Font Size: a A A

Research And Application Of Target Control Model In Information System Engineering Surveillance

Posted on:2013-11-26Degree:MasterType:Thesis
Country:ChinaCandidate:Y B SuFull Text:PDF
GTID:2249330362972333Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
Recently, there are some existing problems in the construction of the information systemprojects in china: the quality of information system projects can′t meet the users′requirements, the information system projects are finished beyond the scheduled time and thecosts exceed its budget. The reason is that supervision mechanism is introduced in the processof the construction of the information system projects to avoid risks, but supervisingengineers set apart quality, schedule and costs in the management, they don′t put them in thewhole system to control.The article first introduce the concept of information system engineering and its lifecycle, then illustrates the definition of the information system project surveillance, and givethe analysis from the perspective of systems theory and cybernetics to raise that the supervisorcontrol the progress of quality, schedule and the investment goal with the aid of devotion,conversion, feedback, contrast and correction. We need to put quality, schedule and theinvestment as a whole part in the information sysytem through the combination of activecontrol and passive control.This article includes three objectives of the information projects surveillance, and givesthe analysis of the processes and methods about the scheduled time, quality and costs, whichare controled by the supervisor. Then we use the network technology to do the optimizationanalysis about three objectives, and learn about it with genetic algorithm. All of these canprovide the direction for supervisor to control the quality, schedule and costs. Finally,supervising engineers can control costs, quality and scheduled time reasonably with theimprovement of value-added management. In this article, an actual case was executed tovalidate the feasibility and practicality of the model. Results about the application of the caseshowed the model in this paper has some practical value.
Keywords/Search Tags:Information Systems Engineering, Surveillance, Target Control, GeneticAlgorithms
PDF Full Text Request
Related items