Search results for "reliability"
showing 10 items of 1563 documents
A Knowledge-Based System for the Automatic Generation of Plant Shutdown and Startup Schedules
1988
Abstract When the shutdown of a plant, or part of it, has been decided as consequence of a major fault, the generation of a safe shutdown schedule may be, for large and complex plants, a very difficult and delicate task. The same problem may be found when the plant must be restarted after the fault has been repaired, for the generation of a start-up schedule. The use of a knowledge-based system appears to be a suitable answer to this problem, allowing a high level of safety and a very fast generation process. The paper examines the process knowledge that needs to be included in such a knowledge-based system and proposes some knowledge representation forms that appear suitable for the task t…
Attribute based access control scheme with controlled access delegation for collaborative E-health environments
2017
Abstract Modern electronic healthcare (e-health) settings constitute collaborative environments with complex access requirements. Thus, there is a need for sophisticated fine-grained access control mechanisms to cater these access demands and thereby experience the full potential of e-health systems. In order to realize a flexible access control scheme, integrating access delegation is of paramount importance. However, access delegation has to be enforced in a controlled manner so that it will not jeopardize the security of the system. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities. …
5G Functional Architecture and Signaling Enhancements to Support Path Management for eV2X
2019
Enhanced vehicle-to-everything (eV2X) communication is one of the most challenging use cases that the fifth generation (5G) of cellular mobile communications must address. In particular, eV2X includes some 5G vehicular applications targeting fully autonomous driving which require ultra-high reliability. The usual approach to providing vehicular communication based on single-connectivity transmission, for instance, through the direct link between vehicles (PC5 interface), often fails at guaranteeing the required reliability. To solve such a problem, in this paper, we consider a scheme where the radio path followed by eV2X messages can be proactively and dynamically configured to either trans…
Logic gates scheme based on Coulomb blockade in metallic nanoclusters with organic ligands
2010
We propose a logic gates scheme based on the electron transfer through metallic nanoclusters linked to organic ligands and discuss theoretically the characteristics needed for practical implementation. As a proof-of-the-concept, we demonstrate the OR, AND and NOT gates and study the performance in terms of temperature, applied voltage, and noise.
Priority-based initial access for URLLC traffic in massive IoT networks: Schemes and performance analysis
2020
Abstract At a density of one million devices per square kilometer, the10’s of billions of devices, objects, and machines that form a massive Internet of things (mIoT) require ubiquitous connectivity. Among a massive number of IoT devices, a portion of them require ultra-reliable low latency communication (URLLC) provided via fifth generation (5G) networks, bringing many new challenges due to the stringent service requirements. Albeit a surge of research efforts on URLLC and mIoT, access mechanisms which include both URLLC and massive machine type communications (mMTC) have not yet been investigated in-depth. In this paper, we propose three novel schemes to facilitate priority-based initial …
A Cognitive-based scheme for user reliability and expertise assessment in Q&A social networks
2011
Q&A social media has gained a great deal of attention during recent years. People rely on these sites to obtain information due to the number of advantages they offer as compared to conventional sources of knowledge (e.g., asynchronous and convenient access). However, for the same question one may find highly contradictory answers, causing ambiguity with respect to the correct information. This can be attributed to the presence of unreliable and/or non-expert users. In this work, we propose a novel approach for estimating the reliability and expertise of a user based on human cognitive traits. Every user can individually estimate these values based on local pairwise interactions. We examine…
Strategies to exiting the COVID-19 lockdown for workplace and school: A scoping review
2021
Highlights • Epidemiological conditions should be monitored and enforced. • COVID-19 must be under control below thresholds of safeguards. • Testing, contact tracing, and isolation strategies are essential components to ease the lockdown. • The maintenance of social distancing measures is an overarching mitigation strategy. • The benefit gained from the implementation of social distancing was evident.
Propiedades métricas de un instrumento para evaluar el Valor Social Subjetivo de la Educación: escala SECS-EVALNEC VSE-Estudiantes-Secundaria
2018
El estudio analiza los resultados de la aplicación de un instrumento que pretende medir el Valor Social Subjetivo de la Educación. Trabajando con un grupo de 341 estudiantes de Educación Secundaria Obligatoria en España, se exponen las propiedades métricas del instr umento desde una metodología de Teoría Clásica de los Tests y Teoría de Respuesta al Ítem para comprobar su fiabilidad y bondad de ajuste. Después de comprobar la dimensionalidad de la escala y el funcionamiento de los reactivos, los datos muestr an que todos se ajustan adecuadamente al modelo de referencia. A partir de ello, presentamos una propuesta de escala SECS - EVALNEC VSE - Estudiantes - Secundaria unidimensional conform…
Autochthonous microalgae grown in municipal wastewaters as a tool for effectively removing nitrogen and phosphorous
2020
Abstract Microalgae have promising applications in wastewater treatment because of their ability to use inorganic compounds such as nitrates and phosphates as nutrients for their growth. Microalgae are applied to the secondary and tertiary bio-treatment with two benefits: i) pollutants removal from wastewater; ii) production of microalgal biomass, that can be exploited as a source of biomass and biomolecules. In the present work, four different microalgal strains (two from culture collections and two isolated from Sicilian littoral) were tested in municipal sewage bioremediation. The sewage of a municipal plant, already processed with primary treatment, was used for the cultivation of micro…
The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies
2013
Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber activism, cybercrime, cyber espionage, cyber terrorism and cyber warfare. The National Cyber Security Strategy defines articulates the overall aim and objectives of the nation's cyber security policy and sets out the strategic priorities that the national government will pursue to achieve these objectives…