Mitigating investment risk using modular technologies
نویسندگان
چکیده
We study logistical investment flexibility provided by modular processing technologies for mitigating risk. Specifically, we propose a multi-stage stochastic programming formulation that determines optimal capacity expansion plans mitigate demand uncertainty. The accounts multi-product dependencies between small/large units and trade-offs expected profit uses cumulative risk measure to avoid time-consistency issues of traditional, per-stage risk-minimization formulations, argue this approach is more compatible with typical metrics such as the net present value. Case studies different complexity are presented illustrate developments. Our reveal Pareto frontier flexible setting (allowing deployment small units) dominates an inflexible only large units). Notably, dominance prevalent despite benefits arising from economies scale units.
منابع مشابه
Measuring and Mitigating Regulatory Risk in Private Infrastructure Investment
Mark Jamison is Director of the Public Utility Research Center (PURC), Warrington College of Business, University of Florida. Before joining PURC in 1996, he was Manager of Regulatory Policy at Sprint. Prior to joining Sprint, he worked nine years for state regulatory commission staffs at the Iowa Utilities Board and the Kansas Corporation Commission. He earned his PhD at the University of Flor...
متن کاملModular System for Mitigating Flood Attacks
Denial-of-Service (DoS) flooding attacks have become a serious threat to the reliability of the Internet. Web servers face all kinds of users; some of them engage malicious activities to degrade or completely block network services, such as flooding attacks. As a result, lots of resource and bandwidth on web sites might be wasted. While many approaches exist to filter network-level attacks, the...
متن کاملDevelopments in DoS Research and Mitigating Technologies
This paper is a survey on the problem of denial of service attacks and the proposed ways to defend against them. Of particular concern are the distributed attacks that an adversary can carry out by recruiting innocent targets to aid the attack. Since attacks come in many forms and shapes and are generally easy to carry out given the free availability of tools such as Trinoo, defense is difficul...
متن کاملMonitoring Technologies for Mitigating Insider Threats
The annual Computer Crime and Security Survey for 2008 [1] surveyed 522 security employees from US corporations and government agencies, finding that insider incidents were cited by 44 percent of respondents, nearly as high as the 49 percent that encountered a conventional virus in the previous year. In general, there is an increasing recognition of the significance, scope and cost of the malic...
متن کاملUnderstanding and Mitigating Rental Risk
The decision of whether to rent or own a home should involve an evaluation of the relative risks and the relative costs of the two options. It is often assumed that renting is less risky than homeownership, but that is not always the case. Which option is riskier depends on the risk source and household characteristics. This article provides a framework for understanding the sources of risk for...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Chemical Engineering
سال: 2021
ISSN: ['1873-4375', '0098-1354']
DOI: https://doi.org/10.1016/j.compchemeng.2021.107424