نتایج جستجو برای: fuzzy chance constrainedprogramming
تعداد نتایج: 127166 فیلتر نتایج به سال:
abstract this thesis includes five chapter : the first chapter assign to establish fuzzy mathematics requirement and introduction of liner programming in thesis. the second chapter we introduce a multilevel linear programming problems. the third chapter we proposed interactive fuzzy programming which consists of two phases , the study termination conditions of algorithm we show a satisfac...
Similarity measures for comparing clusterings is an important component, e.g., of evaluating clustering algorithms, for consensus clustering, and for clustering stability assessment. These measures have been studied for over 40 years in the domain of exclusive hard clusterings (exhaustive and mutually exclusive object sets). In the past years, the literature has proposed measures to handle more...
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar random variables W , W ′ to agree on a secret key R in the presence of an active adversary. Robust fuzzy extractors were defined by Dodis et al. in Crypto 2006 [6] to be noninteractive, i.e., only one message P , which can be modified by an unbounded adversary, can pass from one party to the oth...
Preventive health care is unlike health care for acute ailments, as people are less alert to their unknown medical problems. In order to motivate public and to attain desired participation levels for preventive programs, the attractiveness of the health care facility is a major concern. Health economics literature indicates that attractiveness of a facility is significantly influenced by proxim...
Abstract: In this study, we combine the fuzzy customer information problem with the multicommodity multimodal routing with schedule-based services which was explored in our previous study [1]. The fuzzy characteristics of the customer information are embodied in the demanded volumes of the multiple commodities and the time windows of their due dates. When the schedule-based services are conside...
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar random variables W , W ′ to agree on a secret key R in the presence of an active adversary. Robust fuzzy extractors were defined by Dodis et al. in Crypto 2006 [6] to be noninteractive, i.e., only one message P , which can be modified by an unbounded adversary, can pass from one party to the oth...
Cancer is the leading life-threatening disease for people in today’s world. Although cancer formation is different for each type of cancer, it has been determined by studies and research that stress also triggers cancer types. Early precaution is very important for people who have not fallen ill yet with a disease like cancer that has a high mortality rate and expensive treatment. With this stu...
The data envelopment analytical hierarchy process (DEAHP) is a type of the analytical hierarchy process (AHP), which used the concept of data envelopment analysis (DEA) for generating LW from the judgment matrices and aggregating them to be final weight (FW) in AHP. In general, the judgment scales in AHP is built based on decision maker. It is unrealistic to expect that the decision maker has c...
The classical analysis of real time systems tries to ensure that the instance of every task finishes before its absolute deadline (strict guarantee). The probabilistic approach tends to estimate the probability that it will happen. The deterministic timed behavior is an important parameter for analysing the robustness of the system. Most of related works are mainly based on the determinism of t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید