Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type

Articles 4141 - 4170 of 4242

Full-Text Articles in Management Information Systems

Orion: A Menu-Driveri Source Code Generator For End Users, Jay M. Lightfoot Jan 1993

Orion: A Menu-Driveri Source Code Generator For End Users, Jay M. Lightfoot

Journal of International Information Management

Low software development productivity is a major concern for corporations. This paper describes one approach to improve productivity by allowing end users to build their own business data processing systems. The approach uses Orion, a menu-driven software development tool. Orion generates source level COBOL programs that compile and run without modification. The tool does not require end users to know COBOL or high-level query languages. Orion was used for nearly two years to build real business systems. The approach resulted in a significant improvement in software development productivity.


A Group Decision Support System For The Asian Pacific Rim, Milan Aiken, Chi Hwang, Joseph Paolillo, Daeryong Kim, Long-Chuan Lu Jan 1993

A Group Decision Support System For The Asian Pacific Rim, Milan Aiken, Chi Hwang, Joseph Paolillo, Daeryong Kim, Long-Chuan Lu

Journal of International Information Management

The vast majority of research on Group Decision Support Systems (GDSSs) has been conducted on American groups using English. However, other nationalities using other languages may also benefit from this new technology. The GDSS developed at the University of Mississippi supports over a dozen languages including Japanese, Chinese, Korean, Russian, and Malay which are particularly relevant to organizations on the Asian Pacific rim. Three pilot studies of Japanese, Chinese, and Malaysian students using the GDSS demonstrate that these groups can benefit from the technology.


Use Of Expert Systems In Harmonizing International Accounting Reports, Mohammad S. Bazaz, Ravi Parameswaran Jan 1993

Use Of Expert Systems In Harmonizing International Accounting Reports, Mohammad S. Bazaz, Ravi Parameswaran

Journal of International Information Management

A significant problem in international accounting is the presence of a variety of accounting and disclosure standards that have been adopted by various countries as they match their national information needs to specific formats. Efforts at harmonization of world-wide financial statements have been less than successful. The needs in the 1990s suggest the need for an expedient solution to this problem. The current paper addresses this problem and suggests an information systems approach—a new approach—namely the development of an expert system which would be capable of translating disclosure in a particular country standard to one that meets internationally acceptable accounting …


Job Attribute Preferences Of The Workforce In Polish High Technology Enterprises, Florian Michael Sisavic Jan 1993

Job Attribute Preferences Of The Workforce In Polish High Technology Enterprises, Florian Michael Sisavic

Dissertations and Theses

A key precept in work place motivation theory is that management knows what job attributes are valued by the employee. Management can benefit by asking employees what they want from their work experience (i.e., job attribute preferences), rather than assume they know. This is particularly important to Polish high technology companies that are in transition to a free-market economy and to Polish workers who must be appropriately motivated to compete globally.

This study attempts to better understand the job attribute preferences of Polish managers and workers, the potential gaps between Polish managers' perception of their workers' preferences (system), and how …


Integrated Diagnostic Expert System Model (Idesm): A Model For The Conversion Of Fault Isolation Procedures Into An Integrated Diagnostic Expert System, Robert J. Lacey, Glen D. Steemson Dec 1992

Integrated Diagnostic Expert System Model (Idesm): A Model For The Conversion Of Fault Isolation Procedures Into An Integrated Diagnostic Expert System, Robert J. Lacey, Glen D. Steemson

Theses and Dissertations

The purpose of this research was to develop a model to convert existing hardcopy maintenance manual fault isolation procedures into electronic format and to partially automate the fault isolation process. A comprehensive model was developed which comprised four major components: user interface, expert system submodel, hypermedia submodel, and a submodel integration shell. Using this model, the F 15E nose landing gear fault isolation procedures were transformed into a rule based expert system. An existing hypermedia information base was expanded and subsequently integrated with the expert system to form the prototype application. The prototype was evaluated by engineering and maintenance personnel …


Staffing Sources Of Usaf Medical Center Systems Offices: A Study Of Their Relation To Information Systems Quality, William K. Dorr, Shelley D. Christia Dec 1992

