Search results for "Liability"
showing 10 items of 1754 documents
Reliable Data Gathering in Tree-Based IEEE 802.15.4 Wireless Sensor Networks
2007
This paper describes a routing protocol for enhanced robustness in IEEE 802.15.4-based sensor networks, which also addresses typical MAC layer issues, including power management, synchronization and link reliability. The algorithm uses a single-path strategy in error-free scenarios and resorts to using alternative paths when communication errors are detected. Our proposal exploits implicit acknowledgement of reception, a feature which may be provided by data aggregation when a broadcast medium such as the wireless channel is used. Therefore MAC layer acknowledgements are not used and errors recovery relies on a caching and retransmission strategy. The protocol requires synchronization among…
Synergistic effects of childhood adversity and polygenic risk in first-episode psychosis
2023
The European Network of National Schizophrenia Networks Studying Gene-Environment Interactions (EU-GEI) Project is funded by grant agreement HEALTH-F2-2010-241909 (Project EU-GEI) from the European Community’s Seventh Framework Programme.
Reliable Coverage with Circumferential WMSNs
2021
This work tackles the closed peripheral coverage issue. Such circumferential surveillance is essential in numerous realistic applications where the goal is to ensure rapid detection of any unauthorized entry/exit of the monitored area. To respond to these requirements, peripheral WMSNs can be rapidly deployed around areas of interest (e.g., temporary military camps, natural or nuclear disasters, etc.). While it seems simple, this solution raises two major challenging issues. First, checking whether the deployed peripheral WMSN forms a closed shape around the monitored region. That is, any object trying to leave or access this area must be instantaneously detected by at least one multimedia …
Language-Integrated Privacy-Aware Distributed Queries
2019
Distributed query processing is an effective means for processing large amounts of data. To abstract from the technicalities of distributed systems, algorithms for operator placement automatically distribute sequential data queries over the available processing units. However, current algorithms for operator placement focus on performance and ignore privacy concerns that arise when handling sensitive data. We present a new methodology for privacy-aware operator placement that both prevents leakage of sensitive information and improves performance. Crucially, our approach is based on an information-flow type system for data queries to reason about the sensitivity of query subcomputations. Ou…
The Valencia Eustress-Distress Appraisal Scale (VEDAS): Validation of the Italian Version
2018
© 2018 by the authors. The aim of this study is to validate the Italian version of the Valencia Eustress-Distress Appraisal Scale (VEDAS). Two hundred and thirty-two Italian workers were involved in the study. Dimensionality, reliability, and concurrent validity were analyzed. Confirmatory factor analysis supported a four-dimensional structure. In addition, the Italian version of the scale showed good internal consistency and validity. The results indicate that the Italian version of the VEDAS is a valid instrument for measuring eustress and distress appraisal in the Italian context. ispartof: SUSTAINABILITY vol:10 issue:11 status: published
White Noise Speech Illusions: A Trait-Dependent Risk Marker for Psychotic Disorder?
2019
Supported by the European Community’s Seventh Framework Program under grant agreement No. HEALTH-F2-2009-241909 (Project EU-GEI)
The Safety Culture Enactment Questionnaire (SCEQ): Theoretical model and empirical validation
2015
This paper presents the Safety Culture Enactment Questionnaire (SCEQ), designed to assess the degree to which safety is an enacted value in the day-to-day running of nuclear power plants (NPPs). The SCEQ is based on a theoretical safety culture model that is manifested in three fundamental components of the functioning and operation of any organization: strategic decisions, human resources practices, and daily activities and behaviors. The extent to which the importance of safety is enacted in each of these three components provides information about the pervasiveness of the safety culture in the NPP. To validate the SCEQ and the model on which it is based, two separate studies were carried…
Design of a safety training package for migrant workers in the construction industry
2021
Abstract The construction sector is known as a high-risk sector with many safety challenges. It is also characterised by a large number of migrant workers and these workers report higher accident rates than native workers. This paper presents the design of the CSTP (Construction Safety Training Programme). The CSTP is a theory-based training program aimed at improving safety behaviours in construction sites acknowledging the particular challenges migrant workers face. Based on second and third generational models of training, we developed a training program that addresses the challenges faced by migrant workers in the construction industry, namely language and cultural barriers, times press…
Human Reliability Analysis to support operational planning of an experimental facility
2015
This paper reports the results obtained by using different techniques of Human Reliability Analysis (HRA) to identify potential operator errors at the SPES (Selective Production of Exotic Species) facility, a second generation Isotope Separation On Line (ISOL) plant for advanced nuclear physic applications. The paper presents scoping-level HRA applications, with the main goal to evaluate the applicability of HRA techniques for the specific domain. In particular, two aspects challenge a standard HRA. First, the facility is under construction so that a number of aspects related to its operation (e.g. procedures and operator interfaces) are still under definition. Second, the context of operat…
Ex vivo measurement reliability using two different cbct scanners for orthodontic purposes
2012
Background There are many cone beam computed tomography (CBCT) scanners available on the market: detector technology, algorithm precision, and scanner settings influence image quality. The aim of this study was to compare the accuracy of linear measurements made on images of the same sample obtained using two different CBCT scanners. Methods Twenty-eight linear measurements between orthodontic anatomical landmarks that were marked with gutta-percha points on a fresh sacrificed lamb head were taken three times. The head was scanned with two CBCT scanners using different scanning parameters. Digital Imaging and Communications in Medicine (DICOM) images were reconstructed and the same measurem…