Handoff strategies in settings with high consequences for failure: lessons for health care operations
Objective. To describe strategies employed during handoffs in four settings with high
consequences for failure. Design. Analysis of observational data for evidence of use of 21 handoff …
consequences for failure. Design. Analysis of observational data for evidence of use of 21 handoff …
Large‐scale DNA‐based survey of frogs in Amazonia suggests a vast underestimation of species richness and endemism
…, R Ernst, P Gaucher, JO Gomes… - Journal of …, 2020 - Wiley Online Library
Aim Mapping Amazonian biodiversity accurately is a major challenge for integrated conservation
strategies and to study its origins. However, species boundaries and their respective …
strategies and to study its origins. However, species boundaries and their respective …
Analysis of the resilience of team performance during a nuclear emergency response exercise
The current work presents results from a cognitive task analysis (CTA) of a nuclear disaster
simulation. Audio-visual records were collected from an emergency room team composed of …
simulation. Audio-visual records were collected from an emergency room team composed of …
Human factors approach for evaluation and redesign of human–system interfaces of a nuclear power plant simulator
Nuclear power production is a safety-critical process where ultimate execution of process
change decisions lie with the operators. Thus it is important to provide the best possible …
change decisions lie with the operators. Thus it is important to provide the best possible …
Resilience and brittleness in the offshore helicopter transportation system: The identification of constraints and sacrifice decisions in pilots' work
Offshore transportation using helicopters is a complex socio-technical system. The resilience
of this system is an emergent property related to performance variability in many nested …
of this system is an emergent property related to performance variability in many nested …
Micro incident analysis framework to assess safety and resilience in the operation of safe critical systems: a case study in a nuclear power plant
PVR Carvalho, IL dos Santos, JO Gomes… - Journal of loss …, 2008 - Elsevier
Safety in modern organizations, comprised of many nested levels with different types of
coupling between them, must be managed by a control structure embedded in this adaptive …
coupling between them, must be managed by a control structure embedded in this adaptive …
[PDF][PDF] Predicting price of cryptocurrency–a deep learning approach
S Marne, S Churi, D Correia, J Gomes - NTASU-9 (3), 2020 - academia.edu
Bitcoin, a type of cryptocurrency is currently a thriving open-source community and payment
network, which is currently used by millions of people. As the value of Bitcoin varies …
network, which is currently used by millions of people. As the value of Bitcoin varies …
[PDF][PDF] Deep fake detection using neural networks
…, L Castelino, C Darekar, J Gomes - 15th IEEE international …, 2018 - academia.edu
Deepfake is a technique for human image synthesis based on artificial intelligence. Deepfake
is used to merge and superimpose existing images and videos onto source images or …
is used to merge and superimpose existing images and videos onto source images or …
Normal people working in normal organizations with normal equipment: system safety and cognition in a mid-air collision
A fundamental challenge in improving the safety of complex systems is to understand how
accidents emerge in normal working situations, with equipment functioning normally in …
accidents emerge in normal working situations, with equipment functioning normally in …
EIDDM: Edge and internet layer distributed dos threats detection and mitigation for internet of things wireless communications
Distributed Denial of Service (DDoS) attacks, plague the Internet of Things (IoT)-enabled
distributed communication network. To mitigate DDoS attacks on IoT many protocols have been …
distributed communication network. To mitigate DDoS attacks on IoT many protocols have been …