1,065 research outputs found

    An Extended Mean Field Game for Storage in Smart Grids

    Full text link
    We consider a stylized model for a power network with distributed local power generation and storage. This system is modeled as network connection a large number of nodes, where each node is characterized by a local electricity consumption, has a local electricity production (e.g. photovoltaic panels), and manages a local storage device. Depending on its instantaneous consumption and production rates as well as its storage management decision, each node may either buy or sell electricity, impacting the electricity spot price. The objective at each node is to minimize energy and storage costs by optimally controlling the storage device. In a non-cooperative game setting, we are led to the analysis of a non-zero sum stochastic game with NN players where the interaction takes place through the spot price mechanism. For an infinite number of agents, our model corresponds to an Extended Mean-Field Game (EMFG). In a linear quadratic setting, we obtain and explicit solution to the EMFG, we show that it provides an approximate Nash-equilibrium for NN-player game, and we compare this solution to the optimal strategy of a central planner.Comment: 27 pages, 5 figures. arXiv admin note: text overlap with arXiv:1607.02130 by other author

    The dynamic programming equation for the problem of optimal investment under capital gains taxes

    Get PDF
    This paper considers an extension of the Merton optimal investment problem to the case where the risky asset is subject to transaction costs and capital gains taxes. We derive the dynamic programming equation in the sense of constrained viscosity solutions. We next introduce a family of functions, which converges to our value function uniformly on compact subsets, and which is characterized as the unique constrained viscosity solution of an approximation of our dynamic programming equation. In particular, this result justifies the numerical results reported in the accompanying paper by the authors

    Modeling continuous-time financial markets with capital gains taxes

    Get PDF
    We formulate a model of continuous-time financial market consisting of a bank account with constant interest rate and one risky asset subject to capital gains taxes. We consider the problem of maximizing expected utility from future consumption in infinite horizon. This is the continuous-time version of the model introduced by Dammon, Spatt and Zhang [11]. The taxation rule is linear so that it allows for tax credits when capital gains losses are experienced. In this context, wash sales are optimal. Our main contribution is to derive lower and upper bounds on the value function in terms of the corresponding value in a tax-free and frictionless model. While the upper bound corresponds to the value function in a tax-free model, the lower bound is a consequence of wash sales. As an important implication of these bounds, we derive an explicit first order expansion of our value function for small interest rate and tax rate coefficients. In order to examine the accuracy of this approximation, we provide a characterization of the value function in terms of the associated dynamic programming equation, and we suggest a numerical approximation scheme based on finite differences and the Howard algorithm. The numerical results show that the first order Taylor expansion is reasonably accurate for reasonable market data

    Self-Modeling Based Diagnosis of Software-Defined Networks

    Full text link
    Networks built using SDN (Software-Defined Networks) and NFV (Network Functions Virtualization) approaches are expected to face several challenges such as scalability, robustness and resiliency. In this paper, we propose a self-modeling based diagnosis to enable resilient networks in the context of SDN and NFV. We focus on solving two major problems: On the one hand, we lack today of a model or template that describes the managed elements in the context of SDN and NFV. On the other hand, the highly dynamic networks enabled by the softwarisation require the generation at runtime of a diagnosis model from which the root causes can be identified. In this paper, we propose finer granular templates that do not only model network nodes but also their sub-components for a more detailed diagnosis suitable in the SDN and NFV context. In addition, we specify and validate a self-modeling based diagnosis using Bayesian Networks. This approach differs from the state of the art in the discovery of network and service dependencies at run-time and the building of the diagnosis model of any SDN infrastructure using our templates

