Search results for "etäkäyttö"

showing 3 items of 3 documents

VBA-ohjelmoinnin mahdollisuudet raportoinnin ja etähuollon kehityksessä

2005

Visual Basic for ApplicationsetäkäyttöVisual BasicohjelmointiBASICraportointihuoltoExcelohjelmointikieletWord for Windows
researchProduct

The effects of technology-utilising rehabilitation on rehabilitees' physical activity: a prospective cohort study

2021

The aim of this study was to investigate the effects of technology-utilising rehabilitation on different intensities of physical activity (PA) and determine the explanatory factors of PA change. This was a prospective cohort study. Cardiac, musculoskeletal and vocational rehabilitees (N = 36) had 6 months of rehabilitation, which included guided training and counselling face-to-face as well as through distance technology. PA (total, light, moderate, vigorous) was measured by an activity tracker. Biopsychosocial questionnaires, waist circumference, PA measurements and m-coach activity were used to determine the factors that influence PA change. Technology-utilising rehabilitation improved li…

aktiivisuusmedicine.medical_specialtybiopsykologiavocational rehabiliteemedicine.medical_treatmentetäkäyttöPhysical activityphysical activityetäpalvelutPhysical Therapy Sports Therapy and Rehabilitationtuki- ja liikuntaelinvammaisetrehabilitationetäosallistuminenMedicineseurantamusculoskeletal rehabiliteesydäntauditskin and connective tissue diseasesProspective cohort studyRehabilitationetäkuntoutuspalvelutcardiac rehabiliteebusiness.industrydistance technologyteknologiaPhysical therapyetäkuntoutuskuntoutussense organsbusinessfyysinen aktiivisuus
researchProduct

Efficient remote authentication

2013

In 2003, Kennel and Jamieson described a method of remote machine authentication. By authentication, the authors meant that the remote machine is non-virtual, and the operating system on the remote machine is not malicious. The described method does not consider the variety of versions of each operating system. The description completely ignores the existence of modules that can be plugged into the operating system. The authors of this paper adapt the method described by Kennel and Jamieson to the real world so that itcan be applied without prior knowledge of theoperating system or the modules on the remote machine. peerReviewed

todentaminentietokoneetetäkäyttöremote authenticationtietoturvavirtuaaliympäristöVirtual machinedatabasedigital rights management
researchProduct