Staffing Sources Of Usaf Medical Center Systems Offices: A Study Of Their Relation To Information Systems Quality, William K. Dorr, Shelley D. Christia

Theses and Dissertations

This study measured the relationship between Medical Systems Office staffing source (i.e., military medical, military communications/computer, civilian government, and contractor personnel) and quality of automated information services provided at CONUS USAF medical centers. A literature search determined that information system quality is best measured on eight dimensions: performance, features, reliability, conformance, durability, serviceability, aesthetics, and perceived quality. The CIO at each medical center was surveyed to determine the level of system conformance to Air Force standards and to gather data on each MSO staff. Users at the medical centers were also surveyed in order to measure performance, features, reliability, serviceability, …


Corporate Information Management And Business Process Improvement Under The Unit Cost Program: An Analysis Of A System For The Air Force Institute Of Technology, Kevin D. Kettell, Fredrick T. Ziegler Ii Dec 1992

Corporate Information Management And Business Process Improvement Under The Unit Cost Program: An Analysis Of A System For The Air Force Institute Of Technology, Kevin D. Kettell, Fredrick T. Ziegler Ii

Theses and Dissertations

DOD has been undergoing changes toward a competitive business-type environment as a result of the Packard Commission and -the Goldwater-Nichols Act. As a result of the Goldwater-Nichols Act, two programs directly affect the Air Force Institute of Technology (AFIT): Defense Management Report Decision 971, better known as the Defense Business Operations Fund (DBOF); and, the Corporate Information Management (CIM) initiative. DBOF requires that organizations provide unit cost per output figures as the basis for organizational funding. Unit cost resourcing changes the way federal managers manage and allocate resources, and promotes quality management and continuous improvement principles. Defense Information Management recognizes …


Automated Logistics Information Systems: A Case Study, James E. Hogue Dec 1992

Automated Logistics Information Systems: A Case Study, James E. Hogue

Theses and Dissertations

A change within the Air Force has shifted management responsibilities within the logistics community. Formerly diverse functions have come under the purview of a single manager-the Logistics Group Commander-who has inherited information systems that may riot be able to provide consolidated information for informed and accurate decision making. The purpose of this thesis was to describe the current and potential ability for three logistics information management systems to share data: Standard Base Supply System, Consolidated Aircraft Management System, and On-Line Vehicle Information Management System. A systems model was synthesized from the literature review to determine what components of a system …


An Analysis Of The Effectiveness Of Air Force Information Management Officer Training Based On The Perceived Needs Of Current Information Management Officers, David P. Biros, Stewart J. Cole Dec 1992

An Analysis Of The Effectiveness Of Air Force Information Management Officer Training Based On The Perceived Needs Of Current Information Management Officers, David P. Biros, Stewart J. Cole

Theses and Dissertations

The purpose of this study was to determine if the computer orientation courses provided Air Force information managers are properly focused. This study found that the courses have made the desired impact and, with minor exceptions, information managers perceive then-selves to be more knowledgeable after the training. From the results of the survey it is apparent that information managers are more knowledgeable of computers than they were in a study completed in 1988. The officers who attended training after the course was modified to include computer orientation were much more satisfied with their training than previous graduates. They indicated a …


Porting Cosmos Expert System From Unix To Dos, Ching-Jeng Chiu Oct 1992

Porting Cosmos Expert System From Unix To Dos, Ching-Jeng Chiu

Theses

COSMOS is an object-oriented Knowledge Based System building Tools (KBSTs) to solve problem in engineering industry. COSMOS stands for C++ Object-oriented System Made for expert System development.

In order to provide more people those who don't have a Sun workstation to use this expert system, our task is porting COSMOS form UNIX to DOS.

Because the differents of workstation environment, the user interface and structure of original COSMOS no longer can be used, therefore we made some necessary change before we porting it to IBM Personal Computer.

