable enhancements in both recall and NDCG across these datasets.
文摘COVID-19 pandemic restrictions limited all social activities to curtail the spread of the virus.The foremost and most prime sector among those affected were schools,colleges,and universities.The education system of entire nations had shifted to online education during this time.Many shortcomings of Learning Management Systems(LMSs)were detected to support education in an online mode that spawned the research in Artificial Intelligence(AI)based tools that are being developed by the research community to improve the effectiveness of LMSs.This paper presents a detailed survey of the different enhancements to LMSs,which are led by key advances in the area of AI to enhance the real-time and non-real-time user experience.The AI-based enhancements proposed to the LMSs start from the Application layer and Presentation layer in the form of flipped classroom models for the efficient learning environment and appropriately designed UI/UX for efficient utilization of LMS utilities and resources,including AI-based chatbots.Session layer enhancements are also required,such as AI-based online proctoring and user authentication using Biometrics.These extend to the Transport layer to support real-time and rate adaptive encrypted video transmission for user security/privacy and satisfactory working of AI-algorithms.It also needs the support of the Networking layer for IP-based geolocation features,the Virtual Private Network(VPN)feature,and the support of Software-Defined Networks(SDN)for optimum Quality of Service(QoS).Finally,in addition to these,non-real-time user experience is enhanced by other AI-based enhancements such as Plagiarism detection algorithms and Data Analytics.
文摘In recent years, the increasingly complexity of the logistic and technical aspects of the novel manufacturing environments, as well as the need to increase the performance and safety characteristics of the related cooperation, coordi-nation and control mechanisms is encouraging the development of new information management strategies to direct and man- age the automated systems involved in the manufacturing processes. The Computational Intelligent (CI) approaches seem to provide an effective support to the challenges posed by the next generation industrial systems. In particular, the Intelligent Agents (IAs) and the Multi-Agent Systems (MASs) paradigms seem to provide the best suitable solutions. Autonomy, flexibility and adaptability of the agent-based technology are the key points to manage both automated and information processes of any industrial system. The paper describes the main features of the IAs and MASs and how their technology can be adapted to support the current and next generation advanced industrial systems. Moreover, a study of how a MAS is utilized within a productive process is depicted.
文摘Research on the intersection of the areas of aviation and management of information systems is scarce. Airports, more than ever before need to align their information systems to gain a competitive advantage and become more efficient in their operations. A proper classification is a prerequisite to systems alignment. The purpose of this paper is to provide descriptions of some of the airport management information systems, connections to or interoperability with other systems, and the key uses and users of each system. There are many types of management information systems and they can be organized or classified in a number of different ways. Furthermore, each system may or may not be necessary for a particular airport depending on the business goals and objectives and the certificate which the airport is operating under. Consequently, the system classification schema presented in this paper is neither all-inclusive nor exclusive;however, a number of leading aviation practitioners, business professionals, and educators in the industry were instrumental in both proposing and validating the schema. The study used interviews, documentation, and observation as the primary sources of data.
文摘Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively guarantees the efficiency and quality.At present,due to the wide variety of external information that Chinese citizens are exposed to,in addition to the variegated and mixed content,it is easy for information to be leaked or stolen.In order to avoid similar situations,it is necessary for people to pay more attention to network system security,so as to ensure that the quality of life of citizens can be guaranteed.In view of that,this paper discusses and analyzes the application of computer network technology in electronic information engineering.
文摘Research on the intersection of the areas of aviation and management information systems is sparse. Just as within other economic sectors, members of the aviation sector must incorporate new and existing technologies as they grow to maintain their competitive edge whether in aircraft systems, airports or other aerospace and aviation related industries. A proper classification is a prerequisite to systems alignment. This paper reviews landside airport information management systems, and their connections and interoperability with other systems and who the key airport users are. The information presented in this paper is based on interviews and data collection at a number of representative airports across the United States. Airport size and function are key considerations in the acquisition of information management system airside or land side. The implication is that not all airports are equipped in the same manner and therefore these systems can only be considered as representative of what exists “on the ground”. This paper represents a point of departure or a reference for those researchers interested in a more indepth study of airport information systems on the landside.
