Search results for "Liability"
showing 10 items of 1754 documents
A computer controlled patterning system for scanning probe microscopes
1999
Abstract A pattern generator system for lithography based on scanning force microscopes has been developed. Patterns to be miniaturized onto a chip can be scanned or drawn by any common graphical program. The pattern file is used to control a voltage simultaneously with the microscope probe scanning the surface of the substrate. The voltage can be used in numerous different ways to manipulate the substrate, depending on the lithographic method preferred. We have demonstrated the system by adding this voltage to the z -piezo voltage of the scanner, in order to make the probe plow the pattern into a film spinned on the sample. To maintain linearity in zooming in and rotating the scanning dire…
On the Use of Prognostics and Health Management to Jointly Schedule Production and Maintenance on a Single Multi-purpose Machine
2020
This paper address the problem of using prognostic information in the decision-making process of a single multi-purpose machine. The prognostics and health management method is compared to condition-based maintenance combined with a genetic algorithm to determine the joint schedule of maintenance and production. The paper presents a methodology to select the adequate strategy while considering several factors that influence the functioning of the machine. The results show that operational and conditions variability influence the choice of the suitable methods. In the presented case, we show configurations where prognostic information is useless or useful.
Reconfiguration: a key to handle exceptions and performance deteriorations in manufacturing operations
2005
During a manufacturing operation, exceptions may occur dynamically and unpredictably. Their occurrence may lead to the degradation of system performance or, in the worst case scenario may interrupt the production process by causing errors in the schedule plan. This paper classifies three families of exceptions: (1) out-of-order events such as machine breakdowns, (2) operational out-of-ordinary events such as rush orders and (3) deteriorations of manufacturing resource performance such as reductions of machines' utilization. In all cases, in order to maintain an adequate level of system performance, it is necessary to detect exceptions, to diagnose them quickly and to recover them by taking …
A Knowledge-Based System for the Automatic Generation of Plant Shutdown and Startup Schedules
1988
Abstract When the shutdown of a plant, or part of it, has been decided as consequence of a major fault, the generation of a safe shutdown schedule may be, for large and complex plants, a very difficult and delicate task. The same problem may be found when the plant must be restarted after the fault has been repaired, for the generation of a start-up schedule. The use of a knowledge-based system appears to be a suitable answer to this problem, allowing a high level of safety and a very fast generation process. The paper examines the process knowledge that needs to be included in such a knowledge-based system and proposes some knowledge representation forms that appear suitable for the task t…
Attribute based access control scheme with controlled access delegation for collaborative E-health environments
2017
Abstract Modern electronic healthcare (e-health) settings constitute collaborative environments with complex access requirements. Thus, there is a need for sophisticated fine-grained access control mechanisms to cater these access demands and thereby experience the full potential of e-health systems. In order to realize a flexible access control scheme, integrating access delegation is of paramount importance. However, access delegation has to be enforced in a controlled manner so that it will not jeopardize the security of the system. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities. …
5G Functional Architecture and Signaling Enhancements to Support Path Management for eV2X
2019
Enhanced vehicle-to-everything (eV2X) communication is one of the most challenging use cases that the fifth generation (5G) of cellular mobile communications must address. In particular, eV2X includes some 5G vehicular applications targeting fully autonomous driving which require ultra-high reliability. The usual approach to providing vehicular communication based on single-connectivity transmission, for instance, through the direct link between vehicles (PC5 interface), often fails at guaranteeing the required reliability. To solve such a problem, in this paper, we consider a scheme where the radio path followed by eV2X messages can be proactively and dynamically configured to either trans…
Logic gates scheme based on Coulomb blockade in metallic nanoclusters with organic ligands
2010
We propose a logic gates scheme based on the electron transfer through metallic nanoclusters linked to organic ligands and discuss theoretically the characteristics needed for practical implementation. As a proof-of-the-concept, we demonstrate the OR, AND and NOT gates and study the performance in terms of temperature, applied voltage, and noise.
Priority-based initial access for URLLC traffic in massive IoT networks: Schemes and performance analysis
2020
Abstract At a density of one million devices per square kilometer, the10’s of billions of devices, objects, and machines that form a massive Internet of things (mIoT) require ubiquitous connectivity. Among a massive number of IoT devices, a portion of them require ultra-reliable low latency communication (URLLC) provided via fifth generation (5G) networks, bringing many new challenges due to the stringent service requirements. Albeit a surge of research efforts on URLLC and mIoT, access mechanisms which include both URLLC and massive machine type communications (mMTC) have not yet been investigated in-depth. In this paper, we propose three novel schemes to facilitate priority-based initial …
A Cognitive-based scheme for user reliability and expertise assessment in Q&A social networks
2011
Q&A social media has gained a great deal of attention during recent years. People rely on these sites to obtain information due to the number of advantages they offer as compared to conventional sources of knowledge (e.g., asynchronous and convenient access). However, for the same question one may find highly contradictory answers, causing ambiguity with respect to the correct information. This can be attributed to the presence of unreliable and/or non-expert users. In this work, we propose a novel approach for estimating the reliability and expertise of a user based on human cognitive traits. Every user can individually estimate these values based on local pairwise interactions. We examine…
Strategies to exiting the COVID-19 lockdown for workplace and school: A scoping review
2021
Highlights • Epidemiological conditions should be monitored and enforced. • COVID-19 must be under control below thresholds of safeguards. • Testing, contact tracing, and isolation strategies are essential components to ease the lockdown. • The maintenance of social distancing measures is an overarching mitigation strategy. • The benefit gained from the implementation of social distancing was evident.