نتایج جستجو برای: we designed a fuzzy inference system employees

تعداد نتایج: 14091109  

Quantitative assessment is the most important means to identify hazard potential and manage risk for an industrial process. The implement of quantitative assessment in the early stage will help to develop inherently safer process, eliminating the hazard and reduce the possibility of accidental chain events and the magnitude of consequences. In this paper, after reviewing the presently available...

پایان نامه :0 1391

employees always concern about losing their job , or in other word , losing their income resources. for this purpose, every government requires strong system for covering these concerns. the unemployment insurance (ui) program’s can be used for achieving this goal. in this thesis, we price ui based on the insurance history of employee and the duration of being unemployed. we use the weibull dis...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند 1388

a significant problem in multicarrier communication systems is the necessity to reduce the value of papr (peak-to-average power ratio) of transmitting signal. in this thesis we study the effect of the system parameters such as coding and modulation types on papr and ultimate ber in a mc-cdma system. in this study we consider fading channel as well as the nonlinearity of transmitter’s amplifier ...

Journal: :iranian journal of chemistry and chemical engineering (ijcce) 2007
nasser saghatoleslami mahmood mousavi javad sargolzaei mohammad khoshnoodi

a neuro-fuzzy modeling tool (anfis) has been used to dynamically model cross flow ultrafiltration of milk. it aims to predict permeate flux and total hydraulic resistance as a function of transmembrane pressure, ph, temperature, fat, molecular weight cut off, and processing time. dynamic modeling of ultrafiltration performance of colloidal systems (such as milk) is very important for designing ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند - دانشکده علوم 1391

in this thesis, we consider a mathematical model of cancer with completely unknown parameters. we study the stability of critical points which are biologically admissible. then we consider a control on the system and introduce situations at which solutions are attracted to critical points and so the cancer disease has auto healing. the lyapunov stability method is used for estimating the un...

some applications are critical and must designed Fault Tolerant System. Usually Voting Algorithm is one of the principle elements of a Fault Tolerant System. Two kinds of voting algorithm are used in most applications, they are majority voting algorithm and weighted average algorithm these algorithms have some problems. Majority confronts with the problem of threshold limits and voter of weight...

some applications are critical and must designed Fault Tolerant System. Usually Voting Algorithm is one of the principle elements of a Fault Tolerant System. Two kinds of voting algorithm are used in most applications, they are majority voting algorithm and weighted average algorithm these algorithms have some problems. Majority confronts with the problem of threshold limits and voter of weight...

Journal: :مدیریت فناوری اطلاعات 0
محمد علی شفیعا دانشیار گروه فناوری صنعتی، دانشکده‎ی مهندسی صنایع، دانشگاه علم و صنعت، تهران، ایران امیر مانیان دانشیار گروه مدیریت فناوری اطلاعات، دانشکده‎ی مدیریت، دانشگاه تهران، ایران ایمان رئیسی وانانی دانشجوی دکترای مدیریت فناوری اطلاعات، دانشکده‎ی مدیریت، دانشگاه تهران، ایران

implementation of enterprise resource planning has had a chaotic history in which many projects ended successfully and many failed or ended without approaching the predetermined objectives. this research, in terms of purpose, is considered fundamental since it designs a new system for solving a fundamental problem and it is also an applied research because the research result is deployed in the...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده فنی و مهندسی 1387

abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید