30 resultados para Implementing
Resumo:
Browsing the web has become one of the most important features in high end mobile phones and in the future more and more people will be using mobile phone for web browsing. Large touchscreens improve browsing experience but many web sites are designed to be used with a mouse. A touchscreen differs substantially from a mouse as a pointing device and therefore mouse emulation logic is required in the browsers to make more web sites usable. This Master's thesis lists the most significant cases where the differences of a mouse and a touchscreen affect web browsing. Five touchscreen mobile phones and their web browsers were evaluated to find out if and how these cases are handled in them. Also as a part of this thesis, a simple QtWebKit based mobile web browser with advanced mouse emulation model was implemented, aiming to solve all the problematic cases. The conclusion of this work is that it is feasible to emulate a mouse with a touchscreen and thus deliver good user experience in mobile web browsing. However, current highend touchscreen mobile phones have relatively underdeveloped mouse emulations in their web browsers and there is a lot to improve.
Resumo:
To improving efficiency and transparency of government services, government authorities may increase the frequency of interaction between citizens and government as well as improving the quality of the government services and trust. Electronic Government (E-Government) in definition is the delivery of government services to citizens, businesses, and government organizations through the use of internet, web based applications, and Information and Communication Technologies (ICTs) is the solution to build more reliable and efficient contact with citizens. Like the developing and developed countries, Iran also has been processing the various aspects of ICT, IT, and e-Government. Though, in order to implement and improve e-Government; Iran has faced with some obstacles. Therefore, the purpose of this thesis is to study progress of e- Government and identify obstacles of implementing and improving e Government in Iran. In this thesis, based on the literature review, the progress of e-Government in Iran was studied and various obstacles were identified. Therefore, as a result, e- Government of Iran is said to be in the transactional stage of the United Nations’ e-Government maturity stages. In addition, establishing more reliable, efficient, and accurate e-Government initiatives, plans, guidelines, and strategies will extremely enhance e-Government status of Iran. On the other hand, the needs of the citizens should always be under consideration when implementing and improving e-Government services; because citizens are considered to be at the core of every e-Government services and the responsibilities of the authorities.
Resumo:
Information technology service management has become an important task in delivering information for management purposes. Especially applications containing information for decision making need to be agile and ready for changes. The aim of this study was to find a solution for successful implementation of an ITIL based change management process to enterprise resource management applications managed by the target organization. Literature review of the study introduces frameworks that are important for success of an IT project implementation. In addition an overview of ITIL and ITIL based change management process is presented. The result of the study was a framework of actions that are needed to accomplish to be successful in change management process implementation. It was noticed that defining success criterions, critical success factors and success measures is important for achieving the goals of the implementation project.
Resumo:
Wireless sensor networks and its applications have been widely researched and implemented in both commercial and non commercial areas. The usage of wireless sensor network has developed its market from military usage to daily use of human livings. Wireless sensor network applications from monitoring prospect are used in home monitoring, farm fields and habitant monitoring to buildings structural monitoring. As the usage boundaries of wireless sensor networks and its applications are emerging there are definite ongoing research, such as lifetime for wireless sensor network, security of sensor nodes and expanding the applications with modern day scenarios of applications as web services. The main focus in this thesis work is to study and implement monitoring application for infrastructure based sensor network and expand its usability as web service to facilitate mobile clients. The developed application is implemented for wireless sensor nodes information collection and monitoring purpose enabling home or office environment remote monitoring for a user.
Resumo:
Open data refers to publishing data on the web in machine-readable formats for public access. Using open data, innovative applications can be developed to facilitate people‟s lives. In this thesis, based on the open data cases (discussed in the literature review), Open Data Lappeenranta is suggested, which publishes open data related to opening hours of shops and stores in Lappeenranta City. To prove the possibility of creating Open Data Lappeenranta, the implementation of an open data system is presented in this thesis, which publishes specific data related to shops and stores (including their opening hours) on the web in standard format (JSON). The published open data is used to develop web and mobile applications to demonstrate the benefits of open data in practice. Also, the open data system provides manual and automatic interfaces which make it possible for shops and stores to maintain their own data in the system. Finally in this thesis, the completed version of Open Data Lappeenranta is proposed, which publishes open data related to other fields and businesses in Lappeenranta beyond only stores‟ data.
