نتایج جستجو برای: hybrid method
تعداد نتایج: 1787930 فیلتر نتایج به سال:
DEA Classic models cannot be used for inaccurate and indeterminate data, and it is supposed that the data for all inputs and outputs are accurate and determinate. However, in real life situations uncertainty is more common. This article attempts to get the common weights for Decision-Making Units by developing DEA multi-objective models in the grey environment. First, we compute the privilege o...
DEA Classic models cannot be used for inaccurate and indeterminate data, and it is supposed that the data for all inputs and outputs are accurate and determinate. However, in real life situations uncertainty is more common. This article attempts to get the common weights for Decision-Making Units by developing DEA multi-objective models in the grey environment. First, we compute the privilege o...
Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...
The Liroo Dam is one of the largest concrete dams in the country under study. The objective is to investigate and estimate the amount of water leakage from joints and fractures in dam abutments using numerical method. Interconnected fractures are the main pathways of water flow into the abutments and control the rock hydraulic behavior. Considering the stochastic properties of the geometric par...
This article addresses a single row facility layout problem where the objective is to optimize the arrangement of some rectangular facilities with different dimensions on a line. Regarding the NP-Hard nature of the considered problem, a hybrid meta-heuristic algorithm based on simulated annealing has been proposed to obtain a near optimal solution. A number of test problems are randomly generat...
Mobile Ad hoc Network (MANET) consists of a set of wireless nodes which are connected but can freely move. These mobile nodes include a particular type of nodes, known as ‘gateway’ nodes, which are directly connected with internet and other mobile nodes in a MANET get internet access through them. Prior to access, any mobile node requires discovering such a nearest gateway node using a gateway ...
In this paper we present a stable hybrid scheme for viscous problems. The hybrid method combines the unstructured finite volume method with high-order finite difference methods in complex geometries. The coupling procedure between the two numerical methods is based on energy estimates and stable interface conditions are constructed. Numerical calculations show that the hybrid method is efficien...
The behavior of an exponentially graded hybrid cylindrical shell subjected to an axisymmetric thermo-electro-mechanical loading placed in a constant magnetic field is investigated. The hybrid shell is consisted of a functionally graded host layer embedded with pyroelectric layers as sensor and/or actuator that can be imperfectly bonded to the inner and the outer surfaces of a shell. The shell...
Face recognition is an active research work since its use is widespread in many applications. The proposed work is to develop a hybrid illumination pre-processing method for face recognition by combining two-dimensional Discrete Wavelet Transform (2D DWT) and Contrast Limited Adaptive Histogram Equalization (CLAHE). 2D DWT is applied on the original image and the LL sub-band of DWT coefficients...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید