Spelling suggestions: "subject:"ctility"" "subject:"abtility""
281 |
Essai sur la théorie de l'actualisation : utilité escomptée subjective et sensibilité à la variation / Essay on the discounting theory : subjective discounted utility and variation sensibilityRenault, Olivier 29 November 2013 (has links)
La thèse, intitulée « Essai sur la Théorie de l’Actualisation : Utilité Escomptée Subjective et Sensibilité à la Variation », s’inscrit dans le périmètre de recherche associé à la théorie de la décision intertemporelle et s’engage précisément dans deux sentiers qui ont été, jusqu’à présent, relativement peu exploités. D’une part, elle s’interroge sur la diversité observée – et modélisée – des mécanismes d’actualisation en cherchant à expliquer une telle diversité sur la base d’une structure comportementale unique (Partie I. Une investigation de l’actualisation). D’autre part, face à cette diversité croissante des mécanismes d’actualisation recensés, la thèse s’interroge sur la condition de cohérence temporelle en cherchant à caractériser des préférences temporelles cohérentes sur la base de la même structure comportementale définie dans la première partie (Partie II. Une investigation de la cohérence temporelle). / The thesis, entitled “Essay on the Discounting Theory: Subjective Discounted Utility and Variation Sensibility”, gathers a set of theoretical works related to Intertemporal Decision Theory. In particular, two unexploited fields are investigated. On one hand, the thesis explains the great heterogeneity in discounting by a single behavioral pattern called time perception. A general axiomatic model, the Subjective Discounted Utility, generalizes any Discounted Utility model by associating each discount mechanism to a unique time perception (Part I. An Investigation of Discounting). Many applications are dedicated to extreme time horizons. On the other hand, the Subjective Discounted Utility model is applied to a general study of time consistent preferences. Axiomatic conditions are defined on time preferences to characterize time consistent and time inconsistent preferences (Part II. An Investigation of Time Consistency).
|
282 |
Energy Efficiency Programs at All Utilities: An Analysis of the Factors that Lead Electric Utilities to Invest in Energy EfficiencyPletcher, Christopher J 01 January 2013 (has links) (PDF)
While the utilization of energy efficiency has grown in recent years, it has not been distributed evenly across the country. In some states, over 2% of a utility’s budget is spent on energy efficiency; in other states that number is 0. Much of the growth in energy efficiency has been due to state policies and the development utility-level energy efficiency programs. Yet, all utility programs are not created equal. Because they are often exempt from state regulation (and therefore state energy efficiency policy), publicly-owned utilities have traditionally lagged behind IOUs when it comes to EE programs.
This research quantifies energy efficiency programs in four Midwestern states: Iowa, Indiana, Michigan and Wisconsin. The first part of the thesis evaluates 474 electric utilities as to whether they had an energy efficiency program in 2010. The second part of the thesis evaluates each utility’s EE program spending in terms of energy and utility specific factors, as well as socio-economic, housing stock and political variables. Through descriptive statistical analysis and the creation of a predictable linear regression model, this thesis identifies relationships between the dependent variable (EE program spending as a % of a utility’s total revenue) and commonly cited barriers to EE program development.
Through the analysis, this study finds widespread EE program coverage in Iowa, Michigan and Wisconsin. Also, it finds states are the greatest predictor of utility energy efficiency program spending. A utility’s ownership type and the share of homes that heat with electricity are also significant predictors of program spending.
|
283 |
Integration of electricity cost saving interventions on a water distribution utility / Wynand Johannes Jacobus BreytenbachBreytenbach, Wynand Johannes Jacobus January 2014 (has links)
Electrical energy has become a very important and integrated part of the current era. Electricity cost saving interventions, such as load shifting, form part of demand side management (DSM) interventions. DSM interventions have been successfully implemented in the past to ensure reliable supply of electricity during the Eskom peak periods. It has been established that there is a need to implement an electricity cost saving intervention on a large water distribution utility.
This dissertation focuses on the integration of electricity cost saving interventions on a water distribution utility. An investigation methodology, as well as an integration strategy for implementing an electricity cost saving intervention were developed. This study expands on the importance of an integrated approach. It further discusses the shortcomings of the current control philosophies of a large water distribution utility in South Africa.
A load shifting project was implemented as an electricity cost saving intervention on a large water distribution utility in South Africa. The proposed integrated strategy was simulated and an optimised approach developed. It was found that the implementation of the strategy was limited due to process constraints and increasing water demand.
