194 research outputs found

    Working Notes from the 1992 AAAI Spring Symposium on Practical Approaches to Scheduling and Planning

    Get PDF
    The symposium presented issues involved in the development of scheduling systems that can deal with resource and time limitations. To qualify, a system must be implemented and tested to some degree on non-trivial problems (ideally, on real-world problems). However, a system need not be fully deployed to qualify. Systems that schedule actions in terms of metric time constraints typically represent and reason about an external numeric clock or calendar and can be contrasted with those systems that represent time purely symbolically. The following topics are discussed: integrating planning and scheduling; integrating symbolic goals and numerical utilities; managing uncertainty; incremental rescheduling; managing limited computation time; anytime scheduling and planning algorithms, systems; dependency analysis and schedule reuse; management of schedule and plan execution; and incorporation of discrete event techniques

    ๋„คํŠธ์›Œํฌ ๊ธฐ๋ฐ˜ ๊ฐ€์ƒ ์‚ฌํšŒ์˜ ์‹ ๋ขฐ ๊ตฌ์ถ• ๋ฒ•์น™๊ณผ ์‹ ๋ขฐ ๊ด€๋ฆฌ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ํ˜‘๋™๊ณผ์ • ๊ธฐ์ˆ ๊ฒฝ์˜ยท๊ฒฝ์ œยท์ •์ฑ…์ „๊ณต, 2012. 8. ํ™ฉ์ค€์„.๊ฐ€์ƒ ์‚ฌํšŒ์—์„œ ์ฐธ์—ฌ์ž๊ฐ€ ์ž…์„ ์ˆ˜ ์žˆ๋Š” ์†์‹ค์€ ํฌ๊ฒŒ ๊ฐ€์ƒ ์ปค๋ฎค๋‹ˆํ‹ฐ์˜ ์ผ์›์œผ๋กœ ์—ฌ๊ฒจ์ง€๋Š” ์ฐธ์—ฌ์ž๋กœ๋ถ€ํ„ฐ ์ž…์„ ์ˆ˜ ์žˆ๋Š” ํ”ผํ•ด์™€ ์ปค๋ฎค๋‹ˆํ‹ฐ ์™ธ๋ถ€์˜ ์ƒ๋Œ€๋กœ๋ถ€ํ„ฐ ์ž…์„ ์ˆ˜ ์žˆ๋Š” ํ”ผํ•ด๋กœ ๋‚˜๋‰œ๋‹ค. ๋‹ค์‹œ, ์ปค๋ฎค๋‹ˆํ‹ฐ ์ฐธ์—ฌ์ž๋“ค์— ์˜ํ•ด ๋ฐœ์ƒํ•˜๋Š” ์œ„ํ—˜๊ณผ ๋ถˆํ™•์‹ค์„ฑ์€ ์ƒ๋Œ€๋ฐฉ์˜ ์œ ํ˜•์ด ๊ฐ์ถ”์–ด์ ธ ์žˆ๊ฑฐ๋‚˜ ํ–‰๋™์ด ๊ฐ์ถ”์–ด์ ธ ์žˆ๋Š” ์ •๋ณด๋น„๋Œ€์นญ์œผ๋กœ ์ธํ•ด ๋ฐœ์ƒํ•œ๋‹ค. ๊ฐ€์ƒ์ปค๋ฎค๋‹ˆํ‹ฐ์˜ ์ผ์›์œผ๋กœ๋ถ€ํ„ฐ ์ž…์„ ์ˆ˜ ์žˆ๋Š” ํ”ผํ•ด๋Š” ์ผ์ฐจ์ ์œผ๋กœ ๊ตฌ์„ฑ์›๋“ค ๊ฐ„์˜ ์ž์œจ์ ์ธ ๋ฐ˜๋ณต ์†Œํ†ต๊ณผ ํ•™์Šต์„ ํ†ตํ•œ ์ƒ๋Œ€ ์„ ๋ณ„ ๊ธฐ์ค€์˜ ์—…๋ฐ์ดํŠธ๋ฅผ ํ†ตํ•ด ์ ์ฐจ ์–‘์งˆ์˜ ๊ฑฐ๋ž˜ ์ƒ๋Œ€๋ฅผ ์„ ๋ณ„ํ•˜๋Š” ๊ฒƒ์œผ๋กœ ์™„ํ™”ํ•  ์ˆ˜ ์žˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜, ํ•œ๋ฒˆ ์„ ๋ณ„๊ณผ์ •์„ ํ†ตํ•ด ์ปค๋ฎค๋‹ˆํ‹ฐ์— ์ง„์ž…ํ•œ ๊ตฌ์„ฑ์›๋„ ๋‹ค์‹œ ๋ฐฐ์‹ ํ•  ์œ ์ธ์€ ์žˆ์œผ๋ฉฐ, ์ด๋Š” ํ‰ํŒ ๋“ฑ ์ง€์†์ ์ธ ๊ตฌ์„ฑ์› ๊ฐ„ ๋ฐ˜๋ณต ์†Œํ†ต ํ˜น์€ ์ด์ฐจ์  ์ˆ˜๋‹จ์ธ ์‹ ๋ขฐํ•  ์ˆ˜ ์žˆ๋Š” ์ œ3์ž์˜ ๊ฐœ์ž…์„ ํ†ตํ•ด ์™„ํ™”๊ฐ€ ๊ฐ€๋Šฅํ•˜๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ปค๋ฎค๋‹ˆํ‹ฐ ์™ธ๋ถ€์˜ ์ƒ๋Œ€๋กœ๋ถ€ํ„ฐ ์ž…์„ ์ˆ˜ ์žˆ๋Š” ํ”ผํ•ด๋Š” ์ปค๋ฎค๋‹ˆํ‹ฐ ์ „์ฒด ์ˆ˜์ค€์—์„œ ๊ธฐ์ˆ ์ ์œผ๋กœ ๋ฐฉ์–ดํ•˜๊ฑฐ๋‚˜, ํ˜น์€ ๋™์‹œ์— ๊ฐœ์ธ์ด ํ”ผํ•ด๋ฅผ ์˜ˆ๋ฐฉํ•  ์ˆ˜ ์žˆ๋Š” ํˆฌ์ž๋ฅผ ์„ ํ–‰ํ•จ์œผ๋กœ์จ ์™„ํ™”ํ•ด์•ผ ํ•œ๋‹ค. ๋ณธ ์—ฐ๊ตฌ๋Š” ๊ฐ€์ƒ ์‚ฌํšŒ์—์„œ ์ฐธ์—ฌ์ž์˜ ์†์‹ค ์™„ํ™”์™€ ์˜ˆ๋ฐฉ, ๊ทธ๋ฆฌ๊ณ  ๋ฐฉ์–ด๋ฅผ ์œ„ํ•œ ์ปค๋ฎค๋‹ˆํ‹ฐ์˜ ๊ตฌ์„ฑ ๊ธฐ์ค€, ์ปค๋ฎค๋‹ˆํ‹ฐ์˜ ๊ด€๋ฆฌ ๋ฐฉ๋ฒ•, ๊ทธ๋ฆฌ๊ณ  ์™ธ๋ถ€๋กœ๋ถ€ํ„ฐ์˜ ๋ฐฉ์–ด๋ฅผ ์œ„ํ•œ ํˆฌ์ž๋ฅผ ์‚ฌํšŒ์™€ ๊ฐœ์ธ์˜ ํšจ์œจ์„ฑ ํ™•๋ณด๋ผ๋Š” ์ธก๋ฉด์—์„œ ์ ‘๊ทผํ•˜์—ฌ ์ตœ์„ ์˜ ์ •์ฑ…์„ ์ œ์•ˆํ•˜๊ณ ์ž ํ•˜์˜€๋‹ค. ์šฐ์„  ์ธํ„ฐ๋„ท ๊ธฐ๋ฐ˜์˜ ๊ฐ€์ƒ ์‚ฌํšŒ์—์„œ ์ฐธ์—ฌ์ž๋“ค์ด ์ƒ๋Œ€๋ฅผ ์„ ๋ณ„ํ•˜์—ฌ ์ปค๋ฎค๋‹ˆํ‹ฐ๋ฅผ ๊ตฌ์„ฑํ•˜๋Š” ๊ธฐ์ค€์œผ๋กœ ์‹ ๋ขฐ ์‹ ํ˜ธ ๊ฒŒ์ž„ ๋ชจ๋ธ์„ ๊ตฌ์„ฑํ•˜๊ณ , ์‹ ํ˜ธ๋งŒ์œผ๋กœ ์‹ ๋ขฐ์„ฑ ์žˆ๋Š” ์ƒ๋Œ€๋ฅผ ํŒ๋ณ„ํ•  ์ˆ˜ ํ•˜๊ธฐ ์œ„ํ•œ ์‹ ํ˜ธ๋น„์šฉ ๊ธฐ๋ฐ˜ ์‹œ์Šคํ…œ์„ ์ œ์‹œํ•˜์˜€๋‹ค. ์ด๋ ‡๊ฒŒ ์‹ ํ˜ธ๋ฅผ ํ†ตํ•ด ์ƒ๋Œ€๋ฅผ ํŒ๋ณ„ํ•˜์—ฌ ๊ฑฐ๋ž˜ํ•˜๋Š” ๋ฐฉ๋ฒ•์€ ์ผ๋ถ€ ์กฐ๊ฑด์—์„œ๋Š” ์‚ฌํšŒ์ ์œผ๋กœ ์ตœ์ ์€ ์•„๋‹ˆ๋ฉฐ, ์‚ฌํšŒ ํ›„์ƒ ๊ด€์ ์—์„œ ํšจ์œจ์ ์ด๊ธฐ ์œ„ํ•ด์„œ๋Š” ์‹ ํ˜ธ์ฒด๊ณ„์˜ ์„ค๊ณ„ ํ˜น์€ ์‹ ๋ขฐ์„ฑ ๋‚ฎ์€ ์‚ฌ์šฉ์ž์— ๋Œ€ํ•œ ๊ทœ์ œ๋ผ๋Š” ๋‘ ์ •์ฑ… ์ค‘์—์„œ ์„ ํƒํ•ด์•ผ ํ•จ์„ ์ œ์‹œํ•˜์˜€๋‹ค. ์ „ํ†ต์ ์œผ๋กœ ์ƒ๋Œ€๋ฅผ ์„ ํƒํ•˜๊ธฐ ์œ„ํ•ด ์‚ฌ์šฉ๋˜์–ด ์˜จ ๋ฐฉ๋ฒ•์ธ ํ‰ํŒ์€ ์ผ์ข…์˜ ์‹ ํ˜ธ์ฒด๊ณ„๋ผ๊ณ  ํ•  ์ˆ˜ ์žˆ๋Š”๋ฐ, ์šฐ์„  ์‹ ํ˜ธ ์ฒด๊ณ„๋ฅผ ํ†ตํ•ด ์ปค๋ฎค๋‹ˆํ‹ฐ์— ์ง„์ž…ํ•œ ์ดํ›„์—๋Š” ์ด๋ฅผ ๊ด€๋ฆฌํ•˜๋Š” ๊ฒƒ์ด ํ•„์š”ํ•ด์ง„๋‹ค. ์ด ๊ณผ์ •์—์„œ ์ง‘ํ•ฉ์ ์ธ ์‹ ๋ขฐ์˜ ๋ณด์žฅ๊ณผ ๊ฐœ์ธ์˜ ํ”„๋ผ์ด๋ฒ„์‹œ ๋ณดํ˜ธ ๊ฐ„์˜ ๊ธด์žฅ๊ด€๊ณ„๊ฐ€ ๋ฐœ์ƒํ•œ๋‹ค. ์ด๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•œ ๋ชจ๋‹ˆํ„ฐ๋ง๊ณผ ์ฒ˜๋ฒŒ์ด๋ผ๋Š” ์ •์ฑ… ๋ณ€์ˆ˜๋ฅผ ์ œ์•ˆํ•˜๊ณ , ์ตœ์  ์ˆ˜์ค€์„ ์ œ์‹œํ•˜์˜€๋‹ค. ๋”ฐ๋ผ์„œ ๊ฑฐ๋ž˜ ํ˜น์€ ์†Œํ†ตํ•˜๋Š” ์ „์ฒด ์ปค๋ฎค๋‹ˆํ‹ฐ์˜ ๊ฑด์ „์„ฑ ์œ ์ง€๋ฅผ ์œ„ํ•ด์„œ ๋„์ž…๋˜๋Š” ์‹ ๋ขฐ๋ฐ›๋Š” ์ œ3์ž์˜ ์ •์ฑ…์ด ์ค‘์š”ํ•˜๋‹ค. ๋งˆ์ง€๋ง‰์œผ๋กœ, ๊ฐœ์ธ์ด ์ž์‹ ์˜ ํ”„๋ผ์ด๋ฒ„์‹œ๋ฅผ ์ง€ํ‚ค๊ธฐ ์œ„ํ•œ ํˆฌ์ž๋ฅผ ํ•˜๋Š” ์ƒํ™ฉ์—์„œ ์„œ๋กœ ๊ฑฐ๋ž˜ํ•  ๋•Œ์—, ๋ฐฉ์–ด์ž์˜ ์ž…์žฅ์—์„œ ์ „๋žต์„ ์„ธ์šธ ํ•„์š”๊ฐ€ ์žˆ๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ๊ณต๊ฒฉ์ž ๋˜ํ•œ ํ•˜๋‚˜์˜ ๊ฒŒ์ž„ ์ฐธ์—ฌ์ž๋ผ๋Š” ์ž…์žฅ์—์„œ ์ด๋“ค์˜ ์œ ์ธ์„ ๊ณ ๋ คํ•œ ์˜์‚ฌ๊ฒฐ์ • ๋ชจ๋ธ์„ ์ œ์•ˆํ•œ๋‹ค. ๊ฒŒ์ž„์˜ ๋ถ„์„์  ๋ชจ๋ธ๊ณผ ์‹คํ—˜ ๋ชจ๋ธ์„ ํ†ตํ•ด ์–ป์–ด์ง„ ๊ฒฐ๊ณผ์— ๋”ฐ๋ฅด๋ฉด, ์†์‹ค์— ๋Œ€ํ•œ ๊ณต๊ฒฉ์ž์˜ ์ด์ต ๋น„์œจ์ด ์ƒ๋Œ€์ ์œผ๋กœ ํด ์ˆ˜๋ก ๋ณด์•ˆํˆฌ์ž์— ๋Œ€ํ•œ ๊ธฐ๋Œ€์ด์ต์ด ์ค„์–ด๋“ ๋‹ค. ๋ณด์•ˆ ํˆฌ์ž๋ฅผ ํ†ตํ•œ ๊ธฐ๋Œ€ ์ด์ต์„ ๊ทน๋Œ€ํ™”ํ•˜๋Š” ์ตœ์  ํˆฌ์ž๋Ÿ‰๊ณผ ํˆฌ์ž ์‹œ์ ์„ ๋˜ํ•œ ์ œ์‹œํ•˜์˜€๋‹ค. ๊ทธ๋ฆฌ๊ณ  ์˜ˆ์ƒ๋˜๋Š” ๊ณต๊ฒฉ์˜ ์ข…๋ฅ˜์™€ ํ™•๋ฅ ์— ๋”ฐ๋ผ ์ ์ ˆํ•œ ๋ณด์•ˆํˆฌ์ž ํฌํŠธํด๋ฆฌ์˜ค๋ฅผ ๊ตฌ์„ฑํ•˜๋Š” ๊ฒƒ์ด ํ•„์š”ํ•˜๋‹ค๋Š” ๊ฒฐ๋ก ์„ ์ œ์‹œํ•˜๊ณ , ๋ช‡ ๊ฐ€์ง€ ์‚ฌ๋ก€์— ๋Œ€ํ•ด ๊ฐ€์ƒ ํฌํŠธํด๋ฆฌ์˜ค๋ฅผ ์ œ์‹œํ•˜์˜€๋‹ค.The uncertainties and risks in a virtual society can be divided into those posed by a member of the community and those posed by an outsider of the community. The uncertainties and risks from a member of the community can be further divided into those stemming from the hidden type problem and those stemming from the hidden action problem in the context of information asymmetry. These uncertainties and risks posed by community members can be alleviated by a prudently designed selection mechanism that uses repeated communication and learning. Nevertheless, there exists an incentive to commit a violation for a community member who is selected by the selection mechanism. A complementary mechanism such as reputation or third party intervention is therefore required to resolve this problem. On the other hand, the alleviation of the uncertainty or risk posed by an outsider of the community requires the effort of the entire community and individual investment by each community member to protect their information and systems. Enhancing trust is a critical factor in the development of virtual and offline societies. Just as various policy tools have been used continuously to build trust in the real society, various policy guidelines also need to be suggested to build trust in the virtual society. Although previous studies have focused on suggesting policy guidelines based on observed phenomena, this study provides the theoretical foundation for analyzing the process of trust building in various environments of virtual society using the game theory approach. The theoretical analysis in this research suggests that the most critical task is to make a pool of trustworthy providers to establish an efficient market. Prudent policies also need to be designed to differentiate the signaling costs for different types of providers. The trusted third party method can be one of the possible alternatives. As this study suggests, even in a trustworthy market, minimum monitoring and penalty contracts are necessary and individual users need to invest in optimal security. This research also contributes to the development of a new trust-management mechanism that is not only more objective and robust but also has a simple structure that can be easily understood by users in the virtual society. Existing studies have merely focused on one of the two conflicting values or indicated the limitations of pervasive reputation mechanisms. Moreover, flexible-monitoring levels cannot be chosen when the service participants are highly concerned about their privacy or when the expected loss from the invasion of privacy is high. In such cases, the level of punishment is inevitably highlegal enforcement is therefore required to complement the voluntary punishment scheme for virtual society models such as the utility-computing service market. Finally, this research contributes to the decision-making process of the defender. The proposed model gives a defender more practical instruments to decide the optimal level of security investment through consideration of the attackers strategic decisions. The majority of existing studies have considered only the defenders perspective and have regarded the actions of attackers as a given. The last analysis suggested a model of interdependent decision-making processes of two players behaving strategically. The strategic attacker bases its strategies such as attack frequency on the actions of the defender, whereas the strategic defender bases its strategies such as the level of security investment on the actions of the attacker. The model used in this study aims to provide the defender more practical instruments to determine the optimal level of security investment through the consideration of the attackers decision-making process.Chapter 1. Introduction 1 1.1 Research Background 1 1.1.1 The characteristics of a virtual society 1 1.1.2 Approaches to investigation of virtual society 3 1.2 Problem Statement 6 1.3 Approach and Conceptual Framework 10 1.4 Research Questions 15 1.5 Outlines of the study 17 Chapter 2. Literature Review 21 2.1 Research on the trust building in various context 21 