922 resultados para Profit.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, the complex faulted-block oil reservoir of Xinzhen area in Dongying depression is systematically studied from basic conditions forming faulted-block oil and gas reservoir integrating geology, seismic, logging and reservoir engineering information and computer; guided by petroleum geology, geomechanics, structural geology and geophysics and other theories. Based on analysis of background condition such as regional strata, structure and petroleum geology, structural research on geometry, kinemaitcs and dynamics, oil-controlling fault research on the seal features, sealing mechanism and sealing pattern, and research on enrichment rules and controlling factors of complex faulted-block oil reservoir are carried out to give out the formation mechanics of oil reservoir of Xinzhen complex faulted-block oil reservoir. As a result, the reservoir formation pattern is established. At the same time, through dissecting the characteristics and hydrocarbon enrichment law of complex faulted-block oil reservoir, and studying its distribution law of remaining oil after entering extra high water-cut period, a set of technologies are formed to predict complex faulted-block oil reservoir and its remaining oil distribution and to enhance oil recovery (EOR). Based on the time relationship between migration of hydrocarbon and trap formation, accumulating period of Xinzhen oil reservoir is determined. The formation of Xinzhen anticlinal trap was prior to the primary migration. This is favorable to formation of Xinzhen anticlinal hydrocarbon reservoir. Meanwhile, because anticline top caving isn't at the sane time as that of moving or faulted-trap forming inner anticline, oil and gas migrated many times and Xinzhen complex faulted-block oil reservoir formed from ES_3~(upper) to EG. Accumulating law and controlling factors of complex faulted-block reservoir are analyzed from many aspects such as regional structure background controlling hydrocarbon accumulating, plastic arch-open structure controlling oil-bearing series and reservoir types, sealing-opening of fault controlling hydrocarbon distribution and structure pattern controlling enriched trap types. Also, we established the structure pattern in Xinzhen a'ea: the arch-open of underlying strata cause expanding fracture. The main block groups developed here are shovel-like normal fault block group in the north area of Xinzhen and its associated graben block group. Block groups dominate the formation and distribution of reservoirs. We studied qualitatively and quantitatively the sealing characteristics, sealing history and sealing mechanism of faults, too. And, the sealing characteristics are evaluated and the distribution pattern of hydrocarbon controlled by faults is researched. Due to movement intensity of big faults, deep falling of downthrown block, high degree of repture and development of fracture, shallow layers close to the downthrown block of secondary faults are unfavorable to hydrocarbon accumulation. This is confirmed by the exploration practice in Xinzhen anticline. In terms of the downthrown blocks of sencondary contemporaneous faults lied in the south and north area of Xinzhen, hydrocarbon is poor close to fracture belt, while it is relatively abundant in tertiary companion faults. Because of long-term movement of faults that control hydrocarbon, fi'om ES3 to EG, six set of oil-bearing series formed. And their opening causes the inhomogeneity in hydrocarbon abundance among each block--in two flanks of anticline reservoirs are abundant while in the axial area, oil and gas are sporadic. There the sealing characteristics control oil-bearing area of oil/gas accumulation and the height of oil reservoir. Longitudinally, oil and gas are enriched in dip-flat areas in mid-plane of faults. It is established that there are four types of accumulating patterns in complex faulted-block oil reservoirs in Xinzhen. The first is accumulating pattern of lithologic oil reservoirs in E~S_3~(mid-lowwer), that is, self-generating-self-reserving-self-covering lithologic trap pattern. The second is drag-anticline accumulating pattern in Xinzhen. The structure traps are drag anticlines formed by the contemporaneous faults of the second basement in the north of Xinzhen, and the multiple source rocks involve Ek_2, Es_4, Es_3 and Es_1 members. The reservoirs are fluvial-delta sandstones of the upper member of Shahejie formation and Guantao formation, covered by regional thick mudstone of the upper member of Guantao formation and MingHuazhen formation. The third is the accumulating pattern of reverse listric fault, the third-degree fault of Xinzhen anticline limb and the reservoirs form reservoir screened by reverse listric faults. The forth is accumulating pattern of crossing faults which form closing or semi-closing faulted-blocks that accumulate hydrocarbon. The technologies of predicting remaining oil in complex faulted-block reservoir during the mid and late development stage is formed. Remaining oil in simple large faulted-blocks enriches in structural high, structural middle, structural low of thick bottom water reservoirs, points near bent edge-fault oftertiary faults and part the fourth ones with big falling displacement, microstructure high place of oil-sandbodies and areas where local well pattern isn't perfect. While that in small complex faulted-blocks enriches near small nose, small high point, angle of small faults, small oil-bearing faulted-blocks without well and areas with non-perfect well pattern. The technologies of enhancing recovery factor in complex faulted-block reservoir during the mid and late development stage is formed as follows: fine reservoir description, drilling adjust wells, designing directional wells, sub-dividing layer series of development, improving flooding pattern, changing water-injection direction and enhancing swept volume, cyclic waterflooding and gas-injection, etc. Here, directional wells include directional deflecting wells, lateral-drilling wells, lateral-drilling horizontal wells and horizontal wells. The results of this paper have been used in exploration and development of Shengli oilfield, and have achieved great social and economic profit, especially in predicting distribution of complex faulted-block reservoir, remaining oil distribution during middle and late stage of development, and in EOR. Applying the achievement of fault-closure research, new hydrocarbon-bearing blocks are discovered in flanks of Dongying central uplift and in complex blocks with proved reserves 15 million tons. With the study of remaining oil distribution law in complex faulted-block reservoirs, recovery factors are increased greatly in Dongxin, Xianhe and Linpan complex faulted-block reservoirs and accumulated oil production increment is 3 million tons.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The discovery of the highly productive Renqiu buried hill reservoir in Bohai Bay Basin in 1975 started the high tide of finding buried hill reservoirs in China and their research. As the advance of E&P technologies, the study of buried hill reservoir in China had a qualitative leap. The reservoir description and some other aspects of development have reached or approached to the international leading level. However, some core techniques for reservoir study such as structure & faulting system study, formation prediction and connection study and heterogeneous model's construction could not completely carry out the quantitative or accurate reservoir description, e. g. the areal distribution of porosity, permeability and oil saturation. Especially, the modeling for reservoir simulation is still wandering in the stage of simplicity. The inaccurate understanding of geology could not derive 3D heterogeneous geological model that can reveal the actual underground situation thus could not design practical and feasible oilfield development plan. Therefore, the problems of low oil recovery rate, low recovery factor and poor development effectiveness have not been solved. The poor connection of the reservoir determined that waterflooding could not get good development effect and the production had to depend on the reservoir elastic energy, and this will bring big difficulty for development modification and improvement of oil recovery. This study formed a series of techniques for heterogeneous model research that can be used to construct heterogeneous model consistent with the reservoir geology. Thus the development effectiveness, success ratio of drilling and percent of producing reserves can be enhanced. This study can make the development of buried hill reservoir be of high recovery rate and high effect. The achievements of this study are as follows: 1. Evaluated the resources, summarized the geological characteristics and carried out the reservoir classification of the buried hill reservoirs in Shengli petroliferous area; 2. Established the markers for stratigraphical correlation and formed the correlation method for complex buried hill reservoirs; 3. Analyzed the structural features of the buried hill reservoirs, finished the structure interpretation and study of faulting system using synthetic seismograms, horizontal slices and coherent analysis, and clarified structural development history of the buried hill reservoirs in Shengli petroliferous area; 4. Determined the 3 classes and 7 types of pore space and the main pore space type, the logging response characteristics and the FMI logging identified difference between artificial and natural fractures by the comprehensive usage of core analysis, other lab analyses, conventional logging, FMI logging and CMR logging; 5. Determined the factors controlled the growth of the fractures, vugs and cavities, proposed the main formation prediction method for buried hill reservoir and analyzed their technical principium and applicability, and formed the seismic method and process for buried hill reservoir description; 6. Established the reserve calculation method for buried hill reservoirs, i. e. the reserves of fractures and matrix are calculated separately; the recoverable reserves are calculated by decline method and are classified by the SPE criteria; 7. Studied restraining barriers and the sealing of the faults thus clarified the oil-bearing formations of the buried hill reservoirs, and verified the multiple reservoir forming theory; 8. Formed reasonable procedure of buried hill reservoir study; 9. Formed the 3 D modeling technology for buried hill reservoirs; 10. Studied a number of buried hill blocks on the aspects of reservoir description, reservoir engineering and development plan optimization based on the above research and the profit and social effect are remarkable.