Spelling suggestions: "subject:"bounded"" "subject:"abounded""
171 |
Graph Theoretical Modelling of Electrical Distribution GridsKohler, Iris 01 June 2021 (has links) (PDF)
This thesis deals with the applications of graph theory towards the electrical distribution networks that transmit electricity from the generators that produce it and the consumers that use it. Specifically, we establish the substation and bus network as graph theoretical models for this major piece of electrical infrastructure. We also generate substation and bus networks for a wide range of existing data from both synthetic and real grids and show several properties of these graphs, such as density, degeneracy, and planarity. We also motivate future research into the definition of a graph family containing bus and substation networks and the classification of that family as having polynomial expansion.
|
172 |
Experimental Investigation of Drag Reduction by Trailing Edge Tabs on a Square Based Bluff Body in Ground EffectSawyer, Scott R 01 May 2015 (has links) (PDF)
This thesis presents an experimental investigation of drag reduction devices on a bluff body in ground effect. It has previously been shown that the addition of end-plate tabs to a rectangular based bluff body with an aspect ratio of 4 is effective in eliminating vortex shedding and reducing drag for low Reynolds number flows. In the present study a square based bluff body, both with and without tabs, will be tested under the same conditions, except this time operating within proximity to a ground plane in order to mimic the properties of bounded aerodynamics that would be present for a body in ground effect.
|
173 |
Assumption-Based Runtime Verification of Finite- and Infinite-State SystemsTian, Chun 23 November 2022 (has links)
Runtime Verification (RV) is usually considered as a lightweight automatic verification technique for the dynamic analysis of systems, where a monitor observes executions produced by a system and analyzes its executions against a formal specification. If the monitor were synthesized, in addition to the monitoring specification, also from extra assumptions on the system behavior (typically described by a model as transition systems), then it may output more precise verdicts or even be predictive, meanwhile it may no longer be lightweight, since monitoring under assumptions has the same computation complexity with model checking. When suitable assumptions come into play, the monitor may also support partial observability, where non-observable variables in the specification can be inferred from observables, either present or historical ones. Furthermore, the monitors are resettable, i.e. being able to evaluate the specification at non-initial time of the executions while keeping memories of the input history. This helps in breaking the monotonicity of monitors, which, after reaching conclusive verdicts, can still change its future outputs by resetting its reference time. The combination of the above three characteristics (assumptions, partial observability and resets) in the monitor synthesis is called the Assumption-Based Runtime Verification, or ABRV. In this thesis, we give the formalism of the ABRV approach and a group of monitoring algorithms based on specifications expressed in Linear Temporal Logic with both future and past operators, involving Boolean and possibly other types of variables. When all involved variables have finite domain, the monitors can be synthesized as finite-state machines implemented by Binary Decision Diagrams. With infinite-domain variables, the infinite-state monitors are based on satisfiability modulo theories, first-order quantifier elimination and various model checking techniques. In particular, Bounded Model Checking is modified to do its work incrementally for efficiently obtaining inconclusive verdicts, before IC3-based model checkers get involved. All the monitoring algorithms in this thesis are implemented in a tool called NuRV. NuRV support online and offline monitoring, and can also generate standalone monitor code in various programming languages. In particular, monitors can be synthesized as SMV models, whose behavior correctness and some other properties can be further verified by model checking.
|
174 |
Examining Bounded Rationality Influences on Decisions Concerning Information Security : A Study That Connects Bounded Rationality and Information SecurityMalm Wiklund, Oskar, Larsson, Caroline January 2024 (has links)
This study investigates the impact of bounded rationality on information security decisions in public Swedish authorities. The research addresses how cognitive limitations and organizational dynamics shape decisions in this area. Utilizing qualitative research methods, in-depth interviews and document analysis, the study provides nuanced insights into decision-making processes. A thematic analysis identifies six recurring themes influencing decision-making: Awareness & Knowledge, Individual Characteristics, Organizational Culture & Behavioral Patterns, Organization & Execution, Regulatory Frameworks & Management, Responsibility & Obligation. The findings reveal significant influences and barriers in implementing effective security strategies, making a theoretical contribution to information security management in public sectors. This research highlights the importance of understanding human behavior in information security, offering insights to shape strategic directions for policy and practical implementation to enhance organizational and national cybersecurity resilience.
|
175 |
Resource-Bounded Information Acquisition and LearningKanani, Pallika H 01 May 2012 (has links)
In many scenarios it is desirable to augment existing data with information acquired from an external source. For example, information from the Web can be used to fill missing values in a database or to correct errors. In many machine learning and data mining scenarios, acquiring additional feature values can lead to improved data quality and accuracy. However, there is often a cost associated with such information acquisition, and we typically need to operate under limited resources. In this thesis, I explore different aspects of Resource-bounded Information Acquisition and Learning.
