993 resultados para Fractional-order holds


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Kalajoen pääuomassa on tehty suuria vesistöjärjestelyjä 1900-luvun alusta aina 2000-luvulle asti. Jokiuomaa ja sen virtaamia on muutettu mm. tulvasuojelun, voimatalouden ja uiton edistämiseksi. Merkittävimmät vesistöjärjestelyt ovat olleet Kalajoen säännöttäminen vuosina 1903–1910, Niemelänkylän pengerrys vuosina 1955–1960, Kalajoen vesistötaloussuunnitelma 1960–1970-luvulla, Kalajoen keskiosan järjestely vuosina 1967–1988, Alavieskan tulvasuojelu vuosina 1990–1992 ja Juurikosken kunnostus vuosina 2004–2005. 1970-luvunlopulta lähtien vesistöjärjestelyiden lupamääräyksiin alettiin sisällyttää velvoitteita tarkkailla hankkeiden vaikutuksia veden laatuun, kalastoon ja kalastukseen. Lisäksi aiheutetun haitan kompensoimiseksi alettiin määrätä toimenpiteitä, kuten kalaistutuksia ja kunnostustoimenpiteitä. Lupamääräykset ovat sisältäneet myös velvoitteita tarkkailla kompensaatiotoimenpiteiden tuloksellisuutta. Kalajoella valtio on ollut selvästi merkittävin toimija vesistöjärjestelyissä ja on ollut luvanhaltijana pääosassa hankkeista. Lisäksi valtio on kaikkien Kalajoen vesistön säännöstelyjen luvanhaltija. Näin ollen valtio on vastannut myös hankkeisiin liittyvistä velvoitetarkkailuista ja kompensaatiotoimenpiteistä. Merkittävimmät kompensaatiotoimenpiteet ovat olleet 4,7 miljoonan yksikesäisen vaellussiian istuttaminen vuosina 1981–2010, Kalajoen kunnostaminen mm. ravun ja nahkiaisen lisääntymisedellytysten parantamiseksi vuosina 1999–2004 ja 30 000 sukukypsän ravun istuttaminen vuosina 2003–2006. Tässä raportissa on tehty yhteenveto Kalajoen tarkkailututkimuksista vuosilta 1978–2010. Niiden perusteella on arvioitu, kuinka vesistörakentamishankkeet ja säännöstely sekä niihin liittyvät kompensaatiotoimenpiteet ovat vaikuttaneet rapu-, nahkiais- ja kalakantoihin sekä Kalajokeen niiden elinympäristönä. Lisäksi käytettävissä olevan aineiston puitteissa on arvioitu muiden tekijöiden vaikutusta rapu-, nahkiais- ja kalakantoihin.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To create a more inclusive school, an increase in multidisciplinary cooperation is needed. One possible form of collaboration could encompass the special education teacher taking on the role of a consultant for other teachers in need of support in working with heterogeneous groups of pupils. Previous research shows that special education teachers see the role as consultant as diffuse and complex. The overarching aim of the present study involves deepening the knowledge on how consultation in a special educational context can be understood and developed based on teachers’ descriptions on this particular form of activity interpreted against various perspectives on consultation. The study is qualitative in nature and rests on a hermeneutic interpretive research tradition in combination with an abductive approach. The theoretical framework consists of two different approaches to consultation: the directive and the non-directive approach. The approaches differ regarding particular emphasis on advice and reflection during the consultation and with respect to who or what should be the focus of the consultation. The two approaches are here studied through various theories such as social learning theory, Bruner's theory of scaffolding, Roger’s humanist psychology, and constructivism. Semi-structured interviews were held with eighteen special education teachers (n=9) and class teachers (n=9) working in the compulsory school. The overall interpretation of the results shows that special education consultation can be understood as three different types of consultation. Consultation as counseling which harmonizes with the directive perspective on consultation is the most prominent type. In the consultation as counseling conversation, the special educational knowledge transfer is central and the focus is placed on the pupil. Although special education knowledge transfer emerges as a unique aspect of special education consultation, there are several inherent challenges in this type of consultation that can be addressed in that teachers also describe two other types of consultation. In the reflective consultation, there is a move away from the pupil focus and toward a focus on the class teacher and the use of reflection. The reflective consultation harmonizes with the non-directive approach to consultation. This type of consultation does not as of yet have a prominent place in the Finland-Swedish school context and at this stage it is not seen as a legitimate type of consultation according to the teachers’ descriptions. Despite this, certain aspects of the reflective conversation could be given more space in the development of consultation within special educational contexts. The co-operative consultation is characterized by the teachers acting as teammates and using professional exchange as a strategy for consultation. Both teachers' knowledge is seen as central, and rather than the special education teacher acting as the expert and moderator, the teachers control the consultation together and jointly move the work along. The co-operative consultation enables the focus to move from the pupil toward the context, which can lead to the development of inclusive practices. The results indicate that this type of consultation holds potential in the development of special educational consultation that takes place between equal colleagues. The co-operative consultation opens up for a third collaborative approach to consultation, where aspects of the directive and non-directive perspective can merge and develop. The thesis concludes with the proposal that special pedagogical consultation can be understood from an integrated perspective. The characteristics of the consultation can vary depending on the type of problem or situation, while co-operative consultation can be seen as the ideal as equal colleagues meet in consultation conversations. In order to develop the co-operative consultation, both teachers are required to have knowledge of consultation as a practice, to be part of a collaborative school climate, and that teachers are provided with enough time to take part in consultations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis discusses adaption of new project management tool at ABB Oy Motors and Generators business unit, Synchronous Machines profit centre. Thesis studies project modeling in general and buries in the Gate Model used at ABB Synchronous Machines. It is essential to understand Gate Model because this new project management tool, called Project Master Document, is created on the base of the existing project model. Thesis also analyzes goals and structure of Project Master Document in order to ease implementation of this new tool. Project Master Document aims to improved customer order fulfillment by clearing order handover interface. Office process, especially responsibilities and target dates, become also clearer after Master Document implementation. The document is built to be frame for whole order fulfillment process including check points for each gate of project model and updated memos from all project meetings. Furthermore, project progress will be clearly stated by status markings and visualized with colors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Formal methods provide a means of reasoning about computer programs in order to prove correctness criteria. One subtype of formal methods is based on the weakest precondition predicate transformer semantics and uses guarded commands as the basic modelling construct. Examples of such formalisms are Action Systems and Event-B. Guarded commands can intuitively be understood as actions that may be triggered when an associated guard condition holds. Guarded commands whose guards hold are nondeterministically chosen for execution, but no further control flow is present by default. Such a modelling approach is convenient for proving correctness, and the Refinement Calculus allows for a stepwise development method. It also has a parallel interpretation facilitating development of concurrent software, and it is suitable for describing event-driven scenarios. However, for many application areas, the execution paradigm traditionally used comprises more explicit control flow, which constitutes an obstacle for using the above mentioned formal methods. In this thesis, we study how guarded command based modelling approaches can be conveniently and efficiently scheduled in different scenarios. We first focus on the modelling of trust for transactions in a social networking setting. Due to the event-based nature of the scenario, the use of guarded commands turns out to be relatively straightforward. We continue by studying modelling of concurrent software, with particular focus on compute-intensive scenarios. We go from theoretical considerations to the feasibility of implementation by evaluating the performance and scalability of executing a case study model in parallel using automatic scheduling performed by a dedicated scheduler. Finally, we propose a more explicit and non-centralised approach in which the flow of each task is controlled by a schedule of its own. The schedules are expressed in a dedicated scheduling language, and patterns assist the developer in proving correctness of the scheduled model with respect to the original one.