A proposal for a computer-based system to support the Chinese Marine Corps Field Maneuver Controlling and Evaluation Operation (FIOP).
Ho, Chun Wu
Spencer, Michael P.
Jones, Carl R.
MetadataShow full item record
This thesis addresses IBM's Business Systems Planning (BSP) methodology to design a computer-based information system for the Chinese Marine Corps Field Maneuver Controlling And Evaluation Operation (FIOP) . It initially describes the current manual system fay identifying each organizational group and the functions each perform. BSP is then defined including its background, underlying concepts and potential benefits. Finally, the 3SP methodology is applied to FIOP resulting in a list of data classes, a process/data class matrix and an information flow diagram. The conclusion is that a computer-based system for FIOP is both feasible and worthwhile. The recommendations are that a steering committee of major FIOP users be formed to devise obtainable and measurable objectives; that a BSP expert be hired to act as a consultant/coordinator for this project and finally, that the implementation plan be reviewed annually to ensure its continued cost effectiveness.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
DiMiceli, John A. (1986-09);A computer-controlled data acquisition and analysis system was designed, built and tested. All of the required elements of a complete data acquisition system were assembled, including transducers, amplifiers, signal ...
The translation of data structure representations of simple queuing problems into GPSS programs and English text. McGee, Robert Thomas (Monterey, California. Naval Postgraduate School, 1971-06);One of the goals of computer technology is to have the ability to communicate with the computer in a natural language such as English. A research effort underway at the Naval Postgraduate School involves the design and ...
Graham, Scott W.; Mills, Stephen E. (Monterey, California. Naval Postgraduate School, 1999-09-01);Many computer security policies are written relatively vaguely. In many ways this is intentional to allow for easier access to all the functionality of the computer network. However, too much leeway allows users, without ...