225 research outputs found

    Multi-layer Architecture For Storing Visual Data Based on WCF and Microsoft SQL Server Database

    Full text link
    In this paper we present a novel architecture for storing visual data. Effective storing, browsing and searching collections of images is one of the most important challenges of computer science. The design of architecture for storing such data requires a set of tools and frameworks such as SQL database management systems and service-oriented frameworks. The proposed solution is based on a multi-layer architecture, which allows to replace any component without recompilation of other components. The approach contains five components, i.e. Model, Base Engine, Concrete Engine, CBIR service and Presentation. They were based on two well-known design patterns: Dependency Injection and Inverse of Control. For experimental purposes we implemented the SURF local interest point detector as a feature extractor and KK-means clustering as indexer. The presented architecture is intended for content-based retrieval systems simulation purposes as well as for real-world CBIR tasks.Comment: Accepted for the 14th International Conference on Artificial Intelligence and Soft Computing, ICAISC, June 14-18, 2015, Zakopane, Polan

    How was it for you? Experiences of participatory design in the UK health service

    Get PDF
    Improving co-design methods implies that we need to understand those methods, paying attention to not only the effect of method choices on design outcomes, but also how methods affect the people involved in co-design. In this article, we explore participants' experiences from a year-long participatory health service design project to develop ‘Better Outpatient Services for Older People’. The project followed a defined method called experience-based design (EBD), which represented the state of the art in participatory service design within the UK National Health Service. A sample of participants in the project took part in semi-structured interviews reflecting on their involvement in and their feelings about the project. Our findings suggest that the EBD method that we employed was successful in establishing positive working relationships among the different groups of stakeholders (staff, patients, carers, advocates and design researchers), although conflicts remained throughout the project. Participants' experiences highlighted issues of wider relevance in such participatory design: cost versus benefit, sense of project momentum, locus of control, and assumptions about how change takes place in a complex environment. We propose tactics for dealing with these issues that inform the future development of techniques in user-centred healthcare design

    A Complexity Architecture for Information Technologies: a Three-Year Didactic Experiment

    Get PDF
    One medium-term strategy for helping in the management of complexity is the introduction of a conceptual complexity component in the very centre of university curricula. In very few areas is the growth of complexity as evident as in the information technologies (ITs), the focus of the work presented in the current paper. We have therefore developed an integrated way of tackling the specific field of information technologies by means of an approach,to complexity. The content of this paper describes the guidelines of our research effort, placing an emphasis on informatics. Concepts of complexity based on the system metaphor have been substantially drawn upon in this exercise and are thus presented in some detail. Also described is a didactic experiment conducted by the author and designed to provide a new and integrating approach to University curricula for future professionals. The students' "discovery" of complexity is the focal point of the experiment. The findings of this effort are encouraging and call for the continuation and expansion of this experiment

    Loitering with intent: dealing with human-intensive systems

    Get PDF
    This paper discusses the professional roles of information systems analysts and users, focusing on a perspective of human intensive, rather than software intensive information systems. The concept of ‘meaningful use’ is discussed in re-lation to measures of success/failure in IS development. The authors consider how a number of different aspects of reductionism may distort analyses, so that processes of inquiry cannot support organizational actors to explore and shape their requirements in relation to meaningful use. Approaches which attempt to simplify complex problem spaces, to render them more susceptible to ‘solution’ are problematized. Alternative perspectives which attempt a systematic, holistic complexification, by supporting contextual dependencies to emerge, are advocated as a way forward

    Southern theories in ICT4D

    Get PDF
    This paper suggests that the dominance of northern research paradigms in ICT4D may be viewed as a continuation of colonial sway over the endeavors of the global South. The notion of Southern Theory - as introduced in the work of Raewyn Connell, the Comaroffs, and others - may be a route by which re-searchers in the global South can reclaim the intellectual territory of ICT4D, with indigenous and regional research paradigms and theories rather than those simply absorbed from the global North

    The role of emotion, values, and beliefs in the construction of innovative work realities