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this thesis is to examine whether the pricing anomalies exists in the Finnish stock markets by comparing the performance of quantile portfolios that are formed on the basis of either individual valuation ratios, composite value measures or combined value and momentum indicators. All the research papers included in the thesis show evidence of value anomalies in the Finnish stock markets. In the first paper, the sample of stocks over the 1991-2006 period is divided into quintile portfolios based on four individual valuation ratios (i.e., E/P, EBITDA/EV, B/P, and S/P) and three hybrids of them (i.e. composite value measures). The results show the superiority of composite value measures as selection criterion for value stocks, particularly when EBITDA/EV is employed as earnings multiple. The main focus of the second paper is on the impact of the holding period length on performance of value strategies. As an extension to the first paper, two more individual ratios (i.e. CF/P and D/P) are included in the comparative analysis. The sample of stocks over 1993- 2008 period is divided into tercile portfolios based on six individual valuation ratios and three hybrids of them. The use of either dividend yield criterion or one of three composite value measures being examined results in best value portfolio performance according to all performance metrics used. Parallel to the findings of many international studies, our results from performance comparisons indicate that for the sample data employed, the yearly reformation of portfolios is not necessarily optimal in order to maximally gain from the value premium. Instead, the value investor may extend his holding period up to 5 years without any decrease in long-term portfolio performance. The same holds also for the results of the third paper that examines the applicability of data envelopment analysis (DEA) method in discriminating the undervalued stocks from overvalued ones. The fourth paper examines the added value of combining price momentum with various value strategies. Taking account of the price momentum improves the performance of value portfolios in most cases. The performance improvement is greatest for value portfolios that are formed on the basis of the 3-composite value measure which consists of D/P, B/P and EBITDA/EV ratios. The risk-adjusted performance can be enhanced further by following 130/30 long-short strategy in which the long position of value winner stocks is leveraged by 30 percentages while simultaneously selling short glamour loser stocks by the same amount. Average return of the long-short position proved to be more than double stock market average coupled with the volatility decrease. The fifth paper offers a new approach to combine value and momentum indicators into a single portfolio-formation criterion using different variants of DEA models. The results throughout the 1994-2010 sample period shows that the top-tercile portfolios outperform both the market portfolio and the corresponding bottom-tercile portfolios. In addition, the middle-tercile portfolios also outperform the comparable bottom-tercile portfolios when DEA models are used as a basis for stock classification criteria. To my knowledge, such strong performance differences have not been reported in earlier peer-reviewed studies that have employed the comparable quantile approach of dividing stocks into portfolios. Consistently with the previous literature, the division of the full sample period into bullish and bearish periods reveals that the top-quantile DEA portfolios lose far less of their value during the bearish conditions than do the corresponding bottom portfolios. The sixth paper extends the sample period employed in the fourth paper by one year (i.e. 1993- 2009) covering also the first years of the recent financial crisis. It contributes to the fourth paper by examining the impact of the stock market conditions on the main results. Consistently with the fifth paper, value portfolios lose much less of their value during bearish conditions than do stocks on average. The inclusion of a momentum criterion somewhat adds value to an investor during bullish conditions, but this added value turns to negative during bearish conditions. During bear market periods some of the value loser portfolios perform even better than their value winner counterparts. Furthermore, the results show that the recent financial crisis has reduced the added value of using combinations of momentum and value indicators as portfolio formation criteria. However, since the stock markets have historically been bullish more often than bearish, the combination of the value and momentum criteria has paid off to the investor despite the fact that its added value during bearish periods is negative, on an average.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For the paper mill profitability it is crucial to minimize overproduction and underproduction. Overproduction and underproduction both generate undesired costs and profit losses in paper mill production. This master’s thesis examines paper production order fulfillment subject from paper production level point of view. Research and development approach is selected due to clarification requirements in lately implemented manufacturing execution system. Manufacturing execution systems are generally expected to offer reliable and accurate information about mill production details. However, confusions are likely to occur after implementation of new manufacturing execution system. These confusions are usually harmful and become cumulatively more influential the longer they keep occurring. In this master’s thesis is presented actions to improve order fulfillment at paper mill production level. Central points of the improvement actions are a model for successful order fulfillment in paper mill production and manufacturing execution system catalogue configuration redesign. Improvement actions are implemented in Jokilaakso paper production plant and it is examined as a case study. In the end of this master’s thesis is presented performance measurements which demonstrate order fulfillment from case Jokilaakso.