<div>Mathematical methods and theories with interdisciplinary applications are presented in this book. The eighteen contributions presented in this Work have been written by eminent scientists; a few papers are based on talks which took place at the International Conference at the Hellenic Artillery
Operations Research, Engineering, and Cyber Security: Trends in Applied Mathematics and Technology
β Scribed by Nicholas J. Daras, Themistocles M. Rassias (eds.)
- Publisher
- Springer International Publishing
- Year
- 2017
- Tongue
- English
- Leaves
- 424
- Series
- Springer Optimization and Its Applications 113
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Mathematical methods and theories with interdisciplinary applications are presented in this book. The eighteen contributions presented in this Work have been written by eminent scientists; a few papers are based on talks which took place at the International Conference at the Hellenic Artillery School in May 2015. Each paper evaluates possible solutions to long-standing problems such as the solvability of the direct electromagnetic scattering problem, geometric approaches to cyber security, ellipsoid targeting with overlap, non-equilibrium solutions of dynamic networks, measuring ballistic dispersion, elliptic regularity theory for the numerical solution of variational problems, approximation theory for polynomials on the real line and the unit circle, complementarity and variational inequalities in electronics, new two-slope parameterized achievement scalarizing functions for nonlinear multiobjective optimization, and strong and weak convexity of closed sets in a Hilbert space. <
Graduate students, scientists, engineers and researchers in pure and applied mathematical sciences, operations research, engineering, and cyber security will find the interdisciplinary scientific perspectives useful to their overall understanding and further research.
β¦ Table of Contents
Front Matter....Pages i-xi
Complementarity and Variational Inequalities in Electronics....Pages 1-43
Electromagnetic Scattering by a Chiral Impedance Screen....Pages 45-56
Optimal Batch Production with Rework Process for Products with Time-Varying Demand Over Finite Planning Horizon....Pages 57-68
On Co-polynomials on the Real Line and the Unit Circle....Pages 69-94
Electromagnetic Compatibility (EMC) in Challenging Environments....Pages 95-115
Cybersecurity Investments with Nonlinear Budget Constraints: Analysis of the Marginal Expected Utilities....Pages 117-134
Ellipsoid Targeting with Overlap....Pages 135-154
A Review of Several Optimization Problems Related to Security in Networked System....Pages 155-166
On Some Information Geometric Approaches to Cyber Security....Pages 167-197
A Survey of Recent Inequalities for Relative Operator Entropy....Pages 199-229
On the Use of Elliptic Regularity Theory for the Numerical Solution of Variational Problems....Pages 231-257
Strong and Weak Convexity of Closed Sets in a Hilbert Space....Pages 259-297
Non-equilibrium Solutions of Dynamic Networks: A Hybrid System Approach....Pages 299-315
Measuring Ballistic Dispersion for the Purpose of Ammunition Quality Assurance....Pages 317-330
Region-Based Watermarking for Images....Pages 331-343
Optimal Inventory Policies for Finite Horizon Inventory Models with Time Varying Demand: A Unified Presentation....Pages 345-358
Metrical Pareto Efficiency and Monotone EVP....Pages 359-401
New Two-Slope Parameterized Achievement Scalarizing Functions for Nonlinear Multiobjective Optimization....Pages 403-422
β¦ Subjects
Optimization;Numerical Analysis;Order, Lattices, Ordered Algebraic Structures;Mathematics of Algorithmic Complexity;Mathematical Modeling and Industrial Mathematics;Mathematical Applications in Computer Science
π SIMILAR VOLUMES
As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect yourselves from this threat. The world's foremost cyber security experts, from Ruby Lee, Ph.D., the Forrest G. Hamrick professor of engineering and Director of the Princeton Archi
<p></p><p>Transmutation operators in differential equations and spectral theory can be used to reveal the relations between differentΒ problems, and often make it possible to transform difficult problems into easier ones. Accordingly, they represent an important mathematical tool in the theory of inv
<p></p><p><span>Transmutation operators in differential equations and spectral theory can be used to reveal the relations between different problems, and often make it possible to transform difficult problems into easier ones. Accordingly, they represent an important mathematical tool in the theory
<p><span>The text envisages novel optimization methods that significantly impact real-life problems, starting from inventory control to economic decision-making. It discusses topics such as inventory control, queueing models, timetable scheduling, fuzzy optimization, and the Knapsack problem. The bo