2.1.1 Social dilemmas and the trust 21 2.1.2 Traditional and behavioral approaches of game theory 22 2.1.3 Trust concepts in various contexts 23 2.2 Mechanisms to develop trustworthy environment 26 2.2.1 Signaling game approaches 28 2.2.2 Prisoners dilemma game approaches 30 2.2.3 Trusted third party interventions 34 2.2.4 Private solutions by individual dimension 36 2.2.5 Other game theoretical approaches 38 2.3 Agent based simulation 38 Chapter 3. Trust Signaling Game as a Fundamental Rule of Transactions on the Internet Based Virtual Society 40 3.1 Introduction 40 3.2 Model Description 41 3.3 Equilibrium Analysis 45 3.3.1 Separating equilibrium 45 3.3.2 Pooling equilibrium 47 3.3.3 The existence condition of the equilibrium 50 3.3.4 The social optimality of the equilibrium 51 3.3.5 The continuous needs of costly signals 53 3.3.6 The dynamics of the trust equilibrium shifts 53 3.4 The Simulation and Results 54 3.4.1 The simulation overview 54 3.4.2 The simulation description 56 3.4.3 The simulation results 60 3.4.4 The comparison with equilibrium analysis 63 3.5 Conclusion and Discussion 63 Chapter 4. Balancing between Privacy Protection and Security Robustness 66 4.1 Introduction 66 4.2 Motivation and Related Works 68 4.2.1 Prisoners dilemma 68 4.2.2 Demerits of the reputation mechanism 70 4.3 Model Description 75 4.3.1 Game Design 78 4.3.2 Investment in privacy protection 82 4.3.3 Implications 85 4.4 Simulation 85 4.4.1 Simulation Architecture 86 4.4.2 Simulation Results 89 4.5 Model Validation and Adaptation 93 4.5.1 Robustness against unfair or biased ratings 93 4.5.2 Long-term accuracy of the trust level 94 4.5.3 Validation and Sensitivity test 98 4.6 Conclusion and Discussion 100 Chapter 5. Modeling the Defenders Strategic Decision Process in Security Investment 102 5.1 Introduction 102 5.2 Model 103 5.2.1 Motivation 103 5.2.2 Attackers behavior 106 5.2.3 Defenders behavior 110 5.3 Equilibrium Analysis 112 5.3.1 Simultaneous game 113 5.3.2 Sequential game 116 5.3.3 Comparison of the equilibriums 119 5.4 Comparative Static 120 5.5 Conclusion and Discussion 126 Chapter 6. Discussion and Policy Implication 131 6.1 Results Summary and Discussion 131 6.2 Contributions and Policy Implications 133 6.3 Future Research 136Docto

    Self-Optimizing Memory Controllers: A Reinforcement Learning Approach

    Full text link

    Operational Research IO2017, Valenรงa, Portugal, June 28-30

    Get PDF
    This proceedings book presents selected contributions from the XVIII Congress of APDIO (the Portuguese Association of Operational Research) held in Valenรงa on June 28โ€“30, 2017. Prepared by leading Portuguese and international researchers in the field of operations research, it covers a wide range of complex real-world applications of operations research methods using recent theoretical techniques, in order to narrow the gap between academic research and practical applications. Of particular interest are the applications of, nonlinear and mixed-integer programming, data envelopment analysis, clustering techniques, hybrid heuristics, supply chain management, and lot sizing and job scheduling problems. In most chapters, the problems, methods and methodologies described are complemented by supporting figures, tables and algorithms. The XVIII Congress of APDIO marked the 18th installment of the regular biannual meetings of APDIO โ€“ the Portuguese Association of Operational Research. The meetings bring together researchers, scholars and practitioners, as well as MSc and PhD students, working in the field of operations research to present and discuss their latest works. The main theme of the latest meeting was Operational Research Pro Bono. Given the breadth of topics covered, the book offers a valuable resource for all researchers, students and practitioners interested in the latest trends in this field.info:eu-repo/semantics/publishedVersio

    BNAIC 2008:Proceedings of BNAIC 2008, the twentieth Belgian-Dutch Artificial Intelligence Conference

    Get PDF

    A World-Class University-Industry Consortium for Wind Energy Research, Education, and Workforce Development: Final Technical Report

    Get PDF
    During the two-year project period, the consortium members have developed control algorithms for enhancing the reliability of wind turbine components. The consortium members have developed advanced operation and planning tools for accommodating the high penetration of variable wind energy. The consortium members have developed extensive education and research programs for educating the stakeholders on critical issues related to the wind energy research and development. In summary, The Consortium procured one utility-grade wind unit and two small wind units. Specifically, the Consortium procured a 1.5MW GE wind unit by working with the world leading wind energy developer, Invenergy, which is headquartered in Chicago, in September 2010. The Consortium also installed advanced instrumentation on the turbine and performed relevant turbine reliability studies. The site for the wind unit is Invenergyรƒร‚รƒร‚รƒร‚รƒร‚ยขรƒร‚รƒร‚รƒร‚รƒร‚รƒร‚รƒร‚รƒร‚รƒร‚s Grand Ridge wind farmin Illinois. The Consortium, by working with Viryd Technologies, installed an 8kW Viryd wind unit (the Lab Unit) at an engineering lab at IIT in September 2010 and an 8kW Viryd wind unit (the Field Unit) at the Stuart Field on IITรƒร‚รƒร‚รƒร‚รƒร‚ยขรƒร‚รƒร‚รƒร‚รƒร‚รƒร‚รƒร‚รƒร‚รƒร‚s main campus in July 2011, and performed relevant turbine reliability studies. The operation of the Field Unit is also monitored by the Phasor Measurement Unit (PMU) in the nearby Stuart Building. The Consortium commemorated the installations at the July 20, 2011 ribbon-cutting ceremony. The Consortiumรƒร‚รƒร‚รƒร‚รƒร‚ยขรƒร‚รƒร‚รƒร‚รƒร‚รƒร‚รƒร‚รƒร‚รƒร‚s researches on turbine reliability included (1) Predictive Analytics to Improve Wind Turbine Reliability; (2) Improve Wind Turbine Power Output and Reduce Dynamic Stress Loading Through Advanced Wind Sensing Technology; (3) Use High Magnetic Density Turbine Generator as Non-rare Earth Power Dense Alternative; (4) Survivable Operation of Three Phase AC Drives in Wind Generator Systems; (5) Localization of Wind Turbine Noise Sources Using a Compact Microphone Array; (6) Wind Turbine Acoustics - Numerical Studies; and (7) Performance of Wind Turbines in Rainy Conditions. The Consortiumรƒร‚รƒร‚รƒร‚รƒร‚ยขรƒร‚รƒร‚รƒร‚รƒร‚รƒร‚รƒร‚รƒร‚รƒร‚s researches on wind integration included (1) Analysis of 2030 Large-Scale Wind Energy Integration in the Eastern Interconnection; (2) Large-scale Analysis of 2018 Wind Energy Integration in the Eastern U.S. Interconnection; (3) Integration of Non-dispatchable Resources in Electricity Markets; (4) Integration of Wind Unit with Microgrid. The Consortiumรƒร‚รƒร‚รƒร‚รƒร‚ยขรƒร‚รƒร‚รƒร‚รƒร‚รƒร‚รƒร‚รƒร‚รƒร‚s education and outreach activities on wind energy included (1) Wind Energy Training Facility Development; (2) Wind Energy Course Development; (3) Wind Energy Outreach