Utilising the large combined installed capacity of the pumps in the water distribution utility and the storage capacity, the strategy was implemented and cost savings obtained. It was concluded that load shifting was possible on individual pumping stations in the water distribution utility subsystems, and could, therefore, be quantified to an integrated approach. / MIng (Mechanical Engineering), North-West University, Potchefstroom Campus, 2015
|
284 |
Integration of electricity cost saving interventions on a water distribution utility / Wynand Johannes Jacobus BreytenbachBreytenbach, Wynand Johannes Jacobus January 2014 (has links)
Electrical energy has become a very important and integrated part of the current era. Electricity cost saving interventions, such as load shifting, form part of demand side management (DSM) interventions. DSM interventions have been successfully implemented in the past to ensure reliable supply of electricity during the Eskom peak periods. It has been established that there is a need to implement an electricity cost saving intervention on a large water distribution utility.
This dissertation focuses on the integration of electricity cost saving interventions on a water distribution utility. An investigation methodology, as well as an integration strategy for implementing an electricity cost saving intervention were developed. This study expands on the importance of an integrated approach. It further discusses the shortcomings of the current control philosophies of a large water distribution utility in South Africa.
A load shifting project was implemented as an electricity cost saving intervention on a large water distribution utility in South Africa. The proposed integrated strategy was simulated and an optimised approach developed. It was found that the implementation of the strategy was limited due to process constraints and increasing water demand.
Utilising the large combined installed capacity of the pumps in the water distribution utility and the storage capacity, the strategy was implemented and cost savings obtained. It was concluded that load shifting was possible on individual pumping stations in the water distribution utility subsystems, and could, therefore, be quantified to an integrated approach. / MIng (Mechanical Engineering), North-West University, Potchefstroom Campus, 2015
|
285 |
Militära ”mobil-appar” : Den militära nyttan med kommersiell teknik för militära ändamålHansson, Stefan January 2014 (has links)
The transformation of the Swedish Armed Forces is bringing about major changes in many areas. Indirect fire is one capability affected by these changes. Financial savings, a shrinking organization and higher eligibility requirements mean that fewer soldiers will gain access to exclusive high-tech support resources such as the JAS 39 Gripen aircraft and the ARCHER artillery system. This thesis aims to examine whether access to indirect fire capability can be increased through the use of civilian products and communication networks. Technology development in the civilian mobile communications area is exponential and nations such as the USA, facing challenges similar to those of the Swedish Armed Forces, devote substantial resources to research and development. Is the use of mobile phones for military purposes the innovation needed by the Swedish Armed Forces, do the necessary technical conditions exist and is the technology applicable during peace and wartime operations? The results indicate that the military use of commercial technology is too low at the moment, but that the technology itself sets no limits, and that there is a need and a demand to develop military mobile apps. The robustness of commercial networks does not meet Armed Forces’ requirements and the Armed Forces need a clear strategy that states the aims and objectives before procurement and implementation is possible. The results show further that, regardless of the challenges identified, there are good reasons to continue to pursue these issues in order to build up experience and knowledge in this area of technology. The development of civil mobile phone technology for military purposes will mean that there is an economically viable resource to use in the future.
|
286 |
Evaluating the security of anonymized big graph/structural dataJi, Shouling 27 May 2016 (has links)
We studied the security of anonymized big graph data. Our main contributions include: new De-Anonymization (DA) attacks, comprehensive anonymity, utility, and de-anonymizability quantifications, and a secure graph data publishing/sharing system SecGraph. New DA Attacks. We present two novel graph DA frameworks: cold start single-phase Optimization-based DA (ODA) and De-anonymizing Social-Attribute Graphs (De-SAG). Unlike existing seed-based DA attacks, ODA does not priori knowledge. In addition, ODA’s DA results can facilitate existing DA attacks by providing more seed information. De-SAG is the first attack that takes into account both graph structure and attribute information. Through extensive evaluations leveraging real world graph data, we validated the performance of both ODA and De-SAG. Graph Anonymity, Utility, and De-anonymizability Quantifications. We developed new techniques that enable comprehensive graph data anonymity, utility, and de-anonymizability evaluation. First, we proposed the first seed-free graph de-anonymizability quantification framework under a general data model which provides the theoretical foundation for seed-free SDA attacks. Second, we conducted the first seed-based quantification on the perfect and partial de-anonymizability of graph data. Our quantification closes the gap between seed-based DA practice and theory. Third, we conducted the first attribute-based anonymity analysis for Social-Attribute Graph (SAG) data. Our attribute-based anonymity analysis together with existing structure-based de-anonymizability quantifications provide data owners and researchers a more complete understanding of the privacy of graph data. Fourth, we conducted the first graph Anonymity-Utility-De-anonymity (AUD) correlation quantification and provided close-forms to explicitly demonstrate such correlation. Finally, based on our quantifications, we conducted large-scale evaluations leveraging 100+ real world graph datasets generated by various computer systems and services. Using the evaluations, we demonstrated the datasets’ anonymity, utility, and de-anonymizability, as well as the significance and validity of our quantifications. SecGraph. We designed, implemented, and evaluated the first uniform and open-source Secure Graph data publishing/sharing (SecGraph) system. SecGraph enables data owners and researchers to conduct accurate comparative studies of anonymization/DA techniques, and to comprehensively understand the resistance/vulnerability of existing or newly developed anonymization techniques, the effectiveness of existing or newly developed DA attacks, and graph and application utilities of anonymized data.
