Editors: Vinod Kumar, Mandeep Mittal, Adesh Kumari

Series Title: Computational Intelligence for Data Analysis

Optimization Techniques for Decision-making and Information Security

Volume 3

eBook: US $39 Special Offer (PDF + Printed Copy): US $67
Printed Copy: US $47
Library License: US $156
ISBN: 978-981-5196-33-7 (Print)
ISBN: 978-981-5196-32-0 (Online)
Year of Publication: 2024
DOI: 10.2174/97898151963201240101

Introduction

Optimization Techniques for Decision-making and Information Security is a scholarly compilation that has been edited by experts with specialized knowledge in the fields of decision theory and cybersecurity. Through the synthesis of an extensive array of information, this edited volume presents novel methodologies and approaches that forge a link between the critical domain of information security and the realm of decision-making processes.

The publication commences with a fundamental investigation that establishes the theoretical foundations of information security-relevant decision-making models. The subsequent chapters present comprehensive evaluations of real-world applications, showcasing an assortment of optimization techniques. The book offers a wide range of perspectives on the practical implementation of data analysis in various domains, including but not limited to power generation and optimization, solid transportation problems, soft computing techniques, wireless sensor networks, parametric set-valued optimization problems, data aggregation optimization techniques, fuzzy linear programming problems, and nonlinear chaotic systems. The anthology concludes with a comprehensive summary of the most noteworthy observations and ramifications extracted from the projects of all contributors.

Key features

  • - Presents a wide variety of sophisticated optimization methodologies
  • - Explores the intricate intersection of decision theory and the safeguarding of confidential information.
  • - Emphasizes effectiveness in improving decision-making processes designed to strengthen information security measures.
  • - Showcases practical examples in different industrial domains through case studies and real-world problems.
  • - Provides guidance and contemplations on strengthening information security environments.
  • - Includes scientific references for advanced reading

This book serves as an essential reference for policymakers, researchers, and professionals who are learning about or working in information security roles.

Readership

Policymakers, researchers, and professionals in information security roles.

Foreword

- Pp. i
Mansaf Alam
Download Free

Preface

- Pp. ii-vi (5)
Vinod Kumar, Mandeep Mittal, Adesh Kumari
Download Free

List of Contributors

- Pp. vii-viii (2)

Download Free

Cost Optimisation Analysis for a Markovian Feedback Queueing System with Discouragement, Breakdown, and Threshold-based Recovery Policy

- Pp. 1-17 (17)
Amit Kumar, Amina Angelika Bouchentouf, Mohamed Boualem*

PDF Price: $15

View Abstract Purchase Chapter

Solutions of Parametric Set-Valued Optimization Problems of Higher-Order

- Pp. 18-35 (18)
Koushik Das*, Chandal Nahak

PDF Price: $15

View Abstract Purchase Chapter

Development and Assessment of Data in Solarpowered System for Simultaneous Production of Power, Heating, and Cooling

- Pp. 36-47 (12)
Mohd Parvez*, Taufique Ahamad, Osama Khan

PDF Price: $15

View Abstract Purchase Chapter

A New Algorithm for Solving Fully Fuzzy Linear Programming Problems using the Lexicographic Method

- Pp. 48-61 (14)
Anil Kumar Nishad*, Gunjan Agarwal, S. R. Singh, Gajraj Singh

PDF Price: $15

View Abstract Purchase Chapter

Anti-synchronization Between Different Nonlinear Chaotic Systems Via Active Nonlinear Control Method

- Pp. 62-74 (13)
Sanjay Kumar, Ram Pravesh Prasad*

PDF Price: $15

View Abstract Purchase Chapter

Fixed Charged Nonlinear Solid Transportation Problem with Budget Constraints Using Bounded Parameters

- Pp. 75-91 (17)
A. K. Bhurjee, P. Kumar*

PDF Price: $15

View Abstract Purchase Chapter

Soft Computing Techniques for Cancer Classification of Gene Expression Microarray Data: A Three-Phase Hybrid Approach

- Pp. 92-113 (22)
Amol Avinash Joshi*, Rabia Musheer Aziz

PDF Price: $15

View Abstract Purchase Chapter

A Survey of Pairing Free Certificateless Signature Schemes for Secure Networking

- Pp. 114-131 (18)
Deepika*, Pankaj Kumar

PDF Price: $15

View Abstract Purchase Chapter

Analysis and Development of Tie-breaking Procedures Using Fuzzy Technique for Order Performance by Similarity to Ideal Solution

- Pp. 132-145 (14)
Iftikhar Husain*

PDF Price: $15

View Abstract Purchase Chapter

Subject Index

- Pp. 146-150 (5)
Vinod Kumar, Mandeep Mittal, Adesh Kumari
Download Free