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Evolução e perspectivas de desempenho econômico associadas com a produção de soja nos contextos mundial e brasileiro. O mercado mundial de produtos do complexo soja. O mercado e a produção de soja no Brasil. Expectativas de desempenho econômico para a safra 2009/10.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Businesses interact constantly with the environment, realizing several and heterogeneous exchanges. Organizations can be considered a system of different interests, frequently conflicting and the satisfaction of different stakeholders is a condition of success and survival. National and international literature attempts to explain the complex connection between companies and environment. In particular, the Stakeholder Theory considers crucial for businesses the identification of different stakeholders and their involvement in decision-making process. In this context, profit can not be considered the only purpose of companies existence and business aims become more numerous and different. The Stakeholder Theory is often utilized as framework for tourism studies, in particular in Sustainable Tourism Development research. In fact, authors consider sustainable the tourism development able to satisfy interests of different stakeholders, traditionally identified as local community and government, businesses, tourists and natural environment. Tourism businesses have to guarantee the optimal use of natural resources, the respect of socio-cultural tradition of local community and the creation of socio-economic benefits for all stakeholders in destinations. An obstacle to sustainable tourism development that characterizes a number of destinations worldwide is tourism demand seasonality. In fact, its negative impact on the environment, economy and communities may be highly significant. Pollution, difficulties in the use of public services, stress for residents, seasonal incomes, are all examples of the negative effects of seasonality. According to the World Tourism Organization (2004) the limitation of seasonality can favour the sustainability of tourism. Literature suggests private and public strategies to minimize the negative effects of tourism seasonality, as diversification of tourism products, identification of new market segments, launching events, application of public instruments like eco-taxes and use of differential pricing policies. Revenue Management is a managerial system based on differential pricing and able to affect price sensitive tourists. This research attempts to verify if Revenue Management, created to maximize profits in tourism companies, can also mitigate the seasonality of tourism demand, producing benefits for different stakeholders of destinations and contributing to Sustainable Tourism Development. In particular, the study attempts to answer the following research questions: 1) Can Revenue Management control the flow of tourist demand? 2) Can Revenue Management limit seasonality, producing benefits for different stakeholders of a destination? 3) Can Revenue Management favor the development of Sustainable Tourism? The literature review on Stakeholder Theory, Sustainable Tourism Development, tourism seasonality and Revenue Management forms the foundation of the research, based on a case study approach looking at a significant destination located in the Southern coast of Sardinia, Italy. A deductive methodology was applied and qualitative and quantitative methods were utilized. This study shows that Revenue Management has the potential to limit tourism seasonality, to mitigate negative impacts occurring from tourism activities, producing benefits for local community and to contribute to Sustainable Tourism Development.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Malicious software (malware) have significantly increased in terms of number and effectiveness during the past years. Until 2006, such software were mostly used to disrupt network infrastructures or to show coders’ skills. Nowadays, malware constitute a very important source of economical profit, and are very difficult to detect. Thousands of novel variants are released every day, and modern obfuscation techniques are used to ensure that signature-based anti-malware systems are not able to detect such threats. This tendency has also appeared on mobile devices, with Android being the most targeted platform. To counteract this phenomenon, a lot of approaches have been developed by the scientific community that attempt to increase the resilience of anti-malware systems. Most of these approaches rely on machine learning, and have become very popular also in commercial applications. However, attackers are now knowledgeable about these systems, and have started preparing their countermeasures. This has lead to an arms race between attackers and developers. Novel systems are progressively built to tackle the attacks that get more and more sophisticated. For this reason, a necessity grows for the developers to anticipate the attackers’ moves. This means that defense systems should be built proactively, i.e., by introducing some security design principles in their development. The main goal of this work is showing that such proactive approach can be employed on a number of case studies. To do so, I adopted a global methodology that can be divided in two steps. First, understanding what are the vulnerabilities of current state-of-the-art systems (this anticipates the attacker’s moves). Then, developing novel systems that are robust to these attacks, or suggesting research guidelines with which current systems can be improved. This work presents two main case studies, concerning the detection of PDF and Android malware. The idea is showing that a proactive approach can be applied both on the X86 and mobile world. The contributions provided on this two case studies are multifolded. With respect to PDF files, I first develop novel attacks that can empirically and optimally evade current state-of-the-art detectors. Then, I propose possible solutions with which it is possible to increase the robustness of such detectors against known and novel attacks. With respect to the Android case study, I first show how current signature-based tools and academically developed systems are weak against empirical obfuscation attacks, which can be easily employed without particular knowledge of the targeted systems. Then, I examine a possible strategy to build a machine learning detector that is robust against both empirical obfuscation and optimal attacks. Finally, I will show how proactive approaches can be also employed to develop systems that are not aimed at detecting malware, such as mobile fingerprinting systems. In particular, I propose a methodology to build a powerful mobile fingerprinting system, and examine possible attacks with which users might be able to evade it, thus preserving their privacy. To provide the aforementioned contributions, I co-developed (with the cooperation of the researchers at PRALab and Ruhr-Universität Bochum) various systems: a library to perform optimal attacks against machine learning systems (AdversariaLib), a framework for automatically obfuscating Android applications, a system to the robust detection of Javascript malware inside PDF files (LuxOR), a robust machine learning system to the detection of Android malware, and a system to fingerprint mobile devices. I also contributed to develop Android PRAGuard, a dataset containing a lot of empirical obfuscation attacks against the Android platform. Finally, I entirely developed Slayer NEO, an evolution of a previous system to the detection of PDF malware. The results attained by using the aforementioned tools show that it is possible to proactively build systems that predict possible evasion attacks. This suggests that a proactive approach is crucial to build systems that provide concrete security against general and evasion attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many multinational companies are supposedly viewing Europe as one region and re-shaping their approach to the supply of products to customers. Several factors are thought to be driving this trend, notably the degree of merger and acquisitions activity; the need for improved financial performance; the pressure to reduce inventories and costs, facilitated by improvements in communication and information technology systems. All of this is in the context of European market and monetary harmonisation. This paper investigates the extent and effect of the amanegement of supply chains on a pan-European baisis by multinational business. A survey was used to examine changes, both made and anticipated. to operational strategies, processes, organisational structures and physical infrastructure across a range of businesses and industry sectors. Cost reducation, driven by the need for profit and shreholder return, was found to be the priority for developments in supply chains.Many businesses reported consolidation of manufacturing and distribution activities whilst retaining discrete country-by-country organisational structures for managing customers and markets.Logistics Service Providers were seen in a traditional role as suppliers of commodity warehousing and transport services and lacked true pan-European capability. Despite the often-vaunted concept of a pan-European business model, individual businesses wwere seen to be negotiating their own path to balancing economies of scale with customers' service needs and expectations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Thomas, D. (2001). Welsh Water: role model or special case?. Utilities Policy, 10 (2), 99-114. RAE2008

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wydział Nauk Społecznych: Instytut Filozofii

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Literature on the nonprofit sector focuses on charities and their interactions with clients or governmental agencies; donors are studied less often. Studies on philanthropy do examine donors but tend to focus on microlevel factors to explain their behavior. This study, in contrast, draws on institutional theory to show that macrolevel factors affect donor behavior. It also extends the institutional framework by examining the field‐level configurations in which donors and fundraisers are embedded. Employing the case of workplace charity, this new model highlights how the composition of the organizational field structures fundraisers and donors alike, shaping fundraisers’ strategies of solicitation and, therefore, the extent of donor control.