Browse Results

Showing 16,351 through 16,375 of 61,857 results

Decision Trees Versus Systems of Decision Rules: A Rough Set Approach (Studies in Big Data #160)

by Mikhail Moshkov Kerven Durdymyradov Azimkhon Ostonov

This book explores, within the framework of rough set theory, the complexity of decision trees and decision rule systems and the relationships between them for problems over information systems, for decision tables from closed classes, and for problems involving formal languages. Decision trees and systems of decision rules are widely used as means of representing knowledge, as classifiers that predict decisions for new objects, as well as algorithms for solving various problems of fault diagnosis, combinatorial optimization, etc. Decision trees and systems of decision rules are among the most interpretable models of knowledge representation and classification. Investigating the relationships between these two models is an important task in computer science. The possibilities of transforming decision rule systems into decision trees are being studied in detail. The results are useful for researchers using decision trees and decision rule systems in data analysis, especially in rough set theory, logical analysis of data, and test theory. This book is also used to create courses for graduate students.

Decision and Control in Hybrid Wind Farms (Studies in Systems, Decision and Control #253)

by Dipankar Deb Harsh S. Dhiman

This book focuses on two of the most important aspects of wind farm operation: decisions and control. The first part of the book deals with decision-making processes, and explains that hybrid wind farm operation is governed by a set of alternatives that the wind farm operator must choose from in order to achieve optimal delivery of wind power to the utility grid. This decision-making is accompanied by accurate forecasts of wind speed, which must be known beforehand. Errors in wind forecasting can be compensated for by pumping power from a reserve capacity to the grid using a battery energy storage system (BESS). Alternatives based on penalty cost are assessed using certain criteria, and MCDM methods are used to evaluate the best choice. Further, considering the randomness in the dynamic phenomenon in wind farms, a fuzzy MCDM approach is applied during the decision-making process to evaluate the best alternative for hybrid wind farm operation. Case studies from wind farms in the USA are presented, together with numerical solutions to the problem. In turn, the second part deals with the control aspect, and especially with yaw angle control, which facilitates power maximization at wind farms. A novel transfer function-based methodology is presented that controls the wake center of the upstream turbine(s); lidar-based numerical simulation is carried out for wind farm layouts; and an adaptive control strategy is implemented to achieve the desired yaw angle for upstream turbines. The proposed methodology is tested for two wind farm layouts. Wake management is also implemented for hybrid wind farms where BESS life enhancement is studied. The effect of yaw angle on the operational cost of BESS is assessed, and case studies for wind farm datasets from the USA and Denmark are discussed. Overall, the book provides a comprehensive guide to decision and control aspects for hybrid wind farms, which are particularly important from an industrial standpoint.

Decision and Game Theory for Security

by Mhr Khouzani Emmanouil Panaousis George Theodorakopoulos

This book constitutes the refereed proceedings of the 6th International Conference on Decision and Game Theory for Security, GameSec 2015, held in London, UK, in November 2015. The 16 revised full papers presented together with 5 short papers were carefully reviewed and selected from 37 submissions. Game and decision theory has emerged as a valuable systematic framework with powerful analytical tools in dealing with the intricacies involved in making sound and sensible security decisions. For instance, game theory provides methodical approaches to account for interdependencies of security decisions, the role of hidden and asymmetric information, the perception of risks and costs in human behaviour, the incentives/limitations of the attackers, and much more. Combined with our classical approach to computer and network security, and drawing from various fields such as economic, social and behavioural sciences, game and decision theory is playing a fundamental role in the development of the pillars of the "science of security".

Decision and Game Theory for Security

by Tansu Alpcan Emmanouil Panaousis Quanyan Zhu Milind Tambe William Casey

This book constitutes the refereed proceedings of the 6th International Conference on Decision and Game Theory for Security, GameSec 2015, held in London, UK, in November 2015. The 16 revised full papers presented together with 5 short papers were carefully reviewed and selected from 37 submissions. Game and decision theory has emerged as a valuable systematic framework with powerful analytical tools in dealing with the intricacies involved in making sound and sensible security decisions. For instance, game theory provides methodical approaches to account for interdependencies of security decisions, the role of hidden and asymmetric information, the perception of risks and costs in human behaviour, the incentives/limitations of the attackers, and much more. Combined with our classical approach to computer and network security, and drawing from various fields such as economic, social and behavioural sciences, game and decision theory is playing a fundamental role in the development of the pillars of the "science of security".

