Results 251 to 260 of about 765,622 (301)

Protected Adaptive Asset Allocation

Finance Research Letters, 2020
Abstract Protected Adaptive Asset Allocation (PAAA) is a tactical asset allocation model that targets an optimal risk/returns ratio using both a momentum index to capture the short-run dynamics and cash protection in negative market periods to reduce drawdowns.
BELLU, MIRKO, Conversano Claudio
openaire   +2 more sources

Adaptive Protection Systems

2019
Sustainable resources would replace traditional energy production solutions in the near future. There are determinant factors that force to adopt the changes in actual power system: environmental protection, and the increasing price of natural gas, coal and oil. The chapter provides a short overview of protection functions in adaptive systems. Nowadays,
Marian Gaiceanu, Iulian Nicusor Arama
openaire   +1 more source

Adaptive relaying concepts for generator protection

TENCON '91. Region 10 International Conference on EC3-Energy, Computer, Communication and Control Systems, 2005
Adaptive relaying concepts as applicable to generator protection are presented in this paper. Adaptive relaying deploys changes in relaying settings and/or change in relay characteristics or even a change in relaying modus operandi as and when the system configuration or oprating conditions change.
P.B.D. Gupta, S. Kannan
openaire   +1 more source

Adaptive shared protection rearrangement*

DRCN 2005). Proceedings.5th International Workshop on Design of Reliable Communication Networks, 2005., 2006
We propose two algorithms for dynamic routing of guaranteed bandwidth pipes with shared protection that provide low blocking through thrifty resource usage. We assume that a single working path can be protected by one or multiple protection paths, which are partially or fully disjoint from the working path.
T. Cinkler   +3 more
openaire   +1 more source

Adaptive reflexivity threat protection

Automatic Control and Computer Sciences, 2015
A confrontation between a security administrator and an intruder is presented as a conflict of information security. The formalization of the conflict with the use of Lefebvre’s algebra of conflicts is proposed. The effective behavior policies of the parties to the conflict in terms of protection have been analyzed.
D. S. Lavrova, A. I. Pechenkin
openaire   +1 more source

Home - About - Disclaimer - Privacy