    Get PDF
    Traditional approaches to requirements elicitation stress systematic and rational analysis and representation of organizational context and system requirements. This paper argues that (1) for an organization, a software system implements a shared vision of a future work reality and that (2) understanding the emotions, feelings, values, beliefs, and interests that drive organizational human action is needed in order to invent the requirements of such a software system. This paper debunks some myths about how organizations transform themselves through the adoption of Information and Communication Technology; describes the concepts of emotion, feeling, value, and belief; and presents some constructionist guidelines for the process of eliciting requirements for a software system that helps an organization to fundamentally change its work patterns.(undefined

    Evaluation of the Performance of Routine Information System Management (PRISM) framework: evidence from Uganda

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Sound policy, resource allocation and day-to-day management decisions in the health sector require timely information from routine health information systems (RHIS). In most low- and middle-income countries, the RHIS is viewed as being inadequate in providing quality data and continuous information that can be used to help improve health system performance. In addition, there is limited evidence on the effectiveness of RHIS strengthening interventions in improving data quality and use. The purpose of this study is to evaluate the usefulness of the newly developed Performance of Routine Information System Management (PRISM) framework, which consists of a conceptual framework and associated data collection and analysis tools to assess, design, strengthen and evaluate RHIS. The specific objectives of the study are: a) to assess the reliability and validity of the PRISM instruments and b) to assess the validity of the PRISM conceptual framework.</p> <p>Methods</p> <p>Facility- and worker-level data were collected from 110 health care facilities in twelve districts in Uganda in 2004 and 2007 using records reviews, structured interviews and self-administered questionnaires. The analysis procedures include Cronbach's alpha to assess internal consistency of selected instruments, test-retest analysis to assess the reliability and sensitivity of the instruments, and bivariate and multivariate statistical techniques to assess validity of the PRISM instruments and conceptual framework.</p> <p>Results</p> <p>Cronbach's alpha analysis suggests high reliability (0.7 or greater) for the indices measuring a promotion of a culture of information, RHIS tasks self-efficacy and motivation. The study results also suggest that a promotion of a culture of information influences RHIS tasks self-efficacy, RHIS tasks competence and motivation, and that self-efficacy and the presence of RHIS staff have a direct influence on the use of RHIS information, a key aspect of RHIS performance.</p> <p>Conclusions</p> <p>The study results provide some empirical support for the reliability and validity of the PRISM instruments and the validity of the PRISM conceptual framework, suggesting that the PRISM approach can be effectively used by RHIS policy makers and practitioners to assess the RHIS and evaluate RHIS strengthening interventions. However, additional studies with larger sample sizes are needed to further investigate the value of the PRISM instruments in exploring the linkages between RHIS data quality and use, and health systems performance.</p

    ASTERIX and 2.0 Knowledge Management : exploring the appropriation of 2.0 KMS via the Myth of the Gaulish village

    Get PDF
    International audienceKnowledge Management Systems (KMS) in companies have profoundly changed in recent years. They have become KMS 2.0 that aim to transform the firm and are driven by a new relationship to knowledge in line with 2.0 organisations. These 2.0 KMS have implemented modes of organisation that disrupt those that previously guided firms’ performance. This can sometimes lead to paradoxical organizational dysfunctions as witnessed by the difficulties faced by some traditionally hierarchical French companies. Through a case study of Constructor and a theoretical background on IS appropriation in organizations and myths in management, we show how the Asterix myth contributes to understanding how 2.0. KMS are appropriated in such companies. We find evidence of similarities regarding knowledge and Knowledge Management between the Asterix’ myth and the behaviours and practices concerning knowledge management within Constructor. As a result, the Asterix’ myth may be a relevant perspective for understanding the obstacles, advantages and appropriations of 2.0. KMS within French organizations

    Technology Adoption by Elderly People – An Empirical Analysis of Adopters and Non-Adopters of Social Networking Sites

    Get PDF
    This research paper analyzes the impact of attitudinal, control and normative beliefs on the intention to use social network sites (SNS) by people older than 50. Using the Model of Adoption of Technology in Households (MATH) and the data of 115 social network site adopters and 53 non-adopters it can be shown that the intention of adopters and non-adopters has been influenced by different reasons. Perceived Ease of Use and Normative Beliefs have only a significant impact for adopters. Moreover, this research paper unfolds Fear of Technology as a strong influence factor for non-adopters in regard not to use SNS in their daily routine. The paper concludes with a discussion of an age-sensitive design of SNS in order to address the digital divide
    corecore