The process of acquiring information from an external source involves multiple steps, such as deciding what subset of information to obtain, locating the documents that contain the required information, acquiring relevant documents, extracting the specific piece of information, and combining it with existing information to make useful decisions. The problem of Resource-bounded Information Acquisition (RBIA) involves saving resources at each stage of the information acquisition process. I explore four special cases of the RBIA problem, propose general principles for efficiently acquiring external information in real-world domains, and demonstrate their effectiveness using extensive experiments. For example, in some of these domains I show how interdependency between fields or records in the data can also be exploited to achieve cost reduction. Finally, I propose a general framework for RBIA, that takes into account the state of the database at each point of time, dynamically adapts to the results of all the steps in the acquisition process so far, as well as the properties of each step, and carries them out striving to acquire most information with least amount resources.
|
176 |
Numerical Investigation of High-Speed Wall-Bounded Turbulence Subject to Complex Wall ImpedanceYongkai Chen (14253383) 15 December 2022 (has links)
<p>Laminar or turbulent flows over porous surfaces have received extensive attention in the past few decades, due to their potential to achieve passive flow controls. These surfaces either in natural exhibit roughness or are engineered in purpose, and usually entail special features such as increasing/reducing surface drags. An increasing interest has arisen in the interaction between these surfaces and high-speed compressible flows, which could inform the next-level flow control studies at supersonic and hypersonic speeds for the designs of high-speed vehicles. In this dissertation, the interaction between high-speed compressible turbulent flows and acoustically permeable surface is investigated. The surface property is modeled via the Time-Domain Impedance Boundary Condition (TDIBC), which avoids the inclusion of the geometric details in the numerical simulations.</p>
<p>We first perform Large-Eddy Simulations of compressible turbulent channel flows over one impedance wall for three bulk Mach numbers:Mb = 1.5, 3.5 and 6.0. The bulk Reynolds number Reb is tuned to achieve similar viscous Reynolds number Re∗τ ≈ 220 across all Mb to ensure a nearly common state of near-wall turbulence structures over impermeable walls. The TDIBC based on the auxiliary differential equations (ADE) method is applied to bottom wall of the channel. A three-parameter complex impedance model with a resonating frequency tuned to the large-eddy turn-over frequency of the flow is adopted. With a sufficiently high permeability, a streamwise traveling instability wave that is confined in nature and that increases the surface drag, is observed in the near-wall region and changes the local turbulent events. As a result, the first and second order mean flow statistics are found to deviate from that of a flow over impermeable walls. We then perform a linear stability analysis using a turbulent background base flow and confirm that the instability wave is triggered by a sufficiently high permeability and manifests a confined nature. The critical resistance Rcr (interpreted as the inverse of the permeability), above which the instability is suppressed, is found to be sub-linearly proportional to the bulk Mach number Mb, indicating less permeability required to trigger the instability in high Mach number flows.</p>
<p>Due to the extremely high computational cost in high Mach number wall-bounded flow calculations, the next-phase optimization/flow control design using the porous surface becomes unaffordable. An ’economical’ flow setup that can server the purpose of rapid flow generation would greatly benefit the planned research. For such reason, we carry out a study about the effect of the domain size on the near-wall turbulence structures in compressible turbulent channel flows, to identify such type of flow setup. Apart from the concept of minimal flow units (MFU, as in the literature) entailing a minimal domain size required for near-wall turbulence to be sustained, efforts have also been made to identify a range of the domain size that can sustain both the inner and outer layer turbulence, and lead to only small deviations in mean flow statistics from the baseline data, which herein defined as minimal turbulent channel (MTC). The motivation of proposing the concept of MTC is to provide a computationally efficient setup for the rapid generation of near-wall turbulence with minimal compromise on the fidelity of the simulated field for investigations requiring numerous simulations, such as machine learning, flow control/optimization designs. It is found that the mean flow statistics from a