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Kandidaatintyön tavoitteena on tutkia engineer-to-order -toimitusketjun tyypillisiä tärkeimpiä kilpailutekijöitä sekä esittää esimerkkiratkaisu siitä, millaisella suorituskyvyn mittaristolla engineer-to-order toimitusketjua voidaan ohjata kohti tärkeimpien kilpailutekijöiden vahvistamista. Työssä luodaan katsaus ETO -ympäristön erityispiirteisiin ja esitetään tekijöitä, joita suorituskyvyn mittaamisessa tulisi huomioida tässä ympäristössä.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sosialistisen vallankumouksen jälkeen Neuvosto-Venäjän oli monien muiden kysymysten ohella ratkaistava sosialismin saavutusten puolustaminen. Aluksi ratkaisuksi suunniteltiin vapaaehtoisuuteen perustuvaa punakaartia, mutta riittävän miesvahvuuden turvaamiseksi päädyttiin yleiseen asevelvollisuuteen. Pian Venäjän sisällissodan jälkeen sotataidon suunta painottui enemmän vanhan armeijan asiantuntijoiden näkemysten kuin vallankumoussankarien kokemusten mukaiseksi, vaikka Frunzen puna-armeijalle kirjoittama doktriini perustui luokkataisteluun ja korosti sisällissodassa hyväksi koettua operatiivista liikkuvuutta. Neuvostoliiton ja Venäjän sotataidon perustana on Pietari I:n aloittama länsimainen suuntaus, jota kuitenkin täydentävät vahvat kansalliset piirteet. Venäläisen sotataidon henkisenä isänä voidaan hyvällä syyllä pitää Aleksandr Suvorovia, jonka opetukset näkyvät tekstilainausten lisäksi myös periaatteissa ja sotilaskasvatuksessa. Napoleonin sotien jälkeen perustettu Keisarillinen yleisesikunta-akatemia loi Venäjälle sotatieteellisen tutkimuksen ja opetuksen. Sotatieteen mahdollisuuksia ei 1800-luvun Venäjällä osattu täysin hyödyntää. Aseistuksen kasvavan tehon merkitystä vähättelevä asenne johti sotataidon taantumisen ja katastrofiin Venäjän–Japanin sodassa. Sen kokemuksia analysoidessaan Aleksandr Neznamov kehitti edelleen saksalaista operaation käsitettä ja loi perustan Neuvostoliitossa 1920-luvulla kehitetylle operaatiotaidolle. Neuvostoliittolaisen sotataidon päämääränä oli kehittää taktinen ja operatiivinen ratkaisu aseistuksen tehon kasvun aikaansaamaan puolustuksen ylivoimaisuuteen. Ratkaisussa hyödynnettiin brittien kokemuksia ja tutkimusta. Neuvostoliittolainen taktiikka ja operaatiotaito eivät kuitenkaan olleet brittiläisen mekanisoidun sodankäynnin tai saksalaisen salamasodan itäinen kopioita vaan itsenäisiin ratkaisuihin pohjautuvia. Syvän taistelun ja operaation teoriaa kokeiltiin harjoituksissa, ja sitä kehitettiin Stalinin vuoden 1937 puhdistuksiin saakka. Toisen maailmansodan taisteluissa puna-armeija sovelsi alkuvaiheen katastrofin jälkeen syvän taistelun ja syvän operaation oppeja. Komentajien ja joukkojen taito ei riittänyt teorian vaatimusten mukaiseen toimintaan, siksi syväksi aiotusta taistelusta tuli ajoittain ainoastaan tiheää. Suuren isänmaallisen sodan kokemusten perusteella neuvostoliittolainen sotatiede kehitti yleisjoukkojen taistelun periaatteet, jotka ovat säilyneet muuttumattomina nykypäivään saakka. Kylmän sodan aikakaudella ydin- ja tavanomaisen aseistuksen merkitys sodan ja taistelun kuvassa vaihteli. Lännen sotataidon ja aseteknologian kehitys pakotti Neuvostoliiton siirtymään 1980-luvulla sotilaallisessa ajattelussaan hyökkäyksestä puolustukseen. Neuvostoliiton hajoamisen jälkeen Venäjän sotilaallisen turvallisuuden takaajana on ydinaseistus. Yhdysvaltain tavanomainen ilma-avaruushyökkäyskyky vaatii Venäjää kehittämään torjuntajärjestelmiä. Tavanomaisten joukkojen rakentamisessa Venäjä seuraa tarkasti läntisen sotataidon kehittymistä, mutta pitäytyy omaperäisiin ratkaisuihin, joiden kehittämisessä sen vahvalla sotatieteellisellä järjestelmällä ja dialektisen materialismin metodilla on edelleen olennaisen tärkeä merkitys.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Today’s electrical machine technology allows increasing the wind turbine output power by an order of magnitude from the technology that existed only ten years ago. However, it is sometimes argued that high-power direct-drive wind turbine generators will prove to be of limited practical importance because of their relatively large size and weight. The limited space for the generator in a wind turbine application together with the growing use of wind energy pose a challenge for the design engineers who are trying to increase torque without making the generator larger. When it comes to high torque density, the limiting factor in every electrical machine is heat, and if the electrical machine parts exceed their maximum allowable continuous operating temperature, even for a short time, they can suffer permanent damage. Therefore, highly efficient thermal design or cooling methods is needed. One of the promising solutions to enhance heat transfer performances of high-power, low-speed electrical machines is the direct cooling of the windings. This doctoral dissertation proposes a rotor-surface-magnet synchronous generator with a fractional slot nonoverlapping stator winding made of hollow conductors, through which liquid coolant can be passed directly during the application of current in order to increase the convective heat transfer capabilities and reduce the generator mass. This doctoral dissertation focuses on the electromagnetic design of a liquid-cooled direct-drive permanent-magnet synchronous generator (LC DD-PMSG) for a directdrive wind turbine application. The analytical calculation of the magnetic field distribution is carried out with the ambition of fast and accurate predicting of the main dimensions of the machine and especially the thickness of the permanent magnets; the generator electromagnetic parameters as well as the design optimization. The focus is on the generator design with a fractional slot non-overlapping winding placed into open stator slots. This is an a priori selection to guarantee easy manufacturing of the LC winding. A thermal analysis of the LC DD-PMSG based on a lumped parameter thermal model takes place with the ambition of evaluating the generator thermal performance. The thermal model was adapted to take into account the uneven copper loss distribution resulting from the skin effect as well as the effect of temperature on the copper winding resistance and the thermophysical properties of the coolant. The developed lumpedparameter thermal model and the analytical calculation of the magnetic field distribution can both be integrated with the presented algorithm to optimize an LC DD-PMSG design. Based on an instrumented small prototype with liquid-cooled tooth-coils, the following targets have been achieved: experimental determination of the performance of the direct liquid cooling of the stator winding and validating the temperatures predicted by an analytical thermal model; proving the feasibility of manufacturing the liquid-cooled tooth-coil winding; moreover, demonstration of the objectives of the project to potential customers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Presentation at Open Repositories 2014, Helsinki, Finland, June 9-13, 2014

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study examines information security as a process (information securing) in terms of what it does, especially beyond its obvious role of protector. It investigates concepts related to ‘ontology of becoming’, and examines what it is that information securing produces. The research is theory driven and draws upon three fields: sociology (especially actor-network theory), philosophy (especially Gilles Deleuze and Félix Guattari’s concept of ‘machine’, ‘territory’ and ‘becoming’, and Michel Serres’s concept of ‘parasite’), and information systems science (the subject of information security). Social engineering (used here in the sense of breaking into systems through non-technical means) and software cracker groups (groups which remove copy protection systems from software) are analysed as examples of breaches of information security. Firstly, the study finds that information securing is always interruptive: every entity (regardless of whether or not it is malicious) that becomes connected to information security is interrupted. Furthermore, every entity changes, becomes different, as it makes a connection with information security (ontology of becoming). Moreover, information security organizes entities into different territories. However, the territories – the insides and outsides of information systems – are ontologically similar; the only difference is in the order of the territories, not in the ontological status of entities that inhabit the territories. In other words, malicious software is ontologically similar to benign software; they both are users in terms of a system. The difference is based on the order of the system and users: who uses the system and what the system is used for. Secondly, the research shows that information security is always external (in the terms of this study it is a ‘parasite’) to the information system that it protects. Information securing creates and maintains order while simultaneously disrupting the existing order of the system that it protects. For example, in terms of software itself, the implementation of a copy protection system is an entirely external addition. In fact, this parasitic addition makes software different. Thus, information security disrupts that which it is supposed to defend from disruption. Finally, it is asserted that, in its interruption, information security is a connector that creates passages; it connects users to systems while also creating its own threats. For example, copy protection systems invite crackers and information security policies entice social engineers to use and exploit information security techniques in a novel manner.