Browse Definitions :
Definition

stochastic optimization

Stochastic optimization is the process of maximizing or minimizing the value of a mathematical or statistical function when one or more of the input parameters is subject to randomness. The word stochastic means involving chance or probability.

 Stochastic processes are commonly involved in business analytics (BA), sales, service, manufacturing, finance and communications. Stochastic processes always involve probability, such as trying to predict the water level in a reservoir at a certain time based on random distribution of rainfall and water usage, or estimating the number of dropped connections in a communications network based on randomly variable traffic but constant available bandwidth. In contrast, deterministic processes never involve probability; outcomes occur (or fail to occur) based on predictable and exact input values. 

Stochastic optimization lends itself to real-life situations because many phenomena in the physical world involve uncertainty, imprecision or randomness. Consider the following example: A computer repair shop wants to order exactly the right number of spare parts of several different types every month to keep pace with customer demand. If the shop orders too many parts of any type from the wholesalers, money will be spent needlessly; if the shop does not order enough parts of any type, it will lose business when customers go elsewhere for service. Determining the ideal number of parts of each type to order involves stochastic optimization, because the number of customers who come in with component failures of various sorts cannot be precisely predicted. The objective is to maximize the function's output value (the shop's profit) in the face of numerous random input variables.

See also: chaos theory

This was last updated in July 2012

Continue Reading About stochastic optimization

SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • Extensible Authentication Protocol (EAP)

    The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by ...

  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close