computational domain spanning 700 − 1100 and 230 − 280 local viscous units in streamwise and spanwise directions, respectively, agree reasonably well with the reference calculations of all three Mach numbers under investigation, and are thus identified as the range in which the MTC stays. The large scale near-wall turbulence structures observed in full scale DNS simulations, and their spatially coherent connections, are roughly preserved in MTC, indicated by the existence of the grouped streamwise aligned hairpin vortices of various sizes and the resulted patterns of uniform momentum zones and thermal zones in the instantaneous flow field. In an MTC, the energy transfer paths among the kinetic energy of the mean field, turbulent kinetic energy and mean internal energy are slightly modified, with the most significant change observed in the viscous dissipation. The mean wall-shear stress and mean wall heat flux see less than 5% error as compared to the full scale simulations. Such reduced-order flow setup requires less than 3% of the computational resource as compared to the full scale simulations.</p>
|
177 |
Methodological Foundations for Bounded Rationality as a Primary FrameworkModarres-Mousavi, Shabnam 10 January 2003 (has links)
Experimental observations have shown that economic agents behave in ways different from the maximization of any utility function. Herbert Simon sought to deal with this by positing that individuals do not maximize, but rather "satisfice." This was a radical departure from the traditional economic framework, and one that still has not been adequately formalized. But Simon's suggestion is only the smallest part of what is needed for a theory that reflects the actual behavior. For instance, Simon's framework cannot deal with the observation that the act of choice changes the chooser. This dissertation is further developing Simon's original ideas through embracing John Dewey's transactional thinking to attain an adequate theory of economic choice that accounts for boundedly rational agents.
I clarify that substantive rationality and bounded (procedural) rationality share the same basic utilitarian assumption of predetermined goals. In terms of a Deweyan (transactional) analysis, the idea of utilitarian "optimization" ultimately guides and constrains both theories. But empirical study of choice behavior and the behavior of subjects in experimental laboratories, both indicate that neither substantive nor procedural rationality can effectively account for actual economic choices.
I emphasize the importance of treating bounded rationality without reference to the rational framework. To me, bounded rationality implies a realistic picture of behavior, which is associated with emerging goals and not ones that exist prior to the making of a choice. I consider uncertainty as a normal characteristic of the situation, which in turn allows consideration of acting based on inconsistent information, just as people actually do. The basis of a systematic approach to behavior that can capture inconsistency is developed by Tom Burke. He mathematizes Dewey's logic. He allows for impossible worlds in the set of states. Thus, not only can the initial state space hold inconsistent states, the information set can include mutually inconsistent elements.
So the current neoclassical paradigm resembles the representative realism, but is there any good reason why we should accept this methodology as economists? Whatever one's ultimate metaphysics and epistemology, I want to show that an alternative approach to economic decision-making may prove highly useful in theory and practice. / Ph. D.
|
178 |
A Test of Bounded Generalized Reciprocity and Social Identity Theory in a Social Video Game Play ContextVelez, John A. 21 July 2014 (has links)
No description available.
|
179 |
Quasi-isometries of graph manifolds do not preserve non-positive curvatureNicol, Andrew 15 October 2014 (has links)
No description available.
|
180 |
Computational Methods for Control of Queueing Models in Bounded DomainsMenéndez Gómez, José María 17 June 2007 (has links)
The study of stochastic queueing networks is quite important due to the many applications including transportation, telecommunication, and manufacturing industries. Since there is often no explicit solution to these types of control problems, numerical methods are needed. Following the method of Boué-Dupuis, we use a Dynamic Programming approach of optimization on a controlled Markov Chain that simulates the behavior of a fluid limit of the original process. The search for an optimal control in this case involves a Skorokhod problem to describe the dynamics on the boundary of closed, convex domain. Using relaxed stochastic controls we show that the approximating numerical solution converges to the actual solution as the size of the mesh in the discretized state space goes to zero, and illustrate with an example. / Ph. D.
|
Page generated in 0.0315 seconds