Search results for "reliability"

showing 10 items of 1563 documents

A Knowledge-Based System for the Automatic Generation of Plant Shutdown and Startup Schedules

1988

Abstract When the shutdown of a plant, or part of it, has been decided as consequence of a major fault, the generation of a safe shutdown schedule may be, for large and complex plants, a very difficult and delicate task. The same problem may be found when the plant must be restarted after the fault has been repaired, for the generation of a start-up schedule. The use of a knowledge-based system appears to be a suitable answer to this problem, allowing a high level of safety and a very fast generation process. The paper examines the process knowledge that needs to be included in such a knowledge-based system and proposes some knowledge representation forms that appear suitable for the task t…

ScheduleKnowledge-based systemsEngineeringKnowledge representation and reasoningbusiness.industryShutdownProcess controlProcess knowledgeControl engineeringbusinessFault (power engineering)Reliability engineeringTask (project management)IFAC Proceedings Volumes
researchProduct

Attribute based access control scheme with controlled access delegation for collaborative E-health environments

2017

Abstract Modern electronic healthcare (e-health) settings constitute collaborative environments with complex access requirements. Thus, there is a need for sophisticated fine-grained access control mechanisms to cater these access demands and thereby experience the full potential of e-health systems. In order to realize a flexible access control scheme, integrating access delegation is of paramount importance. However, access delegation has to be enforced in a controlled manner so that it will not jeopardize the security of the system. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities. …

Scheme (programming language)Computer access controlDelegationRevocationComputer Networks and CommunicationsComputer sciencebusiness.industrymedia_common.quotation_subject020206 networking & telecommunications020207 software engineeringProvisioningAccess control02 engineering and technologyComputer securitycomputer.software_genre0202 electrical engineering electronic engineering information engineeringPhysical accessRole-based access controlSafety Risk Reliability and QualitybusinesscomputerSoftwaremedia_commoncomputer.programming_languageJournal of Information Security and Applications
researchProduct

5G Functional Architecture and Signaling Enhancements to Support Path Management for eV2X

2019

Enhanced vehicle-to-everything (eV2X) communication is one of the most challenging use cases that the fifth generation (5G) of cellular mobile communications must address. In particular, eV2X includes some 5G vehicular applications targeting fully autonomous driving which require ultra-high reliability. The usual approach to providing vehicular communication based on single-connectivity transmission, for instance, through the direct link between vehicles (PC5 interface), often fails at guaranteeing the required reliability. To solve such a problem, in this paper, we consider a scheme where the radio path followed by eV2X messages can be proactively and dynamically configured to either trans…

Scheme (programming language)General Computer ScienceComputer scienceDistributed computingInterface (computing)Reliability (computer networking)02 engineering and technology0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceUse casecomputer.programming_languageMulti-connectivitybusiness.industryGeneral Engineering020206 networking & telecommunications5G coreTransmission (telecommunications)Path (graph theory)V2Xsidelink020201 artificial intelligence & image processinglcsh:Electrical engineering. Electronics. Nuclear engineeringMobile telephonybusinesslcsh:TK1-9971computer5GIEEE Access
researchProduct

Logic gates scheme based on Coulomb blockade in metallic nanoclusters with organic ligands

2010

We propose a logic gates scheme based on the electron transfer through metallic nanoclusters linked to organic ligands and discuss theoretically the characteristics needed for practical implementation. As a proof-of-the-concept, we demonstrate the OR, AND and NOT gates and study the performance in terms of temperature, applied voltage, and noise.

Scheme (programming language)PhysicsCondensed matter physicsbusiness.industryGeneral Physics and AstronomyCoulomb blockadeHardware_PERFORMANCEANDRELIABILITYNoise (electronics)NanoclustersMetalElectron transfervisual_artLogic gateHardware_INTEGRATEDCIRCUITSvisual_art.visual_art_mediumOptoelectronicsbusinesscomputerHardware_LOGICDESIGNcomputer.programming_languageVoltagePhysics Letters A
researchProduct

Priority-based initial access for URLLC traffic in massive IoT networks: Schemes and performance analysis

2020

Abstract At a density of one million devices per square kilometer, the10’s of billions of devices, objects, and machines that form a massive Internet of things (mIoT) require ubiquitous connectivity. Among a massive number of IoT devices, a portion of them require ultra-reliable low latency communication (URLLC) provided via fifth generation (5G) networks, bringing many new challenges due to the stringent service requirements. Albeit a surge of research efforts on URLLC and mIoT, access mechanisms which include both URLLC and massive machine type communications (mMTC) have not yet been investigated in-depth. In this paper, we propose three novel schemes to facilitate priority-based initial …

Scheme (programming language)Service (systems architecture)Computer Networks and CommunicationsComputer sciencebusiness.industryReliability (computer networking)Frame (networking)020206 networking & telecommunications02 engineering and technologyTransmission (telecommunications)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingLatency (engineering)businesscomputerVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 5505GRandom accesscomputer.programming_languageComputer network
researchProduct

