نتایج جستجو برای: security multiple objective decision making modm

تعداد نتایج: 1878972  

Journal: :Procedia - Social and Behavioral Sciences 2013

Journal: :International Journal of Security and Its Applications 2014

Journal: :Revista Brasileira de Política Internacional 2014

2000
Jian Ma Quan Zhang Duanning Zhou Zhi Ping Fan

This paper presents a new method for multiple person multiple attribute decision making (MADM) based on decision makers' subjective preference information on alternatives and objective decision matrix. In this method, multiple decision makers give their preference information on the alternatives in different formats, and an optimization model is constructed to reflect both decision makers' subj...

Journal: :سیاست 0
مصطفی ملکوتیان دانشیار گروه علوم سیاسی دانشکده حقوق و علوم سیاسی دانشگاه تهران محمدمهدی باباپور استادیار دانشکده الهیات و ادیان دانشگاه شهید بهشتی

although the subject of amending was reffered to in the draft constitution ,but due to revolution time circumstances,this principle was not approved.ten years of islamic state (1358 – 68 ) revealed some problems of the constitution like multiple decision making centers and existence of parallel organisations at administrative, legislative and judicial levels. after the war and considering appro...

منصوری, محمد مسعود,

In this paper the descriptive and normative stages and steps of decision- making process are reviewed and analyzed. The objective is to design a new general and efficient Algorithm for decision- making process. For better understanding of the new Algorithm, attempt was made to simplify the subject. The new Algorithm sequentially consists of the following four stages: 1- Need for decision dia...

2012

The design of weight is one of the important parts in fuzzy decision making, as it would have a deep effect on the evaluation results. Entropy is one of the weight measure based on objective evaluation. Non--probabilistic-type entropy measures for fuzzy set and interval type-2 fuzzy sets (IT2FS) have been developed and applied to weight measure. Since the entropy for (IT2FS) for decision making...

2008
Carlos Sánchez Le Gruenwald Mauricio Sánchez

Due to both the number of entities and the nature of the interactions and collaborations amongst them, conventional security models are inadequate for regulating access to data and services in a pervasive mobile computing environment. Since many of these interactions occur between entities that have not interacted with each other previously, new security paradigms rely on context information in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید