+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Optimization Techniques for Decision-making and Information Security

  • Book

  • May 2024
  • Bentham Science Publishers Ltd
  • ID: 5972698
Optimization Techniques for Decision-making and Information Security is a scholarly compilation that has been edited by experts with specialized knowledge in the fields of decision theory and cybersecurity. Through the synthesis of an extensive array of information, this edited volume presents novel methodologies and approaches that forge a link between the critical domain of information security and the realm of decision-making processes.

The publication commences with a fundamental investigation that establishes the theoretical foundations of information security-relevant decision-making models. The subsequent chapters present comprehensive evaluations of real-world applications, showcasing an assortment of optimization techniques. The book offers a wide range of perspectives on the practical implementation of data analysis in various domains, including but not limited to power generation and optimization, solid transportation problems, soft computing techniques, wireless sensor networks, parametric set-valued optimization problems, data aggregation optimization techniques, fuzzy linear programming problems, and nonlinear chaotic systems. The anthology concludes with a comprehensive summary of the most noteworthy observations and ramifications extracted from the projects of all contributors.

Key Features

  • Presents a wide variety of sophisticated optimization methodologies
  • Explores the intricate intersection of decision theory and the safeguarding of confidential information.
  • Emphasizes effectiveness in improving decision-making processes designed to strengthen information security measures.
  • Showcases practical examples in different industrial domains through case studies and real-world problems.
  • Provides guidance and contemplations on strengthening information security environments.
  • Includes scientific references for advanced reading
This book serves as an essential reference for policymakers, researchers, and professionals who are learning about or working in information security roles.

Readership

Policymakers, researchers, and professionals in information security roles.

Table of Contents

Chapter 1 Cost Optimisation Analysis for a Markovian Feedback Queueing System With Discouragement, Breakdown, And Threshold-Based Recovery Policy
  • Amit Kumar, Amina Angelika Bouchentouf and Mohamed Boualem
1. Introduction
2. Model Description and Steady-State Probability
2.1. Assumptions and Notations
2.2. Chapman-Kolmogorov Equations
2.3. The Steady-State Solution
3. System Characteristics
4. Cost Model
5. Quasi-Newton Method
6. Numerical Results
  • Conclusion
  • References
Chapter 2 Solutions of Parametric Set-Valued Optimization Problems
  • Of Higher-Order
  • Koushik Das and Chandal Nahak
1. Introduction
2. Motivation
3. Definition and Preliminaries
4. Main Results
4.1. Higher-Order Sufficient Optimality Conditions
4.2. Higher-Order Mond-Weir Type Dual
  • Conclusions
  • References
Chapter 3 Development and Assessment of Data in Solar-Powered System for Simultaneous Production of Power, Heating, and Cooling
  • Mohd Parvez, Taufique Ahamad and Osama Khan
1. Introduction
2. Error Estimation
2.1. Mathematical Modeling
3. Results and Discussion for the Proposed System
  • Conclusion
  • Nomenclature
  • References
Chapter 4 a New Algorithm for Solving Fully Fuzzy Linear Programming Problems Using the Lexicographic Method
1. Introduction
2. Preliminaries
3. Fully Fuzzy Linear Programming Problem (Fflpp)
3.1. Algorithm to Solve the System (1) of Fflpp
4. Numerical Illustration
  • Conclusion
  • References
Chapter 5 Anti-Synchronization Between Different Nonlinear Chaotic
  • Systems Via Active Nonlinear Control Method
  • Sanjay Kumar and Ram Pravesh Prasad
1. Introduction
2. System Description
3. Anti-Synchronization Between Chaotic Chen-Lee System And
  • Chaotic Lorenz-Stenflo Systems
3.1. Numerical Simulation
4. Anti-Synchronization Between Chaotic Chen-Lee and Liu-Chen
  • Systems
4.1 Numerical Simulation
  • Conclusion
  • Data Responsibility
  • References
Chapter 6 Fixed Charged Nonlinear Solid Transportation Problem With Budget Constraints Using Bounded Parameters
1. Introduction
1.1. Motivation
2. Interval Analysis
2.1. Partial Ordering on 𝕀 (ℝ)
2.2. Interval Valued Function
3. Notations and Model Formulation
4. Fixed Charged Nonlinear Solid Transportation Problem in Crisp Environment
4.1. Fixed Charged Nonlinear Interval Solid Transportation Problem (𝑭π‘ͺ𝑡𝑰𝑺𝑻𝑷)
4.2. Solution Procedure Of 𝐅π‘ͺ𝑡𝑰𝑺𝑻𝑷
5. Numerical Problems
  • Conclusion
  • References
  • Amol Avinash Joshi and Rabia Musheer Aziz
1. Introduction
1.1. Lecture Survey
1.2. Recent Related References
1.3. Motivation and Contribution
2. Proposed Framework
2.1. Genes Extraction by Ica
2.2. Genetic Spider Monkey (Gsm) Algorithm
3. Used Classifier
4. Experimental Setups
5. Experimental Result
  • Conclusion
  • Future Work
  • References
Chapter 8 a Survey of Pairing Free Certificateless Signature Schemes For Secure Networking
1. Introduction
1.1. Motivation and Contribution
1.2. Structure of the Chapter
2. Related Work
3. Preliminaries
3.1. Bilinear Map
3.2. Elliptic Curve Cryptography

Chapter 7 Soft Computing Techniques for Cancer Classification of Gene Expression Microarray Data: a Three-Phase Hybrid Approach
3.2.1. Elliptic Curves
3.2.2. Elliptic Curve Over
3.2.3. Elliptic Curve Discrete Logarithm Problems (Ecdlp)
4. System Model of Cls and Various Attacks in Cls
4.1. System Model in Cls
4.2. Security Model of Cls
4.3. Some of the Attacks
5. Performance Evaluation of Various Schemes
  • Conclusion
  • References
Chapter 9 Analysis and Development of Tie-Breaking Procedures Using
  • Fuzzy Technique for Order Performance by Similarity to Ideal
  • Solution
  • Iftikhar Husain
1. Introduction
1.1. Motivation and Contribution
1.2. Roadmap of the Chapter
2. Preliminaries
3. Mean of Removals Approach for Ranking Fuzzy Numbers [4]
4. The Working Rule of Fuzzy Topsis Approach
4.1. Combination of the Importance Weights
4.2. Combined Ratings of Alternatives Under Decision Criteria
4.3. Establishment of the Weighted Decision Matrix
4.4. Establish the Ideal and Non-Perfect Solutions
4.5. Determining the Distances of Alternatives from Ideal and Negative-Ideal Solutions
4.6. Deriving the Closeness Coefficients
5. Numerical Example
5.1. Calculated Entries of the Weighted Decision Matrix
  • Conclusion
  • References
  • Subject Index

Author

  • Vinod Kumar
  • Mandeep Mittal
  • Adesh Kumar