Search results for "communication technology"

showing 10 items of 360 documents

Oppikirjan rooli tieto- ja viestintätekniikan opetuksessa

2011

educationperuskoulun yläastetieto- ja viestintätekniikkaoppikirjatlearning materialcomputer sciencetietotekniikkaopetusteachingopetusaineistoICTtextbookyläkouluinformation and communication technologyoppimateriaali
researchProduct

Oppimateriaalien kehittäminen, hyödyntäminen ja rooli tieto- ja viestintätekniikan opetuksessa

2014

educationtieto- ja viestintätekniikkaoppikirjatlearning materialKehittämistutkimuscomputer sciencetietotekniikkaopetusupper level of comprehensive schoole-learning materialdesign-based researchopetusaineistoelectronic learning materialICTperuskoulutextbookyläkouluinformation and communication technologydigitaalinen oppimateriaalioppimateriaali
researchProduct

Implementering av elektroniske legemiddelkurven på et sykehus

2014

Masteroppgave i helse- og sosialinformatikk HSI 500 Universitetet i Agder 2014 Background: This rapport is a student project as a part of the final year program for master degree in Health and social Informatics at Agder University. The implementation of electronic prescribing systems in the health sector is a priority for both the public policy and for the management of hospitals. It is expected that such systems will increase the work capacity of the employees, improve information flow and reduce medication errors. Akershus University Hospital is the only hospital in Norway that has implemented an electronic prescribing system at the ward units. But implementation is seriously delayed com…

elektronisk legemiddelkurve ; implementering ; informasjonssystemer ; motstand mot forandring ; kunnskapsmedarbeidere ; electronic prescribing systems ; implementation ; information systems ; professionals ; resistance to changeVDP::Technology: 500::Information and communication technology: 550
researchProduct

Information and Communication Technology within English for Academic Purposes Studies

2009

english for academic purposes studiesInformation and Communications TechnologyComputer scienceCommunication studiesMathematics educationEnglish for academic purposeslcsh:Linformation and communication technologylcsh:EducationSignum Temporis: Journal of Research in Pedagogy and Psychology
researchProduct

The Bayesian Pursuit Algorithm: A New Family of Estimator Learning Automata

2011

Published version of a chapter in the book: Modern Approaches in Applied Intelligence. Also available from the publisher at http://dx.doi.org/10.1007/978-3-642-21827-9_53 The fastest Learning Automata (LA) algorithms currently available come from the family of estimator algorithms. The Pursuit algorithm (PST), a pioneering scheme in the estimator family, obtains its superior learning speed by using Maximum Likelihood (ML) estimates to pursue the action currently perceived as being optimal. Recently, a Bayesian LA (BLA) was introduced, and empirical results that demonstrated its advantages over established top performers, including the PST scheme, were reported. The BLA scheme is inherently …

estimator algorithms learning automata pursuit algorithm Bayesian learning automata Bayesian pursuit algorithm Beta distributionVDP::Technology: 500::Information and communication technology: 550
researchProduct

Tutkimus peruskoulun ja lukion opettajista Keski-Suomen alueella

2017

This study examined Information and Communications Technology (ICT) know-how and needs and challenges of teachers in-service training in the region of Middle–Finland. In this context impressiveness is seen as the congruence between the set aims and gathered results. The study approaches the subject matter through the opinions of teaching personnel. The study data was gathered from the focused interview questionnaires in many supplementary educational occasions of randomly picked teaching personnel in 2013, 2014, 2017 and also from personnel interwiew’s in 2013-2016. The study is aimed at the teaching personnel of Comprehensive Schools and Upper- Secondary Schools to investigate their ICT kn…

evaluationtieto- ja viestintätekniikkaKeski-Suomieffectivenesslukiotietotekniikkaopettajatvaikuttavuusaineenopettajateducation for in-service teachersComputingMilieux_COMPUTERSANDEDUCATIONopetuskäyttöperuskoulutäydennyskoulutusInformation and Communication Technology
researchProduct