    An investigation into the relationship between the leadership competencies, emotional intelligence, and leadership styles of Russian managers working for MNCs

    Get PDF
    This thesis was submitted for the degree of Doctor of Business Administration and awarded by Brunel University.The need for greater understanding of international leadership models has escalated in tandem with the globalization of trade and commerce. This dissertation presents the comparative-cultural study undertaken to address these two critical issues; employing the Russian Federation as the cultural context for the investigation. Cross-cultural research highlights a deficit of up-to-date comparative data on Russian organizational leadership, whilst practitioners articulate the demand for Russia-appropriate leadership development expertise. Increasingly, scholars advocate the application of integrated theories for assessing organizational leadership; contributing to several scholars updating trait theory into competency terms (including emotional competencies). Recent studies in the UK have established linkages amongst the competencies required for effective leadership, executivesโ€™ emotional competencies, and the demonstrated leadership styles of managers. This research extends these UK findings, investigating the possible relationship between the leadership competencies, Emotional Intelligence (EI), and leadership styles of Russian managers working within domestic and foreign MNCs. The researcher employed the Leadership Dimensions Questionnaire (LDQ) as the standardized measurement instrument for conducting this โ€œeticโ€ (comparative) study. The LDQ assesses managers based on 15 dimensions, representing cognitive (IQ), Emotional Intelligence (EQ), and managerial competencies (MQ); generating a leadership style โ€œprofileโ€ based on the respondentโ€™s scores. A combination of online and paper-based self-report versions of the LDQ (recently validated and utilized in several key UK studies) facilitated the data collection from the participating Russian managers (n = 152), over a 12- month period. Major findings of this research include: the identification of a clear leadership style preference by the Russian manager-sample (โ€œparticipativeโ€); statistically significant differences between the Russian and UK samples โ€“ on 14 of the 15 dimensions; distinctive differences in the competencies required for senior versus junior managers; โ€œcommunicationโ€ was predictive of Russian leader performance, whilst follower commitment was predicted by leadersโ€™ levels of โ€œsensitivityโ€ and โ€œcommunicationโ€. Contributions of this research to theory include: the identification of an up-to-date leadership profile of Russian managers, in competency terms, which can be compared with other cultures; a comparative cultural assessment of Russian managersโ€™ based on EI; a comparison of Russian managers at different levels of large companies, with special attention to their similarities and differences. Implications of this research for practitioners include: the ability for organizations operating in Russia to identify/develop leaders based on their personal leadership profiles (executive training and development), as assessed by the LDQ; the potential for identifying and fostering competencies required of managers at higher levels within the organization (promotion; as roles and responsibilities differ at various levels within an organization); the opportunity for matching appropriate leadership styles to conform with organizational strategies and the surrounding business environment (strategic leadership style/context fit)

    Reinforcement Learning

    Get PDF
    Brains rule the world, and brain-like computation is increasingly used in computers and electronic devices. Brain-like computation is about processing and interpreting data or directly putting forward and performing actions. Learning is a very important aspect. This book is on reinforcement learning which involves performing actions to achieve a goal. The first 11 chapters of this book describe and extend the scope of reinforcement learning. The remaining 11 chapters show that there is already wide usage in numerous fields. Reinforcement learning can tackle control tasks that are too complex for traditional, hand-designed, non-learning controllers. As learning computers can deal with technical complexities, the tasks of human operators remain to specify goals on increasingly higher levels. This book shows that reinforcement learning is a very dynamic area in terms of theory and applications and it shall stimulate and encourage new research in this field
    • โ€ฆ
    corecore