Search results for "Exploit"

showing 10 items of 284 documents

Large Scale Control of Deferrable Domestic Loads in Smart Grids

2016

International audience; In this paper, we investigate a realistic and low-cost deployment of large scale direct control of inelastic home appliances whose energy demand cannot be shaped, but simply deferred. The idea is to exploit 1) some simple actuators to be placed on the electric plugs for connecting or disconnecting appliances with heterogeneous control interfaces, including non-smart appliances, and 2) the Internet connections of customers for transporting the activation requests from the actuators to a centralized controller. Our solution requires no interaction with home users: in particular, it does not require them to express their energy demand in advance. A queuing theory model …

EngineeringGeneral Computer ScienceExploitQueuing analysis020209 energyDistributed computingReal-time computing02 engineering and technology7. Clean energySettore ING-INF/04 - AutomaticaControl theory0202 electrical engineering electronic engineering information engineering[INFO.INFO-SY]Computer Science [cs]/Systems and Control [cs.SY]Queueing theoryLoad managementLoad modelingbusiness.industrySettore ING-INF/03 - TelecomunicazioniQuality of serviceScale (chemistry)[SPI.NRJ]Engineering Sciences [physics]/Electric powerComputer Science (all)Smart gridsLoad management; Load modeling; Power demand; Queuing analysis; Smart grids;Settore ING-IND/33 - Sistemi Elettrici Per L'EnergiaSmart gridSoftware deploymentPower demandThe Internetbusiness
researchProduct

Realizing the Benefits from Enterprise Information Systems: A Sociomaterial Perspective

2013

AbstractDespite the worthwhile studies that have been conducted on the realization of benefits from Enterprise Information Systems (EISs), many organizations are not satisfied with the benefits they have gained. This work draws on the sociomaterial perspective and suggests that benefits can be realized when organizations are able to utilize their capabilities in order to exploit the technological possibilities of the EISs, in addition to their willingness to change their business routines. It suggests focusing on the unintended benefits that can emerge based on the organizational capabilities and the system possibilities. The main contribution from this conceptual work is to provide a discu…

EngineeringKnowledge managementExploitEnterprise Information Systems (EIS)business.industryPerspective (graphical)Realization (linguistics)Sociomateriality (SM)Enterprise systemRelationalityWork (electrical)Benefits Realization (BR)Order (exchange)PerformativityGeneral Earth and Planetary SciencesPerformativityEnterprise information systembusinessGeneral Environmental ScienceProcedia Technology
researchProduct

An FPGA-Based Software Defined Radio Platform for the 2.4GHz ISM Band

2006

A prototype of a Software Defined Radio (SDR) platform has been successfully designed and tested implementing a reconfigurable IEEE 802.11 and ZigBee receiver. The system exploits the reconfiguration capability of an FPGA for implementing a number of receiver configurations that share the same RF front-end. Configurations can be switched at run time, or can share the available logic and radio resource.

EngineeringRF front endRadio receiver designExploitbusiness.industrySoftware radioComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSFrequency shift keyingControl reconfigurationSoftware-defined radioRemote radio headEmbedded systemField-programmable gate arraybusinessISM bandreceived signal
researchProduct

Charging Electric Vehicles Using Opportunistic Stopovers

2017

The diffusion of electric vehicles asks for efficient energy replenishment, which requires geographical and temporal coordination of shared charging resources. We introduce a novel charging methodology that exploits users’ opportunistic mobility. This paper focuses on vehicle stopovers detecting potential charg- ing opportunities. Our mobility-assisted methodology protects users privacy and permits a hybrid centralized/distributed ap- proach avoiding clashes with other potential users. A preliminary analysis on our charging system, obtained with mobility data from the field, shows that among the available charging stations, some are more relevant and have a key role in serving electric vehi…

Engineeringbusiness.product_categoryExploitbusiness.industrySettore ING-INF/03 - Telecomunicazioni020209 energyDistributed computingOnline charging system02 engineering and technologyelectric vehicle recharge stopover mobilityPreliminary analysisHardware_GENERALElectric vehicle0202 electrical engineering electronic engineering information engineeringKey (cryptography)businessTelecommunicationsEfficient energy use
researchProduct

Linking Women Entrepreneurship with Social Entrepreneurship

2011

In recent times, the number of women entrepreneurs in the world has grown steadily, motivated by necessity or by reasons related to the identification and exploitation of a gap in the market via which they can exploit and develop the experience and knowledge acquired. However, a new phenomenon is emerging in the field of entrepreneurship: the creation of organizations to attain social goals. It is precisely within this new framework that women can take on a relevant role due to a certain extent to a greater sensitivity towards the social problems in their environment. In this paper, we discuss several cases of women entrepreneurs that have allowed us to relate the motives for entrepreneuria…