    Generic Structural Features of Requestive Academic Emails

    Get PDF
    The aim of the present study is to analyze the generic structural features of requestive academic emails. For this purpose, 182 emails written by 81 Tunisian postgraduate students to their professor were analysed. The collected academic email messages share a main communicative function which is requesting. This study drew on the framework of genre analysis and employed the pattern of move schemata proposed by Swales (1990) and follows the typology suggested by Guffey (2010). The gathered emails are made up of the email’s subject line, an opening, body text and closing. The findings revealed that more than half of the subject lines of emails are either inappropriate, improper or do not exist. This shows that the participants are to some extent not able to write proper subject lines when addressing their professor however they did appear to pay attention to greetings in their emails. By examining the structure of the body of the gathered emails, it is noticed that postgraduate students tended to use the inductive style when emailing their professor. They do not go straight to the request. Instead, they go through some strategies (introduction, self-identification, apologizing, or reminding remarks, pre-request and request). The findings revealed that more than half of the emails either do not display perfect closings or do not display closings while the remaining emails are considered acceptable since they contain both greeting and the sender’s name. Accordingly, this study suggests some useful pedagogical implications. Tunisian EFL learners need to be supplemented with explicit instruction regarding teaching pragmatic issues concerning writing emails. The use of authentic materials in the context of pragmatics instruction is highly recommended Another practical method is to introduce and teach email writing guidelines and etiquettes so that Tunisian students can readily refer to them when writing emails. Keywords: structural features, request, email,  moves. DOI: 10.7176/JEP/10-19-03 Publication date:July 31st 201

    Analysis of Academic Email Requests Written by Tunisian Postgraduate Students

    Get PDF
    This study analyses how requests are written by a group of Tunisian postgraduate students to their professor via emails. The aim of the present study is to examine the email requests in terms of the degree of directness employed and seeks to find out whether the directness level of Tunisian postgraduate students e-requests varies with increasing the imposition of requests. Results prove the reliance of Tunisian postgraduate students on direct strategies when requesting their professor. This is manifested in the preference for direct questions and mood derivables in requests for information and expectation want and need statements for requests for action. The findings also reveal no significant differences between requests for information and requests for action concerning direct strategies and conventionally indirect requests. However, a significantly higher number of hints was found in non-conventionally indirect requests for requests for action. Tunisian postgraduate students realized their requests for information and requests for action with different request realizations, but they displayed a preference for directness in both types of requests. The preference for direct requests strategies may enhance a negative effect on their evaluation by their recipient. This suggests that Tunisian postgraduate students have not acquired enough pragmalinguistic and sociolinguistic knowledge to request appropriately socially superior persons. Accordingly, this study suggests some pedagogical implications and suggestions for Tunisian EFL (English as a Foreign Language) instructors. Henceforth, Tunisian teachers and syllabus designers should devote more attention to developing Tunisian EFL learners’ pragmatic competence through teaching L2 pragmatics. Keywords: e-requests, politeness, directness, ranking of imposition

    Trolls Identification within an Uncertain Framework

    Get PDF
    The web plays an important role in people's social lives since the emergence of Web 2.0. It facilitates the interaction between users, gives them the possibility to freely interact, share and collaborate through social networks, online communities forums, blogs, wikis and other online collaborative media. However, an other side of the web is negatively taken such as posting inflammatory messages. Thus, when dealing with the online communities forums, the managers seek to always enhance the performance of such platforms. In fact, to keep the serenity and prohibit the disturbance of the normal atmosphere, managers always try to novice users against these malicious persons by posting such message (DO NOT FEED TROLLS). But, this kind of warning is not enough to reduce this phenomenon. In this context we propose a new approach for detecting malicious people also called 'Trolls' in order to allow community managers to take their ability to post online. To be more realistic, our proposal is defined within an uncertain framework. Based on the assumption consisting on the trolls' integration in the successful discussion threads, we try to detect the presence of such malicious users. Indeed, this method is based on a conflict measure of the belief function theory applied between the different messages of the thread. In order to show the feasibility and the result of our approach, we test it in different simulated data.Comment: International Conference on Tools with Artificial Intelligence - ICTAI , Nov 2014, Limassol, Cypru
    • …
    corecore