240 research outputs found

    Third Party Access pricing to the network, secondary capacity market and economic optimum : the case of natural gas

    Get PDF
    The gas deregulation process implies crucial choices concerning access to transportation networks. These choices deal with the nature, the structure and the level of access fees. This paper proposes an evaluation of different systems implemented both in Europe and North America, in relation to normative pricing references. The rules according to which shippers can buy or sell capacity represent another kind of choice that Regulators have to make. This paper proposes a simple model which demonstrates that secondary market prices should not be subject to a cap and emphasizes the need of a 'use-it-or-lose-it' rule on this market.DEREGLEMENTATION; INVESTISSEMENT; OPTION REELLE; FINANCEMENT OPTIMAL; PRIX DE REVIENT; ELECTRICITE

    La dérégulation de l'industrie électrique en Europe et aux Etats-Unis : un processus de décomposition-recomposition

    Get PDF
    The deregulation of electric industry in Europe and in the U.S.A. assumes various aspects according to each country. Several institutionnal, economic and political reasons explain this evolution. Electric firms take this opportunity to merge and to implement offensive strategies on global markets. A lot of questions remains unsolved, in particular the problem of TPA pricing and the problem of planning of network infrastructures over the long run.ELECTRIC INDUSTRY ; DEREGULATION ; ENERGY PRICING ; PUBLIC UTILITIES

    Towards a Rule-level Verification Framework for Property-Preserving Graph Transformations

    Get PDF
    International audienceWe report in this paper a method for proving that a graph transformation is property-preserving. Our approach uses a relational representation for graph grammar and a logical representation for graph properties with first-order logic formulas. The presented work consists in identifying the general conditions for a graph grammar to preserve graph properties, in particular structural properties. We aim to implement all the relevant notions of graph grammar in the Isabelle/HOL proof assistant in order to allow a (semi) automatic verification of graph transformation with a reasonable complexity. Given an input graph and a set of graph transformation rules, we can use mathematical induction strategies to verify statically if the transformation preserves a particular property of the initial graph. The main highlight of our approach is that such a verification is done without calculating the resulting graph and thus without using a transformation engine

    A Modeling and Formal Approach for the Precise Specification of Security Patterns

    Get PDF
    International audienceNon-functional requirements such as Security and Dependability (S &D) become more important as well as more difficult to achieve. In fact, the integration of security features requires the availability of both application domain specific knowledge and security expertise at the same time. Hence, capturing and providing this expertise by the way of security patterns can support the integration of S&D features by design to foster reuse during the process of software system development.The solution envisaged here is based on combining metamodeling techniques and formal methods to represent security pattern at two levels of abstraction fostering reuse during the process of pattern development and during the process of pattern-based development. The contribution of this work is twofold: (1) An improvement of our previous pattern modeling language for representing security pattern in the form of a subsystem providing appropriate interfaces and targeting security properties, (2) Formal specification and validation of pattern properties, using the interactive Isabelle/HOL proof assistant. The resulting validation artifacts may mainly complete the definitions, and provide semantics for the interfaces and the properties in the context of S&D. As a result, validated patterns will be used as bricks to build applications through a Model-Driven engineering approach

    Deep neural networks for inverse problems in mesoscopic physics: Characterization of the disorder configuration from quantum transport properties

    Full text link
    We present a machine learning approach that allows to characterize the disorder potential of a two-dimensional electronic system from its quantum transport properties. Numerically simulated transport data for a large number of disorder configurations is used for the training of artificial neural networks. We show that the trained networks are able to recognize details of the disorder potential of an unknown sample from its transport properties, and that they can even reconstruct the complete potential landscape seen by the electrons.Comment: 12 pages, 11 figure

    Integrating verifiable Assume/Guarantee contracts in UML/SysML

    Get PDF
    International audienceThe compositional approach based on components and driven by requirements is a common method used in the development of critical real-time embedded systems. Since the satisfaction of a requirement is subject to the composition of several components, defining abstract and partial behaviors for components with respect to the point of view of the requirement allows for a manageable design of systems. In this paper we consider such specifications in the form of contracts. A contract for a component is a pair (assumption, guarantee) where the assumption is an abstraction of the component's environment behavior and the guarantee is an abstraction of the component's behavior given that the environment behaves like the assumption. In previous work we have defined a formal contract-based theory for Timed Input/Output Automata with the aim of using it to express the semantics of UML/SysML models. In this paper we propose an extension of the UML/SysML language with a syntax and semantics for contracts and for the relations they must satisfy. Besides the important role that contracts have in design, they can also be used for the verification of requirement satisfaction and for their traceability

    Bad smells in design and design patterns

    Get PDF
    International audienceTo give a consistent and more valuable property on models, model-driven processes should be able to reuse the expert knowledge generally expressed in terms of patterns. We focus our work on the design stage and on the systematically use of design patterns. Choose a good design pattern and ensure the correct integration of the chosen pattern are non trivial for a designer who wants to use them. To help designers, we propose design inspection in order to detect “bad smells in design” and models reworking through use of design patterns. The automatic detection and the explanation of the misconceptions are performed thanks to spoiled patterns. A “spoiled pattern” is a pattern which allows to instantiate inadequate solutions for a given problem: requirements are respected, but architecture is improvable
    • 

    corecore