首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The Integrated Computer Aided Manufacturing (ICAM) program of the U.S. Air Force identified a need to better communicate and analyze manufacturing for the people involved in improving productivity. To satisfy that need, the ICAM program developed the IDEF (ICAM Definition) method to address particular characteristics of manufacturing. This IDEF Method is equally applicable in analyzing other types of organizations.IDEF comprises of three modeling methodologies: Function model methodology (IDEF0), Information model methodology (IDEF1) and Dynamics model methodology (IDEF2). This paper reports on the function model methodology only. This methodology is used to construct a function model which helps in understanding the actions, activities, decisions, and informational interfaces needed to support the functions of an organization.  相似文献   

2.
The Integrated Computer Aided Manufacturing (ICAM) program of the U.S. Air Force identified a need to better communicate and analyze manufacturing for the people involved in improving productivity. To satisfy that need, the ICAM program developed the IDEF (ICAM Definition) method to address particular characteristics of manufacturing. This IDEF Method is equally applicable in analyzing other types of organizations.IDEF comprises of three modeling methodologies: function model methodology (IDEF0), information model methodology (IDEF1) and dynamics model methodology (IDEF2). This paper reports on the dynamics model methodology only. This methodology is used to construct models which help in understanding the Dynamic (time-varying behavior) structure which the functions of an organization exhibit.  相似文献   

3.
Information systems ranging over wide areas show properties that must be carefully analyzed and designed in order to meet the needs of the customers. Thus the development of such information systems is to be guided by software engineering methods that address problems like distribution of data and processes, communication aspects and fault tolerance. This paper shows the basic modeling concepts and the development process employed by the BOS Engineering Method to meet these requirements. The BOS Engineering Method applies the concept of business transactions to specify behavior in the early analysis phase. Appropriate abstraction levels are defined to reduce the complexity of specifying distribution issues. The development of complex distributed information systems needs a rigorous life cycle model. The BOS Engineering Method relaxes the waterfall life cycle model to allow controlled look ahead and feedback up and down the abstraction levels  相似文献   

4.
In this paper, we propose an algorithm for solving the problem of ensuring the information security of an organization. The algorithm consists of generating a set of threats aimed at the resources of an organization, generating variants of measures intended to provide protection from these threats, and formulating problems of optimizing the selection of measures intended to ensure information security. The algorithm is used in an expert, automatized information system for decision-making support.  相似文献   

5.
6.
In this work, we present the induction of a fuzzy model that represents the behavior of a partial known function. We extend the approach of classical induction of a classifier by building a decision tree, and its generalization for regression problems by CART, to build a fuzzy model. It is defined by a collection of fuzzy regions fixed in the input domain of the function. To obtain fuzzy regions of the input domain, we have defined a new method (FCMD) to get a fuzzy partition of a fuzzy set, which generalizes the classical Bezdeck's method FCM. © 2001 John Wiley & Sons, Inc.  相似文献   

7.
针对传统的基于角色的访问控制模型在大型应用系统中存在角色数目巨大、临时授权管理繁琐等问题,提出了一种改进的基于组织结构的RBAC模型(IO-RBAC).该模型规定角色只有在特定的组织部门中才能获取相应的权限,并能通过对特殊用户直接授权的方式实现临时授权.实际应用案例表明,该模型在减少角色数量的同时,提高了权限管理的灵活性.  相似文献   

8.
An integrated methodology for successful development and implementation of enterprise information systems is developed. This paper describes the methodology and defines five components and one repository which can be customized with business scenarios and patterns according to various business environments. Five components consist of information strategy planning, economic justification and measurement, enterprise information system appraisal, package software evaluation, and unified modeling tools. They characterize the methodology through its entire road map. Also, case studies are provided to prove its practical values.  相似文献   

9.
This paper suggests a constrained optimization model for the operating core of an organization. Structurally, the core consists of the basic technological module and several modules of support facilities. The production function of the operating core is represented through the superposition of Leontief production functions corresponding to each of the modules. We reduce the optimization problem to a linear programming problem with a parameter describing the operational structure of the core. In addition, we develop a certain algorithm for automatic construction of the basic equations for each value of the parameter. Finally, the optimization problem is solved numerically for a wide range of the model variables and parameters. The proposed model may serve for designing generalized control mechanisms for an organizational system on a large horizon.  相似文献   

10.
实现信息集成、有效信息共享一直是科研和产业界面临的一个挑战,网格技术为解决这一问题提出了解决方案。提出了一种在信息网格环境下基于虚拟组织的信息资源模型,给出了在该模型中如何动态映射虚拟资源和物理资源的方法,并给出相应的算法和分析。  相似文献   

11.
We propose a new concept for the organization of computing such that the number of sequential concurrent clock operations (or, the number of vector operations) is independent of the problem size n. Here, the architecture of the computing environment is adapted to the problem to be solved and the computing is performed without data exchange between the elementary processors the number of which depends on n. We describe an algorithm for implementing this idea using the problem of multiextremal optimization problem (the search for a maximum of n given numbers) and an algorithm for solving the traveling salesman problem as examples [1–4].  相似文献   

12.
针对企业级信息系统访问控制中由于用户、角色与资源客体数量多而引起的控制复杂这一问题,提出了基于组织建模的访问控制设计思想。借鉴组织视图建模思想对传统RBAC模型中角色概念进行拓展,对客体分类并进行组件化设计以支持访问粒度控制。在此基础上给出一个基于组织建模的企业级信息系统访问控制模型,定义了一组模型要素并给出了实现访问控制的机理。最后给出一个基于组织建模的访问控制模型实现,并结合具体实例表明了该模型的可行性和有效性。  相似文献   

13.
14.
In many types of information systems, users face an implicit tradeoff between disclosing personal information and receiving benefits, such as discounts by an electronic commerce service that requires users to divulge some personal information. While these benefits are relatively measurable, the value of privacy involved in disclosing the information is much less tangible, making it hard to design and evaluate information systems that manage personal information. Meanwhile, existing methods to assess and measure the value of privacy, such as self-reported questionnaires, are notoriously unrelated of real–world behavior. To overcome this obstacle, we propose a methodology called VOPE (Value of Privacy Estimator), which relies on behavioral economics' Prospect Theory (Kahneman & Tversky, 1979) and valuates people's privacy preferences in information disclosure scenarios. VOPE is based on an iterative and responsive methodology in which users take or leave a transaction that includes a component of information disclosure. To evaluate the method, we conduct an empirical experiment (n = 195), estimating people's privacy valuations in electronic commerce transactions. We report on the convergence of estimations and validate our results by comparing the values to theoretical projections of existing results (Tsai, Egelman, Cranor, & Acquisti, 2011), and to another independent experiment that required participants to rank the sensitivity of information disclosure transactions. Finally, we discuss how information systems designers and regulators can use VOPE to create and to oversee systems that balance privacy and utility.  相似文献   

15.
User participation in the design of computerized information systems is an accepted philosophy. The goal is to enhance the appreciation for and thus utility of the new system. In reality, however, system design procedures tend not to achieve this goal. The reason is that participation is implemented half heartedly, allowing the user to ask and answer questions, but not get involved in the design. This paper presents an adaptation of Nadler's “IDEALS” approach to the design of information systems. The approach presented is a five step procedure which removes the user from his daily information related activities and allows him to hypothesize an idealized use of information in his job. The approach then proceeds to allow the user and analyst to creatively implement a close approximation to the ideal design target.  相似文献   

16.
The issue of information architecture (IA) for organizations has recently received considerable attention in IS development. However, as yet little research has been reported on modeling IA using a systematic approach. This paper describes an object-oriented method for modeling it. The proposed method extends the traditional concept of IS analysis into the context of contemporary information technology (IT), and is useful for planning IT-enabled business process reengineering for the organization.  相似文献   

17.
鉴于模型在软件系统开发中日趋重要的地位和AADL模型在嵌入式软件建模中的良好应用前景,为了在嵌入式软件系统开发前期保证AADL模型的质量,提出了一种基于模型测试的AADL架构验证方法;该方法应用马尔可夫链描述AADL架构的行为,然后根据得到的马尔可夫链模型以及系统设计要求标准生成相应的测试用例和测试预言,并通过测试用例执行输出和期望值的比较判断AADL模型的正确性,实现对系统AADL模型的测试;最后通过案例分析证明了该方法的有效性。  相似文献   

18.
A model and methodology for hardware-software codesign   总被引:1,自引:0,他引:1  
A behavioral model of a class of mixed hardware-software systems is presented. A codesign methodology for such systems is defined. The methodology includes hardware-software partitioning, behavioral synthesis, software compilation, and demonstration on a testbed consisting of a commercial central processing unit (CPU), field-programmable gate arrays, and programmable interconnections. Design examples that illustrate how certain characteristics of system behavior and constraints suggest hardware or software implementation are presented  相似文献   

19.
An ontological model of an information system that provides precise definitions of fundamental concepts like system, subsystem, and coupling is proposed. This model is used to analyze some static and dynamic properties of an information system and to examine the question of what constitutes a good decomposition of an information system. Some of the major types of information system formalisms that bear on the authors' goals and their respective strengths and weaknesses relative to the model are briefly reviewed. Also articulated are some of the fundamental notions that underlie the model. Those basic notions are then used to examine the nature and some dynamics of system decomposition. The model's predictive power is discussed  相似文献   

20.
This paper presents a generalized model for the pull-in phenomenon in electrostatic actuators with a single input, either charge or voltage. The pull-in phenomenon of a general electrostatic actuator with a single input is represented by an algebraic equation referred to as the pull-in equation. This equation directly yields the pull-in parameters, namely, the pull-in voltage or pull-in charge and the pull-in displacement. The model presented here permits the analysis of a wide range of cases, including nonlinear mechanical effects as well as various nonlinear, nonideal, and parasitic electrical effects. In some of the cases, an analytic solution is derived, which provides physical insight into how the pull-in parameters depend upon the design and properties of the actuator. The pull-in equation can also yield rapid numerical solutions, allowing interactive and optimal design. The model is then utilized to analyze analytically the case of a Duffing spring, previously analyzed numerically by Hung and Senturia, and captures the variations of the pull-in parameters in the continuum between a perfectly linear spring and a cubic spring. Several other case studies are described and analyzed using the pull-in equation, including parallel-plate and tilted-plate (torsion) actuators taking into account the fringing field capacitance, feedback and parasitic capacitance, trapped charges, an external force, and large displacements  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号