文摘The plain of Mascara includes groundwater resources, heavily exploited for the needs of the population, industry and agriculture. However, this resource is under threat from the point of view of quality and quantity. The degradation of water quality comes from water discharges untreated (domestic and/or industrial) and from the irrational use of fertilizers and pesticides in agriculture. The decrease in reserves is due to the effects of intensive exploitation. Several studies on the water resources of the plain generated a mass of very important data. In most cases, these data are disparate at different institutions managers (water resources, environment, etc.), and are found recorded in paper documents, difficult to exploit. For this reason, it would be essential to use reliable new techniques, namely the GIS (geographic information systems). The implementation of the GIS of the plain of Mascara (with extension to all the sub-basin of Wadi Fekan) must permit to organize the data and transform it into information. Integration, crossing and superposition of the data with other variables may contribute to spatial analysis and generate very important thematic maps. The GIS constitutes a very effective decision aid tool for the management, exploitation, preservation and protection of water resources. The exploitation possibilities of GIS are multiple, direct or indirect. We give an example as the coupling with a groundwater flow model that may be the subject of additional work.
文摘Escalation of commitment has been linked to losses in information systems (IS) projects. Understanding the nature and the rationality of escalation allows the firm to promote optimal project management practices. This study takes an inter-disciplinary approach and draws on research from economics and management to create a model of irrational escalation and a model of rational escalation. The forces that contribute to irrational escalation include the responsibility of the same manager for both the project selection and project continuation decisions that create proneness to self-justification, the potential for negative framing of decision options due to large sunk costs, the proximity of project completion and the presence of organizational inertia. Identifying these irrational escalation factors helps design appropriate de-escalation techniques. The rational escalation model draws on the real option theory and the bandit process theory to identify conditions when project continuation is justified by the value of information and the value of flexibility that the firm receives from continuing the project.
文摘Before Information Systems are developed, they must have undergone a process called Systems Development Life Cycle (SDLC) using appropriate methodology. The SDLC consists of phases varying from author to author. However, an information systems project can only be successful with intense interaction amongst project manager, systems analyst, system designers and the end users. Viewed from the project manager’s perspective, the SDLC lacks the essence of project management activities. Similarly, end users involvement is not clearly specified. The main aim of this paper is to propose a framework for information systems management and development process which accommodates the views of the different participants. Furthermore, the paper sharpens the concept of conventional SDLC, on the basis of the proposed framework. In addition, tools and methods that are appropriate for the implementation of the framework are herein discussed.
文摘This paper describes the implementation of an Information Systems (IS) capstone project management course that is a requirement for graduating seniors in an undergraduate Computer Information Systems (CIS) program at a regional university. The description provides a model which includes the culmination of students' academic training in an IS curriculum which is part of a Bachelor of Business Administration (BBA) program in an accredited college of business. The course requires an application of technical and business skills, as well as systems development and project management skills--while students are working on an actual IS project for an external sponsoring organization. Rationale for implementing this type of course includes the benefits it provides to the students, the project sponsors, and the IS department providing the course. Feedback from the course is used as integral part of the C1S curriculum assessment process used for accreditation purposes.
基金supported by the Research Grants Council of the Hong Kong SAR Government(Grant Nos.16202716 and C6012-15G)
文摘New sensing and wireless technologies generate massive data. This paper proposes an efficient Bayesian network to evaluate the slope safety using large-quantity field monitoring information with underlying physical mechanisms. A Bayesian network for a slope involving correlated material properties and dozens of observational points is constructed.
基金Hohai University Startup Outlay for Doctor Scientific Research (2084/40601136)
文摘A kind of networked control system is studied; the networked control system with noise disturbance is modeled based on information scheduling and control co-design. Augmented state matrix analysis method is introduced, and robust fault-tolerant control problem of networked control systems with noise disturbance under actuator failures is studied. The parametric expression of the controller under actuator failures is given. Furthermore, the result is analyzed by simulation tests, which not only satisfies the networked control systems stability, but also decreases the data information number in network channel and makes full use of the network resources.
基金Projects(51378119,51578150)supported by the National Natural Science Foundation of China
文摘Advanced traveler information systems (ATIS) can not only improve drivers' accessibility to the more accurate route travel time information, but also can improve drivers' adaptability to the stochastic network capacity degradations. In this paper, a mixed stochastic user equilibrium model was proposed to describe the interactive route choice behaviors between ATIS equipped and unequipped drivers on a degradable transport network. In the proposed model the information accessibility of equipped drivers was reflected by lower degree of uncertainty in their stochastic equilibrium flow distributions, and their behavioral adaptability was captured by multiple equilibrium behaviors over the stochastic network state set. The mixed equilibrium model was formulated as a fixed point problem defined in the mixed route flows, and its solution was achieved by executing an iterative algorithm. Numerical experiments were provided to verify the properties of the mixed network equilibrium model and the efficiency of the iterative algorithm.
