On the real world applications of many-objective evolutionary algorithms

Author(s):  
Hayder H. Safi ◽  
Osman N. Ucan ◽  
Oguz Bayat
Author(s):  
Michael Suk-Young Chwe

This chapter examines African American folktales that teach the importance of strategic thinking and argues that they informed the tactics of the 1960s civil rights movement. It analyzes a number of stories where characters who do not think strategically are mocked and punished by events while revered figures skillfully anticipate others' future actions. It starts with the tale of a new slave who asks his master why he does nothing while the slave has to work all the time, even as he demonstrates his own strategic understanding. It then considers the tale of Brer Rabbit and the Tar Baby, along with “Malitis,” which tackles the problem of how the slaves could keep the meat and eat it openly. These and other folktales teach how inferiors can exploit the cluelessness of status-obsessed superiors, a strategy that can come in handy. The chapter also discusses the real-world applications of these folktales' insights.


2017 ◽  
Vol 1 (2) ◽  
pp. 76-90 ◽  
Author(s):  
Jassim Happa ◽  
Michael Goldsmith

Purpose Several attack models attempt to describe behaviours of attacks with the intent to understand and combat them better. However, all models are to some degree incomplete. They may lack insight about minor variations about attacks that are observed in the real world (but are not described in the model). This may lead to similar attacks being classified as the same type of attack, or in some cases the same instance of attack. The appropriate solution would be to modify the model or replace it entirely. However, doing so may be undesirable as the model may work well for most cases or time and resource constraints may factor in as well. This paper aims to explore the potential value of adding information about attacks and attackers to existing models. Design/methodology/approach This paper investigates used cases of minor variations in attacks and how it may and may not be appropriate to communicate subtle differences in existing attack models through the use of annotations. In particular, the authors investigate commonalities across a range of existing models and identify where and how annotations may be helpful. Findings The authors propose that nuances (of attack properties) can be appended as annotations to existing attack models. Using annotations appropriately should enable analysts and researchers to express subtle but important variations in attacks that may not fit the model currently being used. Research limitations/implications This work only demonstrated a few simple, generic examples. In the future, the authors intend to investigate how this annotation approach can be extended further. Particularly, they intend to explore how annotations can be created computationally; the authors wish to obtain feedback from security analysts through interviews, identify where potential biases may arise and identify other real-world applications. Originality/value The value of this paper is that the authors demonstrate how annotations may help analysts communicate and ask better questions during identification of unknown aspects of attacks faster,e.g. as a means of storing mental notes in a structured manner, especially while facing zero-day attacks when information is incomplete.


2015 ◽  
Vol 11 (02) ◽  
pp. 115-120
Author(s):  
Aki-Hiro Sato ◽  
Hiroshi Kawakami ◽  
Toshihiro Hiraoka

This is a topical issue on the 16th Asia–Pacific Symposium on Intelligent and Evolutionary Systems (IES) which was held in Kyoto from December 12–14, 2012. This special issue contains six articles related to evolutionary algorithms that are designed to solve optimization problems, network concepts, mathematical methods and their real world applications.


Author(s):  
Viet Bui ◽  
Trung Pham ◽  
Huy Nguyen ◽  
Hoang Nhi Tran Gia ◽  
Tauheed Khan Mohd

Sign in / Sign up

Export Citation Format

Share Document