This paper describes how to present different multimedia objects on a Multimedia Abstract Machine with a structural mechanism. The structural mechanism is based on a timed Petri net. We use the features of a Petri net...
详细信息
Tato bakalářská práce se zabývá návrhem datového a funkčního modelu informačního systému společnosti DIRTEL, s.r.o. Byla provedena analýza současné situace s...
详细信息
Tato bakalářská práce se zabývá návrhem datového a funkčního modelu informačního systému společnosti DIRTEL, s.r.o. Byla provedena analýza současné situace společnosti a analýza problematiky týkající se informačního systému. Na základě výsledků bylo vypracováno řešení návrhů datového a funkčního modelu informačního systému, které bude možné použít na implementaci informačního systému, který společnost ještě nemá.
Na základě analýzy současných přístupů k informačním systémům zabývajících se turistikou byl vytvořen datový a funkční model. Datový a funkční model by...
详细信息
Na základě analýzy současných přístupů k informačním systémům zabývajících se turistikou byl vytvořen datový a funkční model. Datový a funkční model byl koncipován tak, aby navržený informační systém byl přínosný pro široké spektrum uživatelů a aby našel reálné uplatnění a komerční využití.
Bakalářské práce se zabývá návrhem části informačního systému pro výkup a prodej použitých motorových vozidel. První část obsahuje teoretická ...
详细信息
Bakalářské práce se zabývá návrhem části informačního systému pro výkup a prodej použitých motorových vozidel. První část obsahuje teoretická východiska, která vysvětlují použité postupy a metody. Druhá část je zaměřena na analýzu současného stavu informačního systému ve společnosti. Poslední část obsahuje návrh, možná řešení implementace aplikace a ekonomické zhodnocení.
Tématem bakalářská práce je návrh a tvorba webové aplikace pro publikování na internetu. Práce je rozdělena na čtyři části. V první jsou popsány obecné...
详细信息
Tématem bakalářská práce je návrh a tvorba webové aplikace pro publikování na internetu. Práce je rozdělena na čtyři části. V první jsou popsány obecné vlastnosti redakčních systémů a příklady redakčních systémů. V druhé je popsán návrh samotné aplikace. Od tvorby entitně relačního diagramu přes normalizaci datového modelu až po diagram datových toků. Ve třetí části jsou popsány použité technické prostředky. A v poslední je popsána samotná realizace aplikace s ukázkou skriptů. Výsledkem této práce je funkční webová aplikace.
Cloud computing offers many benefits including business flexibility, scalability and cost savings but despite these benefits, there exist threats that require adequate attention for secure service delivery. Threats in...
详细信息
Cloud computing offers many benefits including business flexibility, scalability and cost savings but despite these benefits, there exist threats that require adequate attention for secure service delivery. Threats in a cloud-based system need to be considered from a holistic perspective that accounts for data, application, infrastructure and service, which can pose potential risks. data certainly plays a critical role within the whole ecosystem and organisations should take account of and protect data from any potential threats. Due to the variation of data types, status, and location, understanding the potential security concerns in cloud-based infrastructures is more complex than in a traditional system. The existing threat modeling approaches lack the ability to analyse and prioritise data-related threats. The main contribution of the paper is a novel data-driven threat analysis (d-TM) approach for the cloud-based systems. The main motivation of d-TM is the integration of data from three levels of abstractions, i.e., management, control, and business and three phases, i.e., storage, process and transmittance, within each level. The d-TM provides a systematic flow of attack surface analysis from the user agent to the cloud service provider based on the threat layers in cloud computing. Finally, a cloud-based use case scenario was used to demonstrate the applicability of the proposed approach. The result shows that d-TM revealed four critical threats out of the seven threats based on the identified assets. The threats targeted management and business data in general, while targeting data in process and transit more specifically.
We present the model of a new information system for agribusiness management that supports Direct Costing and Activity Based Costing methodologies. We conducted interviews with key-informants to evaluate their needs a...
详细信息
We present the model of a new information system for agribusiness management that supports Direct Costing and Activity Based Costing methodologies. We conducted interviews with key-informants to evaluate their needs and identify the information requirements for the introduction of structured cost management approaches in a Farm Management Information System. The paper presents a viable design of the system supported by a working prototype and a set of reports for farm decision makers. This system offers precise information about crop costs, with general costs allocation procedures based on the consumption of activities, and enables sensitivity analyses.
Most of the traditional and legacy systems were designed using traditional methodologies such as Structured Analysis/Structured Design (SA/SD) methodology. Design of such a system is called an imperative design . Afte...
详细信息
Most of the traditional and legacy systems were designed using traditional methodologies such as Structured Analysis/Structured Design (SA/SD) methodology. Design of such a system is called an imperative design . After the introduction of the object-oriented technology, there are compelling reasons to redevelop those systems using this new technology to benefit from its merits. To redevelop them, there are two possible choices: either develop them from scratch using some object-oriented methodology, or use the available design documents (i.e., imperative design) of those systems and transform their designs into object-oriented designs. The second choice clearly results in saving both the development cost and time. This paper reports on an effort to build support for the second choice mentioned above. We started our effort in 1992 and proposed a framework of a redesign methodology. Our proposed redesign methodology, i.e., imperative design to object-oriented design (ID-OOD), transforms a given imperative design of an already implemented system into an object-oriented design using the design documents of the system. The methodology works in four phases and they are presented formally. We also illustrate the methodology with a case study.
The “Citizen-Centric Complaint Reporting and Analyzing Mechanism” project is designed to create an online complaint system, called “e-Complaint”, to allow citizens to file complaints related to crime and misconduc...
详细信息
The “Citizen-Centric Complaint Reporting and Analyzing Mechanism” project is designed to create an online complaint system, called “e-Complaint”, to allow citizens to file complaints related to crime and misconduct in a secure and user-friendly way. The proposed system aims to address the challenges of the current complaint system, ensuring transparency and accountability in the police force. The “e-Complaint” system aims to increase police accountability and transparency and has significant benefits for both citizens and police departments.
In the virtual training simulation software, users through graphical interfaces to fullfill in-formation exchange. By adopting the method of black box testing, treating the virtual training simula-tion software as a b...
详细信息
In the virtual training simulation software, users through graphical interfaces to fullfill in-formation exchange. By adopting the method of black box testing, treating the virtual training simula-tion software as a black box and input data to drive the software running, could test the interaction of graphical interface. The test case generation method based on data flow diagram(DFD), which is characterized to form a complete set of test cases and cover the entire path of the program, could im-prove the efficiency of the test and ensure the reliability of the test results.
暂无评论