Search results for "PROGRAM"
showing 10 items of 5938 documents
New delay-dependent stability of Markovian jump neutral stochastic systems with general unknown transition rates
2015
This paper investigates the delay-dependent stability problem for neutral Markovian jump systems with generally unknown transition rates GUTRs. In this neutral GUTR model, each transition rate is completely unknown or only its estimate value is known. Based on the study of expectations of the stochastic cross-terms containing the integral, a new stability criterion is derived in terms of linear matrix inequalities. In the mathematical derivation process, bounding stochastic cross-terms, model transformation and free-weighting matrix are not employed for less conservatism. Finally, an example is provided to demonstrate the effectiveness of the proposed results.
DESDEO: The Modular and Open Source Framework for Interactive Multiobjective Optimization
2021
Interactive multiobjective optimization methods incorporate preferences from a human decision maker in the optimization process iteratively. This allows the decision maker to focus on a subset of solutions, learn about the underlying trade-offs among the conflicting objective functions in the problem and adjust preferences during the solution process. Incorporating preference information allows computing only solutions that are interesting to the decision maker, decreasing computation time significantly. Thus, interactive methods have many strengths making them viable for various applications. However, there is a lack of existing software frameworks to apply and experiment with interactive …
The minimum mean cycle-canceling algorithm for linear programs
2022
Abstract This paper presents the properties of the minimum mean cycle-canceling algorithm for solving linear programming models. Originally designed for solving network flow problems for which it runs in strongly polynomial time, most of its properties are preserved. This is at the price of adapting the fundamental decomposition theorem of a network flow solution together with various definitions: that of a cycle and the way to calculate its cost, the residual problem, and the improvement factor at the end of a phase. We also use the primal and dual necessary and sufficient optimality conditions stated on the residual problem for establishing the pricing step giving its name to the algorith…
The Challenge of Coexistence in Socially Vulnerable Schools
2017
Abstract Society in general and schools in particular continue to express their concerns with regard to the many challenges posed nowadays by living in a globalized world, where learning to coexist involves knowing oneself and those around us. Therefore, the professionals from the education sector and specially from the most vulnerable contexts demand the necessity to know strategies and initiatives which enable them to build a democratic school, where learning to coexist is the key to educate engaged citizens living in an increasingly intercultural, changing world. The study presented here has been conducted in two differentiated, but complementary, phases. During the first phase a documen…
The organization of the defense support system: an economic geography perspective
2017
In the context of restricted budgetary resources and the growing cost of maintenance, repair, and overhaul (MRO) activities, a major issue for modern armed forces is to sustain defense platforms. A possible method consists of realizing economies of scale through the concentration of maintenance activities, which involves the spatial reorganization of existing industrial sites dedicated to MRO. This article provides a formalized framework to discuss the optimal organization for the MRO of defense platforms in space. The public planner organizes the maintenance of defense platforms with only two possible spatial configurations. In the dispersed configuration, two industrial production units i…
Visualization of Exchanged Information with Dynamic Networks: A Case Study of Fire Emergency Search and Rescue Operation
2017
To perform emergency response activities, complex networks of emergency responders from different emergency organizations work together to rescue affected people and to mitigate the property losses. However, to work efficiently, the emergency responders have to rely completely on the data which gets generated from heterogeneous data sources during search and rescue operation (SAR). From this abundant data, rescue teams share needed information which is hidden in the abundant data with one another to make decisions, obtain situational awareness and also to assign tasks. Moreover, understanding and analyzing the shared information is a complex and very challenging task. Therefore, in this pap…
The Camorra and protection rackets: the cost to business
2016
Based on the observations from the judicial and investigative evidence provided by prosecutors in Camorra areas in Italy, this investigation provides an estimate of the economic impact of extortion racket to businesses. In particular, the estimates refer to the total and average withdrawal of monetary amounts from the businesses victimised by Camorra clans. Further insights are provided in terms of economic activities mostly victimised, and specifically the construction sector, which is subject to a different type of extortion racket.
Language constraints in producing prefiguration posters for a scientific exhibition
1997
The museographic transposition of scientific knowledge leads notably to the preparation of exhibition posters. This is a delicate operation, on account of the constraints imposed by space, language, concepts and the text. These difficulties are even greater in the case of bovine reproduction biotechnologies, such as cloning, where knowledge is not yet stable. This paper deals with the choices made during the phase of museographic transposition. First of all, based on an epistemological approach, a historical analysis of knowledge-building underpins the choice of information to be presented. Language is then selected according to the linguistic analysis of a series of articles which popular…
HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication
2020
Malicious programs vary widely in their functionality, from key-logging to disk encryption. However, most malicious programs communicate with their operators, thus revealing themselves to various security tools. The security tools incorporated within an operating system are vulnerable to attacks due to the large attack surface of the operating system kernel and modules. We present a kernel module that demonstrates how kernel-mode access can be used to bypass any security mechanism that is implemented in kernel-mode. External security tools, like firewalls, lack important information about the origin of the intercepted packets, thus their filtering policy is usually insufficient to prevent c…
Kick Detection and Influx Size Estimation during Offshore Drilling Operations using Deep Learning
2019
An uncontrolled or unobserved influx or kick during drilling has the potential to induce a well blowout, one of the most harmful incidences during drilling both in regards to economic and environmental cost. Since kicks during drilling are serious risks, it is important to improve kick and loss detection performance and capabilities and to develop automatic flux detection methodology. There are clear patterns during a influx incident. However, due to complex processes and sparse instrumentation it is difficult to predict the behaviour of kicks or losses based on sensor data combined with physical models alone. Emerging technologies within Deep Learning are however quite adapt at picking up …