In stead of X Window system®, we implemented ObjectWindows® runs on Microsoft WindowsTM. …


Character Recognition Using String Matching, Xiaozhi Ye Oct 1992

Character Recognition Using String Matching, Xiaozhi Ye

Theses

To handle noisy and distorted pattern is the use of similarity or distance measures. A similarity or distance measure can be defined between a representation of an unknown pattern and a representation of a prototype pattern. Recognition of the unknown pattern can be carried out on the basis of the maximum-similarity or minimum distance criterion (Bunke 1990) This approach is proposed to recognize the noisy or distorted character image. In this work, a directly string representation of the pattern ( prototype as well as unknown input) using the histogram method, a decision procedure for classification is the well known Levenshtein …


Performance Analysis Of Queueing Systems With Synchronous Server, Wonmu Hur Oct 1992

Performance Analysis Of Queueing Systems With Synchronous Server, Wonmu Hur

Theses

The performance measures are derived for a queueing system which is characterized by its synchronous server operations. This property is the one which normal queueing systems lack. A system of this nature contains a single common server to which multiple number of buffers are connected in parallel, where the server operates only when all system buffers are occupied.

In this thesis, the analysis is carried out focusing on the simplest system involving only two buffers. Throughout the analysis, a symmetricity of the system is assumed (i.e., system is symmetrical in terms of arriving customer statistics.). Also assumed are the Poisson …


Domain Analysis Within The Gensif Framework, Heiko Thimm Oct 1992

Domain Analysis Within The Gensif Framework, Heiko Thimm

Theses

The GenSIF framework which is targeted towards very large, distributed, and complex software systems recently has been proposed to accomplish a form of systems engineering and systems development in which the issue of systems integration is considered from the beginning on.

One of the components of GenSIF is domain analysis. Domain analysis leads to the design of a domain model. The specific needs GenSIF has in that area were investigated with an emphasis on domain modeling. Main points addressed in that investigation were the issue regarding the relevant information for the domain modeling process and the required type of domain …


Design And Implementation Of Two Text Recognition Algorithms, Madhumathi Yendamuri Oct 1992

Design And Implementation Of Two Text Recognition Algorithms, Madhumathi Yendamuri

Theses

This report presents two algorithms for text recognition. One is a neural-based orthogonal vector with pseudo-inverse approach for pattern recognition. A method to generate N orthogonal vectors for an N-neuron network is also presented. This approach converges the input to the corresponding orthogonal vector representing the prototype vector. This approach can restore an image to the original image and thus has error recovery capacility. Also, the concept of sub-networking is applied to this approach to enhance the memory capacity of the neural network. This concept drastically increases the memory capacity of the network and also causes a reduction of the …


A Study Of Organizational Downsizing And Information Management Strategies, Terry L. Brown, Dale J. Long Sep 1992

A Study Of Organizational Downsizing And Information Management Strategies, Terry L. Brown, Dale J. Long

Theses and Dissertations

Organizational downsizing and strategic information management are two important trends that have developed in the business world over the last 10 years. This study was conducted to identify possible links between these two trends. It also tries to identify some potential benefits and pitfalls associated with simultaneously restructuring an organization and upgrading its information management systems. This study is initial, descriptive research in this area. Interviews were conducted with six organizations of varying size and type that had both downsized and upgraded information systems within the past five years. While the small size of the sample and time constraints on …


New Algorithms For Mid-Crack Codes In Image Processing, Wai-Tak Wong May 1992

New Algorithms For Mid-Crack Codes In Image Processing, Wai-Tak Wong

Theses

The chain code is a widely-used description for a contour image. Recently, a mid-crack code algorithm has been proposed as another more precise method for image representation. New algorithms using this new mid-crack code for image representation, restoration, and skeletonization are developed. The efficiency and accuracy can be increased obviously.

Firstly, the conversion of a binary image with multiple regions into the mid-crack codes is presented. A fast on-line implementation can be achieved using tables look-up. The input binary image may contain several object regions and their mid-crack codes can be extracted at the same time in a single-pass row-by-row …


Graphical Image Persistence And Code Generation For Object Oriented Databases, Subrata Chatterjee May 1992

Graphical Image Persistence And Code Generation For Object Oriented Databases, Subrata Chatterjee