|
287 |
John Ruskin : conservative attitudes to the modern 1836-1860Williams, Michael A. January 1997 (has links)
I examine the way in which, in his work of the 1840s, Ruskin uses methods and assumptions derived from eighteenth-century Materialist, Mechanist and Vitalist Natural Philosophy, especially his assertion that the meanings which he reads into natural phenomena are objectively present and can be quantified, and the way in which therefore aesthetic concepts, responses and judgements can be quantified, and their values fixed. I examine the ways in which Ruskin seeks to demonstrate the relationship between the unity of Nature and the Multipilicity of Phenomena, not only as existing objectively in the external world, but also as reflected in the paintings of Turner. I suggest that his attempt at demonstration features a problematic relationship between his accounting for a material reality and the spiritual significances which he sees as immanent in it, and that resistance to the dynamism of contemporary industrial and social change is implicit in his celebration of an eternalised natural order. I examine four features of his correspondence during the 1840s: his dealings in the art market, his outright opposition to a number of modern developments, his urgent desires to see his favourite European architectural heritage preserved, and his strident xenophobia, and suggest relationships between the last two and his resistance to the modern. I examine the shift in his interests in the 1840s and 1850s from Nature and Art to Architecture and Man, and thence to Political Economy, and examine available accounts which rely too heavily on references to his psychological development, or on his claims to regular epiphanies, or on a significant shift in focus which can be explained by revealing the internal continuities in his work. I conclude with an attempt to demonstrate that what I have called the "broad sweep" approach obscures the confusions and contradictions in his position in the late 1840s and 1850s, and suggest that his social and intellectual inheritance, which is of a highly conservative and unremittingly paternalistic nature, crucially limits his work as ~ social critic. I offer three appendices: on the problem of the relationship between the Unity of Nature and the Multiplicity of Phenomena as that had been addressed in the Natural Philosophy on whose assumptions Ruskin draws; on eighteenth century Materialist, Mechanist and Vitalist theories of matter; and on the work of Edmund Burke and Sir Charles Bell.
|
288 |
Are You Smarter than an Ostrich: Does “Skin in the Game” Influence an Investor’s Portfolio Monitoring Behavior?Liu, Iris 01 January 2016 (has links)
Abstract
In this paper, we examine the behavior of subjects in a mock financial investment experiment to investigate the effects of “skin in the game” and ego utility on hedonic information acquisition decisions. We observe how often subjects “check” their portfolios after given general market returns, and whether conditions impact the existence and magnitude of the ostrich effect – the tendency to avoid information expected to be negative. When considering these experiment conditions as well as subject sex, risk aversion, curiosity, financial literacy and investing experience, we do not find an ostrich effect. We do find that females check their portfolios more often on average than males. Finally, we find that risk-averse people will check their portfolios more often, regardless of market returns or sex.
|
289 |
Distributed intelligent system for on-line fault section estimation oflarge-scale power networks畢天姝, Bi, Tianshu. January 2002 (has links)
published_or_final_version / Electrical and Electronic Engineering / Doctoral / Doctor of Philosophy
|
290 |
How are Electric Utilities Responding to the Impact of Renewables? Exploring an Integrative Approach to Ambidextrous Business BehaviorCasey, Robert T, Jr 03 May 2015 (has links)
In the U.S., clean energy goals and the move towards a clean energy economy are causing the electric power sector to add emerging and innovative renewable energy resources into their generation mix. Electric utilities (EU) face a monumental challenge to create, deliver, and capture value from emerging and disruptive technologies. This study seeks to address the impact of solar photovoltaics on the EU market by investigating the role of business model changes within the domain of urban and rural U.S. electric utility organizations. By integrating the evolving EU business model with the Competing Values Framework (CVF), a new lens is created to assess the changing and evolving business behavior within the EU industry. Furthermore, a predictive and prescriptive tool emerges associated with organizational ambidexterity (OA). Finally, four lessons are presented that will help EU leaders become more anticipatory, adaptable, and responsive in this changing renewable environment.
|
Page generated in 0.0304 seconds