Please login to be able to save your searches and receive alerts for new content matching your search criteria.
We address the following: Are there several optimal strategies for a hunter-gatherer society in a given environment, in which the society has an evolving level of technology and/or skills? We use the Genetic Algorithm, with point mutations, to facilitate the search for these strategies. We find that, in a generous environment, several optimal strategies are possible; there is no unique optimal strategy. We are now in a position, with the Genetic Algorithm, to assess different approaches to resource exploitation and the role of contingency.
Using a dynamic programming formulation, an analysis is presented of both the first and second innings of a one-day cricket match assuming variation in type of ball bowled and subsequent selection of a strategy by the batsman. We assume that the team batting first uses the strategy to maximize the expected score, and the team batting second uses the strategy to maximize the probability of outscoring the first team and thus of maximizing the probability of a win. The dynamic programming formulation allows a calculation, at any stage of the innings, of the optimal scoring strategy depending on the type of ball bowled, along with an estimate of the maximum of the expected number of runs scored in the remainder of the first innings, and the maximum probability of a win in the second innings. Modifications are then introduced to examine the effect of tailender batsmen and a "fifth bowler". Finally a simulation is done to estimate the variance in total score by following the optimal strategy used in the first innings.
In this paper, to explore propagation dynamics of computer viruses over the Internet, a delayed SLBRS (susceptible–latent–breaking-out–recovering–susceptible) model of computer viruses considering horizontal and vertical dissemination over Internet is studied. The basic reproduction number at which computer viruses are prone to be extinct or continue to exist is calculated with the help of the next generation matrix method. By choosing the time delay because of processing time consumed to recover the breaking-out computers as bifurcation parameter, a series of sufficient criteria for experience of Hopf bifurcation are derived. Specially, optimal strategies to control dissemination of computer viruses over Internet are established. Finally, numerical simulations for certificating correctness of our theoretical findings are carried out. The findings show that the exhibition of Hopf bifurcation has an important impact on prediction and control of the propagation of computer viruses over the Internet.
When it is not economical to carry out maintenance in-house, out-sourcing to an external agent is an alternate viable option. In this paper, we study a simple maintenance service contract involving a single agent (providing the maintenance service) and a single customer (owner of the equipment and recipient of the maintenance service). We develop a simple model to obtain the optimal strategies for both the customer and the agent. We give a complete characterization of the strategies along with some sensitivity analysis and discuss some extensions.
We consider a popular model of microeconomics with countably many assets: the Arbitrage Pricing Model. We study the problem of optimal investment under an expected utility criterion and look for conditions ensuring the existence of optimal strategies. Previous results required a certain restrictive hypothesis on the tails of asset return distributions. Using a different method, we manage to remove this hypothesis, at the price of stronger assumptions on the moments of asset returns.