Search results for "Liability"

showing 10 items of 1754 documents

A computer controlled patterning system for scanning probe microscopes

1999

Abstract A pattern generator system for lithography based on scanning force microscopes has been developed. Patterns to be miniaturized onto a chip can be scanned or drawn by any common graphical program. The pattern file is used to control a voltage simultaneously with the microscope probe scanning the surface of the substrate. The voltage can be used in numerous different ways to manipulate the substrate, depending on the lithographic method preferred. We have demonstrated the system by adding this voltage to the z -piezo voltage of the scanner, in order to make the probe plow the pattern into a film spinned on the sample. To maintain linearity in zooming in and rotating the scanning dire…

Scanning Hall probe microscopeScannerMicroscopeMaterials sciencebusiness.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONHardware_PERFORMANCEANDRELIABILITYSubstrate (printing)Condensed Matter PhysicsAtomic and Molecular Physics and OpticsSurfaces Coatings and FilmsElectronic Optical and Magnetic Materialslaw.inventionScanning probe microscopyOpticslawDigital pattern generatorHardware_INTEGRATEDCIRCUITSElectrical and Electronic EngineeringbusinessLithographyVoltageMicroelectronic Engineering
researchProduct

On the Use of Prognostics and Health Management to Jointly Schedule Production and Maintenance on a Single Multi-purpose Machine

2020

This paper address the problem of using prognostic information in the decision-making process of a single multi-purpose machine. The prognostics and health management method is compared to condition-based maintenance combined with a genetic algorithm to determine the joint schedule of maintenance and production. The paper presents a methodology to select the adequate strategy while considering several factors that influence the functioning of the machine. The results show that operational and conditions variability influence the choice of the suitable methods. In the presented case, we show configurations where prognostic information is useless or useful.

ScheduleComputer scienceProcess (engineering)Ant colony optimization algorithmsCondition-based maintenanceGenetic algorithmPrognosticsProduction (economics)Reliability engineering2020 Prognostics and Health Management Conference (PHM-Besançon)
researchProduct

Reconfiguration: a key to handle exceptions and performance deteriorations in manufacturing operations

2005

During a manufacturing operation, exceptions may occur dynamically and unpredictably. Their occurrence may lead to the degradation of system performance or, in the worst case scenario may interrupt the production process by causing errors in the schedule plan. This paper classifies three families of exceptions: (1) out-of-order events such as machine breakdowns, (2) operational out-of-ordinary events such as rush orders and (3) deteriorations of manufacturing resource performance such as reductions of machines' utilization. In all cases, in order to maintain an adequate level of system performance, it is necessary to detect exceptions, to diagnose them quickly and to recover them by taking …

ScheduleEngineeringbusiness.industryStrategy and ManagementException handlingFlexible manufacturing systemControl reconfigurationWorst-case scenarioManagement Science and Operations ResearchDedicated lineIndustrial and Manufacturing EngineeringReliability engineeringOperations managementManufacturing operationsInterruptbusinessInternational Journal of Production Research
researchProduct

A Knowledge-Based System for the Automatic Generation of Plant Shutdown and Startup Schedules

1988

Abstract When the shutdown of a plant, or part of it, has been decided as consequence of a major fault, the generation of a safe shutdown schedule may be, for large and complex plants, a very difficult and delicate task. The same problem may be found when the plant must be restarted after the fault has been repaired, for the generation of a start-up schedule. The use of a knowledge-based system appears to be a suitable answer to this problem, allowing a high level of safety and a very fast generation process. The paper examines the process knowledge that needs to be included in such a knowledge-based system and proposes some knowledge representation forms that appear suitable for the task t…

ScheduleKnowledge-based systemsEngineeringKnowledge representation and reasoningbusiness.industryShutdownProcess controlProcess knowledgeControl engineeringbusinessFault (power engineering)Reliability engineeringTask (project management)IFAC Proceedings Volumes
researchProduct

Attribute based access control scheme with controlled access delegation for collaborative E-health environments

2017

Abstract Modern electronic healthcare (e-health) settings constitute collaborative environments with complex access requirements. Thus, there is a need for sophisticated fine-grained access control mechanisms to cater these access demands and thereby experience the full potential of e-health systems. In order to realize a flexible access control scheme, integrating access delegation is of paramount importance. However, access delegation has to be enforced in a controlled manner so that it will not jeopardize the security of the system. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities. …

Scheme (programming language)Computer access controlDelegationRevocationComputer Networks and CommunicationsComputer sciencebusiness.industrymedia_common.quotation_subject020206 networking & telecommunications020207 software engineeringProvisioningAccess control02 engineering and technologyComputer securitycomputer.software_genre0202 electrical engineering electronic engineering information engineeringPhysical accessRole-based access controlSafety Risk Reliability and QualitybusinesscomputerSoftwaremedia_commoncomputer.programming_languageJournal of Information Security and Applications
researchProduct

