Search results for "reliability"
showing 10 items of 1563 documents
Stress-strain models for normal and high strength confined concrete: Test and comparison of literature models reliability in reproducing experimental…
2017
SUMMARY: The adoption of proper constitutive laws for confined concrete is basic for seismic assessment of new and existing reinforced concrete civil structures. The deformation capacity of reinforced concrete (RC) columns subjected to axially centred and eccentric loads depends on the effectiveness confinement action. A proper assignment of the stressstrainlaws for concrete allows obtaining an adequate definition of the ductility of the crosssections and correctly identifying mechanical nonlinearities in computational models.Several studies concerning the behaviour of confined concrete have been carried out, highlighting the role of different geometrical and mechanical parameters to the ov…
Predicting risk and outcomes for frail older adults: a protocol for an umbrella review of available frailty screening tools
2015
REVIEW QUESTION / OBJECTIVE The aim of this systematic review is to comprehensively search the available literature and to summarize the best available evidence from systematic reviews in relation to published screening tools to identify pre-frailty and frailty in older adults, that is: (i) to determine their psychometric proprieties; (ii) to assess their capacity to detect pre-frail and frail conditions against established methods; and (iii) to evaluate their predictive ability. More specifically, the review will focus on the following questions: - What is the reliability and validity of existing screening tools that assess pre-frailty/frailty in older patients? - How sensitive and specif…
Improving Reliability of Road Safety Estimates Based on High Correlated Accident Counts
2007
Calibrating a safety performance function (SPF) with many years of accident data creates a temporal correlation that traditional model calibration procedures cannot deal with. It is well known that generalized estimating equations (GEE) models are able to incorporate trends into accident data and thus overcome difficulties in accounting for correlation; the usual application of GEEs to safety analysis uses robust (or sandwich) estimates of regression coefficients under the independence hypothesis for the working correlation matrix. This practice is justified by the robustness of the GEE procedure against misspecification of the response correlation structure. Nevertheless, with this method…
A root cause analysis method for preventing erratic behavior in software development: PEBA
2019
Measures taken to prevent faults from being introduced or going undetected can secure development of highly reliable software systems. One such measure is analyzing root causes of recurring faults and preventing them from appearing again. Previous methods developed for this purpose have been reactive in nature and relied heavily on fault reporting mechanisms of ogranizations. Additionally, previous efforts lack a defined mechanism for innovating corrective actions. In this study, we strive to complement the existing methods by introducing a proactive and qualitative method that does not rely on fault data. During the course of the research, in addition to an extensive literature search, an …
A Novel Fault-Tolerant Routing Technique for Mesh-of-Tree based Network-on-Chip Design
2018
Due to the increase in the number of processing elements in System-on-Chips (SoCs), communication between the cores is becoming complex. A solution to this issue in SoCs gave rise to a new paradigm called Network-on-Chips (NoCs). In NoCs, communication between different cores is achieved using packet based switching techniques. In the deep sub-micron technology, NoCs are more susceptible to different kinds of faults which can be transient, intermittent and permanent. These faults can occur at any component of NoCs. This paper presents a novel Fault-Tolerant Routing (FTR) technique for Mesh-of-Tree (MoT) topology in the presence of router faults. The proposed technique is compared with routi…
Fault Tolerant Routing Methodology for Mesh-of-Tree based Network-on-Chips using Local Reconfiguration
2018
Increase in the processing elements in a System-on- Chip (SoC) has led to an increasing complexity between the cores in the entire network. This communication bottleneck led to rise in the new paradigm called Network-on-Chip (NoC). These NoC are very much susceptible to various types of faults which can be transient, intermittent or permanent. This paper presents a fault-tolerant routing technique which can route the packets from a source to a destination in presence of permanent faults in the leaf routers of Mesh-of-Tree topology where cores are connected. This is achieved by using reconfiguration in the local ports of the leaf routers by inserting multiplexers as a layer between the leaf …
Architectural Implementation of a Reconfigurable NoC Design for Multi-Applications
2021
With the increasing number of applications running on a Network-on-Chip (NoC) based System-on-Chip (SoC), there is a need for designing a reconfigurable NoC platform to achieve acceptable performance for all the applications. This paper proposes a novel architecture for implementing a reconfiguration logic to the NoC platform executing multiple applications. The proposed architecture reconfigures SoC modules to the routers in the NoC with the help of tri-state buffers based on the applications running. The overhead in implementing the reconfiguration circuitry is significantly less, approximately 0.9% of the area and 1% of the total power consumed by the router network. The architectures pr…
Reliable Data Gathering in Tree-Based IEEE 802.15.4 Wireless Sensor Networks
2007
This paper describes a routing protocol for enhanced robustness in IEEE 802.15.4-based sensor networks, which also addresses typical MAC layer issues, including power management, synchronization and link reliability. The algorithm uses a single-path strategy in error-free scenarios and resorts to using alternative paths when communication errors are detected. Our proposal exploits implicit acknowledgement of reception, a feature which may be provided by data aggregation when a broadcast medium such as the wireless channel is used. Therefore MAC layer acknowledgements are not used and errors recovery relies on a caching and retransmission strategy. The protocol requires synchronization among…
Synergistic effects of childhood adversity and polygenic risk in first-episode psychosis
2023
The European Network of National Schizophrenia Networks Studying Gene-Environment Interactions (EU-GEI) Project is funded by grant agreement HEALTH-F2-2010-241909 (Project EU-GEI) from the European Community’s Seventh Framework Programme.
Reliable Coverage with Circumferential WMSNs
2021
This work tackles the closed peripheral coverage issue. Such circumferential surveillance is essential in numerous realistic applications where the goal is to ensure rapid detection of any unauthorized entry/exit of the monitored area. To respond to these requirements, peripheral WMSNs can be rapidly deployed around areas of interest (e.g., temporary military camps, natural or nuclear disasters, etc.). While it seems simple, this solution raises two major challenging issues. First, checking whether the deployed peripheral WMSN forms a closed shape around the monitored region. That is, any object trying to leave or access this area must be instantaneously detected by at least one multimedia …