Runge-Kutta Pairs of Orders 5(4) using the Minimal Set of Simplifying Assumptions

Author(s):  
Ch. Tsitouras ◽  
Theodore E. Simos ◽  
George Psihoyios ◽  
Ch. Tsitouras
2020 ◽  
Author(s):  
Xinhao Fan ◽  
Jacob Elsey ◽  
Aurelien Wyngaard ◽  
Youping Yang ◽  
Aaron Sampson ◽  
...  

AbstractTraditional models of decision making under uncertainty explain human behavior in simple situations with a minimal set of alternatives and attributes. Some of them, such as prospect theory, have been proven successful and robust in such simple situations. Yet, less is known about the preference formation during decision making in more complex cases. Furthermore, it is generally accepted that attention plays a role in the decision process but most theories make simplifying assumptions about where attention is deployed. In this study, we replace these assumptions by measuring where humans deploy overt attention, i.e. where they fixate. To assess the influence of task complexity, participants perform two tasks. The simpler of the two requires participants to choose between two alternatives with two attributes each (four items to consider). The more complex one requires a choice between four alternatives with four attributes each (16 items to consider). We then compare a large set of model classes, of different levels of complexity, by considering the dynamic interactions between uncertainty, attention and pairwise comparisons between attribute values. The task of all models is to predict what choices humans make, using the sequence of observed eye movements for each participant as input to the model. We find that two models outperform all others. The first is the two-layer leaky accumulator which predicts human choices on the simpler task better than any other model. We call the second model, which is introduced in this study, TNPRO. It is modified from a previous model from management science and designed to deal with highly complex decision problems. Our results show that this model performs well in the simpler of our two tasks (second best, after the accumulator model) and best for the complex task. Our results suggest that, when faced with complex choice problems, people prefer to accumulate preference based on attention-guided pairwise comparisons.


INSIST ◽  
2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Z Bahri ◽  
L Zakaria ◽  
Syamsudhuha Syamsudhuha

Abstract—To construct a scheme of implicit Runge-Kutta methods, there are a number of coefficients that must be determined and satisfying consistency properties and Butcher’s simplifying assumptions. In this paper we provide the numerical simulation technique to obtain a scheme of 10th order Implicit Runge-Kutta (IRK10) method. For simulation process, we construct an algorithm to compute all the coefficients involved in the IRK10 scheme. The algorithm is implemented in a language programming (Turbo Pascal) to obtain all the required coefficients in the scheme. To show that our scheme works correctly, we use the scheme to solve Hénon-Heiles system.Keywords—ODEs, 10th order IRK method, numerical technique, Hénon-Heiles system


2013 ◽  
Vol 61 (3) ◽  
pp. 569-579 ◽  
Author(s):  
A. Poniszewska-Marańda

Abstract Nowadays, the growth and complexity of functionalities of current information systems, especially dynamic, distributed and heterogeneous information systems, makes the design and creation of such systems a difficult task and at the same time, strategic for businesses. A very important stage of data protection in an information system is the creation of a high level model, independent of the software, satisfying the needs of system protection and security. The process of role engineering, i.e. the identification of roles and setting up in an organization is a complex task. The paper presents the modeling and design stages in the process of role engineering in the aspect of security schema development for information systems, in particular for dynamic, distributed information systems, based on the role concept and the usage concept. Such a schema is created first of all during the design phase of a system. Two actors should cooperate with each other in this creation process, the application developer and the security administrator, to determine the minimal set of user’s roles in agreement with the security constraints that guarantee the global security coherence of the system.


1997 ◽  
Author(s):  
Jack Yoh ◽  
Xiaolin Zhong ◽  
Jack Yoh ◽  
Xiaolin Zhong
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document