Search results for "Exploit"
showing 10 items of 284 documents
Large Scale Control of Deferrable Domestic Loads in Smart Grids
2016
International audience; In this paper, we investigate a realistic and low-cost deployment of large scale direct control of inelastic home appliances whose energy demand cannot be shaped, but simply deferred. The idea is to exploit 1) some simple actuators to be placed on the electric plugs for connecting or disconnecting appliances with heterogeneous control interfaces, including non-smart appliances, and 2) the Internet connections of customers for transporting the activation requests from the actuators to a centralized controller. Our solution requires no interaction with home users: in particular, it does not require them to express their energy demand in advance. A queuing theory model …
Realizing the Benefits from Enterprise Information Systems: A Sociomaterial Perspective
2013
AbstractDespite the worthwhile studies that have been conducted on the realization of benefits from Enterprise Information Systems (EISs), many organizations are not satisfied with the benefits they have gained. This work draws on the sociomaterial perspective and suggests that benefits can be realized when organizations are able to utilize their capabilities in order to exploit the technological possibilities of the EISs, in addition to their willingness to change their business routines. It suggests focusing on the unintended benefits that can emerge based on the organizational capabilities and the system possibilities. The main contribution from this conceptual work is to provide a discu…
An FPGA-Based Software Defined Radio Platform for the 2.4GHz ISM Band
2006
A prototype of a Software Defined Radio (SDR) platform has been successfully designed and tested implementing a reconfigurable IEEE 802.11 and ZigBee receiver. The system exploits the reconfiguration capability of an FPGA for implementing a number of receiver configurations that share the same RF front-end. Configurations can be switched at run time, or can share the available logic and radio resource.
Charging Electric Vehicles Using Opportunistic Stopovers
2017
The diffusion of electric vehicles asks for efficient energy replenishment, which requires geographical and temporal coordination of shared charging resources. We introduce a novel charging methodology that exploits users’ opportunistic mobility. This paper focuses on vehicle stopovers detecting potential charg- ing opportunities. Our mobility-assisted methodology protects users privacy and permits a hybrid centralized/distributed ap- proach avoiding clashes with other potential users. A preliminary analysis on our charging system, obtained with mobility data from the field, shows that among the available charging stations, some are more relevant and have a key role in serving electric vehi…
Linking Women Entrepreneurship with Social Entrepreneurship
2011
In recent times, the number of women entrepreneurs in the world has grown steadily, motivated by necessity or by reasons related to the identification and exploitation of a gap in the market via which they can exploit and develop the experience and knowledge acquired. However, a new phenomenon is emerging in the field of entrepreneurship: the creation of organizations to attain social goals. It is precisely within this new framework that women can take on a relevant role due to a certain extent to a greater sensitivity towards the social problems in their environment. In this paper, we discuss several cases of women entrepreneurs that have allowed us to relate the motives for entrepreneuria…
Discovering and creating business opportunities for cloud services
2016
This study focuses on how the opportunities for cloud services are detected.The study develops a framework to detect and exploit cloud-based opportunities.This study incorporates entrepreneurship theories to extend and enrich IS research. Cloud computing provides new business opportunities for firms selling or using cloud services. However, little is known about how software firms detect and exploit these opportunities. Based on in-depth qualitative case studies, this study identified two different pathways followed by software firms when they detect and exploit opportunities. In the first pathway, the opportunity is based on an existing problem and need in the market. In the case firms, th…
Improved GNSS positioning exploiting a vehicular P2P infrastructure
2010
This paper considers the possibility to exploit external altitude measurements to improve the performance of a Kalman based GNSS receiver. The altitude measurements are provided by means of a peer to peer network, that is supposed to be based on the evolution of the 802.11 standard for the vehicular environment, namely the WAVE (802.11p). The performance of such a system are investigated for different characteristics of the aiding measurement and for a different number and disposals of the aiding peers. The aiding measurement is obtained starting from the altitude measurements that the other peers in the network send to the aided user. The experiments highlight the need for a parameter that…
Improving Pairs Trading Using Neural Network Techniques and Fundamental Ratios
2020
Pairs trading is a quantitative trading strategy consisting on identifying two stocks that historically move together and, using the assumption that their prices difference has mean- reverting properties, exploit the deviation from the mean by taking long – short position in the chosen pair to profit. Throughout the years, different approaches have been developed in order to exploit this strategy. However, there is little literature who looks whether the divergences in the prices are generated by poor company results, i.e. whether the deviation from the mean are product of bad (or good) fundamentals and are justified, or if they generate a new equilibrium point for the pair. In addition, si…
Fair Kernel Learning
2017
New social and economic activities massively exploit big data and machine learning algorithms to do inference on people’s lives. Applications include automatic curricula evaluation, wage determination, and risk assessment for credits and loans. Recently, many governments and institutions have raised concerns about the lack of fairness, equity and ethics in machine learning to treat these problems. It has been shown that not including sensitive features that bias fairness, such as gender or race, is not enough to mitigate the discrimination when other related features are included. Instead, including fairness in the objective function has been shown to be more efficient.
Labor productivity and firm-level TFP with technology-specific production functions
2020
Abstract We investigate the technological dimension of productivity, presenting an empirical methodology based on mixture models to disentangle the labor productivity differences associated with the firm's choice of technology (BTFP) and those related to the firm's ability to exploit the adopted technology (WTFP). The estimation endogenously determines the number of technologies (in the sector) and degree of technology sharing across firms (i.e., for each firm, the probability of using a given technology). By using comparable data for about 35,000 firms worldwide distributed across 22 (two-digit) sectors, we show BTFP to be at least as important as WTFP in explaining the labor productivity …