close
1.

電子ブック

EB
Ryuji Okazaki
出版情報: SpringerLink Books - AutoHoldings , Springer Japan, 2013
所蔵情報: loading…
2.

電子ブック

EB
出版情報: IEEE Electronic Library (IEL) Standards , IEEE, 2013
所蔵情報: loading…
3.

電子ブック

EB
出版情報: IEEE Electronic Library (IEL) Conference Proceedings , IEEE, 2013
所蔵情報: loading…
4.

電子ブック

EB
Eduardo Calixto
出版情報: Elsevier ScienceDirect Books Complete , Gulf Professional Publishing, 2013
所蔵情報: loading…
目次情報: 続きを見る
Preface
Acknowledgments
Life Cycle Analysis / 1:
Quantitative Failure Data Analysis / 1.1:
Probability Density Functions / 1.2:
Exponential PDF / 1.2.1:
Normal PDF / 1.2.2:
Logistic PDF / 1.2.3:
Lognormal PDF / 1.2.4:
Loglogistic PDF / 1.2.5:
Cumbel PDF / 1.2.6:
Weibull PDF / 1.2.7:
Gamma PDF / 1.2.8:
Generalized Gamma PDF / 1.2.9:
How to Define PDF Parameters and Choose Which PDF Fits Better with the Failure Data / 1.3:
Plot Method / 1.3.1:
Rank Regression / 1.3.2:
Maximum Likelihood Method / 1.3.3:
How Reliable Is the Reliability: The Confidence Bound Will Tell You / 1.4:
References
Accelerated Test and Reliability Growth Analysis Models / 2:
Introduction / 2.1:
Quantitative Accelerated Tests / 2.2:
Arrhenius Life-Stress Model / 2.2.1:
Eyring Life-Stress Model / 2.2.2:
Inverse Power Law Life-Stress Model / 2.2.3:
Temperature-Humidity Life-Stress Model / 2.2.4:
Thermal-Nonthermal Life-Stress Model / 2.2.5:
General Loglinear Life-Stress Model / 2.2.6:
Proportional Hazard Life-Stress Model / 2.2.7:
Cumulative Risk Life-Stress Model / 2.2.8:
Qualitative Accelerated Tests (HALT and HASS) / 2.3:
Reliability Growth Analysis / 2.4:
Duanne Model / 2.4.1:
Crow-Ansaa Model / 2.4.2:
Lloyd-Lipow Model / 2.4.3:
Gompertz Model / 2.4.4:
Logistic Model / 2.4.5:
Crow Extended Model / 2.4.6:
Power Law Model / 2.4.7:
Reliability and Maintenance / 3:
Introduction to Failure Mode Effects Analysis / 3.1:
Design Failure Mode Effects Analysis / 3.1.1:
Failure Mode Analysis: Process and Operational Applications / 3.1.2:
Reliability Centered on Maintenance / 3.2:
Risk-Based Inspection / 3.3:
ReBI / 3.4:
RGBI Analysis / 3.5:
ORT Analysis / 3.6:
Reliability, Availability, and Maintainability Analysis / 4:
Introduction to RAM Analysis / 4.1:
Scope Definition / 4.1.1:
Failure and Repair Data Analysis / 4.1.2:
Modeling and Simulation / 4.1.3:
Sensitivity Analysis / 4.1.4:
Conclusions and Reports / 4.1.5:
RBD Configuration / 4.2:
Markov Chain Methodology / 4.2.2:
Simulation / 4.2.3:
Reliability and Availability Performance Index / 4.2.4:
Sensitivity Analysis: Redundancy Policies, Maintenance Plans, Stock Policies, and Logistics / 4.3:
Redundancy Policies / 4.3.1:
Maintenance Policies / 4.3.2:
A General Renovation Process: Kijima Models I and II / 4.3.3:
Stock Policies / 4.3.4:
Logistics / 4.3.5:
Improvement Allocation Based on Availability / 4.4:
Case Studies / 4.5:
Sensitivity Analysis in Critical Equipment: The Distillation Plant Case Study in the Brazilian Oil and Gas Industry / 4.5.1:
Systems Availability Enhancement Methodology: A Refinery Hydrotreating Unit Case Study / 4.5.2:
The Nonlinear Optimization Methodology Model: The Refinery Plant Availability Optimization Case Study / 4.5.3:
CENPES II Project Reliability Analysis / 4.5.4:
The Operational Effects in Availability: Thermal Cracking Plant RAM Analysis Case Study / 4.5.5:
Partial Availability Based on System Age: The Drill Facility System Case Study / 4.5.6:
High-Performance System Requires Improvements? Compressor Optimum Replacement Time Case Study / 4.5.7:
RAM+L Analysis: Refinery Case Study / 4.5.8:
Human Reliability Analysis / 5:
Human Reliability Concepts / 5.1:
Technique for Human Error Rate Prediction / 5.2:
Operator Action Tree / 5.3:
Accident Sequence Evaluation program / 5.4:
Pre-Accident Analysis Methodology / 5.4.1:
Post-Accident Analysis Methodology / 5.4.2:
Human Error Assessment Reduction Technique / 5.5:
Social Technical Analysis of Human Reliability / 5.6:
Standardized Plant Analysis Risk-Human Reliability / 5.7:
Bayesian Networks / 5.8:
Case Study / 5.9:
THERP Case Study Application / 5.9.1:
OAT Case Study Application / 5.9.2:
SPAR-H Case Study Application / 5.9.3:
HEART Case Study Application / 5.9.4:
STAH-R Case Study Application / 5.9.5:
Bayesian Network Application / 5.9.6:
Methodologies Similarities / 5.9.7:
Conclusion / 5.9.8:
Reliability and Safety Processes / 6:
Fault Tree Analysis / 6.1:
Time Independent FTA / 6.2.1:
Time Dependent FTA / 6.2.2:
FTA as Qualitative Risk Analysis Support / 6.2.3:
FTA as a Root Cause Analysis Tool / 6.2.4:
Event Tree Analysis / 6.3:
Time Independent Event Tree Analysis / 6.3.1:
Time Dependent ETA / 6.3.2:
Layers of Protection Analysis / 6.4:
Independent Time LOPA / 6.4.1:
Time Dependent LOPA / 6.4.2:
Time Dependent LOPA as Qualitative Risk Analysis Support / 6.4.3:
Safety Integrity Level Analysis / 6.5:
Hazard Matrix Methodology / 6.5.1:
Risk Graph Methodology / 6.5.2:
Frequency Target Methodology / 6.5.3:
Individual and Societal Risk Methodology / 6.5.4:
Quantitative Approach to Defining Probability of Failure on Demand / 6.5.5:
Bow Tie Analysis / 6.6:
Time Independent Bow Tie Analysis / 6.6.1:
Time Dependent Bow Tie Analysis / 6.6.2:
Case Study 1: Applying LOPA Analysis to Decide Whether Risk Is Acceptable When Layers of Protection Are Not Available / 6.7:
Case Study 2: Using RAMS Analysis Methodology to Measure Safety Process Effects on System Availability / 6.8:
Safety Processes / 6.8.1:
RAM Analysis Case Study / 6.8.2:
Conclusions / 6.8.3:
Reliability Management / 7:
Reliability Management over the Enterprise Life Cycle / 7.1:
Reliability Management Success Factors / 7.2:
Successful Reliability Engineering Implementation Case Study / 7.3:
Bayer / 7.3.1:
Successful Organization in Reliability Engineer Implementation / 7.4:
USNRC (United States Nuclear Regulatory Commission) / 7.4.1:
ESReDA (European Safety and Reliability and Data Association) / 7.4.2:
ESRA (European Safety and Reliability Association) / 7.4.3:
SINTEF (Stiftelsen for Industriell og Teknisk Forskning) / 7.4.4:
Reliability Engineer Teaching and Research: Successful Universities and Research Center Cases / 7.5:
Karlsruhe Institute Technology / 7.5.1:
Indian Institute of Technology Kharagpur / 7.5.2:
University of Strathclyde Business School / 7.5.3:
University of Stavanger / 7.5.4:
Final Thoughts / 7.6:
Index
Preface
Acknowledgments
Life Cycle Analysis / 1:
5.