Theses

Attached is the detailed description of the design and implementation of graphical image persistence and code generation for object oriented databases. Graphical image persistent is incorporated into a graphics editor called OODINI. OODINI creates and manipulates graphical schemas for object-oriented databases. This graphical image on secondary storage is then translated into an abstract, generic code for dual model databases. This abstract code, DAL can then be converted into different dual model database languages. We provide an example by generating code for the VODAK Data Modeling language. It is also possible to generate a different abstract language code, OODAL from a …


An Implementation And Evaluation Of Distributed Information System Based On The Osca Architecture Guidelines, Babita Masand May 1992

An Implementation And Evaluation Of Distributed Information System Based On The Osca Architecture Guidelines, Babita Masand

Theses

The concepts in this thesis discuss and evaluate the need for systems integration. As a conceptual architecture, the OSCATM architecture is investigated. A prototype of the CS Department distributed information system is built following the guidelines and standards of this conceptual architecture. This prototype is implemented in 'C'. RPC (remote procedure call) is used for the communication channel to implement the distributed environment. Conclusions and results that were achieved by implementing this prototype are presented. The main outcome of this thesis is the introduction of the infrastructure to the GenSIF framework.


Decomposition Of Geometric-Shaped Structuring Elements And Optimization On Euclidean Distance Transformation Using Morphology, Hong Wu May 1992

Decomposition Of Geometric-Shaped Structuring Elements And Optimization On Euclidean Distance Transformation Using Morphology, Hong Wu

Theses

Mathematical morphology which is based on geometric shape, provides an approach to the processing and analysis of digital images. Several widely-used geometric-shaped structuring elements can be used to explore the shape characteristics of an object. In first chapter, we present a unified technique to simplify the decomposition of various types of big geometric-shaped structuring elements into dilations of smaller structuring components by the use of a mathematical transformation. Hence, the desired morphological erosion and dilation are equivalent to a simple inverse transformation over the result of operations on the transformed decomposable structuring elements. We also present a strategy to decompose …


Operating Manual: Living Scriptures Management Information System, Deryn Young May 1992

Operating Manual: Living Scriptures Management Information System, Deryn Young

Undergraduate Honors Capstone Projects

This management information system is specifically designed to provide the managers of the Living Scripture's Summer Program with complete, timely, accurate sales data for each sales person, each team and both groups. The system uses dBASE IV Version 1.2 as its foundation. A majority of the functions the system performs are specialized features of DBASE IV, although some major modifications have been made to the DBASE code in most of the reports. The modifications were made to meet the user's specifications. The major functions of the system requiring user input include; inputting personal information for each sales person, inputting weekly …


Deterministic Approximations To Co-Production Problems With Service Constraints And Random Yields, Gabriel R. Bitran, Thin Yin Leong May 1992

Deterministic Approximations To Co-Production Problems With Service Constraints And Random Yields, Gabriel R. Bitran, Thin Yin Leong

Research Collection School Of Computing and Information Systems

Production planning problems where multiple item categories are produced simultaneously are examined. The items have random yields and are used to satisfy the demands of many products. These products have specification requirements that overlap. An item originally targeted to satisfy the demand of one product may be used to satisfy the demand of other products when it conforms to their specifications. Customers' demand must be satisfied from inventory. The problem is formulated with service constraints and a near-optimal solution is provided to the problem with a fixed planning horizon. Simple heuristics are proposed for the problem solved with a rolling …


Real-Tv : Rtp/L3'S Visual Monitor, Richard Czop Jan 1992

Real-Tv : Rtp/L3'S Visual Monitor, Richard Czop

Theses

Today many real-world activities are being monitored and controlled by some type of micro-processor based system. Emphasis is placed on manufacturing and controlling through the use of computers. The inherent nature of these real-world applications makes them difficult to control and monitor. They must be built meeting strict timing constraints and must be predictable. We need to develop simplistic, reliable, and cost effective methods for building, evaluating, monitoring and controlling these complex systems. These tools should provide the user with system insight. At the New Jersey Institute of Technology Real-Time Computing Laboratory, we are building a system that will provide …


Searching For Orthogonal States Of Neural Networks, Heng Wang Jan 1992

Searching For Orthogonal States Of Neural Networks, Heng Wang

Theses

Two approaches to find orthogonal states of neural network are presented in the paper. The first approach is a recursive one, it builds N orthogonal vectors based on N /2 orthogonal vectors. The second approach is a formula approach, in which orthogonal vectors can be obtained using a formula. Using these approaches, orthogonal states of neural network are found. Some properties of the neural network built on these orthogonal vectors are presented in Appendix A and some examples are given in Appendix B.