Resumo:
Workshop at Open Repositories 2014, Helsinki, Finland, June 9-13, 2014
Resumo:
Panel at Open Repositories 2014, Helsinki, Finland, June 9-13, 2014
Resumo:
Presentation at Open Repositories 2014, Helsinki, Finland, June 9-13, 2014
Resumo:
Presentation at Open Repositories 2014, Helsinki, Finland, June 9-13, 2014
Resumo:
In recent decade customer loyalty programs have become very popular and almost every retail chain seems to have one. Through the loyalty programs companies are able to collect information about the customer behavior and to use this information in business and marketing management to guide decision making and resource allocation. The benefits for the loyalty program member are often monetary, which has an effect on the profitability of the loyalty program. Not all the loyalty program members are equally profitable, as some purchase products for the recommended retail price and some buy only discounted products. If the company spends similar amount of resources to all members, it can be seen that the customer margin is lower on the customer who bought only discounted products. It is vital for a company to measure the profitability of their members in order to be able to calculate the customer value. To calculate the customer value several different customer value metrics can be used. During the recent years especially customer lifetime value has received a lot of attention and it is seen to be superior against other customer value metrics. In this master’s thesis the customer lifetime value is implemented on the case company’s customer loyalty program. The data was collected from the customer loyalty program’s database and represents year 2012 on the Finnish market. The data was not complete to fully take advantage of customer lifetime value and as a conclusion it can be stated that a new key performance indicator of customer margin should be acquired in order to profitably drive the business of the customer loyalty program. Through the customer margin the company would be able to compute the customer lifetime value on regular basis enabling efficient resource allocation in marketing.
Resumo:
The whole research of the current Master Thesis project is related to Big Data transfer over Parallel Data Link and my main objective is to assist the Saint-Petersburg National Research University ITMO research team to accomplish this project and apply Green IT methods for the data transfer system. The goal of the team is to transfer Big Data by using parallel data links with SDN Openflow approach. My task as a team member was to compare existing data transfer applications in case to verify which results the highest data transfer speed in which occasions and explain the reasons. In the context of this thesis work a comparison between 5 different utilities was done, which including Fast Data Transfer (FDT), BBCP, BBFTP, GridFTP, and FTS3. A number of scripts where developed which consist of creating random binary data to be incompressible to have fair comparison between utilities, execute the Utilities with specified parameters, create log files, results, system parameters, and plot graphs to compare the results. Transferring such an enormous variety of data can take a long time, and hence, the necessity appears to reduce the energy consumption to make them greener. In the context of Green IT approach, our team used Cloud Computing infrastructure called OpenStack. It’s more efficient to allocated specific amount of hardware resources to test different scenarios rather than using the whole resources from our testbed. Testing our implementation with OpenStack infrastructure results that the virtual channel does not consist of any traffic and we can achieve the highest possible throughput. After receiving the final results we are in place to identify which utilities produce faster data transfer in different scenarios with specific TCP parameters and we can use them in real network data links.
Resumo:
There is variation in how teachers and schools implement bullying prevention programs. Although this variation has been discussed, there has been little empirical research concerning the relationship between implementation fidelity and program outcomes. This thesis contains three studies, each of them in the context of implementing the KiVa antibullying program, and examines teachers’ actions in preventing and intervening in school bullying. The first aim of this thesis is to examine implementation degree of the KiVa curriculum and its’ association with reductions in victimization and bullying perpetration (Study I). The second aim is to clarify why teachers displayed different degrees of adherence to the KiVa curriculum during a school year (Study II). Thirdly, it is investigated whether recognizing victimization can be difficult for school staff (Study III). In addition to these peer-reviewed studies, the thesis includes a qualitative analysis (unpublished) of the teachers’ open answers concerning their implementation experiences. The data were collected from elementary school teachers (Studies I–II; the unpublished study), elementary school students (Study I), and students on the elementary and middle school levels (Study III) during the evaluation of the effectiveness of KiVa antibullying program between 2007 and 2009. The findings demonstrate that a larger reduction in victimization can be achieved in classrooms where teachers display higher levels of adherence to the KiVa curriculum and invest more time for preparing the lessons. Bullying perpetration, however, was not equally affected by the level of curriculum implementation. With respect to the implementation process over one year, there was significant variation between individual teachers’ activity—ranging from systematic and high implementation to declining delivery from lesson to lesson. The sustained actions (high and moderate levels of implementation) were premised on principal support for antibullying work. Lesson preparation was associated with keeping implementation high throughout the school year. The findings also implied that the belief in the effectiveness of the program is important for a higher implementation degree at starting point of the process. Finally, there are severe flaws in teachers’ ability to identify students who are victimized. As it turns out, it is possible that only one-fourth of chronically victimized students are helped by the school staff. Especially when the victims are middle-school-aged girls, when they bully others themselves, or when they do not tell adults about bullying, reaching out for them is difficult. Implementation and dissemination of research-based interventions will take a good deal of time and effort. The findings demonstrate that active implementation is important for improving program outcomes. They also show how implementation can be sustained—there are both individual and interpersonal factors that facilitate or inhibit high-quality implementation. Thus, implications for future research regarding the implementation of school-based programs are suggested.