نتایج جستجو برای: present value

تعداد نتایج: 2029458  

Journal: :Pacific Rim Property Research Journal 2007

Journal: :gas processing 0
alireza sanaei school of petroleum and geological engineering, university of oklahoma, usa seyed hamidreza yousefi department of petroleum engineering, amirkabir university of technology, iran ehsan khamehchi department of petroleum engineering, amirkabir university of technology, iran

nowadays one of the most important energy sources is natural gas. by depletion of oil reservoirs in the world, natural gasâ will emerge as the future energy source for human life. one of the major concerns of gas suppliers is being able to supply this source of energy the entire year. this concern intensifies during more consuming seasons of the year when the demand for natural gas increases, r...

G. Moslehi and M. Mahnam,

While a great portion of the scheduling literature focuses on time-based criteria, the most important goal of management is maximizing the profitability of the firm. In this paper, the net preset value criterion is studied taking account of linear time-dependent cash flows in single machine and flow shop scheduling problems. First, a heuristic method is presented for the single machine scheduli...

GH. Moslehi and H. Ghahar,

This paper deals with resource unconstrained project scheduling problems with the objective of maximizing the net present value (NPV) of project cash flows. Here we present a heuristic algorithm named as differential procedure (Dif_AOA).&#10In order to evaluate the efficiency of this algorithm, networks with node numbers between 10-1000 and network complexity coefficients between 1.3-6.6 have ...

Journal: :IACR Cryptology ePrint Archive 2012
Frédéric Dupuis Jesper Buus Nielsen Louis Salvail

We provide the first two-party protocol allowing Alice and Bob to evaluate privately even against active adversaries any completely positive, tracepreserving map F ∈ L(Ain ⊗ Bin) → L(Aout ⊗ Bout), given as a quantum circuit, upon their joint quantum input state ρin ∈ D(Ain ⊗ Bin). Our protocol leaks no more to any active adversary than an ideal functionality for F provided Alice and Bob have th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید