47,402 research outputs found
Rational Choice of Machining Tools Using Prediction Procedures
Introducing the methods and procedures for predictive analysis into the design process contours of a variety of machining tools (MT) of metal cutting machines is the main aim of this article. A sequence of realization of prediction object (PO) choice as an initial stage of search of perspective designs is offered. Effective in this regard is the "Tree of objectives" apparatus, on the basis of which many ways of improving MT are formed, selecting progressive (reducing the dimension of the problem) at each level of the hierarchy of the constructed graph-tree. The procedure for selecting the prediction method (PM) as a means of generating the forecast data is developed. The task of choosing a method is structured in detail and uses "Information supply"as the main criterion. To this end, assessment scales of choice criteria have been formed, on the basis of which it is possible to evaluate their effectiveness for the PM selection process. The rules forPOcoding are introduced by a three-element information code, including information source classes – static data, expert estimates and patent data. The process of forecasting the MT components by the method of engineering forecasting on the basis of a representative patent fund is realized. The General Definition Table has been built (GDT "Machining tools") and estimates of the prospects of design solutions have been obtained. A fragment of the database of 3D models of promising MT designs in the integrated computer-aided design KOMPAS-3D is proposed
Workshop on dimensional analysis for design, development, and research executives
The proceedings of a conference of research and development executives are presented. The purpose of the meeting was to develop an understanding of the conditions which are appropriate for the use of certain general management tools and those conditions which render these tools inappropriate. The verbatim statements of the participants are included to show the direction taken initially by the conference. Formal presentations of management techniques for research and development are developed
Disease Surveillance Networks Initiative Africa: Final Evaluation
The overall objective of the Foundation's Disease Surveillance Networks (DSN) Initiative is to strengthen technical capacity at the country level for disease surveillance and to bolster response to outbreaks through the sharing of technical information and expertise. It supports formalizing collaboration, information sharing and best practices among established networks as well as trans-national, interdisciplinary and multi-sectoral efforts, and is experienced in developing and fostering innovative partnerships. In order to more effectively address disease threats, the DSN has four key outcome areas:(1) forming and sustaining trans-boundary DSN;(2) strengthening and applying technical and communication skills by local experts and institutions;(3) increasing access and use of improved tools and methods on information sharing, reporting and monitoring; and(4) emphasizing One Health and transdisciplinary approaches to policy and practice at global, regional and local levels
Evaluating the Employment Impact of Business Incentive Programs in EU Disadvantaged Areas. A case from Northern Italy
Business incentive programs have been increasingly popular within the EU as regional economic development tools to promote employment growth in areas with severely distressed and/or declining socio-economic conditions. Reliable evidenced on the effective net employment impact of such initiatives are greatly needed to help refining future intervention as, to these days, European policy makers' decisions can mostly be supported only by monitoring and survey analyses. This paper proposes a method of analysis to assess the employment impact of the business incentive initiatives implemented in the EU areas with declining industrial production (EU 'Objective 2' areas). The proposed method is a comparison-group evaluation approach that uses panels of employment data aggregated by geographic areas (similarly to the evaluation approach successfully adopted by recent studies of the US Enterprise Zone Programs). Details of the proposed method of analysis are illustrated through an empirical application: the evaluation of the business incentive program co-funded by the European Regional Development Fund in the 'Objective 2' areas of the Piedmont region (Italy). Results from such application prove the effectiveness and the robustness of the proposed method for impact evaluation analyses with longitudinal data, and highlight how the Piedmont's business incentive program did not significantly affect employment in the 'Objective 2 areas'.
Sound and Complete Runtime Security Monitor for Application Software
Conventional approaches for ensuring the security of application software at
run-time, through monitoring, either produce (high rates of) false alarms (e.g.
intrusion detection systems) or limit application performance (e.g. run-time
verification). We present a runtime security monitor that detects both known
and unknown cyber attacks by checking that the run-time behavior of the
application is consistent with the expected behavior modeled in application
specification. This is crucial because, even if the implementation is
consistent with its specification, the application may still be vulnerable due
to flaws in the supporting infrastructure (e.g. the language runtime system,
libraries and operating system). This runtime security monitor is sound and
complete, eliminating false alarms, as well as efficient, so that it does not
limit runtime application performance and so that it supports real-time
systems. The security monitor takes as input the application specification and
the application implementation, which may be expressed in different languages.
The specification language of the application software is formalized based on
monadic second order logic and event calculus interpreted over algebraic data
structures. This language allows us to express behavior of an application at
any desired (and practical) level of abstraction as well as with high degree of
modularity. The security monitor detects every attack by systematically
comparing the application execution and specification behaviors at runtime,
even though they operate at two different levels of abstraction. We define the
denotational semantics of the specification language and prove that the monitor
is sound and complete. Furthermore, the monitor is efficient because of the
modular application specification at appropriate level(s) of abstraction
Human-Agent Decision-making: Combining Theory and Practice
Extensive work has been conducted both in game theory and logic to model
strategic interaction. An important question is whether we can use these
theories to design agents for interacting with people? On the one hand, they
provide a formal design specification for agent strategies. On the other hand,
people do not necessarily adhere to playing in accordance with these
strategies, and their behavior is affected by a multitude of social and
psychological factors. In this paper we will consider the question of whether
strategies implied by theories of strategic behavior can be used by automated
agents that interact proficiently with people. We will focus on automated
agents that we built that need to interact with people in two negotiation
settings: bargaining and deliberation. For bargaining we will study game-theory
based equilibrium agents and for argumentation we will discuss logic-based
argumentation theory. We will also consider security games and persuasion games
and will discuss the benefits of using equilibrium based agents.Comment: In Proceedings TARK 2015, arXiv:1606.0729
Management information systems in social safety net programs : a look at accountability and control mechanisms
This paper is intended to provide task managers and World Bank Group clients working on Social Safety Net (SSN) programs with practical and systematic ways to use information management practices to mitigate risks by strengthening control and accountability mechanisms. It lays out practices and options to consider in the design and implementation of the Management Information System (MIS), and how to evaluate and mitigate operational risks originating from running a MIS. The findings of the paper are based on the review of several Conditional Cash Transfer (CCT) programs in the Latin American Region and various World Bank publications on CCTs. The paper presents a framework for the implementation of MIS and cross-cutting information management systems that is based on industry standards and information management practices. This framework can be applied both to programs that make use of information and communications technology (ICT) and programs that are paper based. It includes examples of MIS practices that can strengthen control and accountability mechanisms of SSN programs, and presents a roadmap for the design and implementation of an MIS in these programs. The application of the framework is illustrated through case studies from three fictitious countries. The paper concludes with some considerations and recommendations for task managers and government officials in charge of implementing CCTs and other safety nets program, and with a checklist for the implementation and monitoring of MIS.E-Business,Technology Industry,Education for Development (superceded),Labor Policies,Knowledge Economy
- …