Decision and Game Theory for Security: 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedings (Lecture Notes in Computer Science #11836)

by Tansu Alpcan Yevgeniy Vorobeychik John S. Baras György Dán

This book constitutes the refereed proceedings of the 10th International Conference on Decision and Game Theory for Security, GameSec 2019,held in Stockholm, Sweden, in October 2019.The 21 full papers presented together with 11 short papers were carefully reviewed and selected from 47 submissions.The papers focus on protection of heterogeneous, large-scale and dynamic cyber-physical systems as well as managing security risks faced by critical infrastructures through rigorous and practically-relevant analytical methods.

Decision and Game Theory for Security: 11th International Conference, GameSec 2020, College Park, MD, USA, October 28–30, 2020, Proceedings (Lecture Notes in Computer Science #12513)

by Radha Poovendran Quanyan Zhu Juntao Chen John S. Baras

This book constitutes the refereed proceedings of the 11th International Conference on Decision and Game Theory for Security, GameSec 2020,held in College Park, MD, USA, in October 2020. Due to COVID-19 pandemic the conference was held virtually The 21 full papers presented together with 2 short papers were carefully reviewed and selected from 29 submissions. The papers focus on machine learning and security; cyber deception; cyber-physical systems security; security of network systems; theoretic foundations of security games; emerging topics.

Decision and Game Theory for Security: 12th International Conference, GameSec 2021, Virtual Event, October 25–27, 2021, Proceedings (Lecture Notes in Computer Science #13061)

by Stefan Rass Branislav Bošanský Cleotilde Gonzalez Arunesh Sinha

This book constitutes the refereed proceedings of the 12th International Conference on Decision and Game Theory for Security, GameSec 2021,held in October 2021. Due to COVID-19 pandemic the conference was held virtually. The 20 full papers presented were carefully reviewed and selected from 37 submissions. The papers focus on Theoretical Foundations in Equilibrium Computation; Machine Learning and Game Theory; Ransomware; Cyber-Physical Systems Security; Innovations in Attacks and Defenses.

Decision and Game Theory for Security: 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26–28, 2022, Proceedings (Lecture Notes in Computer Science #13727)

by Fei Fang Yezekael Hayel Haifeng Xu

This book constitutes the refereed proceedings of the 13th International Conference on Decision and Game Theory for Security, GameSec 2022, held in October 2022 in Pittsburgh, PA, USA. The 15 full papers presented were carefully reviewed and selected from 39 submissions. The papers are grouped thematically on: deception in security; planning and learning in dynamic environments; security games; adversarial learning and optimization; novel applications and new game models.

Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18–20, 2023, Proceedings (Lecture Notes in Computer Science #14167)

by Yezekael Hayel Jie Fu Tomas Kroupa

This book constitutes the refereed proceedings of the 14th International Conference on Decision and Game Theory for Security, GameSec 2023, held in Avignon, France, during October 18–20, 2023.The 19 full papers and 4 short papers included in this book were carefully reviewed and selected from 33 submissions. They were organized in topical sections as follows: Mechanism design and imperfect information, Security Games, Learning in security games, Cyber deception, Economics of security, Information and privacy and Short articles.

Decision and Game Theory for Security: 15th International Conference, GameSec 2024, New York City, NY, USA, October 16–18, 2024, Proceedings (Lecture Notes in Computer Science #14908)

by Tao Zhang Quanyan Zhu Arunesh Sinha Jie Fu

This book constitutes the refereed proceedings of the 15th International Conference on Decision and Game Theory for Security, GameSec 2024, which took place in New York City, USA, in October 2024. The 15 full papers included in this book were carefully reviewed and selected from 27 submissions. They were organized in topical sections as follows: systems security; economics; equilibrium and control; cyber deception; network and privacy; adversarial machine learning; and cyber-physical systems.

Decision and Game Theory for Security: 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedings (Lecture Notes in Computer Science #11199)

by Tamer Başar Linda Bushnell Radha Poovendran

The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions.Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.

Decision and Game Theory in Management With Intuitionistic Fuzzy Sets

by Deng-Feng Li

The focus of this book is on establishing theories and methods of both decision and game analysis in management using intuitionistic fuzzy sets. It proposes a series of innovative theories, models and methods such as the representation theorem and extension principle of intuitionistic fuzzy sets, ranking methods of intuitionistic fuzzy numbers, non-linear and linear programming methods for intuitionistic fuzzy multi-attribute decision making and (interval-valued) intuitionistic fuzzy matrix games. These theories and methods form the theory system of intuitionistic fuzzy decision making and games, which is not only remarkably different from those of the traditional, Bayes and/or fuzzy decision theory but can also provide an effective and efficient tool for solving complex management problems. Since there is a certain degree of inherent hesitancy in real-life management, which cannot always be described by the traditional mathematical methods and/or fuzzy set theory, this book offers an effective approach to using the intuitionistic fuzzy set expressed with membership and non-membership functions. This book is addressed to all those involved in theoretical research and practical applications from a variety of fields/disciplines: decision science, game theory, management science, fuzzy sets, operational research, applied mathematics, systems engineering, industrial engineering, economics, etc.

Decision and Inhibitory Trees and Rules for Decision Tables with Many-valued Decisions (Intelligent Systems Reference Library #156)

by Igor Chikalov Mikhail Moshkov Fawaz Alsolami Mohammad Azad

The results presented here (including the assessment of a new tool – inhibitory trees) offer valuable tools for researchers in the areas of data mining, knowledge discovery, and machine learning, especially those whose work involves decision tables with many-valued decisions. The authors consider various examples of problems and corresponding decision tables with many-valued decisions, discuss the difference between decision and inhibitory trees and rules, and develop tools for their analysis and design. Applications include the study of totally optimal (optimal in relation to a number of criteria simultaneously) decision and inhibitory trees and rules; the comparison of greedy heuristics for tree and rule construction as single-criterion and bi-criteria optimization algorithms; and the development of a restricted multi-pruning approach used in classification and knowledge representation.

Decision-Based Design

by Christopher Hoyle Henk Jan Wassenaar Wei Chen

Building upon the fundamental principles of decision theory, Decision-Based Design: Integrating Consumer Preferences into Engineering Design presents an analytical approach to enterprise-driven Decision-Based Design (DBD) as a rigorous framework for decision making in engineering design. Once the related fundamentals of decision theory, economic analysis, and econometrics modelling are established, the remaining chapters describe the entire process, the associated analytical techniques, and the design case studies for integrating consumer preference modeling into the enterprise-driven DBD framework. Methods for identifying key attributes, optimal design of human appraisal experiments, data collection, data analysis, and demand model estimation are presented and illustrated using engineering design case studies. The scope of the chapters also provides: A rigorous framework of integrating the interests from both producer and consumers in engineering design, Analytical techniques of consumer choice modelling to forecast the impact of engineering decisions, Methods for synthesizing business and engineering models in multidisciplinary design environments, and Examples of effective application of Decision-Based Design supported by case studies. No matter whether you are an engineer facing decisions in consumer related product design, an instructor or student of engineering design, or a researcher exploring the role of decision making and consumer choice modelling in design, Decision-Based Design: Integrating Consumer Preferences into Engineering Design provides a reliable reference over a range of key topics.

Decision-Making Analyses with Thermodynamic Parameters and Hesitant Fuzzy Linguistic Preference Relations (Studies in Fuzziness and Soft Computing #409)

by Zeshui Xu Peijia Ren

The book introduces readers to some of the latest advances in and approaches to decision-making methods based on thermodynamic characters and hesitant fuzzy linguistic preference relations. By investigating the decision-making methods with thermodynamic parameters based on different information representatives, the book offers readers a novel perspective for solving problems under uncertainty. By exploring the consistency and consensus of hesitant fuzzy linguistic preference relations, the book gives readers efficient ways for preference analysis under uncertainty, chiefly intended for researchers and practitioners working in operations research, multi-attribute decision making, preference analysis, etc. The book can also be used as supplementary material for postgraduate and senior-year undergraduate students of the relevant professional institutions.

Decision-Making and the Information System

by Maryse Salles

The purpose of this book is to question the relationships involved in decision making and the systems designed to support it: decision support systems (DSS). The focus is on how these systems are engineered; to stop and think about the questions to be asked throughout the engineering process and, in particular, about the impact designers' choices have on these systems.

Decision-Making in Crisis Situations: Research and Innovation for Optimal Training

by Sophie Sauvagnargues

This book presents concepts and methods for optimal training for decision making in crisis situations. After presenting some general concepts of decision-making during crisis situations, it presents various innovations for optimal training, such as serious games, scenario design, adapted animation of crisis exercises, observation and debriefing of exercises related to pedagogical objectives.

Decision-making Analysis and Optimization Modeling of Emergency Warnings for Major Accidents

by Wenmei Gai Yan Du Yunfeng Deng

This book highlights cutting-edge research into emergency early warning management and decision-making for severe accidents. Using toxic gas leakages as examples, it puts forward new design methods for emergency early warning systems, as well as a systematic description of emergency early warning information communication mechanisms and characteristics of regional evacuation, based on a wide range of theories, including safety engineering, information engineering, communication, behaviorology and others. The book applies a range of methods, such as case analysis, questionnaire interviews, and multi-objective optimization modeling. Drawing on this basis, it subsequently proposes a multi-objective optimization modeling and algorithm for emergency path selection, together with an evacuation risk assessment method. Divided into six chapters prepared by an international team of researchers, the book addresses the design of early warning systems, communication and dissemination mechanisms of early warning information, characteristics of regional evacuation, multi-objective optimization of emergency paths, and evacuation risk assessment. ­­­­­ The book offers an essential reference guide for engineering technicians and researchers in a wide range of fields, including emergency management, safety science and engineering, disaster relief engineering, and transportation optimization, as well as graduate students in related majors at colleges and universities.

Decisively Digital: From Creating a Culture to Designing Strategy

by Alexander Loth

Discover how to survive and thrive in an increasingly digital world Digital strategy should consist of more than just updating your business’ desktop computers and buying the newest smartphones for your employees. It requires the reimagining of existing business processes and the implementation of the latest technologies into current business activity to enable new capabilities for your firm. In Decisively Digital: From Creating a Culture to Designing Strategy, digital strategy advisor and author Alexander Loth leverages his extensive experience working with Microsoft, CERN, and SAP to deliver a robust and accessible exploration of what it takes for a company to unlock the potential of new digital technologies. You’ll discover how to: Utilize new technologies to establish a digital culture and realize the benefits of modern work for your employees Unleash the abilities that come with processing big data and taking advantage of data democracy, analytics, and cloud computing Implement artificial intelligence, blockchain, process automation, and IoT in a way that goes beyond the hype and delivers real business results Packed with interviews with industry leaders and real-world customer examples, Decisively Digital is ideal for CIOs, CDOs, and other executives and professionals who need to know how technology can improve their businesses and power results today and tomorrow.

Declarative Programming and Knowledge Management

by Michael Hanus Ricardo Rocha

This book constitutes the proceedings of the Kiel Declarative Programming Days, KDPD 2013, unifying the following conferences: the 20th International Conference on Applications of Declarative Programming and Knowledge Management (INAP 2013), the 22nd International Workshop on Functional and (Constraint) Logic Programming (WFLP 2013) and the 27th Workshop on Logic Programming (WLP 2013), held in Kiel, Germany, in September 2013. The 15 papers presented were carefully and reviewed and selected for inclusion in this book. They cover the following topics: logic programming, constraint problem solving, programmable logic solvers, functional programming and constraint programming.

Declarative Programming and Knowledge Management: Conference on Declarative Programming, DECLARE 2019, Unifying INAP, WLP, and WFLP, Cottbus, Germany, September 9–12, 2019, Revised Selected Papers (Lecture Notes in Computer Science #12057)

by Salvador Abreu Dietmar Seipel Petra Hofstedt Ulrich John Herbert Kuchen

This book constitutes revised selected papers from the 22nd International Conference on Applications of Declarative Programming and Knowledge Management, INAP 2019, the 33rd Workshop on Logic Programming, WLP 2019, and the 27th Workshop on Functional and (Constraint) Logic Programming, WFLP 2019. The 15 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 24 submissions. The contributions present current research activities in the areas of declarative languages and compilation techniques, in particular for constraint-based, logical and functional languages and their extensions, as well as discuss new approaches and key findings in constraint-solving, knowledge representation, and reasoning techniques.

Declarative Programming and Knowledge Management: Declarative Programming Days, Kdpd 2013, Unifying Inap, Wflp, And Wlp, Kiel, Germany, September 11-13, 2013, Revised Selected Papers (Lecture Notes in Computer Science #8439)

by Michael Hanus Salvador Abreu Dietmar Seipel

This book constitutes revised selected papers from the 21st International Conference on Applications of Declarative Programming and Knowledge Management, INAP 2017, the 31st Workshop on Logic Programming, WLP 2017, and the 25th Workshop on Functional and (Constraint) Logic Programming, WFLP 2017. The 12 full papers presented in this volume were carefully reviewed and selected from 26 submissions. The contributions were organized in topical sections named: constraints; declarative systems; and functional and logic programming.

Declaring Independence in Cyberspace: Internet Self-Governance and the End of US Control of ICANN (Information Policy)

by Milton L. Mueller

How and why the US government gave up its control of ICANN, the global coordinator of internet names, numbers, and protocols—and what the geopolitical consequences were.In 1997 the United States decided that the Internet should be governed not by governments but by something called the &“global Internet community.&” In Declaring Independence in Cyberspace, Milton Mueller tells the story of why it took 20 years of organizational and geopolitical struggle to make that happen.ICANN (Internet Corporation for Assigned Names and Numbers), created in 1998, was the US government&’s answer to the question of who would control the Internet registries—a key part of the Internet infrastructure supporting domain names, network numbers, IP addresses, and other protocol parameters. Originally, ICANN was a bold institutional innovation based on a vision of Internet governance that was thoroughly globalized and independent of nation-states. Declaring Independence in Cyberspace explains where this vision came from, the problems posed by its implementation, and the organization&’s near-self destruction in its first five years.The US government refused to let go of ICANN for 15 years, triggering geopolitical conflicts over sovereignty and US power. Mueller details why, what prompted its change of heart, and how the problem of making ICANN accountable to its community in the absence of US government control sparked a political battle in Washington. His account gets to the very heart of a pressing question with profound global implications: Is state sovereignty the immutable foundation of global governance, or do new technological capabilities change the model?

Decoding Blockchain for Business: Understand the Tech and Prepare for the Blockchain Future

by Stijn Van Hijfte

Business professionals looking to understand the impact, future, and limitations of blockchain need look no further. This revolutionary technology has impacted business and the economy in unprecedented ways within the past decade, and it is only continuing to grow. As a leader in your organization, it is vital that you decode blockchain and optimize all the ways in which it can improve your business.Author of Decoding Blockchain for Business, Stijn Van Hijfte, expertly emphasizes the imperative of professionals in any sector of industry to understand the core concepts and implications of blockchain technology. Cryptocurrencies, cryptotrading, and constantly-changing tax structures for financial systems using blockchain technologies are covered in detail. The lasting effects of blockchain across specific industries such as media, real estate, finance, and regulatory bodies are addressed with an insightful eye from Van Hijfte.If not properly implemented with care and a foundation of knowledge, blockchain brings risks and uncertainties to a company. Know your technology to be ready for the present and the future, and stay ahead of the curve. Blockchain is here to stay, and Decoding Blockchain for Business is your professional roadmap. What You Will Learn Discover the risks associated with blockchain if not properly implemented Gain insights on how blockchain technology affects other booming topics such as AI, IoT, and RPA Look at the regulations surrounding Blockchain in different countries Who This Book Is For Business professionals looking to understand the impact, future, and limitations of Blockchain and how individuals and companies should prepare for this technology.

Decoding Cultural Heritage: A Critical Dissection and Taxonomy of Human Creativity through Digital Tools

by Fernando Moral-Andrés Elena Merino-Gómez Pedro Reviriego

This book provides readers with an overview of the use of digital techniques for cultural heritage preservation. Those include image processing, advanced sensing, geomatics or virtual and augmented reality. The use of newer tools such as generative artificial intelligence for images and 3D or advanced natural language processing systems is also considered. The ultimate goal is to provide readers with a global perspective of the state of the art on the use of digital tools for cultural heritage applications, both for researchers and professionals involved in cultural heritage and for computer scientists and engineers that design and develop technologies that can be used for cultural heritage preservation.

Refine Search

Showing 16,351 through 16,375 of 61,857 results