電子ブック

EB
Wenji Mao, Fei-Yue Wang, FeiYue Wang
出版情報: Elsevier ScienceDirect Books , Burlington : Academic Press, 2013
所蔵情報: loading…
目次情報: 続きを見る
Preface
Acknowledgements
Intelligence and Security Informatics: Research Frameworks / Chapter 1:
Research Methodology and Frameworks for ISI / 1.1:
The ACP Approach / 1.2:
Modeling with Artificial Societies / 1.2.1:
Analysis with Computational Experiments / 1.2.2:
Control Through Parallel Execution / 1.2.3:
Foundations in Philosophy and Physics / 1.2.4:
Outline of Chapters / 1.3:
Agent Modeling of Terrorist Organization Behavior / Chapter 2:
Modeling Organizational Behavior / 2.1:
Action Extraction from the Web / 2.2:
Action Data Collection / 2.2.1:
Raw Action Extraction / 2.2.2:
Action Elimination / 2.2.3:
Action Refinement / 2.2.4:
Extracting Causal Knowledge from the Web / 2.3:
Construction of Action Hierarchy / 2.4:
Designing, Causal Scenarios / 2.5:
Case Study on Terrorist Organization / 2.6:
Conclusion / 2.7:
Security Story Generation for Computational Experiments / Chapter 3:
Story Generation Systems / 3.1:
System Workflow and Narrative Structure / 3.2:
Story Extraction Approach / 3.3:
Text Processing with Domain Knowledge / 3.3.1:
Event Detection and Event Element Extraction / 3.3.2:
Design and Organization of Patterns / 3.3.3:
Event Element Standardization / 3.3.4:
Evaluation of Event Relations / 3.3.5:
Experiment / 3.4:
Forecasting Croup Behavior via Probabilistic Plan Inference / 3.5:
Review of Plan-Based Inference / 4.1:
Probabilistic Plan Representation / 4.2:
Probabilistic Reasoning Approach / 4.3:
Notation / 4.3.1:
Computation / 4.3.2:
Case Study in Security Informatics / 4.4:
Construction of Plan Library / 4.4.1:
The Test Set / 4.4.2:
Experimental Results / 4.4.3:
Forecasting Complex Croup Behavior via Multiple Plan Recognition / 4.5:
Multiple Plan Recognition for Behavior Prediction / 5.1:
The MPR Problem Definition / 5.2:
The Proposed MPR Approach / 5.3:
Constructing the Explanation Graph / 5.3.1:
Computing Probability of an Explanation / 5.3.2:
Finding the Best Explanation / 5.3.3:
Algorithm and Complexity Analysis / 5.3.4:
Discussion / 5.3.5:
Experimental Design / 5.4:
Results / 5.4.2:
Social Computing in ISI: A Synthetic View / 5.5:
Social Computing / 6.1:
Theoretical and Infrastructure Underpinnings / 6.1.1:
Major Application Areas / 6.1.2:
A Social Computing-Based ISI Research Framework / 6.2:
Control and Management Through Parallel Execution / 6.2.1:
Main Issues in the ACP-Based ISI Research Framework / 6.3:
Modeling Cyber-Physical Societies / 6.3.1:
Scenario-Based Computational Experiment and Evaluation / 6.3.2:
Interactive Co-Evolution of Artificial and Actual Systems / 6.3.3:
Social Media Information Processing and Standardization / 6.3.4:
ISI Research Platform / 6.3.5:
Summary / 6.4:
Cyber-Enabled Social Movement Organizations / Chapter 7:
Studies on Social Movement Organizations: A Review / 7.1:
A New Research Framework for CeSMOs / 7.2:
CeSMO Research Questions / 7.2.1:
A Social Computing-Based CeSMO Research Framework / 7.2.2:
Case Study: Wenchuan Earthquake / 7.3:
Discussions on CeSMO Research Issues / 7.4:
CeSMO Behavior Modeling / 7.4.1:
CeSMO Network Analysis / 7.4.2:
CeSMO Social and Cultural Information Modeling and Analysis / 7.4.3:
CeSMO Behavior Prediction / 7.4.4:
Cultural Modeling for Behavior Analysis and Prediction / 7.5:
Modeling Cultural Data in Security Informatics / 8.1:
Major Machine Learning Methods / 8.2:
Naive Bayesian (NB) / 8.2.1:
Support Vector Machines (SVMs) / 8.2.2:
Artificial Neural Networks / 8.2.3:
k-Nearest Neighbor (kNN) / 8.2.4:
Decision Trees / 8.2.5:
Random Forest (RF) / 8.2.6:
Associative Classification (AC) / 8.2.7:
Experiment and Analysis / 8.3:
Datasets / 8.3.1:
Evaluation Measures / 8.3.2:
Observations and Analysis / 8.3.3:
Discussions on Cultural Modeling Research Issues / 8.4:
Cultural Datasets Construction / 8.4.1:
Attribute Selection / 8.4.2:
Best Performance of Classifiers / 8.4.3:
Handling the Class Imbalance Problem / 8.4.4:
Model Interpretability / 8.4.5:
Incorporation of Domain Knowledge / 8.4.6:
Cultural and Social Dynamics of Behavioral Patterns / 8.4.7:
Index / 8.5:
Preface
Acknowledgements
Intelligence and Security Informatics: Research Frameworks / Chapter 1:
6.

電子ブック

EB
Wenji Mao, Fei-Yue Wang, FeiYue Wang
出版情報: Elsevier ScienceDirect Books Complete , Burlington : Academic Press, 2013
所蔵情報: loading…
目次情報: 続きを見る
Preface
Acknowledgements
Intelligence and Security Informatics: Research Frameworks / Chapter 1:
Research Methodology and Frameworks for ISI / 1.1:
The ACP Approach / 1.2:
Modeling with Artificial Societies / 1.2.1:
Analysis with Computational Experiments / 1.2.2:
Control Through Parallel Execution / 1.2.3:
Foundations in Philosophy and Physics / 1.2.4:
Outline of Chapters / 1.3:
Agent Modeling of Terrorist Organization Behavior / Chapter 2:
Modeling Organizational Behavior / 2.1:
Action Extraction from the Web / 2.2:
Action Data Collection / 2.2.1:
Raw Action Extraction / 2.2.2:
Action Elimination / 2.2.3:
Action Refinement / 2.2.4:
Extracting Causal Knowledge from the Web / 2.3:
Construction of Action Hierarchy / 2.4:
Designing, Causal Scenarios / 2.5:
Case Study on Terrorist Organization / 2.6:
Conclusion / 2.7:
Security Story Generation for Computational Experiments / Chapter 3:
Story Generation Systems / 3.1:
System Workflow and Narrative Structure / 3.2:
Story Extraction Approach / 3.3:
Text Processing with Domain Knowledge / 3.3.1:
Event Detection and Event Element Extraction / 3.3.2:
Design and Organization of Patterns / 3.3.3:
Event Element Standardization / 3.3.4:
Evaluation of Event Relations / 3.3.5:
Experiment / 3.4:
Forecasting Croup Behavior via Probabilistic Plan Inference / 3.5:
Review of Plan-Based Inference / 4.1:
Probabilistic Plan Representation / 4.2:
Probabilistic Reasoning Approach / 4.3:
Notation / 4.3.1:
Computation / 4.3.2:
Case Study in Security Informatics / 4.4:
Construction of Plan Library / 4.4.1:
The Test Set / 4.4.2:
Experimental Results / 4.4.3:
Forecasting Complex Croup Behavior via Multiple Plan Recognition / 4.5:
Multiple Plan Recognition for Behavior Prediction / 5.1:
The MPR Problem Definition / 5.2:
The Proposed MPR Approach / 5.3:
Constructing the Explanation Graph / 5.3.1:
Computing Probability of an Explanation / 5.3.2:
Finding the Best Explanation / 5.3.3:
Algorithm and Complexity Analysis / 5.3.4:
Discussion / 5.3.5:
Experimental Design / 5.4:
Results / 5.4.2:
Social Computing in ISI: A Synthetic View / 5.5:
Social Computing / 6.1:
Theoretical and Infrastructure Underpinnings / 6.1.1:
Major Application Areas / 6.1.2:
A Social Computing-Based ISI Research Framework / 6.2:
Control and Management Through Parallel Execution / 6.2.1:
Main Issues in the ACP-Based ISI Research Framework / 6.3:
Modeling Cyber-Physical Societies / 6.3.1:
Scenario-Based Computational Experiment and Evaluation / 6.3.2:
Interactive Co-Evolution of Artificial and Actual Systems / 6.3.3:
Social Media Information Processing and Standardization / 6.3.4:
ISI Research Platform / 6.3.5:
Summary / 6.4:
Cyber-Enabled Social Movement Organizations / Chapter 7:
Studies on Social Movement Organizations: A Review / 7.1:
A New Research Framework for CeSMOs / 7.2:
CeSMO Research Questions / 7.2.1:
A Social Computing-Based CeSMO Research Framework / 7.2.2:
Case Study: Wenchuan Earthquake / 7.3:
Discussions on CeSMO Research Issues / 7.4:
CeSMO Behavior Modeling / 7.4.1:
CeSMO Network Analysis / 7.4.2:
CeSMO Social and Cultural Information Modeling and Analysis / 7.4.3:
CeSMO Behavior Prediction / 7.4.4:
Cultural Modeling for Behavior Analysis and Prediction / 7.5:
Modeling Cultural Data in Security Informatics / 8.1:
Major Machine Learning Methods / 8.2:
Naive Bayesian (NB) / 8.2.1:
Support Vector Machines (SVMs) / 8.2.2:
Artificial Neural Networks / 8.2.3:
k-Nearest Neighbor (kNN) / 8.2.4:
Decision Trees / 8.2.5:
Random Forest (RF) / 8.2.6:
Associative Classification (AC) / 8.2.7:
Experiment and Analysis / 8.3:
Datasets / 8.3.1:
Evaluation Measures / 8.3.2:
Observations and Analysis / 8.3.3:
Discussions on Cultural Modeling Research Issues / 8.4:
Cultural Datasets Construction / 8.4.1:
Attribute Selection / 8.4.2:
Best Performance of Classifiers / 8.4.3:
Handling the Class Imbalance Problem / 8.4.4:
Model Interpretability / 8.4.5:
Incorporation of Domain Knowledge / 8.4.6:
Cultural and Social Dynamics of Behavioral Patterns / 8.4.7:
Index / 8.5:
Preface
Acknowledgements
Intelligence and Security Informatics: Research Frameworks / Chapter 1:
7.

