THE USAGE OF INFORMATION TECHNOLOGY IN THE IMPLEMENTATION OF THE BOLOGNA PRINCIPLE OF THE STUDENT MOBILITY
Journal Title: Journal of Information Technology and Application (JITA) - Year 2011, Vol 1, Issue 1
Abstract
In this paper, student mobility is observed as one of the steps in realization of the Digital Agenda of the European Union. Student mobility, as one of the main principles of the Bologna process, is the means of effectiveness increase and quality of the educational system in European Higher Education Area, EHEA, because it enables better exchange and fl ow of knowledge and ideas, as well as the adoption of good practices. Management Identity (IdM) system of the Higher Educational institution is a system which supports student mobility by using personal information when accessing data. The basic identity document in this system is a student smart card with the owner’s fi ngerprint. This biometrical data insures high level of data and identity protection. This paper proposes informational system which, in itself, contains standards for student mobility support as one of the modules of the IdM system of the Higher Educational institution.
Authors and Affiliations
Gordana Radić
THE INNOVATION ICT STRATEGY IN AGRI-FOOD SECTOR
The achievement of Information Communication Technology (ICT) as a new ground for economic competition is deeply affecting the trade organization in many merchant sectors. For Italian agri-food products it is of absolute...
MEASURING THE CHARACTERISTICS OF DG CAC ALGORITHM
Users today expect email and instant messaging access, surf, video games and other services through mobile broadband access networks. In order to support this increasing data traffi c, advanced resource management has to...
THE USAGE OF INFORMATION TECHNOLOGY IN THE IMPLEMENTATION OF THE BOLOGNA PRINCIPLE OF THE STUDENT MOBILITY
In this paper, student mobility is observed as one of the steps in realization of the Digital Agenda of the European Union. Student mobility, as one of the main principles of the Bologna process, is the means of effectiv...
SIMULATED ANNEALING AND EVOLUTIONARY ALGORITHM FOR BASE STATION LOCATION PROBLEM: A COMPARISON OF METHODS
A modifi cations of the evolutionary algorithm and simulated annealing method for solving the base station location problem for creating a wireless data network is introduced in the article. By the way of computer simula...
ENUMERATION, RANKING AND GENERATION OF BINARY TREES BASED ON LEVEL-ORDER TRAVERSAL USING CATALAN CIPHER VECTORS
In this paper, a new representation of a binary tree is introduced, called the Catalan Cipher Vector, which is a vector of elements with certain properties. It can be ranked using a special form of the Catalan Triangle d...