scholarly journals Evaluation of compliance of existing forest machine information systems for the implementation of the standard StanForD 2010

2020 ◽  
Author(s):  
Aigars Strubergs ◽  
◽  
Andis Lazdins ◽  
Linards Sisenis ◽  
◽  
...  

The aim of the study is to clarify the compliance of machinery information systems used by Latvian logging service providers with the requirements of the Forest Machine Data and Communications Standard StanForD 2010. For determining the number of logging machines and structure registered in Latvia, data from the State Technical Control Agency of Latvia (VTUA) has been used. This dataset includes 2094 registered machinery units from which 1663 units recorded as harvesters and forwarders are distributed for data processing. Using the national AS Latvian State Forests (LSF) database, where 541 machinery units have been recorded, of which 239 harvesters and 302 forwarders, it is determined what and how many machines already use the standard StanForD 2010, how many machines can implement it and which machines are not suitable for the implementation of StanForD 2010. The study showed that the VTUA register does not fully reflect the true quantity of harvesting machines in Latvia and does not provide information about the use of machines. The LSF data provide reliable information on the possibilities of using StanForD 2010 in harvesters in national forests. From the harvesters working in the country’s forests, 52% of the machines uses the StanForD 2010 standard. Work should be continued to clarify the possible use of the standard in the machines working in private forests. Similarly, work should be continued with dealers of harvesting machines to identify models for which it is possible to adjust the StanForD 2010 standard and what the cost of adapting the indicative information systems is.

2005 ◽  
Vol 44 (02) ◽  
pp. 182-185 ◽  
Author(s):  
J. A. M. Herveg ◽  
F. Crazzolara ◽  
D. Marvin ◽  
Y. Poullet ◽  
S. E. Middleton

Summary Objectives: The GEMSS project is developing a secure Grid infrastructure through which six medical simulations services can be invoked. We examine the legal and security framework within which GEMSS operates. Methods: We provide a legal qualification to the operations performed upon patient data, in view of EU directive 95/46, when using medical applications on the GEMSS Grid. We identify appropriate measures to ensure security and describe the legal rationale behind our choice of security technology. Results: Our legal analysis demonstrates there must be an identified controller (typically a hospital) of patient data. The controller must then choose a processor (in this context a Grid service provider) that provides sufficient guarantees with respect to the security of their technical and organizational data processing procedures. These guarantees must ensure a level of security appropriate to the risks, with due regard to the state of the art and the cost of their implementation.Our security solutions are based on a public key infrastructure (PKI), transport level security and end-to-end security mechanisms in line with the web service (WS Security, WS Trust and SecureConversation) security specifications. Conclusion: The GEMSS infrastructure ensures a degree of protection of patient data that is appropriate for the health care sector, and is in line with the European directives. We hope that GEMSS will become synonymous with high security data processing, providing a framework by which GEMSS service providers can provide the security guarantees required by hospitals with regard to the processing of patient data.


1995 ◽  
Vol 34 (03) ◽  
pp. 289-296 ◽  
Author(s):  
B. H. Sielaff ◽  
D. P. Connelly ◽  
K. E. Willard

Abstract:The development of an innovative clinical decision-support project such as the University of Minnesota’s Clinical Workstation initiative mandates the use of modern client-server network architectures. Preexisting conventional laboratory information systems (LIS) cannot be quickly replaced with client-server equivalents because of the cost and relative unavailability of such systems. Thus, embedding strategies that effectively integrate legacy information systems are needed. Our strategy led to the adoption of a multi-layered connection architecture that provides a data feed from our existing LIS to a new network-based relational database management system. By careful design, we maximize the use of open standards in our layered connection structure to provide data, requisition, or event messaging in several formats. Each layer is optimized to provide needed services to existing hospital clients and is well positioned to support future hospital network clients.


2020 ◽  
Vol 2 (2) ◽  
pp. 128-143
Author(s):  
Tedi Budiman

Financial information system is an information system that provides information to individuals or groups of people, both inside and outside the company that contains financial problems and information about the flow of money for users in the company. Financial information systems are used to solve financial problems in a company, by meeting three financial principles: fast, safe, and inexpensive.Quick principle, the intention is that financial information systems must be able to provide the required data on time and can meet the needs. The Safe Principle means that the financial information system must be prepared with consideration of internal controls so that company assets are maintained. The Principle of Inexpensive, the intention is that the cost of implementing a financial information system must be reduced so that it is relatively inexpensive.Therefore we need technology media that can solve financial problems, and produce financial information to related parties quickly, safely and cheaply. One example of developing information technology today is computer technology and internet. Starting from financial problems and technological advances, the authors make a website-based financial management application to facilitate the parties that perform financial management and supervision.Method of development application program is used Waterfall method, with the following stages: Software Requirement Analysis, Software Design, Program Code Making, Testing, Support, Maintenance.


Author(s):  
Mohammad Istiak Hossain ◽  
Jan I. Markendahl

AbstractSmall-scale commercial rollouts of Cellular-IoT (C-IoT) networks have started globally since last year. However, among the plethora of low power wide area network (LPWAN) technologies, the cost-effectiveness of C-IoT is not certain for IoT service providers, small and greenfield operators. Today, there is no known public framework for the feasibility analysis of IoT communication technologies. Hence, this paper first presents a generic framework to assess the cost structure of cellular and non-cellular LPWAN technologies. Then, we applied the framework in eight deployment scenarios to analyze the prospect of LPWAN technologies like Sigfox, LoRaWAN, NB-IoT, LTE-M, and EC-GSM. We consider the inter-technology interference impact on LoRaWAN and Sigfox scalability. Our results validate that a large rollout with a single technology is not cost-efficient. Also, our analysis suggests the rollout possibility of an IoT communication Technology may not be linear to cost-efficiency.