A Cognitive-based scheme for user reliability and expertise assessment in Q&A social networks

2011

Q&A social media has gained a great deal of attention during recent years. People rely on these sites to obtain information due to the number of advantages they offer as compared to conventional sources of knowledge (e.g., asynchronous and convenient access). However, for the same question one may find highly contradictory answers, causing ambiguity with respect to the correct information. This can be attributed to the presence of unreliable and/or non-expert users. In this work, we propose a novel approach for estimating the reliability and expertise of a user based on human cognitive traits. Every user can individually estimate these values based on local pairwise interactions. We examine…

Scheme (programming language)business.industryComputer sciencemedia_common.quotation_subjectCognitionAmbiguityMachine learningcomputer.software_genreAsynchronous communicationConvergence (routing)Pairwise comparisonSocial mediaArtificial intelligencebusinesscomputerReliability (statistics)computer.programming_languagemedia_common2011 IEEE International Conference on Information Reuse & Integration
researchProduct

Strategies to exiting the COVID-19 lockdown for workplace and school: A scoping review

2021

Highlights • Epidemiological conditions should be monitored and enforced. • COVID-19 must be under control below thresholds of safeguards. • Testing, contact tracing, and isolation strategies are essential components to ease the lockdown. • The maintenance of social distancing measures is an overarching mitigation strategy. • The benefit gained from the implementation of social distancing was evident.

SchoolWorkExit strategyCoronavirus disease 2019 (COVID-19)business.industryWork from homeSocial distancePublic Health Environmental and Occupational HealthExit strategyGrey literaturePublic relationsSettore MED/45 - Scienze Infermieristiche Generali Cliniche E PediatricheArticleExit strategy SchoolnursingWork (electrical)Political sciencePandemicCovi 19 WorkCovid-19businessSafety Risk Reliability and QualitySafety ResearchSafety Science
researchProduct

Propiedades métricas de un instrumento para evaluar el Valor Social Subjetivo de la Educación: escala SECS-EVALNEC VSE-Estudiantes-Secundaria

2018

El estudio analiza los resultados de la aplicación de un instrumento que pretende medir el Valor Social Subjetivo de la Educación. Trabajando con un grupo de 341 estudiantes de Educación Secundaria Obligatoria en España, se exponen las propiedades métricas del instr umento desde una metodología de Teoría Clásica de los Tests y Teoría de Respuesta al Ítem para comprobar su fiabilidad y bondad de ajuste. Después de comprobar la dimensionalidad de la escala y el funcionamiento de los reactivos, los datos muestr an que todos se ajustan adecuadamente al modelo de referencia. A partir de ello, presentamos una propuesta de escala SECS - EVALNEC VSE - Estudiantes - Secundaria unidimensional conform…

Secondary educationItem analysisEvaluación educativaWelfare economicsvalor social de la educaciónEducationTeoría de Respuesta al ÍtemEducació AvaluacióGoodness of fitvalidaciónMetric (unit)Psychologylcsh:LReliability (statistics)escala de evaluaciónlcsh:EducationRevista Electrónica de Investigación Educativa
researchProduct

Autochthonous microalgae grown in municipal wastewaters as a tool for effectively removing nitrogen and phosphorous

2020

Abstract Microalgae have promising applications in wastewater treatment because of their ability to use inorganic compounds such as nitrates and phosphates as nutrients for their growth. Microalgae are applied to the secondary and tertiary bio-treatment with two benefits: i) pollutants removal from wastewater; ii) production of microalgal biomass, that can be exploited as a source of biomass and biomolecules. In the present work, four different microalgal strains (two from culture collections and two isolated from Sicilian littoral) were tested in municipal sewage bioremediation. The sewage of a municipal plant, already processed with primary treatment, was used for the cultivation of micro…

Secondary treatmentBiochemical oxygen demandbusiness.industryBioremediation Chlorella Dunaliella MicroalgaeNannochloropsis Nutrient removalSettore ING-IND/25 - Impianti ChimiciProcess Chemistry and TechnologyChemical oxygen demandBiomassSewage02 engineering and technology010501 environmental sciencesPulp and paper industry01 natural sciencesBioremediation020401 chemical engineeringWastewaterEnvironmental scienceSewage treatment0204 chemical engineeringSafety Risk Reliability and QualitybusinessWaste Management and Disposal0105 earth and related environmental sciencesBiotechnologyJournal of Water Process Engineering
researchProduct

The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies

2013

Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber activism, cybercrime, cyber espionage, cyber terrorism and cyber warfare. The National Cyber Security Strategy defines articulates the overall aim and objectives of the nation's cyber security policy and sets out the strategic priorities that the national government will pursue to achieve these objectives…

Security analysisInformation Systems and ManagementComputer Networks and Communicationsbusiness.industryInternet privacyComputer securitycomputer.software_genreHardware and ArchitectureNational Strategy to Secure CyberspaceCyber-attackBusinessSafety Risk Reliability and QualityCyberspaceSafety ResearchcomputerComputingMilieux_MISCELLANEOUSSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct