Search results for "communication technology"
showing 10 items of 360 documents
Oppikirjan rooli tieto- ja viestintätekniikan opetuksessa
2011
Oppimateriaalien kehittäminen, hyödyntäminen ja rooli tieto- ja viestintätekniikan opetuksessa
2014
Implementering av elektroniske legemiddelkurven på et sykehus
2014
Masteroppgave i helse- og sosialinformatikk HSI 500 Universitetet i Agder 2014 Background: This rapport is a student project as a part of the final year program for master degree in Health and social Informatics at Agder University. The implementation of electronic prescribing systems in the health sector is a priority for both the public policy and for the management of hospitals. It is expected that such systems will increase the work capacity of the employees, improve information flow and reduce medication errors. Akershus University Hospital is the only hospital in Norway that has implemented an electronic prescribing system at the ward units. But implementation is seriously delayed com…
Information and Communication Technology within English for Academic Purposes Studies
2009
The Bayesian Pursuit Algorithm: A New Family of Estimator Learning Automata
2011
Published version of a chapter in the book: Modern Approaches in Applied Intelligence. Also available from the publisher at http://dx.doi.org/10.1007/978-3-642-21827-9_53 The fastest Learning Automata (LA) algorithms currently available come from the family of estimator algorithms. The Pursuit algorithm (PST), a pioneering scheme in the estimator family, obtains its superior learning speed by using Maximum Likelihood (ML) estimates to pursue the action currently perceived as being optimal. Recently, a Bayesian LA (BLA) was introduced, and empirical results that demonstrated its advantages over established top performers, including the PST scheme, were reported. The BLA scheme is inherently …
Tutkimus peruskoulun ja lukion opettajista Keski-Suomen alueella
2017
This study examined Information and Communications Technology (ICT) know-how and needs and challenges of teachers in-service training in the region of Middle–Finland. In this context impressiveness is seen as the congruence between the set aims and gathered results. The study approaches the subject matter through the opinions of teaching personnel. The study data was gathered from the focused interview questionnaires in many supplementary educational occasions of randomly picked teaching personnel in 2013, 2014, 2017 and also from personnel interwiew’s in 2013-2016. The study is aimed at the teaching personnel of Comprehensive Schools and Upper- Secondary Schools to investigate their ICT kn…
Industrial Robot Collision Handling in Harsh Environments
2014
Doktorgradsavhandling i mekatronikk, Universitetet i Agder, 2014 The focus in this thesis is on robot collision handling systems, mainly collision detection and collision avoidance for industrial robots operating in harsh environments (e.g. potentially explosive atmospheres found in the oil and gas sector). Collision detection should prevent the robot from colliding and therefore avoid a potential accident. Collision avoidance builds on the concept of collision detection and aims at enabling the robot to find a collision free path circumventing the obstacle and leading to the goal position. The work has been done in collaboration with ABB Process Automation Division with focus on applicatio…
A general framework for group authentication and key exchange protocols
2014
Published version of a chapter in the book: Foundations and Practice of Security. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-319-05302-8_3 In this paper, we propose a novel framework for group authentication and key exchange protocols. There are three main advantages of our framework. First, it is a general one, where different cryptographic primitives can be used for different applications. Second, it works in a one-to-multiple mode, where a party can authenticate several parties mutually. Last, it can provide several security features, such as protection against passive adversaries and impersonate attacks, implicit key authentication, forward and backward securi…
The role of ICT and high-growth firms : micro-level evidence on job creation and productivity growth
2016
Tässä tutkielmassa analysoidaan kasvuyritysten sekä tieto- ja viestintäteknologian (ICT) kontribuutioita työpaikkojen luomiseen ja työn tuottavuuteen. Suomen talouden kehitys on ollut heikkoa viimeisen vuosikymmenen ajan globaalista finanssikriisistä johtuen. Työttömyys on noussut korkealle tasolle ja työn tuottavuuden kasvu hidastunut, ja lopulta pysähtynyt. Lisäksi on keskusteltu siitä, syntyykö Suomeen uusia työpaikkoja. Tässä tutkielmassa pyritään tarjoamaan empiiriseen tutkimukseen perustuvaa tietoa Suomen talouskasvun lähteistä. Tutkielmassa esitetään kasvuteorian lisäksi kasvuyrittäjyyteen liittyvää teoriataustaa sekä aiempaa kirjallisuutta. Lisäksi esitellään yrityksen elinkaareen l…
Tilgangsstyring av elektronisk pasientjournal : en Delphistudie av dagens utfordringer og synliggjøring av potensielle forbedringer
2014
Masteroppgave i helse- og sosialinformatikk HSI 500 Universitetet Agder 2014 In health care, access to sensitive information about patients is a necessity in order to offer care to the patient, and maintain patient safety. At the same time it is important that the information is protected against unauthorized access, to ensure patient privacy. Access control is an essential function in electronic health records (EHR) to maintain the duality between patient safety and patient privacy by ensuring that authorized personnel are allowed access to information they need. However, care processes are often unpredictable, and a number of end users can be involved in treatment across organizational un…