Industrial Robot Collision Handling in Harsh Environments

2014

Doktorgradsavhandling i mekatronikk, Universitetet i Agder, 2014 The focus in this thesis is on robot collision handling systems, mainly collision detection and collision avoidance for industrial robots operating in harsh environments (e.g. potentially explosive atmospheres found in the oil and gas sector). Collision detection should prevent the robot from colliding and therefore avoid a potential accident. Collision avoidance builds on the concept of collision detection and aims at enabling the robot to find a collision free path circumventing the obstacle and leading to the goal position. The work has been done in collaboration with ABB Process Automation Division with focus on applicatio…

gasskollisjonshåndteringoljekollisjonVDP::Technology: 500::Information and communication technology: 550industriroboterVDP::Social science: 200::Economics: 210::Business: 213eksplosjonsfare
researchProduct

A general framework for group authentication and key exchange protocols

2014

Published version of a chapter in the book: Foundations and Practice of Security. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-319-05302-8_3 In this paper, we propose a novel framework for group authentication and key exchange protocols. There are three main advantages of our framework. First, it is a general one, where different cryptographic primitives can be used for different applications. Second, it works in a one-to-multiple mode, where a party can authenticate several parties mutually. Last, it can provide several security features, such as protection against passive adversaries and impersonate attacks, implicit key authentication, forward and backward securi…

group authenticationAuthenticationPost-quantum cryptographyelliptic curve discrete logarithm problemCryptographic primitivediscrete logarithm problembusiness.industryVDP::Technology: 500::Information and communication technology: 550Computer securitycomputer.software_genreKey authenticationDiffie–Hellman key exchangePublic-key cryptographyDiffie-Hellman key exchangebusinesscomputerKey exchangeElGamal encryptionMathematics
researchProduct

The role of ICT and high-growth firms : micro-level evidence on job creation and productivity growth

2016

Tässä tutkielmassa analysoidaan kasvuyritysten sekä tieto- ja viestintäteknologian (ICT) kontribuutioita työpaikkojen luomiseen ja työn tuottavuuteen. Suomen talouden kehitys on ollut heikkoa viimeisen vuosikymmenen ajan globaalista finanssikriisistä johtuen. Työttömyys on noussut korkealle tasolle ja työn tuottavuuden kasvu hidastunut, ja lopulta pysähtynyt. Lisäksi on keskusteltu siitä, syntyykö Suomeen uusia työpaikkoja. Tässä tutkielmassa pyritään tarjoamaan empiiriseen tutkimukseen perustuvaa tietoa Suomen talouskasvun lähteistä. Tutkielmassa esitetään kasvuteorian lisäksi kasvuyrittäjyyteen liittyvää teoriataustaa sekä aiempaa kirjallisuutta. Lisäksi esitellään yrityksen elinkaareen l…

high-growth firmkasvuyrityksettieto- ja viestintätekniikkatuottavuustyöpaikataggregate labor productivity growthcreative destructionjob creationinformation and communication technologytyö
researchProduct

Tilgangsstyring av elektronisk pasientjournal : en Delphistudie av dagens utfordringer og synliggjøring av potensielle forbedringer

2014

Masteroppgave i helse- og sosialinformatikk HSI 500 Universitetet Agder 2014 In health care, access to sensitive information about patients is a necessity in order to offer care to the patient, and maintain patient safety. At the same time it is important that the information is protected against unauthorized access, to ensure patient privacy. Access control is an essential function in electronic health records (EHR) to maintain the duality between patient safety and patient privacy by ensuring that authorized personnel are allowed access to information they need. However, care processes are often unpredictable, and a number of end users can be involved in treatment across organizational un…

hsi500Tilgangsstyring ; Tilgangskontroll Delphi ; Elektronisk pasientjournal ; Informasjonssikkerhet ; Spesialisthelsetjeneste ; Pasientsikkerhet ; Access Control ; Delphi ; Electronic Health Records ; Information security ; Patient safetyVDP::Technology: 500::Information and communication technology: 550
researchProduct