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We propose and evaluate an admission control paradigm for RTDBS, in which a transaction is submitted to the system as a pair of processes: a primary task, and a recovery block. The execution requirements of the primary task are not known a priori, whereas those of the recovery block are known a priori. Upon the submission of a transaction, an Admission Control Mechanism is employed to decide whether to admit or reject that transaction. Once admitted, a transaction is guaranteed to finish executing before its deadline. A transaction is considered to have finished executing if exactly one of two things occur: Either its primary task is completed (successful commitment), or its recovery block is completed (safe termination). Committed transactions bring a profit to the system, whereas a terminated transaction brings no profit. The goal of the admission control and scheduling protocols (e.g., concurrency control, I/O scheduling, memory management) employed in the system is to maximize system profit. We describe a number of admission control strategies and contrast (through simulations) their relative performance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We propose and evaluate admission control mechanisms for ACCORD, an Admission Control and Capacity Overload management Real-time Database framework-an architecture and a transaction model-for hard deadline RTDB systems. The system architecture consists of admission control and scheduling components which provide early notification of failure to submitted transactions that are deemed not valuable or incapable of completing on time. In particular, our Concurrency Admission Control Manager (CACM) ensures that transactions which are admitted do not overburden the system by requiring a level of concurrency that is not sustainable. The transaction model consists of two components: a primary task and a compensating task. The execution requirements of the primary task are not known a priori, whereas those of the compensating task are known a priori. Upon the submission of a transaction, the Admission Control Mechanisms are employed to decide whether to admit or reject that transaction. Once admitted, a transaction is guaranteed to finish executing before its deadline. A transaction is considered to have finished executing if exactly one of two things occur: Either its primary task is completed (successful commitment), or its compensating task is completed (safe termination). Committed transactions bring a profit to the system, whereas a terminated transaction brings no profit. The goal of the admission control and scheduling protocols (e.g., concurrency control, I/O scheduling, memory management) employed in the system is to maximize system profit. In that respect, we describe a number of concurrency admission control strategies and contrast (through simulations) their relative performance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We introduce Collocation Games as the basis of a general framework for modeling, analyzing, and facilitating the interactions between the various stakeholders in distributed systems in general, and in cloud computing environments in particular. Cloud computing enables fixed-capacity (processing, communication, and storage) resources to be offered by infrastructure providers as commodities for sale at a fixed cost in an open marketplace to independent, rational parties (players) interested in setting up their own applications over the Internet. Virtualization technologies enable the partitioning of such fixed-capacity resources so as to allow each player to dynamically acquire appropriate fractions of the resources for unencumbered use. In such a paradigm, the resource management problem reduces to that of partitioning the entire set of applications (players) into subsets, each of which is assigned to fixed-capacity cloud resources. If the infrastructure and the various applications are under a single administrative domain, this partitioning reduces to an optimization problem whose objective is to minimize the overall deployment cost. In a marketplace, in which the infrastructure provider is interested in maximizing its own profit, and in which each player is interested in minimizing its own cost, it should be evident that a global optimization is precisely the wrong framework. Rather, in this paper we use a game-theoretic framework in which the assignment of players to fixed-capacity resources is the outcome of a strategic "Collocation Game". Although we show that determining the existence of an equilibrium for collocation games in general is NP-hard, we present a number of simplified, practically-motivated variants of the collocation game for which we establish convergence to a Nash Equilibrium, and for which we derive convergence and price of anarchy bounds. In addition to these analytical results, we present an experimental evaluation of implementations of some of these variants for cloud infrastructures consisting of a collection of multidimensional resources of homogeneous or heterogeneous capacities. Experimental results using trace-driven simulations and synthetically generated datasets corroborate our analytical results and also illustrate how collocation games offer a feasible distributed resource management alternative for autonomic/self-organizing systems, in which the adoption of a global optimization approach (centralized or distributed) would be neither practical nor justifiable.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

