Search results for "Formations"
showing 10 items of 680 documents
Special Section on Quality Control by Artificial Vision
2008
This PDF file contains the editorial “Editorial: Special Section on Quality Control by Artificial Vision” for JEI Vol. 17 Issue 03
Systemische Kompetenzen und deren Einfluss auf das Kompetenzentwicklungspotenzial in Produktionsnetzwerken
2001
The special potentials of competence development are the mostly discussed benefits of interorganizational networks. Based on a system-theory-approach the paper examines the possibilities and boundaries of learning in interorganizational networks. On the one hand, the paper gives an answer to the structural question, which network-forms are suitable to realize interorganizational learning effects. On the other hand, the paper presents a process-oriented approach, which is able to describe and to explain the different individual and collective process levels of interorganizational learning as well as the interdependencies between this process levels.
Serviceability of segmental concrete arch-frame bridges built by cantilevering
2013
The evaluation of the safety degree in service life for a segmental prestressed concrete bridge built by the cantilever method presents different aspects related to strength, deformability, durability and to effects of time-dependent phenomena as creep and shrinkage. The case-study of a prestressed concrete frame bridge with inclined piers is presented, built by cantilevering, with precast segments. By considering the fundamental items of design and construction stages, the implications due to the arch effect in this static scheme are investigated, with respect to an equivalent bridge with a final scheme of continuous girder on vertical piers. The birth of a significant value of axial force…
In sewer processes: mathematical model development and sensitivity analysis.
2009
Until now the majority of sewer networks in Italy have been built and managed considering small as well as local wastewater treatment plants (WWTPs). However, pushed by Italian and EU regulations, centralised and large WWTPs are becoming more common in Italy. One major technical aspect caused by the changing from local to centralised WWTPs is the development of significant in-sewer processes. These processes are also emphasized by the building of long interceptor sewers characterized by high hydraulic retention times and absence of tributary sewers. In this paper a model derived from the well known WATS model (Wastewater Aerobic/anaerobic Transformation in Sewers) has been set up and applie…
Carbamazepine exposure in the sea anemones Anemonia sulcata and Actinia equina: Metabolite identification and physiological responses
2020
Trabajo presentado en el 11º Congreso Ibérico, 8º Iberoamericano de Contaminación y Toxicología (CICTA 2018) celebrado en la Escuela Técnica Superior de Ingeniería de Montes, Forestal y del Medio Natural, Madrid del 11 al 13 de julio de 2018
Scalp, basal epidural and intravascular far-field recordings after median nerve stimulation: evidence for a separate N18a potential
2000
Far-field somatosensory evoked potentials (SSEPs) after median nerve stimulation were recorded from scalp- (Fz), epidural- (ED) and intravascular electrodes (basilar artery [Bas]) to study the nature of the controversial N18a component of the widespread N18 potential. In healthy volunteers frequently an N18a potential was recorded at Fz. Simultaneous Fz and ED recordings at the pontomesencephalic junction as well as Bas-recordings at the caudal basilar artery showed N18a components identical in latency and shape. With intravascular recordings the shapes differed between the top of the basilar artery and the caudal artery recordings. These findings support the existence of a separate N18a po…
Not Worth the Net Worth? The Democratic Dilemmas of Privileged Access to Information
2017
In this article, we discuss the democratic conditions for parliamentary oversight in EU foreign affairs. Our point of departure is two Interinstitutional Agreements (IIAs) between the Council and the European Parliament (EP), which provide the latter with access to sensitive documents. To shed light on this issue, we ask to what extent these contribute to the democratic accountability in EU foreign policy? It is argued that the IIAs have strengthened the EP’s role in EU foreign affairs by giving it access to information to which it was previously denied. This does not mean, however, that this increase in power equals a strengthening of the EP as a democratic accountability forum. First of a…
Evaluation of Inciso: A system for automatic elaboration of a Citation Index in Social Science Spanish Journal
2007
We have developed a system that can elaborate a citation index in an automated way. It has been tested with Spanish journals. We need evaluate our system, mainly in effectiveness of the retrieval of citations. Criteria for evaluation of the system is presented and discussed, and the results of the application to our system are showed and analyzed.
The relationship between online vigilance and affective well-being in everyday life: Combining smartphone logging with experience sampling
2021
Contains fulltext : 220301.pdf (Publisher’s version ) (Open Access) Through communication technology, users find themselves constantly connected to others to such an extent that they routinely develop a mindset of connectedness. This mindset has been defined as online vigilance. Although there is a large body of research on media use and well-being, the question of how online vigilance impacts well-being remains unanswered. In this preregistered study, we combine experience sampling and smartphone logging to address the relation of online vigilance and affective well-being in everyday life. Seventy-five Android users answered eight daily surveys over five days (N = 1615) whilst having their…
Eliciting Information on the Vulnerability Black Market from Interviews
2010
Threats to computing prompted by software vulnerabilities are abundant and costly for those affected. Adding to this problem is the emerging vulnerability black markets (VBMs), since they become places to trade malware and exploits. VBMs are discussed based on information derived from interviews with security researchers. The effort is enriched by further examination of documents surrounding the disclosure of four selected vulnerabilities cases. The result suggests that the VBMs is bifurcated into two distinct parts; the skilled-hacker and the script-kiddie VBMs with a possible link between them, where the latter become places to sell malware or exploit kits after the zero day vulnerability…