Search results for "information systems"
showing 10 items of 1926 documents
Representation and retrieval of uncertain temporal information in museum databases
2011
Representation and retrieval of uncertain temporal information in museum databases
2012
An implementation-oriented model to represent uncertain temporal information in databases is proposed. Temporal information is presented to the user as anchored time intervals with optional beginning and end dates. The model accounts for both instants and intervals, and can be applied to uncertain dates by leaving days and months optional, or by using symbolic constraints that present additional time granularities. The model is defined using conventional relational database structures to support ease of deployment and integration to legacy systems with efficient query capabilities. The model is based on experiences with an existing museum database and highlights challenges related to tempor…
The building blocks of academic writing in the field of information systems
2018
A Study on the Assessment of Introductory Computational Thinking via Scratch Programming in Primary Schools
2018
Computational thinking (CT), a transversal intellectual foundation integral to computer science, is making its way into compulsory comprehensive education worldwide. Students are expected to attain skills and knowledge in such interdisciplinary CT principles as Algorithmic thinking, Data representation, and Debugging. Problem-solving by designing and manipulating interactive media with Scratch, a graphical programming tool, is popular especially at the primary school level. However, there has been confusion regarding how introductory CT can be operationalized for educational practice. Teachers and students need research-based knowledge for setting appropriate learning goals in addition to i…
Single-cell analysis of population context advances RNAi screening at multiple levels
2012
Isogenic cells in culture show strong variability, which arises from dynamic adaptations to the microenvironment of individual cells. Here we study the influence of the cell population context, which determines a single cell's microenvironment, in image‐based RNAi screens. We developed a comprehensive computational approach that employs Bayesian and multivariate methods at the single‐cell level. We applied these methods to 45 RNA interference screens of various sizes, including 7 druggable genome and 2 genome‐wide screens, analysing 17 different mammalian virus infections and four related cell physiological processes. Analysing cell‐based screens at this depth reveals widespread RNAi‐induce…
Smart Wireless Sensor Networks and Biometric Authentication for Real Time Traffic Light Junctions Management
2013
The main challenge of intelligent transportation systems (ITS) is to deal with ‘real-time’ information to improve vehicular traffic management. Road data can be processed and used for dynamic traffic light management in order to reduce waiting times in queues. This paper proposes an innovative distributed architecture based on a wireless sensor network (WSN) with a network coordinator providing remote and ubiquitous authentication module for managing unexpected events. The architecture is completed by a dynamic module for street priority management depending on traffic rate. Many experimental trials have been carried out considering three different levels of traffic intensity to prove the e…
Identification of Energy Hubs for the Exploitation of Residual Biomass in an Area of Western Sicily
2017
Recent years have witnessed a marked reduction in financial incentives for renewable energy production in Italy as a consequence of the fact that the nation has already reached its energy policy targets for 2020, However, incentives still persist in certain sectors, such as those of specialized crops for biomass and residual biomass. In order to increase use-efficiency of biomass resources, careful study is needed of their characteristics, and their distribution within an area and over time: biomass use is of interest when production is concentrated in a given area and sufficiently available throughout the year. In order to assess the competitiveness of the biomass energy sector, the logist…
A two-phase insertion technique of unexpected customers for a dynamic dial-a-ride problem
2006
Abstract This work deals with a dynamic dial-a-ride problem with time window constraints. In particular, new unplanned requests for service may arise at a vehicle stop and the driver must decide in real-time whether to accept or reject them. For this problem, we have developed a two-phase insertion algorithm based on route perturbations: the first phase, which is run off-line when the vehicle moves between two successive stops, aims at creating a feasible neighborhood of the current route; while the second phase, which is run in real-time every time a new request occurs, inserts, when possible, the delivery stop of the new customer in the current route.
Minimizing fleet operating costs for a container transportation company
2006
Abstract This paper focuses on a fleet management problem that arises in container trucking industry. From the container transportation company perspective, the present and future operating costs to minimize can be divided in three components: the routing costs, the resource (i.e., driver and truck) assignment costs and the container repositioning costs (i.e., the costs of restoring a given container fleet distribution over the serviced territory, as requested by the shippers that own the containers). This real-world problem has been modeled as an integer programming problem. The proposed solution approach is based on the decomposition of this problem in three simpler sub-problems associate…
Intervention Effect Rates as a Path to Research Relevance : Information Systems Security Example
2018
In the current information systems security (ISS) research, new theory contributions are especially valued. This research typically reflects the following formula: Suggest a new theory (or set of constructs) of ISS and show that it is empirically supported, then suggest another new theory (or set of constructs with some linkages) and show that it is empirically supported, and so on. Despite the merits of this approach, it leaves out many important scientific aspects. For example, after more than 30 years of ISS research, (1) we know little about the conditions and situations to which new theories (or constructs) do not apply; (2) we do not know which new theories are more effective than oth…