Purpose - The purpose of this paper is to propose a quantitative methodology for the identification of the causal relationships between strategic objectives in a strategy map of a balanced scorecard. This is done to f...
详细信息
Purpose - The purpose of this paper is to propose a quantitative methodology for the identification of the causal relationships between strategic objectives in a strategy map of a balanced scorecard. This is done to face the possible weaknesses described in the literature regarding the causal links and the difficulty in validating the relationships. Design/methodology/approach - The proposed method combines the multi-criteria decision-making method called decision-making trial and evaluation laboratory (DEMATEL) and an optimization model. DEMATEL is used to establish the importance of the strategic relations between strategic objectives, and the optimization model is used to find the relations that are more "important" and should be included in the strategy map. The method was created by reviewing the existing literature, modeling the problem, and applying it in a company. Findings - The most important results of applying this methodological design include that the proposed method maintains the BSC classical structure;it also enables the generation of several alternatives to support the decision-making process in terms of strategic objectives for a better organizational performance. Practical implications - The method facilitates the decision-making process by presenting several alternatives of strategy maps according to different levels of organizational criteria. In fact, these alternatives help the organization in focusing on the most important aspects of the strategy map. Consequently, managers may identify where to pay more attention and resources in order to achieve the most important objectives of the company. Hence, this method, as a support for decision makers, enables (and requires) the active participation of senior managers and any kind of decision makers in creating and valuating objectives, relations, constraints, importance, and parameters of the optimization model. Originality/value - DEMATEL has been used to design strategy maps. The contribution of
Distributed computing has turned into a reality which is capable of empowering overall population and associations to make utilization of colossal computational assets without capital interest in pay per utilize form....
详细信息
ISBN:
(纸本)9781509061358
Distributed computing has turned into a reality which is capable of empowering overall population and associations to make utilization of colossal computational assets without capital interest in pay per utilize form. This new worldview permits clients who have so much computational assets to outsource their costly workloads related to computation which is in return connected to cloud as well as obtain advantages of its stockpiling, servers, organizing and a few offices. In this manner distributed computing has endless conceivable outcomes as a result a person could realize a global standard foundation and offices in her own PC sans venture. In spite of the fact that cloud specialist organizations deal with security client have their own worries regarding insurance of their touchy information. Along these lines, it is groundbreaking to have secure system to ensure information of clients furthermore guarantee the information respectability. This will empower clients to outsource their works courageously. This proposed framework concentrates on the linear programming calculations that happen over cloud with excellent security. Keeping in mind the eventually goal is to accomplish reasonable effectiveness, our system configuration unequivocally separate the linear programming (LP) computation outsourcing into open LP solvers functioning on the cloud as well as private LP parameters possessed by the client. The subsequent adaptability permits us to observe fitting security tradeoff by means of larger amount deliberation LP calculations than the general circuit representation. Furthermore for keep up information protection in cloud we utilize blow fish and picture based one-time secret password. It is likewise found that the outcome confirmation of the framework is computationally proficient does not acquire extra charge.
In this paper we present the use of linear programming to systematically create control software for choreographed UAVs. This application requires the control of multiple UAVs where each UAV follows a predefined traje...
详细信息
ISBN:
(纸本)9781509044948
In this paper we present the use of linear programming to systematically create control software for choreographed UAVs. This application requires the control of multiple UAVs where each UAV follows a predefined trajectory while simultaneously maintaining safety properties, such as keeping a safe distance between each other and geofencing. Modeling and incorporating safety requirements into the movement behavior of UAVs is the main motivation of our research. First, we describe an approach where the movement behavior of each UAV is formulated as a linear program. Second, we compare and analyze two different modeling techniques to implement the safe distance and geofencing requirements. Our approach was validated by doing experiments with Parrot Bebop UAVs. Besides being tested in the laboratory, our approach was validated in real life conditions in more than 30 performances of a dance show where five UAVs perform choreographed movements as part of the show introduction.
Security of Smart Grid is the main issue in power sector. The power sector is highly vulnerable to cyber physical attack as it uses modern infrastructure and communication devices. The Security of power system demands...
详细信息
ISBN:
(纸本)9781509059607
Security of Smart Grid is the main issue in power sector. The power sector is highly vulnerable to cyber physical attack as it uses modern infrastructure and communication devices. The Security of power system demands that the real time operation of power system should not be affected under occurrence of events. Contingency or outage of transmission line is one of the major events occurring in the power system. This paper presents that, on the basis of residue we can distinguished between False Data Injection Attack (FDIA) and Contingency. linear programming method of state estimation is being used to find best estimates. Residues calculated under Contingency and attack are calculated and compared.
Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security gam...
详细信息
ISBN:
(纸本)9781538626405
Game theory has been used over the years in areas involving competition such as marketing, auction, gambling etc. The concept of game theory has found application in security domains and is usually called security games. This paper proposes a linear programming model for solving a game problem that involves the interaction of an attacker (zombie) and a defender (firewall) during a distributed denial of service attack (DDoS). It also presents two algorithms that are used to form the mitigation perimeter firewall against DDoS attack on web servers (Anti-DDoS firewall). In a DDoS attack scenario, the players (zombie and firewall) are competing for greater share of a resource of the network An attack occurs when the zombies flood the link in such a way that legitimate users are denied access to a target resource on the network This paper presents a game model solved using linear programming that provides the best strategy for the defender by reducing rogue packets that seek to flood the bandwidth of the network Our model is validated using defined numbers in the pay-off matrix. Solving the matrix using the model approach shows that both the row and the column sum equal one. The output of the model presents probabilistic values that are related to specific actions to be taken by the defender. Two mitigation scripts where presented that makes use of maximum number of connection and sending rate to monitor traffic targeting the web port 80/443. It is clearly observed from extensive simulation on a test bed that using linear programming to model the network behavior and setting the mitigation script with the highest value of the game matrix solution, a better pay-off is obtained by the firewall.
