Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Physical Sciences and Mathematics

Development Of Genetic Algorithm For Solving Scheduling Tasks In Fms With Coloured Petri Nets, Liana Napalkova, Galina Merkuryeva, Miquel Angel Piera Oct 2006

Development Of Genetic Algorithm For Solving Scheduling Tasks In Fms With Coloured Petri Nets, Liana Napalkova, Galina Merkuryeva, Miquel Angel Piera

Liana Napalkova

The paper describes the algorithm, which is developed to solve scheduling tasks in Flexible Manufacturing Systems. The algorithm is a combination of Genetic Algorithm and Coloured Petri Nets. It is proposed to use Coloured Petri Nets to tackle the encoding problem in Genetic Algorithm. The objective is to minimize the total make-span subject to different constraints obtained in Flexible Manufacturing Systems.


Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara May 2006

Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara

Qing Hu

With billions of dollars being spent on information security related products and services each year, the economics of information security investment has become an important area of research, with significant implications for management practices. Drawing on recent studies that examine optimal security investment levels under various attack scenarios, we propose an economic model that considers simultaneous attacks from multiple external agents with distinct characteristics, and derive optimal investments based on the principle of benefit maximization. The relationships among the major variables, such as systems vulnerability, security breach probability, potential loss of security breach, and security investment levels, are investigated via …


Pre-Disaster Planning And Mitigation And Its Impact On Comprehensive Emergency Management And The Nation: Pre-Disaster Mitigation (Pdm) Program And The Population Protected, Thomas Lyons Carr Iii May 2006

Pre-Disaster Planning And Mitigation And Its Impact On Comprehensive Emergency Management And The Nation: Pre-Disaster Mitigation (Pdm) Program And The Population Protected, Thomas Lyons Carr Iii

Thomas Lyons (Thom) Carr III Appl.Sc., CEM

A Project for a Professional Degree submitted to The Faculty of School of Engineering and Applied Science of The George Washington University in partial fulfillment of the requirements for the degree of Applied Scientist of Engineering Management May 21, 2006

On October 10, 2000, The Disaster Mitigation Act of 2000 (DMA 2000 or DMA 2K) (Public Law 106-390) was enacted, amending the Robert T. Stafford Relief and Emergency Assistance Act and established new requirements for the national for hazard mitigation planning. States, Tribes, territories, and local governments now must have an approved mitigation plan in place prior to receiving certain …


Homeland Security: Engaging The Frontlines - Symposium Proceedings, George H. Baker, Cheryl J. Elliott Apr 2006

Homeland Security: Engaging The Frontlines - Symposium Proceedings, George H. Baker, Cheryl J. Elliott

George H Baker

The rise of the American homeland security endeavor under the leadership of the new Department of Homeland Security has been heralded by several major national strategy documents. These documents have served to organize efforts at top levels within the government and industry. However, the national strategy guidance is not getting to many organizations and people at the grass-roots level who can make the most difference in preventing attacks, protecting systems, and recovering from catastrophic events, viz. the general citizenry, private infrastructure owners, and local governments. To better understand grass-roots issues and solutions, James Madison University, in cooperation with the Federal …


Globalization & Nationalism: A Recipe For Terror, Cari Bourette, Daniel Reader Mar 2006

Globalization & Nationalism: A Recipe For Terror, Cari Bourette, Daniel Reader

Cari Bourette

Nationalism appears to be part of the human condition; it may well be related to the human tendency toward tribalism. Whatever the case, nationalism appears to be a permanent feature on the global landscape. Globalization, while not a new phenomenon by any means, seems to be having a tremendous dilutory effect on the sovereignty of states; it now appears to be carrying the assault to the cultural frontiers of nationalism. Unlike the Westphalian constructs, however, nations will not so easily succumb. There is a greater inherent resistance to change in nations; the only historically effective method has been outright eradication …


The "Duty" To Be A Rational Shareholder, David A. Hoffman Feb 2006

The "Duty" To Be A Rational Shareholder, David A. Hoffman

David A Hoffman

How and when do courts determine that corporate disclosures are actionable under the federal securities laws? The applicable standard is materiality: would a (mythical) reasonable investor have considered a given disclosure important. As I establish through empirical and statistical testing of approximately 500 cases analyzing the materiality standard, judicial findings of immateriality are remarkably common, and have been stable over time. Materiality's scope results in the dismissal of a large number of claims, and creates a set of cases in which courts attempt to explain and defend their vision of who is, and is not, a reasonable investor. Thus, materiality …


Development Of A Design Environment For End Users To Build The Target-Relevant Decision Support Tools In Rural Industry, Shah Jahan Miah Jan 2006

Development Of A Design Environment For End Users To Build The Target-Relevant Decision Support Tools In Rural Industry, Shah Jahan Miah

Dr Shah Jahan Miah

Decision support systems (DSS) developed by end users have had limited success in rural operations. This paper will discuss the development stages of a new tool for improving the DSS development process in the rural industries. The object of this project is to develop an end user enabled design environment (EUEDE) which will allow a non-technical computer user to build target-relevant decision support tools. The resultant design environment aims to allow the end user to re-use and share their knowledge within a specific business context. This approach will facilitate flexibility to build relevant DSS’s for an end user’s specific decision …


The Role Of Connective Tissue Growth Factor In Skeletal Growth And Development, Philadelphia University Jan 2006

The Role Of Connective Tissue Growth Factor In Skeletal Growth And Development, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Foreign Exchange Intervention By The Bank Of Japan: Bayesian Analysis Using A Bivariate Stochastic Volatility Model, Michael Smith, Andrew Pitts Dec 2005

Foreign Exchange Intervention By The Bank Of Japan: Bayesian Analysis Using A Bivariate Stochastic Volatility Model, Michael Smith, Andrew Pitts

Michael Stanley Smith

A bivariate stochastic volatility model is employed to measure the effect of intervention by the Bank of Japan (BOJ) on daily returns and volume in the USD/YEN foreign exchange market. Missing observations are accounted for, and a data-based Wishart prior for the precision matrix of the errors to the transition equation that is in line with the likelihood is suggested. Empirical results suggest there is strong conditional heteroskedasticity in the mean-corrected volume measure, as well as contemporaneous correlation in the errors to both the observation and transition equations. A threshold model is used for the BOJ reaction function, which is …


Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara Dec 2005

Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara

Qing Hu

With billions of dollars being spent on information security related products and services each year, the economics of information security investment has become an important area of research, with significant implications for management practices. Drawing on recent studies that examine optimal security investment levels under various attack scenarios, we propose an economic model that considers simultaneous attacks from multiple external agents with distinct characteristics, and derive optimal investments based on the principle of benefit maximization. The relationships among the major variables, such as systems vulnerability, security breach probability, potential loss of security breach, and security investment levels, are investigated via …


The Development Of A Logistic Regression Model Used To Identify At-Risk Students On The Ohio Grade 3 Reading Achievement Test, John Fraas, Doug Marrah, Harold Wilson, Herb Broda, Jim Rycik Dec 2005

The Development Of A Logistic Regression Model Used To Identify At-Risk Students On The Ohio Grade 3 Reading Achievement Test, John Fraas, Doug Marrah, Harold Wilson, Herb Broda, Jim Rycik

John W. Fraas

No abstract provided.