図書

図書
Steven Tadelis
出版情報: Princeton : Princeton University Press, c2013  xv, 396 p. ; 26 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Rational Decision Making / Part I:
The Single-Person Decision Problem / Chapter 1:
Actions, Outcomes, and Preferences / 1.1:
Preference Relations / 1.1.1:
Payoff Functions / 1.1.2:
The Rational Choice Paradigm / 1.2:
Summary / 1.3:
Exercises / 1.4:
Introducing Uncertainty and Time / Chapter 2:
Risk, Nature, and Random Outcomes / 2.1:
Finite Outcomes and Simple Lotteries / 2.1.1:
Simple versus Compound Lotteries / 2.1.2:
Lotteries over Continuous Outcomes / 2.1.3:
Evaluating Random Outcomes / 2.2:
Expected Payoff: The Finite Case / 2.2.1:
Expected Payoff: The Continuous Case / 2.2.2:
Caveat: It's Not Just the Order Anymore / 2.2.3:
Risk Attitudes / 2.2.4:
The St. Petersburg Paradox / 2.2.5:
Rational Decision Making with Uncertainty / 2.3:
Rationality Revisited / 2.3.1:
Maximizing Expected Payoffs / 2.3.2:
Decisions over Time / 2.4:
Backward Induction / 2.4.1:
Discounting Future Payoffs / 2.4.2:
Applications / 2.5:
The Value of Information / 2.5.1:
Discounted Future Consumption / 2.5.2:
Theory versus Practice / 2.6:
Static Games of Complete Information / 2.7:
Preliminaries / Chapter 3:
Normal-Form Games with Pure Strategies / 3.1:
Example: The Prisoner's Dilemma / 3.1.1:
Example: Cournot Duopoly / 3.1.2:
Example: Voting on a New Agenda / 3.1.3:
Matrix Representation: Two-Player Finite Game / 3.2:
Example: Rock-Paper-Scissors / 3.2.1:
Solution Concepts / 3.3:
Assumptions and Setup / 3.3.1:
Evaluating Solution Concepts / 3.3.2:
Evaluating Outcomes / 3.3.3:
Rationality and Common Knowledge / 3.4:
Dominance in Pure Strategies / 4.1:
Dominated Strategies / 4.1.1:
Dominant Strategy Equilibrium / 4.1.2:
Evaluating Dominant Strategy Equilibrium / 4.1.3:
Iterated Elimination of Strictly Dominated Pure Strategies / 4.2:
Iterated Elimination and Common Knowledge of Rationality / 4.2.1:
Evaluating IESDS / 4.2.2:
Beliefs, Best Response, and Rationalizability / 4.3:
The Best Response / 4.3.1:
Beliefs and Best-Response Correspondences / 4.3.2:
Rationalizability / 4.3.3:
The Cournot Duopoly Revisited / 4.3.4:
The "p-Beauty Contest" / 4.3.5:
Evaluating Rationalizability / 4.3.6:
Pinning Down Beliefs: Nash Equilibrium / 4.4:
Nash Equilibrium in Pure Strategies / 5.1:
Pure-Strategy Nash Equilibrium in a Matrix / 5.1.1:
Evaluating the Nash Equilibria Solution / 5.1.2:
Nash Equilibrium: Some Classic Applications / 5.2:
Two Kinds of Societies / 5.2.1:
The Tragedy of the Commons / 5.2.2:
Coumot Duopoly / 5.2.3:
Bertrand Duopoly / 5.2.4:
Political Ideology and Electoral Competition / 5.2.5:
Mixed Strategies / 5.3:
Strategies, Beliefs, and Expected Payoffs / 6.1:
Finite Strategy Sets / 6.1.1:
Continuous Strategy Sets / 6.1.2:
Beliefs and Mixed Strategies / 6.1.3:
Expected Payoffs / 6.1.4:
Mixed-Strategy Nash Equilibrium / 6.2:
Example: Matching Pennies / 6.2.1:
Multiple Equilibria: Pure and Mixed / 6.2.2:
IESDS and Rationalizability Revisited / 6.3:
Nash's Existence Theorem / 6.4:
Dynamic Games of Complete Information / 6.5:
The Extensive-Form Game / Chapter 7:
Game Trees / 7.1.1:
Imperfect versus Perfect Information / 7.1.2:
Strategies and Nash Equilibrium / 7.2:
Pure Strategies / 7.2.1:
Mixed versus Behavioral Strategies / 7.2.2:
Normal-Form Representation of Extensive-Form Games / 7.2.3:
Nash Equilibrium and Paths of Play / 7.3:
Credibility and Sequential Rationality / 7.4:
Sequential Rationality and Backward Induction / 8.1:
Subgame-Perfect Nash Equilibrium: Concept / 8.2:
Subgame-Perfect Nash Equilibrium: Examples / 8.3:
The Centipede Game / 8.3.1:
Stackelberg Competition / 8.3.2:
Mutually Assured Destruction / 8.3.3:
Time-Inconsistent Preferences / 8.3.4:
Multistage Games / 8.4:
Payoffs / 9.1:
Strategies and Conditional Play / 9.3:
Subgame-Perfect Equilibria / 9.4:
The One-Stage Deviation Principle / 9.5:
Repeated Games / 9.6:
Finitely Repeated Games / 10.1:
Infinitely Repeated Games / 10.2:
Strategies / 10.2.1:
Application: Tacit Collusion / 10.3:
Sequential Interaction and Reputation / 10.5:
Cooperation as Reputation / 10.5.1:
Third-Party Institutions as Reputation Mechanisms / 10.5.2:
Reputation Transfers without Third Parties / 10.5.3:
The Folk Theorem: Almost Anything Goes / 10.6:
Strategic Bargaining / 10.7:
One Round of Bargaining: The Ultimatum Game / 11.1:
Finitely Many Rounds of Bargaining / 11.2:
The Infinite-Horizon Game / 11.3:
Application: Legislative Bargaining / 11.4:
Closed-Rule Bargaining / 11.4.1:
Open-Rule Bargaining / 11.4.2:
Static Games of Incomplete Information / 11.5:
Bayesian Games / Chapter 12:
Strategic Representation of Bayesian Games / 12.1:
Players, Actions, Information, and Preferences / 12.1.1:
Deriving Posteriors from a Common Prior: A Player's Beliefs / 12.1.2:
Strategies and Bayesian Nash Equilibrium / 12.1.3:
Examples / 12.2:
Teenagers and the Game of Chicken / 12.2.1:
Study Groups / 12.2.2:
Inefficient Trade and Adverse Selection / 12.3:
Committee Voting / 12.4:
Mixed Strategies Revisited: Harsanyi's Interpretation / 12.5:
Auctions and Competitive Bidding / 12.6:
Independent Private Values / 13.1:
Second-Price Sealed-Bid Auctions / 13.1.1:
English Auctions / 13.1.2:
First-Price Sealed-Bid and Dutch Auctions / 13.1.3:
Revenue Equivalence / 13.1.4:
Common Values and the Winner's Curse / 13.2:
Mechanism Design / 13.3:
Setup: Mechanisms as Bayesian Games / 14.1:
The Players / 14.1.1:
The Mechanism Designer / 14.1.2:
The Mechanism Game / 14.1.3:
The Revelation Principle / 14.2:
Dominant Strategies and Vickrey-Clarke-Groves Mechanisms / 14.3:
Dominant Strategy Implementation / 14.3.1:
Vickrey-Clarke-Groves Mechanisms / 14.3.2:
Dynamic Games of Incomplete Information / 14.4:
Sequential Rationality with Incomplete Information / Chapter 15:
The Problem with Subgame Perfection / 15.1:
Perfect Bayesian Equilibrium / 15.2:
Sequential Equilibrium / 15.3:
Signaling Games / 15.4:
Education Signaling: The MBA Game / 16.1:
Limit Pricing and Entry Deterrence / 16.2:
Separating Equilibria / 16.2.1:
Pooling Equilibria / 16.2.2:
Refinements of Perfect Bayesian Equilibrium in Signaling Games / 16.3:
Building a Reputation / 16.4:
Cooperation in a Finitely Repeated Prisoner's Dilemma / 17.1:
Driving a Tough Bargain / 17.2:
A Reputation for Being "Nice" / 17.3:
Information Transmission and Cheap Talk / 17.4:
Information Transmission: A Finite Example / 18.1:
Information Transmission: The Continuous Case / 18.2:
Application: Information and Legislative Organization / 18.3:
Mathematical Appendix / 18.4:
Sets and Sequences / 19.1:
Basic Definitions / 19.1.1:
Basic Set Operations / 19.1.2:
Functions / 19.2:
Continuity / 19.2.1:
Calculus and Optimization / 19.3:
Differentiation and Optimization / 19.3.1:
Integration / 19.3.3:
Probability and Random Variables / 19.4:
Cumulative Distribution and Density Functions / 19.4.1:
Independence, Conditional Probability, and Bayes' Rule / 19.4.3:
Expected Values / 19.4.4:
References
Index
Preface
Rational Decision Making / Part I:
The Single-Person Decision Problem / Chapter 1:
8.