2021 ◽  
Vol 24 (3) ◽  
pp. 338-368
Author(s):  
Ekaterina V. OLOMSKAYA ◽  
Andrei A. AKSENT'EV

Subject. This article explores the origination of the differences between bookkeeping and tax accounting, and their impact on decision-making. Objectives. The article aims to examine the reasons for the discrepancies between bookkeeping and tax accounting, reveal some aspects of accounting of differences from the position of their registration in a uniform accounting system or two parallel systems, if available, and determine the impact of such gaps on investment and management decisions. Methods. For the study, we used analysis and synthesis, observation, comparison, and the dialectical and data collection methods. Results. The article reveals the key features of the interaction between bookkeeping and tax accounting in Russia and foreign countries. It justifies that in today's economic realities, addressing shortcomings between these information systems is not a necessity, and shows the possible impact of differences on investment decisions. The article also graphically presents the application of cost-plus and balance-based methods of accounting for deferred taxes depending on the way information systems are organized, as well as their comparative characteristics. Conclusions and Relevance. The discrepancies between the two accounting systems provide an opportunity to assess the impact of tax planning on drawing a veil over the accounting profit. Studying the cost and balance methods, as well as the dialectic of the interaction of tax planning with the accounting information system, remain relevant. The results of the study can be useful to accounting and tax specialists, and other stakeholders who are studying the interactions of these information systems.


Cloud computing services mature both economically and technologically and play a more and more extensive role in the domain of software and information systems engineering. SaaS offers advantage for both service providers and consumers. SaaS is faced with the question of appropriate techniques applying at early phase of Requirements engineering of producing system. The paper highlights two traditional methods namely i* and VORD belonging respectively to Goal oriented Requirements Engineering and Viewpoints approaches. The approach proposed try to dealing with the requirements elicitation in the context of Software-as-a-service SaaS. So, the approach benefits from strengths of both VORD and i* models and propose a combination of them in a new approach namely VORDi*.


2013 ◽  
Vol 4 (1) ◽  
pp. 115-125 ◽  
Author(s):  
K Siddique-e Rabbani ◽  
A Raihan Abir ◽  
AKM Bodiuzzaman

ECG equipment is vital for diagnosis of cardiac problems. However, such equipment come from the rich Western countries at a huge cost in both procurement and maintenance, and therefore cannot offer services to a large population in the Third World countries. The only solution is to design and develop such equipment in individual countries by developing local expertise. With three decades of experience, the Dhaka University group has taken a step towards developing prototypes of ECG equipment for dissemination to the healthcare service providers. This paper presents the detailed design of an PC based ECG equipment where optimized choice of components and of the design have been made keeping the cost and maintenance in view, but not sacrificing the quality, and incorporating necessary safety features to protect the patient from known hazards. Both the hardware and the software have been developed locally and are detailed in this paper. Outputs obtained from human subjects are shown which are of reasonable good quality, and have been verified using standard ECG equipment. The PC based ECG system will allow digital post processing of signals for improved diagnosis through software. Besides, this can also become part of a nationwide telemedicine system. DOI: http://dx.doi.org/10.3329/bjmp.v4i1.14701 Bangladesh Journal of Medical Physics Vol.4 No.1 2011 115-125


2020 ◽  
pp. 29-41
Author(s):  
Cheng-Wen Lee ◽  
Hao-Yuan Yu

Information technology and advanced online environments have reduced the cost of these exchange activities and triggered the emergence of the sharing economy. Con-sequently, public attitude toward the sharing economy has gradually shifted from re-luctance to acceptance. Moreover, the sharing economy has revolutionized the busi-ness models and viewpoints of conventional industries, and sharing service providers have gradually shifted from an independent to a collaborative stance, thereby affect-ing conventional economies. This study interprets the phenomenon of cross-industry collaboration in the sharing economy through social exchange and social network the-ories. A multiple-case research framework is used to examine tourism and service in-dustries. Secondary data of service providers and users on sharing platforms are ana-lyzed using content analysis, supplemented with a content analysis of the interview data of three hotel executives. The varying phenomena of the conventional and shar-ing economies on social exchange and social network were compared. Finally, this paper proposes conclusions and practical recommendations according to the analytical results. JEL classification numbers: D85, M31, L14. Keywords: Cross-Industry Collaboration, Sharing Economy, Social Exchange, Social Network.


10.28945/2980 ◽  
2006 ◽  
Author(s):  
Yair Levy ◽  
Timothy J. Ellis

This paper introduces an initial effort towards developing a framework for writing an effective literature review. The target audience for the framework are novice IS researchers or other researchers who are constantly struggling with the development of an effective literature-based foundation for the proposed research. The proposed framework follows the systematic data processing approach comprised of three major stages: 1) inputs (literature gathering and screening), 2) processing (Blooms Taxonomy), and 3) outputs (writing the review). This paper provides the rationale for developing a solid literature review and addresses the central stage, processing the literature. The paper concludes by providing arguments for the value of an effective literature review as well as implications for future work in this proposed framework.


Sign in / Sign up

Export Citation Format

Share Document