Search results for " Reliability"

showing 10 items of 557 documents

A World without Islam

2012

Information Systems and ManagementComputer Networks and CommunicationsHardware and ArchitectureIslamSociologyTheologyReligious studiesSafety Risk Reliability and QualitySafety ResearchSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct

Conflictive Touring

2015

Problems to understand social phenomenon associates to our misconceptions, stereotypes and prejudices imposed during our early socialization. This happens not only with tourism which is valorized as a right of all citizens in modern societies, but also with terrorism, judged as the main threat of West. However, what would happen if both would be different sides of the same coin? This essay review explores the roots of tourism and terrorism during the process of unionization in US. What on one hand resulted in a hyper-mobile process that shore up tourism, on another was a desesperate attempt to struggle against terrorism. In this vein, it is safe to say that tourism is terrorism by other mea…

Information Systems and ManagementComputer Networks and CommunicationsHardware and ArchitecturePolitical scienceLawTerrorismCriminologySafety Risk Reliability and QualitySafety ResearchSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct

Violencia de Estado, guerra, resistencia. Por una nueva política de la Izquierda

2011

Information Systems and ManagementComputer Networks and CommunicationsHardware and ArchitectureSafety Risk Reliability and QualitySafety ResearchSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct

Terrorists Tend to Target Innocent Tourists

2015

Over last decades, policy makers in tourism and hospitality acknowledged that terrorism was the worse threat to tourism and West because of many reasons. Terrorism not only affects seriously economies generating unemployment and stagnation in international demand, but also triggers an escalation of violence where all advertisement efforts are backfired. Nevertheless, this essay review explores the historical roots of modern tourism and worker unions to see the point of connection between both. What beyond the boundaries of society is called terrorist attack, inside is named “strike”. This review reminds that the origin of terrorism has been coined in West, as a result of capitalism expansio…

Information Systems and ManagementComputer Networks and Communicationsbusiness.industrymedia_common.quotation_subjectCapitalismEconomyHardware and ArchitectureHospitalityPolitical sciencePolitical economyTerrorismUnemploymentSafety Risk Reliability and QualitybusinessSafety ResearchSoftwareTourismmedia_commonInternational Journal of Cyber Warfare and Terrorism
researchProduct

Aligning Two Specifications for Controlling Information Security

2014

Assuring information security is a necessity in modern organizations. Many recommendations for information security management exist, which can be used to define a baseline of information security requirements. ISO/ IEC 27001 prescribes a process for an information security management system, and guidance to implement security controls is provided in ISO/IEC 27002. Finnish National Security Auditing Criteria (KATAKRI) has been developed by the national authorities in Finland as a tool to verify maturity of information security practices. KATAKRI defines both security control objectives and security controls to meet an objective. Here the authors compare and align these two specifications in…

Information Systems and ManagementComputer Networks and Communicationsinformation securitysecurity specification alignmentComputer securitycomputer.software_genreSecurity information and event managementInformation security auditKATAKRIsecurity managementSafety Risk Reliability and Qualitysecurity audit criteriaInformation security management systemta113Certified Information Security ManagerInformation securitySecurity controlsISO/IEC 27001ISO/IEC 27002ITIL security managementRisk analysis (engineering)Security servicesecurity cerificationHardware and ArchitectureBusinessSafety ResearchcomputerSoftwaresecurity controls
researchProduct

Assessment of data availability influence on integrated urban drainage modelling uncertainty

2009

In urban water quality management, several models are connected and integrated for analysing the fate of pollutants from the sources in the urban catchment to the final recipient; classical problems connected with the selection and calibration of parameters are amplified by the complexity of the modelling approach increasing their uncertainty. The present paper aims at studying the influence of reductions in available data on the modelling response uncertainty with respect to the different integrated modelling outputs (both considering quantity and quality variables). At this scope, a parsimonious integrated home-made model has been used allowing for analysing the combinative effect of data…

