000 06358cam a22006615i 4500
001 44188
003 0000000000
005 20240411193131.0
006 m |o d |
007 cr |||||||||||
008 170314s2017 gw |||| o |||| 0|eng
010 _a 2019749546
020 _a9783319515007
024 7 _a10.1007/978-3-319-51500-7
_2doi
035 _a(DE-He213)978-3-319-51500-7
035 _a21683328
040 _aDLC
_beng
_epn
_erda
_cDLC
072 7 _aMAT003000
_2bisacsh
072 7 _aPBU
_2bicssc
072 7 _aPBU
_2thema
082 0 4 _a519.6
_223
097 0 0 _aQA402.5-402.6
245 0 0 _aOperations Research, Engineering, and Cyber Security :
_bTrends in Applied Mathematics and Technology /
_c[edited by] Nicholas J. Daras, Themistocles M. Rassias.
250 _a1st ed. 2017.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2017.
300 _a1 online resource (XI, 422 pages 61 illustrations, 27 illustrations in color.)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringer Optimization and Its Applications,
_x1931-6828 ;
_v113
505 0 _aComplementarity and Variational Inequalities in Electronics (K. Addi, D. Goeleven) -- Electromagnetic Scattering by a Chiral Impedance Screen (C. E. Athanasiadis, V. Sevroglou, K. Skourogiannis) -- Optimal Batch Production with Rework Process for Products with Time Varying Demand over Finite Planning Horizon (L. Benkherouf, K. Skouri, I. Konstantaras) -- On co-polynomials on the real line and the unit circle (Kenier Castillo, Francisco Marcellán, Jorge Rivero) -- Electromagnetic Compatibility (EMC) in Challenging Environments (C. Christopoulos) -- Cybersecurity Investments with Nonlinear Budget Constraints: Analysis of the Marginal Expected Utilities (P. Daniele, A. Maugeri, A. Nagurney) -- Ellipsoid Targeting with Overlap (N. J. Daras) -- A Review of Several Optimization Problems Related to Security in Networked System (B. DasGupta, V. Srinivasan) -- On Some Information Geometric Approaches to Cyber Security (C. Dodson) -- A Survey of Recent Inequalities for Relative Operator Entropy (S. S. Dragomir) -- On the Use of Elliptic Regularity Theory for the Numerical Solution of Variational Problems (A. Dreves, J. Gwinner, N. Ovcharova) -- Strong and Weak Convexity of Closed Sets in a Hilbert space (V. V. Goncharov, G. E. Ivanov) -- Non-Equilibrium Solutions of Dynamic Networks: a Hybrid System Approach (Scott Greenhalgh, Monica-Gabriela Cojocaru) -- Measuring Ballistic Dispersion for the Purpose of Ammunition Quality Assurance (W. J. Hurley, J. Brimberg, A. Pavlov) -- Region-Based Watermarking for Images (K. A. Raftopoulos, N. Papadakis, K. S. Ntalianis, P. Tzouveli, G. Goudelis, S. D. Kollias) -- Optimal Inventory Policies for Finite Horizon Inventory Models with Time Varying Demand: a Unified Presentation (K. Skouri, L. Benkherouf, I. Konstantaras) -- Metrical Pareto Efficiency and Monotone EVP (M. Turinici) -- New Two-Slope Parameterized Achievement Scalarizing Functions for Nonlinear Multiobjective Optimization (O. Wilppu, M. M. Makel, Y. Nikuli).
520 _aMathematical methods and theories with interdisciplinary applications are presented in this book. The eighteen contributions presented in this Work have been written by eminent scientists; a few papers are based on talks which took place at the International Conference at the Hellenic Artillery School in May 2015. Each paper evaluates possible solutions to long-standing problems such as the solvability of the direct electromagnetic scattering problem, geometric approaches to cyber security, ellipsoid targeting with overlap, non-equilibrium solutions of dynamic networks, measuring ballistic dispersion, elliptic regularity theory for the numerical solution of variational problems, approximation theory for polynomials on the real line and the unit circle, complementarity and variational inequalities in electronics, new two-slope parameterized achievement scalarizing functions for nonlinear multiobjective optimization, and strong and weak convexity of closed sets in a Hilbert space. Graduate students, scientists, engineers and researchers in pure and applied mathematical sciences, operations research, engineering, and cyber security will find the interdisciplinary scientific perspectives useful to their overall understanding and further research.
588 _aDescription based on publisher-supplied MARC data.
650 0 _aAlgebra.
650 0 _aAlgorithms.
650 0 _aComputer mathematics.
650 0 _aComputer science-Mathematics.
650 0 _aMathematical models.
650 0 _aMathematical optimization.
650 0 _aNumerical analysis.
650 0 _aOrdered algebraic structures.
650 1 4 _aOptimization.
_0https://scigraph.springernature.com/ontologies/product-market-codes/M26008
650 2 4 _aMathematical Applications in Computer Science.
_0https://scigraph.springernature.com/ontologies/product-market-codes/M13110
650 2 4 _aMathematical Modeling and Industrial Mathematics.
_0https://scigraph.springernature.com/ontologies/product-market-codes/M14068
650 2 4 _aMathematics of Algorithmic Complexity.
_0https://scigraph.springernature.com/ontologies/product-market-codes/M13130
650 2 4 _aNumerical Analysis.
_0https://scigraph.springernature.com/ontologies/product-market-codes/M14050
650 2 4 _aOrder, Lattices, Ordered Algebraic Structures.
_0https://scigraph.springernature.com/ontologies/product-market-codes/M11124
700 1 _aDaras, Nicholas J.
_eeditor.
700 1 _aRassias, Themistocles M.
_eeditor.
776 0 8 _iPrint version:
_tOperations research, engineering, and cyber security : trends in applied mathematics and technology
_z9783319514987
_w(DLC) 2017932376
776 0 8 _iPrinted edition:
_z9783319514987
776 0 8 _iPrinted edition:
_z9783319514994
776 0 8 _iPrinted edition:
_z9783319846675
830 0 _aSpringer Optimization and Its Applications,
_x1931-6828 ;
_v113
856 _uhttps://drive.google.com/file/d/1-7HKFK4WKgiehQJlA1MZN1q_1Gden4Nv/view?usp=sharing
999 _c13791
_d13791