EntrepreneurshipIdentification (information)Labour economicsExploitbusiness.industryField (Bourdieu)PhenomenonEconomicsSocial entrepreneurshipPublic relationsSocial issuesbusinessWomen entrepreneurs
researchProduct

Discovering and creating business opportunities for cloud services

2016

This study focuses on how the opportunities for cloud services are detected.The study develops a framework to detect and exploit cloud-based opportunities.This study incorporates entrepreneurship theories to extend and enrich IS research. Cloud computing provides new business opportunities for firms selling or using cloud services. However, little is known about how software firms detect and exploit these opportunities. Based on in-depth qualitative case studies, this study identified two different pathways followed by software firms when they detect and exploit opportunities. In the first pathway, the opportunity is based on an existing problem and need in the market. In the case firms, th…

EntrepreneurshipKnowledge managementExploitComputer scienceCloud computing02 engineering and technologyopportunity creationSoftwaresoftware business020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringInformation systemopportunity discoverycould computingta113business.industry05 social sciencesSaaSHardware and Architectureohjelmistoliiketoimintabusiness050203 business & managementSoftwareInformation SystemsOpportunity discoveryJournal of Systems and Software
researchProduct

Improved GNSS positioning exploiting a vehicular P2P infrastructure

2010

This paper considers the possibility to exploit external altitude measurements to improve the performance of a Kalman based GNSS receiver. The altitude measurements are provided by means of a peer to peer network, that is supposed to be based on the evolution of the 802.11 standard for the vehicular environment, namely the WAVE (802.11p). The performance of such a system are investigated for different characteristics of the aiding measurement and for a different number and disposals of the aiding peers. The aiding measurement is obtained starting from the altitude measurements that the other peers in the network send to the aided user. The experiments highlight the need for a parameter that…

EquationsExploitSatellitesbusiness.industryGNSS vehicularReliability (computer networking)Real-time computingIndexesKalman filterPeer-to-peerReliabilitycomputer.software_genreReceiversGNSS vehicular; Equations; Indexes; Kalman filters; Mathematical model; Receivers; Reliability; SatellitesConsistency (database systems)Mathematical modelGeographyGNSS applicationsP2P localization Kalman filtering GNSS WAVESatellite navigationMobile telephonybusinessKalman filterscomputerSimulation2010 5th Advanced Satellite Multimedia Systems Conference and the 11th Signal Processing for Space Communications Workshop
researchProduct

Improving Pairs Trading Using Neural Network Techniques and Fundamental Ratios

2020

Pairs trading is a quantitative trading strategy consisting on identifying two stocks that historically move together and, using the assumption that their prices difference has mean- reverting properties, exploit the deviation from the mean by taking long – short position in the chosen pair to profit. Throughout the years, different approaches have been developed in order to exploit this strategy. However, there is little literature who looks whether the divergences in the prices are generated by poor company results, i.e. whether the deviation from the mean are product of bad (or good) fundamentals and are justified, or if they generate a new equilibrium point for the pair. In addition, si…

Equilibrium pointIndex (economics)ExploitArtificial neural networkOrder (exchange)Computer scienceEconometricsPairs tradePosition (finance)Trading strategySSRN Electronic Journal
researchProduct

Fair Kernel Learning

2017

New social and economic activities massively exploit big data and machine learning algorithms to do inference on people’s lives. Applications include automatic curricula evaluation, wage determination, and risk assessment for credits and loans. Recently, many governments and institutions have raised concerns about the lack of fairness, equity and ethics in machine learning to treat these problems. It has been shown that not including sensitive features that bias fairness, such as gender or race, is not enough to mitigate the discrimination when other related features are included. Instead, including fairness in the objective function has been shown to be more efficient.

Equity (economics)Actuarial scienceComputingMilieux_THECOMPUTINGPROFESSIONExploitComputer sciencebusiness.industrymedia_common.quotation_subjectDimensionality reductionBig dataWageInference02 engineering and technologyKernel method020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessCurriculummedia_common
researchProduct

Labor productivity and firm-level TFP with technology-specific production functions

2020

Abstract We investigate the technological dimension of productivity, presenting an empirical methodology based on mixture models to disentangle the labor productivity differences associated with the firm's choice of technology (BTFP) and those related to the firm's ability to exploit the adopted technology (WTFP). The estimation endogenously determines the number of technologies (in the sector) and degree of technology sharing across firms (i.e., for each firm, the probability of using a given technology). By using comparable data for about 35,000 firms worldwide distributed across 22 (two-digit) sectors, we show BTFP to be at least as important as WTFP in explaining the labor productivity …

EstimationEconomics and EconometricsSimultaneityExploit05 social sciencesTFPTFP; Technology adoption; Production function estimation; Mixture modelsProduction function estimation0502 economics and businessEconomicsProduction (economics)Statistical dispersion050207 economicsMixture modelsTotal factor productivityProductivityIndustrial organization050205 econometrics Technology adoption
researchProduct