نتایج جستجو برای: security multiple objective decision making modm
تعداد نتایج: 1878972 فیلتر نتایج به سال:
This paper presents a new method for multiple person multiple attribute decision making (MADM) based on decision makers' subjective preference information on alternatives and objective decision matrix. In this method, multiple decision makers give their preference information on the alternatives in different formats, and an optimization model is constructed to reflect both decision makers' subj...
although the subject of amending was reffered to in the draft constitution ,but due to revolution time circumstances,this principle was not approved.ten years of islamic state (1358 – 68 ) revealed some problems of the constitution like multiple decision making centers and existence of parallel organisations at administrative, legislative and judicial levels. after the war and considering appro...
In this paper the descriptive and normative stages and steps of decision- making process are reviewed and analyzed. The objective is to design a new general and efficient Algorithm for decision- making process. For better understanding of the new Algorithm, attempt was made to simplify the subject. The new Algorithm sequentially consists of the following four stages: 1- Need for decision dia...
The design of weight is one of the important parts in fuzzy decision making, as it would have a deep effect on the evaluation results. Entropy is one of the weight measure based on objective evaluation. Non--probabilistic-type entropy measures for fuzzy set and interval type-2 fuzzy sets (IT2FS) have been developed and applied to weight measure. Since the entropy for (IT2FS) for decision making...
Due to both the number of entities and the nature of the interactions and collaborations amongst them, conventional security models are inadequate for regulating access to data and services in a pervasive mobile computing environment. Since many of these interactions occur between entities that have not interacted with each other previously, new security paradigms rely on context information in...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید