47,402 research outputs found

    Rational Choice of Machining Tools Using Prediction Procedures

    Get PDF
    Introducing the methods and procedures for predictive analysis into the design process contours of a variety of machining tools (MT) of metal cutting machines is the main aim of this article. A sequence of realization of prediction object (PO) choice as an initial stage of search of perspective designs is offered. Effective in this regard is the "Tree of objectives" apparatus, on the basis of which many ways of improving MT are formed, selecting progressive (reducing the dimension of the problem) at each level of the hierarchy of the constructed graph-tree. The procedure for selecting the prediction method (PM) as a means of generating the forecast data is developed. The task of choosing a method is structured in detail and uses "Information supply"as the main criterion. To this end, assessment scales of choice criteria have been formed, on the basis of which it is possible to evaluate their effectiveness for the PM selection process. The rules forPOcoding are introduced by a three-element information code, including information source classes – static data, expert estimates and patent data. The process of forecasting the MT components by the method of engineering forecasting on the basis of a representative patent fund is realized. The General Definition Table has been built (GDT "Machining tools") and estimates of the prospects of design solutions have been obtained. A fragment of the database of 3D models of promising MT designs in the integrated computer-aided design KOMPAS-3D is proposed

    Workshop on dimensional analysis for design, development, and research executives

    Get PDF
    The proceedings of a conference of research and development executives are presented. The purpose of the meeting was to develop an understanding of the conditions which are appropriate for the use of certain general management tools and those conditions which render these tools inappropriate. The verbatim statements of the participants are included to show the direction taken initially by the conference. Formal presentations of management techniques for research and development are developed

    Disease Surveillance Networks Initiative Africa: Final Evaluation

    Get PDF
    The overall objective of the Foundation's Disease Surveillance Networks (DSN) Initiative is to strengthen technical capacity at the country level for disease surveillance and to bolster response to outbreaks through the sharing of technical information and expertise. It supports formalizing collaboration, information sharing and best practices among established networks as well as trans-national, interdisciplinary and multi-sectoral efforts, and is experienced in developing and fostering innovative partnerships. In order to more effectively address disease threats, the DSN has four key outcome areas:(1) forming and sustaining trans-boundary DSN;(2) strengthening and applying technical and communication skills by local experts and institutions;(3) increasing access and use of improved tools and methods on information sharing, reporting and monitoring; and(4) emphasizing One Health and transdisciplinary approaches to policy and practice at global, regional and local levels

    Evaluating the Employment Impact of Business Incentive Programs in EU Disadvantaged Areas. A case from Northern Italy

    Get PDF
    Business incentive programs have been increasingly popular within the EU as regional economic development tools to promote employment growth in areas with severely distressed and/or declining socio-economic conditions. Reliable evidenced on the effective net employment impact of such initiatives are greatly needed to help refining future intervention as, to these days, European policy makers' decisions can mostly be supported only by monitoring and survey analyses. This paper proposes a method of analysis to assess the employment impact of the business incentive initiatives implemented in the EU areas with declining industrial production (EU 'Objective 2' areas). The proposed method is a comparison-group evaluation approach that uses panels of employment data aggregated by geographic areas (similarly to the evaluation approach successfully adopted by recent studies of the US Enterprise Zone Programs). Details of the proposed method of analysis are illustrated through an empirical application: the evaluation of the business incentive program co-funded by the European Regional Development Fund in the 'Objective 2' areas of the Piedmont region (Italy). Results from such application prove the effectiveness and the robustness of the proposed method for impact evaluation analyses with longitudinal data, and highlight how the Piedmont's business incentive program did not significantly affect employment in the 'Objective 2 areas'.

    Sound and Complete Runtime Security Monitor for Application Software

    Get PDF
    Conventional approaches for ensuring the security of application software at run-time, through monitoring, either produce (high rates of) false alarms (e.g. intrusion detection systems) or limit application performance (e.g. run-time verification). We present a runtime security monitor that detects both known and unknown cyber attacks by checking that the run-time behavior of the application is consistent with the expected behavior modeled in application specification. This is crucial because, even if the implementation is consistent with its specification, the application may still be vulnerable due to flaws in the supporting infrastructure (e.g. the language runtime system, libraries and operating system). This runtime security monitor is sound and complete, eliminating false alarms, as well as efficient, so that it does not limit runtime application performance and so that it supports real-time systems. The security monitor takes as input the application specification and the application implementation, which may be expressed in different languages. The specification language of the application software is formalized based on monadic second order logic and event calculus interpreted over algebraic data structures. This language allows us to express behavior of an application at any desired (and practical) level of abstraction as well as with high degree of modularity. The security monitor detects every attack by systematically comparing the application execution and specification behaviors at runtime, even though they operate at two different levels of abstraction. We define the denotational semantics of the specification language and prove that the monitor is sound and complete. Furthermore, the monitor is efficient because of the modular application specification at appropriate level(s) of abstraction

    Human-Agent Decision-making: Combining Theory and Practice

    Full text link
    Extensive work has been conducted both in game theory and logic to model strategic interaction. An important question is whether we can use these theories to design agents for interacting with people? On the one hand, they provide a formal design specification for agent strategies. On the other hand, people do not necessarily adhere to playing in accordance with these strategies, and their behavior is affected by a multitude of social and psychological factors. In this paper we will consider the question of whether strategies implied by theories of strategic behavior can be used by automated agents that interact proficiently with people. We will focus on automated agents that we built that need to interact with people in two negotiation settings: bargaining and deliberation. For bargaining we will study game-theory based equilibrium agents and for argumentation we will discuss logic-based argumentation theory. We will also consider security games and persuasion games and will discuss the benefits of using equilibrium based agents.Comment: In Proceedings TARK 2015, arXiv:1606.0729

    Management information systems in social safety net programs : a look at accountability and control mechanisms

    Get PDF
    This paper is intended to provide task managers and World Bank Group clients working on Social Safety Net (SSN) programs with practical and systematic ways to use information management practices to mitigate risks by strengthening control and accountability mechanisms. It lays out practices and options to consider in the design and implementation of the Management Information System (MIS), and how to evaluate and mitigate operational risks originating from running a MIS. The findings of the paper are based on the review of several Conditional Cash Transfer (CCT) programs in the Latin American Region and various World Bank publications on CCTs. The paper presents a framework for the implementation of MIS and cross-cutting information management systems that is based on industry standards and information management practices. This framework can be applied both to programs that make use of information and communications technology (ICT) and programs that are paper based. It includes examples of MIS practices that can strengthen control and accountability mechanisms of SSN programs, and presents a roadmap for the design and implementation of an MIS in these programs. The application of the framework is illustrated through case studies from three fictitious countries. The paper concludes with some considerations and recommendations for task managers and government officials in charge of implementing CCTs and other safety nets program, and with a checklist for the implementation and monitoring of MIS.E-Business,Technology Industry,Education for Development (superceded),Labor Policies,Knowledge Economy
    • …
    corecore