“Proceedings of Safety, Health and Environment World Congress, ISSN 2317-3173. Vol. 13, nr. 1 (2013)” ; Healthcare organizations manage with personal information concerning to patients from many sources that, typically, are supported by computer-based systems therefore, demands cautious when there are ethical and legal aspects involved. Since not all clinical knowledge managed by healthcare organizations could...
In order to provide a better service, sharing knowledge with partners and communities is becoming part of the healthcare organizations culture. Data, information and clinic knowledge require specific cautious, because it involves ethical and legal issues. The constant evolution of Information and Communication Technologies brings new opportunities with multiple forms of communication (web 2.0), therefore,...
This paper introduces a distributed data mining approach suited to grid computing environments based on a supervised learning classifier system. Different methods of merging data mining models generated at different distributed sites are explored. Centralized Data Mining (CDM) is a conventional method of data mining in distributed data. In CDM, data that is stored in distributed locations have to be collected a...
A group of university teachers have been developing several contents using streaming technology, since it promotes the support of pedagogical activity as a dynamic resource and due to the fact that is oriented to a model of shared learning contents. Now, a new challenge can be stated: the share and the reutilization of these learning contents. Apart from being an enhanced experience only concerning the sharing ...
This paper reports the use of podcasts in blended-learning at the University of Minho, in Portugal. Six lecturers created their own podcasts with different purposes in order to support their undergraduate and graduate courses and their students’ (n=318) learning. The reported study belongs to a broader project about the impact of podcasts in blended-learning and it reports data from two semesters. Results give ...
Nowadays the terrorist threat took proportions that concern governments and the national security organizations, all over the world. A successful terrorist incident usually brings catastrophic results. However if a terrorist attack can be predicted and characterized, it may be possible to organize a proper intervention in order to avoid it or to reduce its impact. The management of information is becoming an im...
IEEE Copyright Policies This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the...
The majority of computer systems employ a login ID and password as the principal method for access security. In stand-alone situations, this level of security may be adequate, but when computers are connected to the internet, the vulnerability to a security breach is increased. In order to reduce vulnerability to attack, biometric solutions have been employed. In this paper, we investigate the use of a behaviou...
The information agent has requirements in the Information Technology (IT) age that are in everything comparable to those of one hundred years ago. But, despite being similar, they require new forms of implementation due to the evolution of the communication platforms and protocols and to the increase in the amount of information that has to be known, stored, transmitted, and interpreted. Although, in many situa...
In this paper we describe a functional model that will be used to develop learning units supported by streaming media contents. The mais goal is to test this new methodology by carrying out several padagogical experiences with students and teachers from different scientifies areas, from Engineering to Education. More precisely, the target courses are Applied Mathematics, Computation Systems, Digital Control and...
Financiadores do RCAAP | |||||||
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |