Solving MCDM problems based on combination of PACMAN and LINMAP
نویسندگان
چکیده
منابع مشابه
A Holistic Approach Based on MCDM for Solving Location Problems
Location decision is an integral part of organizational strategies involving many factorsthat may be conflicting in nature. This paper presents a holistic approach of the multi-criteria decisionmaking (MCDM) methodology to select the optimal location(s), which fits best for both investors andmanagers. A case study is also provided to illustrate the application of the proposed holistic approach....
متن کاملThe BF-TOPSIS Approach for Solving Non-classical MCDM Problems
In this paper we show how the Belief-Function based Technique for Order Preference by Similarity to Ideal Solution (BF-TOPSIS) approach can be used for solving non-classical multi-criteria decisionmaking (MCDM) problems. We give simple examples to illustrate our presentation.
متن کاملSolving Fractional Programming Problems based on Swarm Intelligence
This paper presents a new approach to solve Fractional Programming Problems (FPPs) based on two different Swarm Intelligence (SI) algorithms. The two algorithms are: Particle Swarm Optimization, and Firefly Algorithm. The two algorithms are tested using several FPP benchmark examples and two selected industrial applications. The test aims to prove the capability of the SI algorithms to s...
متن کاملSolving the Unconstrained Optimization Problems Using the Combination of Nonmonotone Trust Region Algorithm and Filter Technique
In this paper, we propose a new nonmonotone adaptive trust region method for solving unconstrained optimization problems that is equipped with the filter technique. In the proposed method, the various nonmonotone technique is used. Using this technique, the algorithm can advantage from nonmonotone properties and it can increase the rate of solving the problems. Also, the filter that is used in...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Multi-Criteria Decision Analysis
سال: 2018
ISSN: 1057-9214
DOI: 10.1002/mcda.1650