Search results for "PROGRAM"

showing 10 items of 5938 documents

New delay-dependent stability of Markovian jump neutral stochastic systems with general unknown transition rates

2015

This paper investigates the delay-dependent stability problem for neutral Markovian jump systems with generally unknown transition rates GUTRs. In this neutral GUTR model, each transition rate is completely unknown or only its estimate value is known. Based on the study of expectations of the stochastic cross-terms containing the integral, a new stability criterion is derived in terms of linear matrix inequalities. In the mathematical derivation process, bounding stochastic cross-terms, model transformation and free-weighting matrix are not employed for less conservatism. Finally, an example is provided to demonstrate the effectiveness of the proposed results.

0209 industrial biotechnologygeneral uncertain transition rateStability criterionModel transformationDelay-dependent stability02 engineering and technologyTransition rate matrixStability (probability)neutral-type stochastic systemTheoretical Computer ScienceDelay dependentMatrix (mathematics)Markovian jump020901 industrial engineering & automationControl theoryBounding overwatch0202 electrical engineering electronic engineering information engineeringApplied mathematicsMathematicscomputer.programming_languageDelay-dependent stability; neutral-type stochastic system;Markovian switching; general uncertain transition rate; mean-square exponentially stable; Control and Systems Engineering; Theoretical Computer Science; Computer Science Applications1707 Computer Vision and Pattern RecognitionMarkovian switchingComputer Science Applications1707 Computer Vision and Pattern RecognitionComputer Science ApplicationsControl and Systems Engineeringmean-square exponentially stable020201 artificial intelligence & image processingcomputerInternational Journal of Systems Science
researchProduct

DESDEO: The Modular and Open Source Framework for Interactive Multiobjective Optimization

2021

Interactive multiobjective optimization methods incorporate preferences from a human decision maker in the optimization process iteratively. This allows the decision maker to focus on a subset of solutions, learn about the underlying trade-offs among the conflicting objective functions in the problem and adjust preferences during the solution process. Incorporating preference information allows computing only solutions that are interesting to the decision maker, decreasing computation time significantly. Thus, interactive methods have many strengths making them viable for various applications. However, there is a lack of existing software frameworks to apply and experiment with interactive …

0209 industrial biotechnologylineaarinen optimointiPareto optimizationGeneral Computer Sciencemulti-criteria decision makingComputer sciencepäätöksentekoevoluutiolaskenta02 engineering and technologyData-driven multiobjective optimizationcomputer.software_genrenonlinear optimizationMulti-objective optimizationData modelingopen source softwareavoin lähdekoodi020901 industrial engineering & automationSoftwareoptimointi0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceUse casecomputer.programming_languageGraphical user interfacepareto-tehokkuusbusiness.industryGeneral Engineeringinteractive methodsModular designPython (programming language)monitavoiteoptimointiTK1-9971Software frameworkdata-driven multiobjective optimizationevolutionary computation020201 artificial intelligence & image processingElectrical engineering. Electronics. Nuclear engineeringbusinessSoftware engineeringcomputerIEEE Access
researchProduct

The minimum mean cycle-canceling algorithm for linear programs

2022

Abstract This paper presents the properties of the minimum mean cycle-canceling algorithm for solving linear programming models. Originally designed for solving network flow problems for which it runs in strongly polynomial time, most of its properties are preserved. This is at the price of adapting the fundamental decomposition theorem of a network flow solution together with various definitions: that of a cycle and the way to calculate its cost, the residual problem, and the improvement factor at the end of a phase. We also use the primal and dual necessary and sufficient optimality conditions stated on the residual problem for establishing the pricing step giving its name to the algorith…

021103 operations researchInformation Systems and ManagementGeneral Computer ScienceLinear programmingDegenerate energy levels0211 other engineering and technologiesPhase (waves)0102 computer and information sciences02 engineering and technologyManagement Science and Operations ResearchResidualFlow network01 natural sciencesIndustrial and Manufacturing EngineeringDual (category theory)010201 computation theory & mathematicsModeling and SimulationCoefficient matrixRowAlgorithmMathematicsEuropean Journal of Operational Research
researchProduct

The Challenge of Coexistence in Socially Vulnerable Schools

2017

Abstract Society in general and schools in particular continue to express their concerns with regard to the many challenges posed nowadays by living in a globalized world, where learning to coexist involves knowing oneself and those around us. Therefore, the professionals from the education sector and specially from the most vulnerable contexts demand the necessity to know strategies and initiatives which enable them to build a democratic school, where learning to coexist is the key to educate engaged citizens living in an increasingly intercultural, changing world. The study presented here has been conducted in two differentiated, but complementary, phases. During the first phase a documen…

021110 strategic defence & security studiesClass (computer programming)business.industrymedia_common.quotation_subject05 social sciences0211 other engineering and technologies050301 education02 engineering and technologyPublic relationsPeer supportPhase (combat)DemocracyConvivència escolarReading (process)General Materials ScienceQuality (business)SociologyMarketingbusiness0503 educationmedia_commonProcedia - Social and Behavioral Sciences
researchProduct

The organization of the defense support system: an economic geography perspective

2017

In the context of restricted budgetary resources and the growing cost of maintenance, repair, and overhaul (MRO) activities, a major issue for modern armed forces is to sustain defense platforms. A possible method consists of realizing economies of scale through the concentration of maintenance activities, which involves the spatial reorganization of existing industrial sites dedicated to MRO. This article provides a formalized framework to discuss the optimal organization for the MRO of defense platforms in space. The public planner organizes the maintenance of defense platforms with only two possible spatial configurations. In the dispersed configuration, two industrial production units i…

021110 strategic defence & security studiesEconomics and EconometricsProcess management[QFIN]Quantitative Finance [q-fin]Industrial productionSocial cost05 social sciences0211 other engineering and technologiesContext (language use)02 engineering and technologySpace (commercial competition)Tipping point (climatology)Planner[QFIN] Quantitative Finance [q-fin]Economies of scaleUnit (housing)0502 economics and businessBusiness050207 economicscomputerSocial Sciences (miscellaneous)ComputingMilieux_MISCELLANEOUScomputer.programming_language
researchProduct

Visualization of Exchanged Information with Dynamic Networks: A Case Study of Fire Emergency Search and Rescue Operation

2017

To perform emergency response activities, complex networks of emergency responders from different emergency organizations work together to rescue affected people and to mitigate the property losses. However, to work efficiently, the emergency responders have to rely completely on the data which gets generated from heterogeneous data sources during search and rescue operation (SAR). From this abundant data, rescue teams share needed information which is hidden in the abundant data with one another to make decisions, obtain situational awareness and also to assign tasks. Moreover, understanding and analyzing the shared information is a complex and very challenging task. Therefore, in this pap…

021110 strategic defence & security studiesEmergency managementSituation awarenessbusiness.industryComputer scienceProperty (programming)Information sharing0211 other engineering and technologies030208 emergency & critical care medicine02 engineering and technologyComplex networkComputer securitycomputer.software_genreVisualizationTask (project management)03 medical and health sciences0302 clinical medicinebusinesscomputerSearch and rescue2017 IEEE 7th International Advance Computing Conference (IACC)
researchProduct

The Camorra and protection rackets: the cost to business

2016

Based on the observations from the judicial and investigative evidence provided by prosecutors in Camorra areas in Italy, this investigation provides an estimate of the economic impact of extortion racket to businesses. In particular, the estimates refer to the total and average withdrawal of monetary amounts from the businesses victimised by Camorra clans. Further insights are provided in terms of economic activities mostly victimised, and specifically the construction sector, which is subject to a different type of extortion racket.

021110 strategic defence & security studiesSociology and Political ScienceSettore SPS/08 - Sociologia Dei Processi Culturali E Comunicativi05 social sciences0211 other engineering and technologiesSubject (philosophy)02 engineering and technologyExtortionLawPolitical Science and International RelationsRacket050501 criminologyExtortion racket Camorra Mafia Impact.Settore SPS/07 - Sociologia GeneraleBusinessClanEconomic impact analysisextortion racket Camorra mafia impactLawcomputer0505 lawcomputer.programming_languageLaw and economics
researchProduct

Language constraints in producing prefiguration posters for a scientific exhibition

1997

The museographic transposition of scientific knowledge leads notably to the preparation of exhibition posters. This is a delicate operation, on account of the constraints imposed by space, language, concepts and the text. These difficulties are even greater in the case of bovine reproduction biotechnologies, such as cloning, where knowledge is not yet stable. This paper deals with the choices made during the phase of museographic transposition. First of all, based on an epistemological approach, a historical analysis of knowledge-building underpins the choice of information to be presented. Language is then selected according to the linguistic analysis of a series of articles which popular…

021110 strategic defence & security studiesSociology of scientific knowledge010504 meteorology & atmospheric sciencesCloning (programming)CommunicationReproduction (economics)0211 other engineering and technologies02 engineering and technologySpace (commercial competition)01 natural sciencesExhibitionLinguistic analysisArts and Humanities (miscellaneous)AestheticsDevelopmental and Educational PsychologyTransposition (logic)SociologySocial science0105 earth and related environmental sciencesPublic Understanding of Science
researchProduct

HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication

2020

Malicious programs vary widely in their functionality, from key-logging to disk encryption. However, most malicious programs communicate with their operators, thus revealing themselves to various security tools. The security tools incorporated within an operating system are vulnerable to attacks due to the large attack surface of the operating system kernel and modules. We present a kernel module that demonstrates how kernel-mode access can be used to bypass any security mechanism that is implemented in kernel-mode. External security tools, like firewalls, lack important information about the origin of the intercepted packets, thus their filtering policy is usually insufficient to prevent c…

021110 strategic defence & security studiesSoftware_OPERATINGSYSTEMSNetwork securitybusiness.industryComputer scienceNetwork packet0211 other engineering and technologiesHypervisor02 engineering and technologyAttack surfaceComputer securitycomputer.software_genreOperator (computer programming)Trusted computing baseDisk encryptionKernel (image processing)020204 information systems0202 electrical engineering electronic engineering information engineeringbusinesscomputer
researchProduct

Kick Detection and Influx Size Estimation during Offshore Drilling Operations using Deep Learning

2019

An uncontrolled or unobserved influx or kick during drilling has the potential to induce a well blowout, one of the most harmful incidences during drilling both in regards to economic and environmental cost. Since kicks during drilling are serious risks, it is important to improve kick and loss detection performance and capabilities and to develop automatic flux detection methodology. There are clear patterns during a influx incident. However, due to complex processes and sparse instrumentation it is difficult to predict the behaviour of kicks or losses based on sensor data combined with physical models alone. Emerging technologies within Deep Learning are however quite adapt at picking up …

021110 strategic defence & security studiesgeographygeography.geographical_feature_categoryArtificial neural networkComputer sciencebusiness.industryDeep learning0211 other engineering and technologiesDrilling0102 computer and information sciences02 engineering and technology01 natural sciencesWellboreVDP::Teknologi: 500Drilling machines010201 computation theory & mathematicsInstrumentation (computer programming)Artificial intelligencebusinessOffshore drillingMarine engineeringWater well2019 14th IEEE Conference on Industrial Electronics and Applications (ICIEA)
researchProduct