At the heart of corporate governance and social responsibility discourse is recognition of the fact that the modern corporation is primarily governed by the profit maximisation imperative coupled with moral and ethical concerns that such a limited imperative drives the actions of large and wealthy corporations which have the ability to act in influential and significant ways, shaping how our social world is experienced. The actions of the corporation and its management will have a wide sphere of impact over all of its stakeholders whether these are employees, shareholders, consumers or the community in which the corporation is located. As globalisation has become central to the way we think it is also clear that ‘community’ has an ever expanding meaning which may include workers and communities living very far away from Corporate HQ. In recent years academic commentators have become increasingly concerned about the emphasis on what can be called short-term profit maximisation and the perception that this extremist interpretation of the profit imperative results in morally and ethically unacceptable outcomes.1 Hence demands for more corporate social responsibility. Following Cadbury’s2 classification of corporate social responsibility into three distinct areas, this paper will argue that once the legally regulated tier is left aside corporate responsibility can become so nebulous as to be relatively meaningless. The argument is not that corporations should not be required to act in socially responsible ways but that unless supported by regulation, which either demands high standards, or at the very least incentivises the attainment of such standards such initiatives are doomed to failure. The paper will illustrate by reference to various chosen cases that law’s discourse has already signposted ways to consider and resolve corporate governance problems in the broader social responsibility context.3 It will also illustrate how corporate responsibility can and must be supported by legal measures. Secondly, this paper will consider the potential conflict between an emphasis on corporate social responsibility and the regulatory approach.4 Finally, this paper will place the current interest in corporate social responsibility within the broader debate on the relationship between law and non-legally enforceable norms and will present some reflections on the norm debate arising from this consideration of the CSR movement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is a general presumption in the literature and among policymakers that immigrant remittances play the same role in economic development as foreign direct investment and other capital flows, but this is an open question. We develop a model of remittances based on the economics of the family that implies that remittances are not profit-driven, but are compensatory transfers, and should have a negative correlation with GDP growth. This is in contrast to the positive correlation of profit-driven capital flows with GDP growth. We test this implication of our model using a new panel data set on remittances and find a robust negative correlation between remittances and GDP growth. This indicates that remittances may not be intended to serve as a source of capital for economic development. © 2005 International Monetary Fund.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many consumer durable retailers often do not advertise their prices and instead ask consumers to call them for prices. It is easy to see that this practice increases the consumers' cost of learning the prices of products they are considering, yet firms commonly use such practices. Not advertising prices may reduce the firm's advertising costs, but the strategic effects of doing so are not clear. Our objective is to examine the strategic effects of this practice. In particular, how does making price discovery more difficult for consumers affect competing retailers' price, service decisions, and profits? We develop a model in which a manufacturer sells its product through a high-service retailer and a low-service retailer. Consumers can purchase the retail service at the high-end retailer and purchase the product at the competing low-end retailer. Therefore, the high-end retailer faces a free-riding problem. A retailer first chooses its optimal service levels. Then, it chooses its optimal price levels. Finally, a retailer decides whether to advertise its prices. The model results in four structures: (1) both retailers advertise prices, (2) only the low-service retailer advertises price, (3) only the high-service retailer advertises price, and (4) neither retailer advertises price. We find that when a retailer does not advertise its price and makes price discovery more difficult for consumers, the competition between the retailers is less intense. However, the retailer is forced to charge a lower price. In addition, if the competing retailer does advertise its prices, then the competing retailer enjoys higher profit margins. We identify conditions under which each of the above four structures is an equilibrium and show that a low-service retailer not advertising its price is a more likely outcome than a high-service retailer doing so. We then solve the manufacturer's problem and find that there are several instances when a retailer's advertising decisions are different from what the manufacturer would want. We describe the nature of this channel coordination problem and identify some solutions. © 2010 INFORMS.