Thinking Ontologically

Author(s):  
Jörg Evermann

Information systems (IS) are situated in and representations of business and organizational domains. Conceptual models of the real world serve as tools for understanding the business domain. Conceptual modelling is thus an important first step in any IS development project. As no language has been generally accepted for conceptual modelling, researchers have proposed extending the use of widely accepted object-oriented software design languages such as UML for this purpose. A major problem with this is the fact that such languages possess no real-world business or organizational meaning— that is, it is unclear what the constructs of such languages mean in terms of the business. This chapter discusses how such meaning can be assigned to languages like UML. It provides an example that demonstrates the differences between a software design model and a conceptual model in UML. This chapter shows that UML is suitable for conceptual modelling but that the modeller must take special care not to confuse software aspects with aspects of the real world being modelled.

Sensors ◽  
2020 ◽  
Vol 20 (10) ◽  
pp. 2997 ◽  
Author(s):  
Abolghasem Sadeghi-Niaraki ◽  
Soo-Mi Choi

Most existing augmented reality (AR) applications are suitable for cases in which only a small number of real world entities are involved, such as superimposing a character on a single surface. In this case, we only need to calculate pose of the camera relative to that surface. However, when an AR health or environmental application involves a one-to-one relationship between an entity in the real-world and the corresponding object in the computer model (geo-referenced object), we need to estimate the pose of the camera in reference to a common coordinate system for better geo-referenced object registration in the real-world. New innovations in developing cheap sensors, computer vision techniques, machine learning, and computing power have helped to develop applications with more precise matching between a real world and a virtual content. AR Tracking techniques can be divided into two subcategories: marker-based and marker-less approaches. This paper provides a comprehensive overview of marker-less registration and tracking techniques and reviews their most important categories in the context of ubiquitous Geospatial Information Systems (GIS) and AR focusing to health and environmental applications. Basic ideas, advantages, and disadvantages, as well as challenges, are discussed for each subcategory of tracking and registration techniques. We need precise enough virtual models of the environment for both calibrations of tracking and visualization. Ubiquitous GISs can play an important role in developing AR in terms of providing seamless and precise spatial data for outdoor (e.g., environmental applications) and indoor (e.g., health applications) environments.


2011 ◽  
pp. 149-159
Author(s):  
Farhad Daneshgar

It is now believed that success of ERP systems is largely dependent on not only the successful evaluation, selection, implementation and post-implementation of ERP systems, but also on integrating it with the organizational business processes. On the other hand, nearly all business processes are collaborative in the sense that multiple human agents or actors interact with one another for achieving one or more process goals. As a result, one can claim that one major factor in successful implementation of the ERP systems is development of appropriate conceptual models of the ERP process from various perspectives. In this chapter the writer, being a member of the CSCW (computer supported cooperative work) research community, introduces a conceptual model for ERP which has an emphasis on the collaborative nature of ERP process that explicitly addresses the “awareness” and “knowledge-sharing” issues within the ERP process. This conceptual model demonstrates collaboration requirements of the actors behind individual business processes as well as the relationships among these business processes. This chapter is intended to introduce to the ERP community a relevant piece of work in conceptual modelling from the perspective of CSCW with the aim of attracting research collaborators for further investigation in these fields.


In an e-Learning environment, the communication between sender and receiver has been done via Internet. In general, while the sender sends their important documents to receiver through Internet, he/she encrypts the document which is decrypted by the receiver(s) at their end. In case of large images, decryption causes some sort of distortion, which may be overcome through our proposed model. The object oriented analysis of a system helps to make better understanding and cop up with the real world. The main characteristics of object oriented metric analysis are data hiding, data encapsulation, data abstraction, polymorphism etc. Here we calculate the values of different metrics like CK and MOOD metrics based on the class diagram of our proposed model regarding the transmission of documents from administrator to learner


Author(s):  
Ruuhwan Ruuhwan ◽  
Imam Riadi ◽  
Yudi Prayudi

The handling of digital evidence can become an evidence of a determination that crimes have been committed or may give links between crime and its victims or crime and the culprit. Soft System Methodology (SSM) is a method of evaluation to compare a conceptual model with a process in the real world, so deficiencies of the conceptual model can be revealed thus it can perform corrective action against the conceptual model, thus there is no difference between the conceptual model and the real activity. Evaluation on the IDFIF stage is only done on a reactive and proactive process stages in the process so that the IDFIF model can be more flexible and can be applied on the investigation process of a smartphone.


2012 ◽  
Vol 9 (1) ◽  
pp. 135-164 ◽  
Author(s):  
Damjan Vavpotic ◽  
Olegas Vasilecas

The paper presents a decision model and a tool that helps to find an information systems development methodology (ISDM) for a computer-based business information system (IS) that is suitable to a certain IS development project or an organization dealing with IS development. The intention of the model is not only to suggest a certain ISDM, but also to propose the properties an ISDM should have to suite the project or the organization. It is designed in a way that facilitates experimentation with different project, organization and ISDM properties. Based on the model we created a tool that has been applied on several cases in which we validated the correctness of its recommendations and established that it can have a significant positive contribution in the process of ISDM selection and in the process of improvement of existing ISDM.


2012 ◽  
Vol 2 (1) ◽  
pp. 53-73 ◽  
Author(s):  
Christine Yunn-Yu Sun

This paper explores the construction of identity in online communities and websites for social purposes, and its consequences in terms of how one’s online identity may be utilized to such an extent that one’s real-world identity is either enforced or eroded. It does so by investigating the very nature of Identify, coming predominantly from a cultural studies research and philosophical view, although it also cites some parallel findings in Information Systems (IS) research. In the Section Something Old, the author investigates the concept of identity in the real world, then investigates it in the online world in the Section Something New. Section Something Borrowed examines how an individual positions oneself including who one associates with and why one flags it so to others. And finally this paper looks at some consequences unfolding in our time (in Section: Something Blue), citing several pointed examples for illustration purposes, where values that have been migrated from the real world are amplified via the Internet, causing all sorts of actions and consequences both online and offline. These issues and actions revolve around control and disclosure of ones identity that has consequences upon reputation and trust, and how responsibility needs to be brought forward into how one: positions oneself, manages ones own identity, and acts appropriately in and beyond the Internet. Above all of these, the author concludes, is the responsibility of understanding the nature of identity itself.


Author(s):  
Irwan Rusda ◽  
Legiman Slamet ◽  
Dedy Irfan

Development of technology which progress rapidly has effect to change whole of aspects in human life. One of them is development of information technology. Development of information technologies can apply on web based information systems. Many agencies have moved to web based  inforation systems because of web based is more efective and eficient used. BEM UNP as executive campuss organization has a budget which the aim is implement activities to bend students characters. Examples are national seminars, talkshow, debates, open recruitment for new members, etc. The activities definitely are not without process of registration from participants. Most of the students want to participate in that activity. Usually get troubles activity informations, or trouble in registration directly to committe web based information systems used is one of the effective facilities to share activities process. The design of web based information syste, of BEM UNP visualizes by UML with using several object oriented of visualized diagrams. The result of web based information systems of BEM UNP is web based informations systems which give informations to BEM UNP and to ease students who want to bem participants in activities are implemented by BEM UNP. Keywords: Information System, BEM UNP, CodeIgniter Framework.


Sign in / Sign up

Export Citation Format

Share Document