Search results for " Reliability"
showing 10 items of 557 documents
A World without Islam
2012
Conflictive Touring
2015
Problems to understand social phenomenon associates to our misconceptions, stereotypes and prejudices imposed during our early socialization. This happens not only with tourism which is valorized as a right of all citizens in modern societies, but also with terrorism, judged as the main threat of West. However, what would happen if both would be different sides of the same coin? This essay review explores the roots of tourism and terrorism during the process of unionization in US. What on one hand resulted in a hyper-mobile process that shore up tourism, on another was a desesperate attempt to struggle against terrorism. In this vein, it is safe to say that tourism is terrorism by other mea…
Violencia de Estado, guerra, resistencia. Por una nueva política de la Izquierda
2011
Terrorists Tend to Target Innocent Tourists
2015
Over last decades, policy makers in tourism and hospitality acknowledged that terrorism was the worse threat to tourism and West because of many reasons. Terrorism not only affects seriously economies generating unemployment and stagnation in international demand, but also triggers an escalation of violence where all advertisement efforts are backfired. Nevertheless, this essay review explores the historical roots of modern tourism and worker unions to see the point of connection between both. What beyond the boundaries of society is called terrorist attack, inside is named “strike”. This review reminds that the origin of terrorism has been coined in West, as a result of capitalism expansio…
Aligning Two Specifications for Controlling Information Security
2014
Assuring information security is a necessity in modern organizations. Many recommendations for information security management exist, which can be used to define a baseline of information security requirements. ISO/ IEC 27001 prescribes a process for an information security management system, and guidance to implement security controls is provided in ISO/IEC 27002. Finnish National Security Auditing Criteria (KATAKRI) has been developed by the national authorities in Finland as a tool to verify maturity of information security practices. KATAKRI defines both security control objectives and security controls to meet an objective. Here the authors compare and align these two specifications in…
Assessment of data availability influence on integrated urban drainage modelling uncertainty
2009
In urban water quality management, several models are connected and integrated for analysing the fate of pollutants from the sources in the urban catchment to the final recipient; classical problems connected with the selection and calibration of parameters are amplified by the complexity of the modelling approach increasing their uncertainty. The present paper aims at studying the influence of reductions in available data on the modelling response uncertainty with respect to the different integrated modelling outputs (both considering quantity and quality variables). At this scope, a parsimonious integrated home-made model has been used allowing for analysing the combinative effect of data…
Ensuring content validity of psychological and educational tests – the role of experts
2020
Many test developers try to ensure the content validity of their tests by having external experts review the items in terms of relevance, difficulty, clarity, and so on. Although this approach is widely accepted, a closer look reveals there are several pitfalls that need to be avoided if experts’ advice is to be truly helpful. First, I offer a classification of tasks experts are given by test developers as reported on in the literature dealing with procedures of drawing on experts’ advice. Second, I review a sample of reports on test development (N = 72) to identify the common current procedures for selecting and consulting experts. Results indicate that often the choice of experts seems to…
Early-design improvement of human reliability in an experimental facility: A combined approach and application on SPES
2019
Abstract SPES (Selective Production of Exotic Species) is a second-generation Isotope Separation On-Line (ISOL) facility for advanced nuclear physics applications, currently under construction at INFN (National Institute of Nuclear Physics) of Legnaro, Italy. Despite the potentially important safety implications of human errors for ISOL facilities, only a limited number of studies addressing this issue have been performed worldwide. This paper tries to address this need by means of an integrated approach of Hierarchical Task Analysis (HTA) and three human error quantification methods: HEART (in an enhanced version), SPAR-H, and CREAM. The application of multiple Human Reliability Analysis (…
AnyDSL: a partial evaluation framework for programming high-performance libraries
2023
This paper advocates programming high-performance code using partial evaluation. We present a clean-slate programming system with a simple, annotation-based, online partial evaluator that operates on a CPS-style intermediate representation. Our system exposes code generation for accelerators (vectorization/parallelization for CPUs and GPUs) via compiler-known higher-order functions that can be subjected to partial evaluation. This way, generic implementations can be instantiated with target-specific code at compile time. In our experimental evaluation we present three extensive case studies from image processing, ray tracing, and genome sequence alignment. We demonstrate that using partial …
EECDC-MAC: An energy efficient cooperative duty cycle MAC protocol
2012
In this paper, we propose a novel energy efficient cooperative duty cycle MAC (EECDC-MAC) protocol in which sensor nodes use fixed wakeup rendezvous scheduling to exchange messages and a cooperative transmission mechanism to avoid overuse of nodes with lower residual energy. Numerical results demonstrate that the EECDC-MAC protocol can prolong the entire network longevity efficiently in comparison with an existing cooperative duty cycle MAC protocol, CDC-MAC, and another popular duty cycle MAC protocol, prediction wakeup MAC (PW-MAC) protocol.