電子ブック

EB
Takahiro Sagawa
出版情報: SpringerLink Books - AutoHoldings , Springer Japan, 2013
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
References
Review of Maxwell's Demon / 2:
Original Maxwell's Demon / 2.1:
Szilard Engine / 2.2:
Brillouin's Argument / 2.3:
Landauer's Principle / 2.4:
Bennett's Argument / 2.5:
Classical Dynamics, Measurement, and Information / 3:
Classical Dynamics / 3.1:
Classical Information Theory / 3.2:
Shannon Entropy / 3.2.1:
Kullback-Leibler Divergence / 3.2.2:
Mutual Information / 3.2.3:
Classical Measurement Theory / 3.3:
Quantum Dynamics, Measurement, and Information / 4:
Quantum Dynamics / 4.1:
Unitary Evolutions / 4.1.1:
Nonunitary Evolutions / 4.1.2:
Quantum Measurement Theory / 4.2:
Projection Measurement / 4.2.1:
POVM and Measurement Operators / 4.2.2:
Quantum Information Theory / 4.3:
Von Neumann Entropy / 4.3.1:
Quantum Kullback-Leibler Divergence / 4.3.2:
Holevo Bound / 4.3.3:
QC-Mutual Information / 4.3.4:
Quantum-Classical Correspondence / 4.3.5:
Unitary Proof of the Second Law of Thermodynamics / 5:
Second Law of Thermodynamics / 5.1:
Initial Canonical Distribution with a Single Heat Bath / 5.2:
General Situations with Multi-Heat Baths / 5.3:
Second Law with Feedback Control / 6:
Entropy Inequality / 6.1:
Generalized Second Laws / 6.2:
Generalized Szilard Engines / 6.3:
Thermodynamics of Memories / 7:
Formulation of Memory / 7.1:
Erasure Process / 7.2:
Measurement Process / 7.3:
Reconciliation with Maxwell's Demon / 7.4:
Second Law of Information Thermodynamics / 7.5:
Stochastic Thermodynamics / 8:
Dynamics / 8.1:
Nonequilibrium Equalities / 8.2:
Backward Control / 8.2.1:
Formulation of Nonequilibrium Equalities / 8.2.2:
General Derivation of the Detailed Fluctuation Theorem / 8.2.3:
Markovian Dynamics with Detail Balance / 8.3:
General Formulation / 8.3.1:
Overdamped Langevin Systems / 8.3.2:
Nonequilibrium Equalities with Feedback Control / 9:
Effect of Measurements / 9.1:
Formulation / 9.1.1:
Feedback Control / 9.1.2:
Probability Distributions with Feedback / 9.2.1:
Detailed Fluctuation Theorem for a Fixed Control Protocol / 9.2.3:
Generalized Fluctuation Theorem with Mutual Information / 9.3:
Generalized Fluctuation Theorem with Efficacy Parameter / 9.3.2:
Examples / 9.4:
Szilard Engine with Measurement Errors / 9.4.1:
Feedback-Controlled Ratchet / 9.4.2:
Conclusions / 10:
Introduction / 1:
References
Review of Maxwell's Demon / 2:
9.

図書

図書
Ian J.R. Aitchison, Anthony J.G. Hey
出版情報: Boca Raton : CRC Press, c2013  xiv, 438 p., [2] p. of plates ; 24 cm
シリーズ名: Gauge theories in particle physics : a practical introduction ; v. 1
所蔵情報: loading…
目次情報: 続きを見る
Preface
Introductory Survey, Electromagnetism as a Gauge Theory, and Relativistic Quantum Mechanics / I:
The Particles and Forces of the Standard Model / 1:
Introduction: the Standard Model / 1.1:
The fermions of the Standard Model / 1.2:
Leptons / 1.2.1:
Quarks / 1.2.2:
Particle interactions in the Standard Model / 1.3:
Classical and quantum fields / 1.3.1:
The Yukawa theory of force as virtual quantum exchange / 1.3.2:
The one-quantum exchange amplitude / 1.3.3:
Electromagnetic interactions / 1.3.4:
Weak interactions / 1.3.5:
Strong interactions / 1.3.6:
The gauge bosons of the Standard Model / 1.3.7:
Renormalization and the Higgs sector of the Standard Model / 1.4:
Renormalization / 1.4.1:
The Higgs boson of the Standard Model / 1.4.2:
Summary / 1.5:
Problems
Electromagnetism as a Gauge Theory / 2:
Introduction / 2.1:
The Maxwell equations: current conservation / 2.2:
The Maxwell equations: Lorentz covariance and gauge invariance / 2.3:
Gauge invariance (and covariance) in quantum, mechanics / 2.4:
The argument reversed: the gauge principle / 2.5:
Comments on the gauge principle in electromagnetism / 2.6:
Relativistic Quantum Mechanics / 3:
The Klein-Gordon equation / 3.1:
Solutions in coordinate space / 3.1.1:
Probability current for the KG equation / 3.1.2:
The Dirac equation / 3.2:
Free-particle solutions / 3.2.1:
Probability current for the Dirac equation / 3.2.2:
Spin / 3.3:
The negative-energy solutions / 3.4:
Positive-energy spinors / 3.4.1:
Negative-energy spinors / 3.4.2:
Dirac's interpretation of the negative-energy solutions of the Dirac equation / 3.4.3:
Feynman's interpretation of the negative-energy solutions of the KG and Dirac equations / 3.4.4:
Inclusion of electromagnetic interactions via the gauge principle: the Dirac prediction of g = 2 for the electron / 3.5:
Lorentz Transformations and Discrete Symmetries / 4:
Lorentz transformations / 4.1:
The KG equation / 4.1.1:
Discrete transformations: P, C and T / 4.1.2:
Parity / 4.2.1:
Charge conjugation / 4.2.2:
CP / 4.2.3:
Time reversal / 4.2.4:
CPT / 4.2.5:
Introduction to Quantum Field Theory / II:
Quantum Field Theory I: The Free Scalar Field / 5:
The quantum field: (i) descriptive / 5.1:
The quantum field: (ii) Lagrange-Hamilton formulation / 5.2:
The action principle: Lagrangian particle mechanics / 5.2.1:
Quantum particle mechanics a la Heisenberg-Lagrange-Hamilton / 5.2.2:
Interlude: the quantum oscillator / 5.2.3:
Lagrange-Hamilton classical field mechanics / 5.2.4:
Heisenberg-Lagrange-Hamilton quantum field mechanics / 5.2.5:
Generalizations: four dimensions, relativity and mass / 5.3:
Quantum Field Theory II: Interacting Scalar Fields / 6:
Interactions in quantum field theory: qualitative introduction / 6.1:
Perturbation theory for interacting fields: the Dyson expansion of the S-matrix / 6.2:
The interaction picture / 6.2.1:
The 5-matrix and the Dyson expansion / 6.2.2:
Applications to the 'ABC theory / 6.3:
The decay C → A + B / 6.3.1:
A + B → A + B scattering: the amplitudes / 6.3.2:
A + B → A + B scattering: the Yukawa exchange mechanism, s and u channel processes / 6.3.3:
A + B → A + B scattering: the differential cross section / 6.3.4:
A + B → A +'B scattering: loose ends / 6.3.5:
Quantum Field Theory III: Complex Scalar Fields, Dirac and Maxwell Fields; Introduction of Electromagnetic Interactions / 7:
The complex scalar field: global U(1) phase invariance, particles and antiparticles / 7.1:
The Dirac field and the spin-statistics connection / 7.2:
The Maxwell field Aμ (x) / 7.3:
The classical field case / 7.3.1:
Quantizing Aμ(x) / 7.3.2:
Introduction of electromagnetic interactions / 7.4:
P, C and T in quantum field theory / 7.5:
Tree-Level Applications in QED / 7.5.1:
Elementary Processes in Scalar and Spinor Electrodynamics / 8:
Coulomb scattering of charged spin-0 particles / 8.1:
Coulomb scattering of s+ (wavefunction approach) / 8.1.1:
Coulomb scattering of s+ (field-theoretic approach) / 8.1.2:
Coulomb scattering of s- / 8.1.3:
Coulomb scattering of charged spin-1/2 particles / 8.2:
Coulomb scattering of e- (wavefunction approach) / 8.2.1:
Coulomb scattering of e- (field-theoretic approach) / 8.2.2:
Trace techniques for spin summations / 8.2.3:
Coulomb scattering of e+ / 8.2.4:
e-s+ scattering / 8.3:
The amplitude for e-s+ → e-s+ / 8.3.1:
The cross section for e-s+ → e-s+ / 8.3.2:
Scattering from a non-point-like object: the pion form factor in e-π+ → e-π+ / 8.4:
e- scattering from a charge distribution / 8.4.1:
Lorentz invariance / 8.4.2:
Current conservation / 8.4.3:
The form factor in the time-like region: e+e- → π+π- and crossing symmetry / 8.5:
Electron Compton scattering / 8.6:
The lowest-order amplitudes / 8.6.1:
Gauge invariance / 8.6.2:
The Compton cross section / 8.6.3:
Electron muon elastic scattering / 8.7:
Electron-proton elastic scattering and nucleon form factors / 8.8:
Deep Inelastic Electron-Nucleon Scattering and the Parton Model / 8.8.1:
Inelastic electron-proton scattering: kinematics and structure functions / 9.1:
Bjorken scaling and the parton model / 9.2:
Partons as quarks and gluons / 9.3:
The Drell-Yan process / 9.4:
e+e- annihilation into hadrons / 9.5:
Loops and Renormalization / IV:
Loops and Renormalization I: The ABC Theory / 10:
The propagator correction in ABC theory / 10.1:
The Ο(g2) self-energy ΠC[2] (q2) / 10.1.1:
Mass shift / 10.1.2:
Field strength renormalization / 10.1.3:
The vertex correction / 10.2:
Dealing with the bad news: a simple example / 10.3:
Evaluating ΠC[2] (q2) / 10.3.1:
Regularization and renormalization / 10.3.2:
Bare and renormalized perturbation theory / 10.4:
Reorganizing perturbation theory / 10.4.1:
The Ο(gph2) renormalized self-energy revisited: how counter terms are determined by renormalization conditions / 10.4.2:
Renormalizability / 10.5:
Loops and Renormalization II: QED / 11:
Counter terms / 11.1:
The Ο(e2) fermion self-energy / 11.2:
The Ο (e2) photon self-energy / 11.3:
The Ο (e2) renormalized photon self-energy / 11.4:
The physics of Πγ[2] (q2) / 11.5:
Modified Coulomb's law / 11.5.1:
Radiatively induced charge form factor / 11.5.2:
The running coupling constant / 11.5.3:
ΠC[2] in the s-channel / 11.5.4:
The Ο(e2) vertex correction, and Z1 = Z2 / 11.6:
The anomalous magnetic moment and tests of QED / 11.7:
Which theories are renormalizable - and does it matter? / 11.8:
Non-relativistic Quantum Mechanics / A:
Natural Units / B:
Maxwell's Equations: Choice of Units / C:
Special Relativity: Invariance and Covariance / D:
Dirac 5-Function / E:
Contour Integration / F:
Green Functions / G:
Elements of Non-relativistic Scattering Theory / H:
Time-independent formulation and differential cross section / H.1:
Expression for the scattering amplitude: Born approximation / H.2:
Time-dependent approach / H.3:
The Schrodinger and Heisenberg Pictures
Dirac Algebra and Trace Identities / J:
Dirac algebra / J.1:
γ matrices / J.1.1:
γ5 identities / J.1.2:
Hermitian conjugate of spinor matrix elements / J.1.3:
Spin sums and projection operators / J.1.4:
Trace theorems / J.2:
Example of a Cross Section Calculation / K:
The spin-averaged squared matrix element / K.1:
Evaluation of two-body Lorentz-invariant phase space in 'laboratory' variables / K.2:
Feynman Rules for Tree Graphs in QED / L:
External particles / L.1:
Propagators / L.2:
Vertices / L.3:
References
Index
Preface
Introductory Survey, Electromagnetism as a Gauge Theory, and Relativistic Quantum Mechanics / I:
The Particles and Forces of the Standard Model / 1:
10.