基金The work reported in this paper was supported by the National Natural Science Foundation of China under Grant No. 60972077, the National High-Tech Research and Development Plan of China under Grant No. 2009AA01 Z430, the Beijing Municipal Natural Science Foundation under Grant No. 9092009, the Fundamental Research Funds for the Central Universities under Grant No. B 1020211, China Postdoctoral Science Foundation funded project under Grant No. 20100471373, the "Six Talent Peaks Program" of Jiangsu Province of China and Program for New Century Excellent Talents in Hohai University.
文摘Secure sensor networks has received much attention in the last few years.A sensor network always works unattended possibly in a hostile environment such as a battlefield.In such environments,sensor networks are subject to node capture.Constrained energy,memory,and computational capabilities of sensor nodes mandate a clever design of security solutions to minimize overhead while maintaining secure communication over the lifespan of the network.In this paper,an authenticated dynamic key management scheme,ADKM has been proposed.It provides efficient,scalable,and survivable dynamic keying in a clustered sensor network with a large number of sensor nodes.ADKM employs a combinatorial exclusion basis system (EBS) for efficiency and one-way hash chains for authentication.Analysis of security and performance demonstrate that ADKM is efficient in security of sensor networks.
文摘Information security is the backbone of current intelligent systems,such as the Internet of Things(IoT),smart grids,and Machine-to-Machine(M2M)communication.The increasing threat of information security requires new models to ensure the safe transmission of information through such systems.Recently,quantum systems have drawn much attention since they are expected to have a significant impact on the research in information security.This paper proposes a quantum teleportation scheme based on controlled multi-users to ensure the secure information transmission among users.Quantum teleportation is an original key element in a variety of quantum information tasks as well as quantum-based technologies,which plays a pivotal role in the current progress of quantum computing and communication.In the proposed scheme,the sender transmits the information to the receiver under the control of a third user or controller.Here,we show that the efficiency of the proposed scheme depends on the properties of the transmission channel and the honesty of the controller.Compared with various teleportation scheme presented recently in the literature,the most important difference in the proposed scheme is the possibility of suspicion about the honesty of the controller and,consequently,taking proper precautions.
基金supported in part by The National High Technology Research and Development Program of China (863 Program) under Grant No. 2015AA016101The National Natural Science Foundation of China under Grant No. 61501042+1 种基金Beijing Nova Program under Grant No. Z151100000315078BUPT Special Program for Youth Scientific Research Innovation under Grant No. 2015RC10
文摘Information-centric networking(ICN) aims to improve the efficiency of content delivery and reduce the redundancy of data transmission by caching contents in network nodes. An important issue is to design caching methods with better cache hit rate and achieve allocating on-demand. Therefore, an in-network caching scheduling scheme for ICN was designed, distinguishing different kinds of contents and dynamically allocating the cache size on-demand. First discussing what was appropriated to be cached in nodes, and then a classification about the contents could be cached was proposed. Furthermore, we used AHP to weight different contents classes through analyzing users' behavior. And a distributed control process was built, to achieve differentiated caching resource allocation and management. The designed scheme not only avoids the waste of caching resource, but also further enhances the cache availability. Finally, the simulation results are illustrated to show that our method has the superior performance in the aspects of server hit rate and convergence.
文摘Now, GISs are popular at most major cities along the coast in China. The lack of available digital geographic data is a serious bottleneck problem. This article first analyses the development characteristics of urban planning and management information system in China, and proposes a method for establishing a planning and management information system for small town. By using GIS as core and integrating with microcomputer network, office automation (OA), computer aided design (CAD), and multimedia technology, a microcomputer information system (TownMIS) is implemented after 3 year design and development. It may be a first comprehensive system for the planning and management of small towns. Since the January of 1996, TownMIS has been actually used in Xiaolan Town, a coastal rich town in South China. This has provided perfect technical, managerial, operational and institutional references for resolving the contradiction of the fast growing installation of GIS sites and fewer actually running system.
基金supported by National Natural Science Foundation of China(61233004,61221003,61374109,61104091,61304078,61473184)National Basic Research Program of China(973 Program)(2013CB035500)+2 种基金the International Cooperation Program of Shanghai Science and Technology Commission(12230709600)the Higher Education Research Fund for the Doctoral Program of China(20120073130006,20110073110018)the China Postdoctoral Science Foundation(2013M540364)
文摘In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also generated the problem that it is not fully functioning as a means for the information sharing in a governmental agency. So, the purpose of this research is to find how the administrative document management system can function as information sharing in administrative organization. For this purpose, this paper considers the current status and some problems firstly. And secondary, this paper proposes the idea and constructs some information systems using administrative official Website. This is the method and approach of this research. As a conclusion, this proposal information system junctions as information sharing support systems.