The fully connected conditional random field (CRF) with Gaussian pairwise potentials has proven popular and effective for multi-class semantic segmentation. While the energy of a dense CRF can be minimized accurately ...
详细信息
ISBN:
(纸本)9781538604571
The fully connected conditional random field (CRF) with Gaussian pairwise potentials has proven popular and effective for multi-class semantic segmentation. While the energy of a dense CRF can be minimized accurately using a linear programming (LP) relaxation, the state-of-the-art algorithm is too slow to be useful in practice. To alleviate this deficiency, we introduce an efficient LP minimization algorithm for dense CRFs. To this end, we develop a proximal minimization framework, where the dual of each proximal problem is optimized via block coordinate descent. We show that each block of variables can be efficiently optimized. Specifically, for one block, the problem decomposes into significantly smaller subproblems, each of which is defined over a single pixel. For the other block, the problem is optimized via conditional gradient descent. This has two advantages: 1) the conditional gradient can be computed in a time linear in the number of pixels and labels;and 2) the optimal step size can be computed analytically. Our experiments on standard datasets provide compelling evidence that our approach outperforms all existing baselines including the previous LP based approach for dense CRFs.
We consider the infinite dimensional linear programming (inf-LP) approach for solving stochastic control problems. The inf-LP corresponding to problems with uncountable state and input spaces is in general computation...
详细信息
We consider the infinite dimensional linear programming (inf-LP) approach for solving stochastic control problems. The inf-LP corresponding to problems with uncountable state and input spaces is in general computationally intractable. By focusing on linear systems with quadratic cost (LQG), we establish a connection between this approach and the well-known Riccati LMIs. In particular, we show that the semidefinite programs known for the LQG problem can be derived from the pair of primal and dual inf-LPs. Furthermore, we establish a connection between multi-objective and chance constraint criteria and the inf-LP formulation. (C) 2017, IFAC (International Federation of Automatic Control) Hosting by Elsevier Ltd. All rights reserved.
This paper presents a spatial-based trajectory planning method for automated vehicles under actuator, obstacle avoidance, and vehicle dimension constraints. Starting from a nonlinear kinematic bicycle model, vehicle d...
详细信息
ISBN:
(纸本)9781538615263
This paper presents a spatial-based trajectory planning method for automated vehicles under actuator, obstacle avoidance, and vehicle dimension constraints. Starting from a nonlinear kinematic bicycle model, vehicle dynamics are transformed to a road-aligned coordinate frame with path along the road centerline replacing time as the dependent variable. Space-varying vehicle dimension constraints are linearized around a reference path to pose convex optimization problems. Such constraints do not require to inflate obstacles by safety-margins and therefore maximize performance in very constrained environments. A sequential linear programming (SLP) algorithm is motivated. A linear program (LP) is solved at each SLP-iteration. The relation between LP formulation and maximum admissible traveling speeds within vehicle tire friction limits is discussed. The proposed method is evaluated in a roomy and in a tight maneuvering driving scenario, whereby a comparison to a semi-analytical clothoid-based path planner is given. Effectiveness is demonstrated particularly for very constrained environments, requiring to account for constraints and planning over the entire obstacle constellation space.
An operation technology for effectively using regenerative braking is delayed-departure control in which an operator delays the departure time of a train to match the predicted arrival time of another train. A method ...
详细信息
ISBN:
(纸本)9781538604694
An operation technology for effectively using regenerative braking is delayed-departure control in which an operator delays the departure time of a train to match the predicted arrival time of another train. A method for real-time rescheduling with delayed-departure control is proposed that uses two metrics based on the overlap of train run-curves and that divides the timetable into shorter time periods. This division eliminates the effect of delay propagation so that train pairing can be optimized among n departing trains and m arriving trains by using linear programming. A train-pair candidate is searched for at nearby locations under timedependent constraints. Testing using real data for a 5-min timetable demonstrated that a rescheduled timetable with delayed departures can be calculated within 2 s, which satisfies the requirement for real-time operation.
The problem of assigning business students to program majors in a Middle Eastern College is considered in this study. An important characteristic that usually appears in this problem is a high variation in the demand ...
详细信息
ISBN:
(纸本)9781538609484
The problem of assigning business students to program majors in a Middle Eastern College is considered in this study. An important characteristic that usually appears in this problem is a high variation in the demand for different programs. The allocation method currently used by the College is evaluated, in terms of overall satisfaction of student program preferences, by comparison with optimal allocations obtained from a linear programming formulation. The evaluation demonstrates the current method to be effective in assigning high-GPA students to their first choice programs, yet mediocre in overall satisfaction of the student preferences. Consequently, a hybrid approach that combines the current method with a linear programming model is proposed and analyzed. The results show that the hybridized method provides a solution that successfully integrates the strengths of the LP solution with the currently used method.
暂无评论