Mathematical methods and theories with interdisciplinary applications are presented in this book. The eighteen contributions presented in this Work have been written by eminent scientists; a few papers are based on talks which took place at the International Conference at the Hellenic Artillery School in May 2015. Each paper evaluates possible solutions to long-standing problems such as the solvability of the direct electromagnetic scattering problem, geometric approaches to cyber security, ellipsoid targeting with overlap, non-equilibrium solutions of dynamic networks, measuring ballistic dispersion, elliptic regularity theory for the numerical solution of variational problems, approximation theory for polynomials on the real line and the unit circle, complementarity and variational inequalities in electronics, new two-slope parameterized achievement scalarizing functions for nonlinear multiobjective optimization, and strong and weak convexity of closed sets in a Hilbert space.
Graduate students, scientists, engineers and researchers in pure and applied mathematical sciences, operations research, engineering, and cyber security will find the interdisciplinary scientific perspectives useful to their overall understanding and further research.
Table of Content
Complementarity and Variational Inequalities in Electronics (K. Addi, D. Goeleven).- Electromagnetic Scattering by a Chiral Impedance Screen (C. E. Athanasiadis, V. Sevroglou, K. Skourogiannis).- Optimal Batch Production with Rework Process for Products with Time Varying Demand over Finite Planning Horizon (L. Benkherouf, K. Skouri, I. Konstantaras).- On co-polynomials on the real line and the unit circle (Kenier Castillo, Francisco Marcellán, Jorge Rivero).- Electromagnetic Compatibility (EMC) in Challenging Environments (C. Christopoulos).- Cybersecurity Investments with Nonlinear Budget Constraints: Analysis of the Marginal Expected Utilities (P. Daniele, A. Maugeri, A. Nagurney).- Ellipsoid Targeting with Overlap (N. J. Daras).- A Review of Several Optimization Problems Related to Security in Networked System (B. Das Gupta, V. Srinivasan).- On Some Information Geometric Approaches to Cyber Security (C. Dodson).- A Survey of Recent Inequalities for Relative Operator Entropy (S. S. Dragomir).- On the Use of Elliptic Regularity Theory for the Numerical Solution of Variational Problems (A. Dreves, J. Gwinner, N. Ovcharova).- Strong and Weak Convexity of Closed Sets in a Hilbert space (V. V. Goncharov, G. E. Ivanov).- Non-Equilibrium Solutions of Dynamic Networks: a Hybrid System Approach (Scott Greenhalgh, Monica-Gabriela Cojocaru).- Measuring Ballistic Dispersion for the Purpose of Ammunition Quality Assurance (W. J. Hurley, J. Brimberg, A. Pavlov).- Region-Based Watermarking for Images (K. A. Raftopoulos, N. Papadakis, K. S. Ntalianis, P. Tzouveli, G. Goudelis, S. D. Kollias).- Optimal Inventory Policies for Finite Horizon Inventory Models with Time Varying Demand: a Unified Presentation (K. Skouri, L. Benkherouf, I. Konstantaras).- Metrical Pareto Efficiency and Monotone EVP (M. Turinici).- New Two-Slope Parameterized Achievement Scalarizing Functions for Nonlinear Multiobjective Optimization (O. Wilppu, M. M. Makel, Y. Nikuli).