5G Functional Architecture and Signaling Enhancements to Support Path Management for eV2X

2019

Enhanced vehicle-to-everything (eV2X) communication is one of the most challenging use cases that the fifth generation (5G) of cellular mobile communications must address. In particular, eV2X includes some 5G vehicular applications targeting fully autonomous driving which require ultra-high reliability. The usual approach to providing vehicular communication based on single-connectivity transmission, for instance, through the direct link between vehicles (PC5 interface), often fails at guaranteeing the required reliability. To solve such a problem, in this paper, we consider a scheme where the radio path followed by eV2X messages can be proactively and dynamically configured to either trans…

Scheme (programming language)General Computer ScienceComputer scienceDistributed computingInterface (computing)Reliability (computer networking)02 engineering and technology0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceUse casecomputer.programming_languageMulti-connectivitybusiness.industryGeneral Engineering020206 networking & telecommunications5G coreTransmission (telecommunications)Path (graph theory)V2Xsidelink020201 artificial intelligence & image processinglcsh:Electrical engineering. Electronics. Nuclear engineeringMobile telephonybusinesslcsh:TK1-9971computer5GIEEE Access
researchProduct

Logic gates scheme based on Coulomb blockade in metallic nanoclusters with organic ligands

2010

We propose a logic gates scheme based on the electron transfer through metallic nanoclusters linked to organic ligands and discuss theoretically the characteristics needed for practical implementation. As a proof-of-the-concept, we demonstrate the OR, AND and NOT gates and study the performance in terms of temperature, applied voltage, and noise.

Scheme (programming language)PhysicsCondensed matter physicsbusiness.industryGeneral Physics and AstronomyCoulomb blockadeHardware_PERFORMANCEANDRELIABILITYNoise (electronics)NanoclustersMetalElectron transfervisual_artLogic gateHardware_INTEGRATEDCIRCUITSvisual_art.visual_art_mediumOptoelectronicsbusinesscomputerHardware_LOGICDESIGNcomputer.programming_languageVoltagePhysics Letters A
researchProduct

Priority-based initial access for URLLC traffic in massive IoT networks: Schemes and performance analysis

2020

Abstract At a density of one million devices per square kilometer, the10’s of billions of devices, objects, and machines that form a massive Internet of things (mIoT) require ubiquitous connectivity. Among a massive number of IoT devices, a portion of them require ultra-reliable low latency communication (URLLC) provided via fifth generation (5G) networks, bringing many new challenges due to the stringent service requirements. Albeit a surge of research efforts on URLLC and mIoT, access mechanisms which include both URLLC and massive machine type communications (mMTC) have not yet been investigated in-depth. In this paper, we propose three novel schemes to facilitate priority-based initial …

Scheme (programming language)Service (systems architecture)Computer Networks and CommunicationsComputer sciencebusiness.industryReliability (computer networking)Frame (networking)020206 networking & telecommunications02 engineering and technologyTransmission (telecommunications)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingLatency (engineering)businesscomputerVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 5505GRandom accesscomputer.programming_languageComputer network
researchProduct

A Cognitive-based scheme for user reliability and expertise assessment in Q&A social networks

2011

Q&A social media has gained a great deal of attention during recent years. People rely on these sites to obtain information due to the number of advantages they offer as compared to conventional sources of knowledge (e.g., asynchronous and convenient access). However, for the same question one may find highly contradictory answers, causing ambiguity with respect to the correct information. This can be attributed to the presence of unreliable and/or non-expert users. In this work, we propose a novel approach for estimating the reliability and expertise of a user based on human cognitive traits. Every user can individually estimate these values based on local pairwise interactions. We examine…

Scheme (programming language)business.industryComputer sciencemedia_common.quotation_subjectCognitionAmbiguityMachine learningcomputer.software_genreAsynchronous communicationConvergence (routing)Pairwise comparisonSocial mediaArtificial intelligencebusinesscomputerReliability (statistics)computer.programming_languagemedia_common2011 IEEE International Conference on Information Reuse & Integration
researchProduct

Strategies to exiting the COVID-19 lockdown for workplace and school: A scoping review

2021

Highlights • Epidemiological conditions should be monitored and enforced. • COVID-19 must be under control below thresholds of safeguards. • Testing, contact tracing, and isolation strategies are essential components to ease the lockdown. • The maintenance of social distancing measures is an overarching mitigation strategy. • The benefit gained from the implementation of social distancing was evident.

SchoolWorkExit strategyCoronavirus disease 2019 (COVID-19)business.industryWork from homeSocial distancePublic Health Environmental and Occupational HealthExit strategyGrey literaturePublic relationsSettore MED/45 - Scienze Infermieristiche Generali Cliniche E PediatricheArticleExit strategy SchoolnursingWork (electrical)Political sciencePandemicCovi 19 WorkCovid-19businessSafety Risk Reliability and QualitySafety ResearchSafety Science
researchProduct