Integrated urban drainage systemEnvironmental EngineeringQuality managementSettore ICAR/03 - Ingegneria Sanitaria-AmbientaleOperations researchCalibration (statistics)Computer scienceEcological Modelingmedia_common.quotation_subjectSettore ICAR/02 - Costruzioni Idrauliche E Marittime E IdrologiaUncertainty analysiEnvironmental engineeringEnvironmental modellingModel reliability assessmentData pointDrainage system (geomorphology)Sensitivity analysisQuality (business)Receiving water bodySoftwareReliability (statistics)Uncertainty analysismedia_commonEnvironmental Modelling & Software
researchProduct

Ensuring content validity of psychological and educational tests – the role of experts

2020

Many test developers try to ensure the content validity of their tests by having external experts review the items in terms of relevance, difficulty, clarity, and so on. Although this approach is widely accepted, a closer look reveals there are several pitfalls that need to be avoided if experts’ advice is to be truly helpful. First, I offer a classification of tasks experts are given by test developers as reported on in the literature dealing with procedures of drawing on experts’ advice. Second, I review a sample of reports on test development (N = 72) to identify the common current procedures for selecting and consulting experts. Results indicate that often the choice of experts seems to…

Inter-rater reliabilitylawMeta-analysisApplied psychologyCLARITYContent validityRelevance (law)Psychological testingSample (statistics)PsychologyEducationlaw.inventionTest (assessment)Frontline Learning Research
researchProduct

Early-design improvement of human reliability in an experimental facility: A combined approach and application on SPES

2019

Abstract SPES (Selective Production of Exotic Species) is a second-generation Isotope Separation On-Line (ISOL) facility for advanced nuclear physics applications, currently under construction at INFN (National Institute of Nuclear Physics) of Legnaro, Italy. Despite the potentially important safety implications of human errors for ISOL facilities, only a limited number of studies addressing this issue have been performed worldwide. This paper tries to address this need by means of an integrated approach of Hierarchical Task Analysis (HTA) and three human error quantification methods: HEART (in an enhanced version), SPAR-H, and CREAM. The application of multiple Human Reliability Analysis (…

Interface (Java)Computer scienceHuman error0211 other engineering and technologies02 engineering and technologyTask (project management)law.inventionlawHuman reliability assessment021105 building & constructionNuclear power plantCredibilityHuman error0501 psychology and cognitive sciencesHierarchical task analysiSafety Risk Reliability and QualitySettore ING-IND/19 - Impianti Nucleari050107 human factorsHuman reliability05 social sciencesPublic Health Environmental and Occupational HealthSPAR-HControl roomTask analysisSystems engineeringHEARTCREAMSafety ResearchSafety Science
researchProduct

AnyDSL: a partial evaluation framework for programming high-performance libraries

2023

This paper advocates programming high-performance code using partial evaluation. We present a clean-slate programming system with a simple, annotation-based, online partial evaluator that operates on a CPS-style intermediate representation. Our system exposes code generation for accelerators (vectorization/parallelization for CPUs and GPUs) via compiler-known higher-order functions that can be subjected to partial evaluation. This way, generic implementations can be instantiated with target-specific code at compile time. In our experimental evaluation we present three extensive case studies from image processing, ray tracing, and genome sequence alignment. We demonstrate that using partial …

Intermediate languageComputer science020207 software engineeringImage processing02 engineering and technologyParallel computingPartial evaluation004020204 information systems0202 electrical engineering electronic engineering information engineeringCode generationRay tracing (graphics)General-purpose computing on graphics processing unitsSafety Risk Reliability and QualityImplementationSoftwareCompile time
researchProduct

EECDC-MAC: An energy efficient cooperative duty cycle MAC protocol

2012

In this paper, we propose a novel energy efficient cooperative duty cycle MAC (EECDC-MAC) protocol in which sensor nodes use fixed wakeup rendezvous scheduling to exchange messages and a cooperative transmission mechanism to avoid overuse of nodes with lower residual energy. Numerical results demonstrate that the EECDC-MAC protocol can prolong the entire network longevity efficiently in comparison with an existing cooperative duty cycle MAC protocol, CDC-MAC, and another popular duty cycle MAC protocol, prediction wakeup MAC (PW-MAC) protocol.

Internet Protocol Control ProtocolTelecommunication network reliabilitybusiness.industryComputer scienceDuty cycleComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSRendezvousResidual energybusinessWireless sensor networkComputer networkScheduling (computing)Efficient energy use2012 IFIP Wireless Days
researchProduct