Intro; Preface; Contents; Evaluation of the Succession Measures of the Simultaneous Perturbation Stochastic Approximation Algorithm for the Optimization of the Process Capability Index; 1 Introduction; 2 Materials and Methods; 2.1 SPSA Algorithm and Optimization of the PCI (Cpk); 3 Results; 4 Conclusions; References; An Optimization Vehicle Routing Problem Approached by Bio-inspired Algorithms-A Real Case Study; 1 Introduction; 2 Background; 2.1 Vehicle Routing Problem; 2.2 Bio-Inspired Algorithms; 2.3 Overview of Related Works; 3 Proposed Method and Problem Description
2.2 Ubicomp Paradigms3 Context-Awareness; 3.1 The Components of Context-Aware Systems; 3.2 Related Work; 4 Tacit Knowledge in Context Awareness; 4.1 Knowledge; 4.2 Tacit Knowledge Elements; 4.3 Tacit Knowledge Creation Process; 4.4 Proposal; 4.5 Tacit Context Modeling; 5 Conclusions; 5.1 Future Work; References; Applied Decision Making in Design Innovation Management; 1 Introduction; 2 The Decision-Making Process; 3 Defining Innovation; 4 New Product Development, Management and Design; 5 Case Study: Information Technology Firms in Baja California; 6 Conclusions; References
4 Simulation Results5 Conclusions; Appendix; References; Agent-Based Model of Resistant Bacterial Evolution in an Heterogeneous Medium; 1 Introduction; 1.1 Antibiotic Resistance Development; 1.2 Heterogeneous Environments; 1.3 Development of Antibiotic Resistance at the Molecular Level; 1.4 Agent-Based Modeling; 2 Methodology; 3 Results; 3.1 Simulations; 3.2 Statistical Analysis; 4 Discussions; 5 Conclusions; References; Towards Intelligent Systems for Ubiquitous Computing: Tacit Knowledge-Inspired Ubicomp; 1 Introduction; 2 Ubiquitous Computing; 2.1 Ubicomp Characteristics
Adaptive Security Based on MAPE-K: A Survey1 Introduction; 2 Background; 2.1 Autonomic Computing; 2.2 MAPE-K Reference Model; 2.3 Adaptive Security; 3 Survey of Adaptive Security Systems; 3.1 Adaptive Authorization Framework, Bailey et al.; 3.2 Adaptive Security in Smart Space, Evesti et al.; 3.3 Adaptive Access Control Model, Ma and Wang; 3.4 Dynamic Reconfiguration of Security Policies, Pinto et al.; 3.5 Adaptive Security Solution, Amoud and Roudies; 3.6 Adaptive Security in Mobile Devices, Amoud and Roudies; 3.7 Adaptive Security in Smart Camera Networks, Amoud and Roudies
From Simulation to Implementation: Practical Advice for Policy Makers Who Want to Use Computer Modeling as an Analysis and Communication Tool1 Introduction; 1.1 The Challenges of Public Policy Design; 2 Complexity and Emergence; 2.1 Complexity and Public Policies; 2.2 Complexity and Cities; 3 Modeling; 3.1 Computational Modeling; 3.2 Agent-Based Models; 4 Recommendations for Beginning Modelers; 4.1 The Modeling Process; 4.2 Real World Observation; 4.3 Theory Elaboration; 4.4 Model Execution; 4.5 Output Analysis and Representation; 4.6 Results Presentation; References
0
8
8
8
8
This book gathers a collection of the latest research, applications, and proposals, introducing readers to innovations and concepts from diverse environments and systems. As such, it will provide students and professionals alike with not only cutting-edge information, but also new inspirations and potential research directions. Each chapter focuses on a specific aspect of applied decision making, e.g. in complex systems, computational intelligence, security, and ubiquitous computing.
Springer Nature
com.springer.onix.9783030179854
9783030179847
9783030179861
9783030179878
Decision making-- Mathematical models.
Decision making-- Simulation methods, Case studies.