Information Envelope and its Information Integrity Implications
نویسندگان
چکیده
[1] Beniger J. R., “The Control Revolution”, Harvard University Press, Cambridge, USA (1986). [2] Dorner D., “The Logic of Failure – Recognizing and Avoiding Error in Complex situation”, Perseus Books, USA (1996). [3] Mandke Vijay V., and Nayar M.K., “Information Integrity Technology Product Structure”, Proceedings of 1998 Conference on Information Quality, Edited by Indu Shobba Chengalur Smith and Leo L. Pipino, MIT, Cambridge, Massachusetts, USA (1998). [4] Mandke Vijay V., and Nayar M.K., “Design Basis for Achieving Information Integrity – A Feedback Control System Approach”, IFIP TC 11 WG 11.5 second Working Conference on Integrity and Control in Information Systems, Edited by S. Jajodia, W. List, A.W. McGregor and Leon A.M. Strous, Kluwer Academic Publishers, London (1998), pp. 169-190. [5] Mandke Vijay V., and Nayar M.K., “Modeling Information Flow for Integrity Analysis”, Proceedings of 1999 Conference on Information Quality, Edited by Yang W. Lee and Giri Kumar Tayi, MIT, Cambridge, Massachusetts, USA (1999). [6] Mandke Vijay V., and Nayar M.K., “Information Integrity Imperative for Competitive Advantage in Business Environment characterized by Uncertainty”, Proceedings of Information Technology for Business Management Conference, August 21-25, 2000, Edited by Renchu Gan, 16th World Computer Congress, Beijing, China (2000), pp. 115-125. [7] Matthews Don Q., “The Design of the Management Information System”, Auerback Publishers, NY (1971). [8] Peschon J., “Disciplines and Techniques of Systems Control”, Blaisdell Publishing Co., NY (1965). [9] Simmons R., “Levers of Control”, Harvard Business School Press, Boston, USA (1995). [10] Spectrum Series, “Computers and manufacturing productivity”, An IEEE Press Book (1987). [11] Storey N., “Safety-Critical Computer Systems”, Addison-Wesley Longman, England (1996). [12] “Supply Chain Management: Building the Agile Enterprise”, Gartner Group Symposium, 11-15 October, 1999, Walt Disney World, Orlando, Florida, USA (1999). [13] Tou Julius, “Modern control Theory”, McGraw-Hill Co., NY (1964).
منابع مشابه
Using Exciting and Spectral Envelope Information and Matrix Quantization for Improvement of the Speaker Verification Systems
Speaker verification from talking a few words of sentences has many applications. Many methods as DTW, HMM, VQ and MQ can be used for speaker verification. We applied MQ for its precise, reliable and robust performance with computational simplicity. We also used pitch frequency and log gain contour for further improvement of the system performance.
متن کاملUsing Exciting and Spectral Envelope Information and Matrix Quantization for Improvement of the Speaker Verification Systems
Speaker verification from talking a few words of sentences has many applications. Many methods as DTW, HMM, VQ and MQ can be used for speaker verification. We applied MQ for its precise, reliable and robust performance with computational simplicity. We also used pitch frequency and log gain contour for further improvement of the system performance.
متن کاملInformation Envelope and its Information Integrity Implications: For a complex, changing environment, modeling a generic business process as an integral to a closed loop information and control system characterized by uncertainty
Physical and informational works are strongly interrelated in a business process. This paper facilitates a control’s interpretation of model of business process as an integral part of a closed loop information and control system. Various uncertainties (due to 5Cs) affect this model and raise the Information Integrity issue for the same. This complex information and control system delivers a fle...
متن کاملUse of Episodic Interview in Health Information Seeking Studies
Background and Aim: Due to recent attention to health promotion and self-care as one of the prerequisites of health services and intervention programs, health information seeking behavior research has gain increasing importance. Factors such as attention to user centered studies, context and self-care require using of methods and tools that help study people in their natural environment. Howeve...
متن کاملAnalysis of the concept of information culture and a survey of its status among faculty members of Ferdowsi University of Mashhad
Background and Aim: This study aims to explore the concept of information culture, and survey its status among the faculty members of Ferdowsi University of Mashhad. Method: This research is applied research that conducted via survey research. Population included faculty members of Ferdowsi university of Mashhad that 250 of them were selected via random sampling. A questionnaire based on (Choo ...
متن کاملA NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL
Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...
متن کامل