000780212 000__ 05189cam\a2200517Ii\4500 000780212 001__ 780212 000780212 005__ 20230306143101.0 000780212 006__ m\\\\\o\\d\\\\\\\\ 000780212 007__ cr\nn\nnnunnun 000780212 008__ 170316s2017\\\\sz\\\\\\ob\\\\000\0\eng\d 000780212 019__ $$a984848357 000780212 020__ $$a9783319515007$$q(electronic book) 000780212 020__ $$a3319515004$$q(electronic book) 000780212 020__ $$z9783319514987 000780212 0247_ $$a10.1007/978-3-319-51500-7$$2doi 000780212 035__ $$aSP(OCoLC)ocn976077657 000780212 035__ $$aSP(OCoLC)976077657$$z(OCoLC)984848357 000780212 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dN$T$$dGW5XE$$dEBLCP$$dOCLCF$$dYDX$$dUAB$$dNJR$$dIOG$$dAZU$$dUPM 000780212 049__ $$aISEA 000780212 050_4 $$aQA76.9.A25 000780212 08204 $$a005.8$$223 000780212 24500 $$aOperations research, engineering, and cyber security :$$btrends in applied mathematics and technology /$$cNicholas J. Daras, Themistocles M. Rassias. 000780212 264_1 $$aCham, Switzerland :$$bSpringer,$$c[2017] 000780212 264_4 $$c©2017 000780212 300__ $$a1 online resource. 000780212 336__ $$atext$$btxt$$2rdacontent 000780212 337__ $$acomputer$$bc$$2rdamedia 000780212 338__ $$aonline resource$$bcr$$2rdacarrier 000780212 347__ $$atext file$$bPDF$$2rda 000780212 4901_ $$aSpringer optimization and its applications ;$$vvolume 113 000780212 504__ $$aIncludes bibliographical references. 000780212 5050_ $$aComplementarity and Variational Inequalities in Electronics (K. Addi, D. Goeleven) -- Electromagnetic Scattering by a Chiral Impedance Screen (C. E. Athanasiadis, V. Sevroglou, K. Skourogiannis) -- Optimal Batch Production with Rework Process for Products with Time Varying Demand over Finite Planning Horizon (L. Benkherouf, K. Skouri, I. Konstantaras) -- On co-polynomials on the real line and the unit circle (Kenier Castillo, Francisco Marcellán, Jorge Rivero) -- Electromagnetic Compatibility (EMC) in Challenging Environments (C. Christopoulos) -- Cybersecurity Investments with Nonlinear Budget Constraints: Analysis of the Marginal Expected Utilities (P. Daniele, A. Maugeri, A. Nagurney) -- Ellipsoid Targeting with Overlap (N. J. Daras) -- A Review of Several Optimization Problems Related to Security in Networked System (B. DasGupta, V. Srinivasan) -- On Some Information Geometric Approaches to Cyber Security (C. Dodson) -- A Survey of Recent Inequalities for Relative Operator Entropy (S. S. Dragomir) -- On the Use of Elliptic Regularity Theory for the Numerical Solution of Variational Problems (A. Dreves, J. Gwinner, N. Ovcharova) -- Strong and Weak Convexity of Closed Sets in a Hilbert space (V. V. Goncharov, G. E. Ivanov) -- Non-Equilibrium Solutions of Dynamic Networks: a Hybrid System Approach (Scott Greenhalgh, Monica-Gabriela Cojocaru) -- Measuring Ballistic Dispersion for the Purpose of Ammunition Quality Assurance (W. J. Hurley, J. Brimberg, A. Pavlov) -- Region-Based Watermarking for Images (K. A. Raftopoulos, N. Papadakis, K. S. Ntalianis, P. Tzouveli, G. Goudelis, S. D. Kollias) -- Optimal Inventory Policies for Finite Horizon Inventory Models with Time Varying Demand: a Unified Presentation (K. Skouri, L. Benkherouf, I. Konstantaras) -- Metrical Pareto Efficiency and Monotone EVP (M. Turinici) -- New Two-Slope Parameterized Achievement Scalarizing Functions for Nonlinear Multiobjective Optimization (O. Wilppu, M. M. Makel, Y. Nikuli). 000780212 506__ $$aAccess limited to authorized users. 000780212 520__ $$aMathematical methods and theories with interdisciplinary applications are presented in this book. The eighteen contributions presented in this Work have been written by eminent scientists; a few papers are based on talks which took place at the International Conference at the Hellenic Artillery School in May 2015. Each paper evaluates possible solutions to long-standing problems such as the solvability of the direct electromagnetic scattering problem, geometric approaches to cyber security, ellipsoid targeting with overlap, non-equilibrium solutions of dynamic networks, measuring ballistic dispersion, elliptic regularity theory for the numerical solution of variational problems, approximation theory for polynomials on the real line and the unit circle, complementarity and variational inequalities in electronics, new two-slope parameterized achievement scalarizing functions for nonlinear multiobjective optimization, and strong and weak convexity of closed sets in a Hilbert space. Graduate students, scientists, engineers and researchers in pure and applied mathematical sciences, operations research, engineering, and cyber security will find the interdisciplinary scientific perspectives useful to their overall understanding and further research. 000780212 588__ $$aOnline resource, title from PDF title page (viewed March 18, 2017). 000780212 650_0 $$aCyber intelligence (Computer security) 000780212 650_0 $$aComputer networks$$xSecurity measures. 000780212 650_0 $$aSystems engineering. 000780212 7001_ $$aDaras, Nicholas J.,$$eeditor. 000780212 7001_ $$aRassias, Themistocles M.,$$d1951-$$eeditor. 000780212 77608 $$iPrint version:$$z9783319514987 000780212 830_0 $$aSpringer optimization and its applications ;$$vv. 113. 000780212 852__ $$bebk 000780212 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-51500-7$$zOnline Access$$91397441.1 000780212 909CO $$ooai:library.usi.edu:780212$$pGLOBAL_SET 000780212 980__ $$aEBOOK 000780212 980__ $$aBIB 000780212 982__ $$aEbook 000780212 983__ $$aOnline 000780212 994__ $$a92$$bISE