Optimization Techniques for Decision-making and Information Security is a scholarly compilation that has been edited by experts with specialized knowledge in the fields of decision theory and cybersecurity. Through the synthesis of an extensive array of information, this edited volume presents novel methodologies and approaches that forge a link between the critical domain of information security and the realm of decision-making processes.
The publication commences with a fundamental investigation that establishes the theoretical foundations of information security-relevant decision-making models. The subsequent chapters present comprehensive evaluations of real-world applications, showcasing an assortment of optimization techniques. The book offers a wide range of perspectives on the practical implementation of data analysis in various domains, including but not limited to power generation and optimization, solid transportation problems, soft computing techniques, wireless sensor networks, parametric set-valued optimization problems, data aggregation optimization techniques, fuzzy linear programming problems, and nonlinear chaotic systems. The anthology concludes with a comprehensive summary of the most noteworthy observations and ramifications extracted from the projects of all contributors.
The publication commences with a fundamental investigation that establishes the theoretical foundations of information security-relevant decision-making models. The subsequent chapters present comprehensive evaluations of real-world applications, showcasing an assortment of optimization techniques. The book offers a wide range of perspectives on the practical implementation of data analysis in various domains, including but not limited to power generation and optimization, solid transportation problems, soft computing techniques, wireless sensor networks, parametric set-valued optimization problems, data aggregation optimization techniques, fuzzy linear programming problems, and nonlinear chaotic systems. The anthology concludes with a comprehensive summary of the most noteworthy observations and ramifications extracted from the projects of all contributors.
Key Features
- Presents a wide variety of sophisticated optimization methodologies
- Explores the intricate intersection of decision theory and the safeguarding of confidential information.
- Emphasizes effectiveness in improving decision-making processes designed to strengthen information security measures.
- Showcases practical examples in different industrial domains through case studies and real-world problems.
- Provides guidance and contemplations on strengthening information security environments.
- Includes scientific references for advanced reading
Readership
Policymakers, researchers, and professionals in information security roles.Table of Contents
Chapter 1 Cost Optimisation Analysis for a Markovian Feedback Queueing System With Discouragement, Breakdown, And Threshold-Based Recovery Policy- Amit Kumar, Amina Angelika Bouchentouf and Mohamed Boualem
2. Model Description and Steady-State Probability
2.1. Assumptions and Notations
2.2. Chapman-Kolmogorov Equations
2.3. The Steady-State Solution
3. System Characteristics
4. Cost Model
5. Quasi-Newton Method
6. Numerical Results
- Conclusion
- References
- Of Higher-Order
- Koushik Das and Chandal Nahak
2. Motivation
3. Definition and Preliminaries
4. Main Results
4.1. Higher-Order Sufficient Optimality Conditions
4.2. Higher-Order Mond-Weir Type Dual
- Conclusions
- References
- Mohd Parvez, Taufique Ahamad and Osama Khan
2. Error Estimation
2.1. Mathematical Modeling
3. Results and Discussion for the Proposed System
- Conclusion
- Nomenclature
- References
1. Introduction
2. Preliminaries
3. Fully Fuzzy Linear Programming Problem (Fflpp)
3.1. Algorithm to Solve the System (1) of Fflpp
4. Numerical Illustration
- Conclusion
- References
- Systems Via Active Nonlinear Control Method
- Sanjay Kumar and Ram Pravesh Prasad
2. System Description
3. Anti-Synchronization Between Chaotic Chen-Lee System And
- Chaotic Lorenz-Stenflo Systems
4. Anti-Synchronization Between Chaotic Chen-Lee and Liu-Chen
- Systems
- Conclusion
- Data Responsibility
- References
1. Introduction
1.1. Motivation
2. Interval Analysis
2.1. Partial Ordering on π (β)
2.2. Interval Valued Function
3. Notations and Model Formulation
4. Fixed Charged Nonlinear Solid Transportation Problem in Crisp Environment
4.1. Fixed Charged Nonlinear Interval Solid Transportation Problem (ππͺπ΅π°πΊπ»π·)
4.2. Solution Procedure Of π πͺπ΅π°πΊπ»π·
5. Numerical Problems
- Conclusion
- References
- Amol Avinash Joshi and Rabia Musheer Aziz
1.1. Lecture Survey
1.2. Recent Related References
1.3. Motivation and Contribution
2. Proposed Framework
2.1. Genes Extraction by Ica
2.2. Genetic Spider Monkey (Gsm) Algorithm
3. Used Classifier
4. Experimental Setups
5. Experimental Result
- Conclusion
- Future Work
- References
1. Introduction
1.1. Motivation and Contribution
1.2. Structure of the Chapter
2. Related Work
3. Preliminaries
3.1. Bilinear Map
3.2. Elliptic Curve Cryptography
Chapter 7 Soft Computing Techniques for Cancer Classification of Gene Expression Microarray Data: a Three-Phase Hybrid Approach
3.2.1. Elliptic Curves
3.2.2. Elliptic Curve Over
3.2.3. Elliptic Curve Discrete Logarithm Problems (Ecdlp)
4. System Model of Cls and Various Attacks in Cls
4.1. System Model in Cls
4.2. Security Model of Cls
4.3. Some of the Attacks
5. Performance Evaluation of Various Schemes
- Conclusion
- References
- Fuzzy Technique for Order Performance by Similarity to Ideal
- Solution
- Iftikhar Husain
1.1. Motivation and Contribution
1.2. Roadmap of the Chapter
2. Preliminaries
3. Mean of Removals Approach for Ranking Fuzzy Numbers [4]
4. The Working Rule of Fuzzy Topsis Approach
4.1. Combination of the Importance Weights
4.2. Combined Ratings of Alternatives Under Decision Criteria
4.3. Establishment of the Weighted Decision Matrix
4.4. Establish the Ideal and Non-Perfect Solutions
4.5. Determining the Distances of Alternatives from Ideal and Negative-Ideal Solutions
4.6. Deriving the Closeness Coefficients
5. Numerical Example
5.1. Calculated Entries of the Weighted Decision Matrix
- Conclusion
- References
- Subject Index
Author
- Vinod Kumar
- Mandeep Mittal
- Adesh Kumar