図書

図書
Ian J.R. Aitchison, Anthony J.G. Hey
出版情報: Boca Raton : CRC Press, c2013  xiv, 504 p., [4] p. of plates ; 24 cm
シリーズ名: Gauge theories in particle physics : a practical introduction ; v. 2
所蔵情報: loading…
目次情報: 続きを見る
Preface
Non-Abelian Symmetries / V:
Global Non-Abelian Symmetries / 12:
The Standard Model / 12.1:
The flavour symmetry SU(2)f / 12.2:
The nucleon isospin doublet and the group SU(2) / 12.2.1:
Larger (higher-dimensional) multiplets of SU(2) in nuclear physics / 12.2.2:
Isospin in particle physics: flavour SU(2)f / 12.2.3:
Flavour SU(3)f / 12.3:
Non-Abelian global symmetries in Lagrangian quantum field theory / 12.4:
SU(2)f and SU(3)f / 12.4.1:
Chiral symmetry / 12.4.2:
Problems
Local Non-Abelian (Gauge) Symmetries / 13:
Local SU(2) symmetry / 13.1:
The covariant derivative and interactions with matter / 13.1.1:
The non-Abelian field strength tensor / 13.1.2:
Local SU(3) Symmetry / 13.2:
Local non-Abelian symmetries in Lagrangian quantum field theory / 13.3:
Local SU(2) and SU(3) Lagrangians / 13.3.1:
Gauge field self-interactions / 13.3.2:
Quantizing non-Abelian gauge fields / 13.3.3:
QCD and the Renormalization Group / VI:
QCD I: Introduction, Tree Graph Predictions, and Jets / 14:
The colour degree of freedom / 14.1:
The dynamics of colour / 14.2:
Colour as an SU(3) group / 14.2.1:
Global SU(3)c invariance, and 'scalar gluons' / 14.2.2:
Local SU(3)c invariance: the QCD Lagrangian / 14.2.3:
The θ-term / 14.2.4:
Hard scattering processes, QCD tree graphs, and jets / 14.3:
Introduction / 14.3.1:
Two-jet events in pp collisions / 14.3.2:
Three-jet events in pp collisions / 14.3.3:
3-jet events in e+e- annihilation / 14.4:
Calculation of the parton-level cross section / 14.4.1:
Soft and collinear divergences / 14.4.2:
Definition of the two-jet cross section in e+e- annihilation / 14.5:
Further developments / 14.6:
Test of non-Abelian nature of QCD in e+e- → 4 jets / 14.6.1:
Jet algorithms / 14.6.2:
QCD II: Asymptotic Freedom, the Renormalization Group, and Scaling Violations / 15:
Higher-order QCD corrections to σ(e+e- → hadrons): large logarithms / 15.1:
The renormalization group and related ideas in QED / 15.2:
Where do the large logs come from? / 15.2.1:
Changing the renormalization scale / 15.2.2:
The RGE and large -q2 behaviour in QED / 15.2.3:
Back to QCD: asymptotic freedom / 15.3:
One loop calculation / 15.3.1:
Higher-order calculations, and experimental comparison / 15.3.2:
σ(e+e- → hadrons) revisited / 15.4:
A more general form of the RGE: anomalous dimensions and running masses / 15.5:
QCD corrections to the parton model predictions for deep inelastic scattering: scaling violations / 15.6:
Uncancelled mass singularities at order αs / 15.6.1:
Factorization, and the order αs DGLAP equation / 15.6.2:
Comparison with experiment / 15.6.3:
Lattice Field Theory, and the Renormalization Group Revisited / 16:
Discretization / 16.1:
Scalar fields / 16.2.1:
Dirac fields / 16.2.2:
Gauge fields / 16.2.3:
Representation of quantum amplitudes / 16.3:
Quantum mechanics / 16.3.1:
Quantum field theory / 16.3.2:
Connection with statistical mechanics / 16.3.3:
Renormalization, and the renormalization group, on the lattice / 16.4:
Two one-dimensional examples / 16.4.1:
Connections with particle physics / 16.4.3:
Lattice QCD / 16.5:
Introduction, and the continuum limit / 16.5.1:
The static qq potential / 16.5.2:
Calculation of α(MZ2) / 16.5.3:
Hadron masses / 16.5.4:
Spontaneously Broken Symmetry / VII:
Spontaneously Broken Global Symmetry / 17:
The Fabri-Picasso theorem / 17.1:
Spontaneously broken symmetry in condensed matter physics / 17.3:
The ferromagnet / 17.3.1:
The Bogoliubov superfluid / 17.3.2:
Goldstone's theorem / 17.4:
Spontaneously broken global U(1) symmetry: the Goldstone model / 17.5:
Spontaneously broken global non-Abelian symmetry / 17.6:
The BCS superconducting ground state / 17.7:
Chiral Symmetry Breaking / 18:
The Nambu analogy / 18.1:
Two flavour QCD and SU(2)f L × SU(2)f R / 18.1.1:
Pion decay and the Goldberger-Treiman relation / 18.2:
Effective Lagrangians / 18.3:
The linear and non-linear σ-models / 18.3.1:
Inclusion of explicit symmetry breaking: masses for pions and quarks / 18.3.2:
Extension to SU(3)f L × SU(3)f R / 18.3.3:
Chiral anomalies / 18.4:
Spontaneously Broken Local Symmetry / 19:
Massive and massless vector particles / 19.1:
The generation of 'photon mass' in a superconductor: Ginzburg-Landau theory and the Meissner effect / 19.2:
Spontaneously broken local U(1) symmetry: the Abelian Higgs model / 19.3:
Flux quantization in a superconductor / 19.4:
't Hooft's gauges / 19.5:
Spontaneously broken local SU(2) × U(1) symmetry / 19.6:
Weak Interactions and the Electroweak Theory / VIII:
Introduction to the Phenomenology of Weak Interactions / 20:
Fermi's 'current-current' theory of nuclear β-decay, and its generalizations / 20.1:
Parity violation in weak interactions, and V-A theory / 20.2:
Parity violation / 20.2.1:
V-A theory: chirality and helicity / 20.2.2:
Lepton number and lepton flavours / 20.3:
The universal current × current theory for weak interactions of leptons / 20.4:
Calculation of the cross section for νμ + e- → μ- + νe / 20.5:
Leptonic weak neutral currents / 20.6:
Quark weak currents / 20.7:
Two generations / 20.7.1:
Deep inelastic neutrino scattering / 20.7.2:
Three generations / 20.7.3:
Non-leptonic weak interactions / 20.8:
CP Violation and Oscillation Phenomena / 21:
Direct CP violation in B decays' / 21.1:
CP violation in B meson oscillations / 21.2:
Time-dependent mixing formalism / 21.2.1:
Determination of the angles α(φ2) and β( φ1) of the unitarity triangle / 21.2.2:
CP violation in neutral K-meson decays / 21.3:
Neutrino mixing and oscillations / 21.4:
Neutrino mass and mixing / 21.4.1:
Neutrino oscillations: formulae / 21.4.2:
Neutrino oscillations: experimental results / 21.4.3:
Matter effects in neutrino oscillations / 21.4.4:
The Glashow-Salam-Weinberg Gauge Theory of Electroweak Interactions / 21.4.5:
Difficulties with the current-current and 'naive' IVB models / 22.1:
Violations of unitarity / 22.1.1:
The problem of non-renormalizability in weak interactions / 22.1.2:
The SU(2) × U(1) electroweak gauge theory / 22.2:
Quantum number assignments; Higgs, W and Z masses / 22.2.1:
The leptonic currents (massless neutrinos): relation to current-current model / 22.2.2:
The quark currents / 22.2.3:
Simple (tree-level) predictions / 22.3:
The discovery of the W± and Z0 at the CERN pp collider / 22.4:
Production cross sections for W and Z in pp colliders / 22.4.1:
Charge asymmetry in W± decay / 22.4.2:
Discovery of the W± and Z0 at the pp collider, and their properties / 22.4.3:
Fermion masses / 22.5:
One generation / 22.5.1:
Three-generation mixing / 22.5.2:
Higher-order corrections / 22.6:
The top quark / 22.7:
The Higgs sector / 22.8:
Theoretical considerations concerning mH / 22.8.1:
Higgs boson searches and the 2012 discovery / 22.8.3:
Group Theory / M:
Definition and simple examples / M.1:
Lie groups / M.2:
Generators of Lie groups / M.3:
Examples / M.4:
SO (3) and three-dimensional rotations / M.4.1:
SU(2) / M.4.2:
SO(4): The special orthogonal group in four dimensions / M.4.3:
The Lorentz group / M.4.4:
SU(3) / M.4.5:
Matrix representations of generators, and of Lie groups / M.5:
The relation between SU(2) and SO(3) / M.6:
Geometrical Aspects of Gauge Fields / N:
Covariant derivatives and coordinate transformations / N.1:
Geometrical curvature and the gauge field strength tensor / N.2:
Dimensional Regularization / O:
Grassmann Variables / P:
Feynman Rules for Tree Graphs in QCD and the Electroweak Theory / Q:
QCD / Q.1:
External particles / Q.1.1:
Propagators / Q.1.2:
Vertices / Q.1.3:
The electroweak theory / Q.2:
References / Q.2.1:
Index
Preface
Non-Abelian Symmetries / V:
Global Non-Abelian Symmetries / 12:
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