A Machine Entity For A Coordinate Measurement Machine : The Generic Workcell Project, Richard C. Meyer Jan 1992

A Machine Entity For A Coordinate Measurement Machine : The Generic Workcell Project, Richard C. Meyer

Theses

The Center for Manufacturing Systems (CMS) department at New Jersey Institute of Technology and Siemens Corporate Research located in Princeton have agreed to jointly implement a research project in generic workcell control architectures. This paper discusses the module, called a Machine Entity, developed by the author that interfaces the Brown & Sharpe Coordinate Measurement Machine located on the CMS factory floor with the cell control software. The module has been designed in such a manner to simplify the development of future Machine Entities, thereby reducing the time required to integrate the CMS factory floor.


Dynamic Machine Scheduling, Expansion, And Control Of A Generic Workcell, Peter A. Murray Jan 1992

Dynamic Machine Scheduling, Expansion, And Control Of A Generic Workcell, Peter A. Murray

Theses

Factory automation has come a long way since the invention of the automatic flour mill. A workcell is a group of machines (robots) working together to produce a product. In the past workcells have been hard wired using methods such as Programmable Logic Controllers (PLCs). To change a part of this system would require reprogramming the entire system.

The Generic Work Cell (GWC) is a dynamic architecture which allows a workcell to be modified on the fly. The architecture enables the generation of new cells with minimal effort, and the modification of the system without reprogramming the entire system. The …


Wordperfect 5.1 For Windows, James D. Brodzinski, Elaine A. Crable Jan 1992

Wordperfect 5.1 For Windows, James D. Brodzinski, Elaine A. Crable

Journal of International Information Management

WordPerfect 5.1 for Windows WordPerfect Corporation 1555 N. Technology Way Orem, Utah 84057


Brainmaker V2.3, James D. Brodzinski, Elaine A. Crable Jan 1992

Brainmaker V2.3, James D. Brodzinski, Elaine A. Crable

Journal of International Information Management

BRAINMAKER v2.3 California Scientific Software 10141 Evening Star Drive No. 6 Grass Valley, CA 95945


Personal Computing In The 1990s, Karen Reader, Brian H. Kleiner Jan 1992

Personal Computing In The 1990s, Karen Reader, Brian H. Kleiner

Journal of International Information Management

Personal computers have changed the way that business is conducted in today's office. Every position in a company is affected by the use of personal computers from secretaries to top level management. Tasks and job duties are performed more easily thereby increasing productivity. Personal computers in the 1990s will be networked via LANs to other personal computers, minicomputers and mainframes to enhance people's abilities and allow them to perform their jobs better. With the increased use of LANs, many LAN productivity applications wUl be utilized that will also increase productivity. E-Mail and groupware software will allow people to interact with …


Vertical Integration Of Computing Facilities, A Transaction Cost Approach, Michael Piptea, Dan Pieptea Jan 1992

Vertical Integration Of Computing Facilities, A Transaction Cost Approach, Michael Piptea, Dan Pieptea

Journal of International Information Management

This paper develops a generalized model for computing capacity by identifying the main activities in a computer facility as formal transactions. The formal transactions carried out in a computing environment are characterized along two dimensions: freqency of occurrence and idiosyncrasy of assets. Vfe make recommendations as to how these formal transactons should be executed - across markets, internally or using intermediate forms of governance. It is shown that transactions in a computing facility fall into one of three categories: procurement of assets, maintenance and modification of assets, and collection, storage and processing of data into information. Formal transactions in a …


The Blossoming Of Data Communications And The Thorns Of Computer Crimes: An Analysis Of The Use And Abuse Of Network Computing, Michael T. Tang Jan 1992

The Blossoming Of Data Communications And The Thorns Of Computer Crimes: An Analysis Of The Use And Abuse Of Network Computing, Michael T. Tang

Journal of International Information Management

No abstract provided.