نتایج جستجو برای: undesirable input
تعداد نتایج: 235596 فیلتر نتایج به سال:
Online auctions are a popular means for exchanging items over the Internet. However, are many inherent security and fairness concerns. Participants can behave in an undesirable and fraudulent manner in an attempt to gain an advantage at the expense of rivals. For example, a bidder might seek to suppress the price by bid sniping, or the seller could introduce fake bids to inflate the price. In a...
normal 0 false false false en-us x-none ar-sa introduction: the performance evaluation of healthcare system in macro-level is important. this paper evaluates performance of health service of asian countries in 2006. methods: in the first step, the initial data for performance evaluation has been collected from the site world health organization (who) and are weighted by analytical hierarchy pro...
Due to the power industry importance in the process of country economic development,studying the efficiency of power plant s is very important. By measuring the efficiency canbe perceived the strength and awareness of different sectors and can improve theirperformance by provide the appropriate solutions. In this paper, power plants was assumedas a decision-making unit that consume gas and gaso...
This paper presents a data envelopment analysis (DEA) model combined with Bootstrapping to assess performance of one of the Data mining Algorithms. We applied a two-step process for performance productivity analysis of insurance branches within a case study. First, using a DEA model, the study analyzes the productivity of eighteen decision-making units (DMUs). Using a Malmquist index, DEA deter...
Abstracr-Test data generation in program testing is the process of identifying a set of test data which satisfies given testing criterion. Most of the existing test data generators 161, [It], [lo], [16], [30] use symbolic evaluation to derive test data. However, in practical programs this technique frequently requires complex algebraic manipulations, especially in the presence of arrays. In thi...
Keywords: Data envelopment analysis Target unit Undesirable output Multiple objective linear programming Minimax method a b s t r a c t Data Envelopment Analysis (DEA) is a mathematical programming technique for identifying efficient Decision Making Units (DMUs) with multiple inputs and multiple outputs. DEA provides a technical efficiency score for each DMU, a technical efficiency reference se...
We investigate the origin of undesirable transverse cracks often observed in thin films obtained by the layer transfer technique. During this process, two crystals bonded to each other containing a weak plan produced by ion implantation are heated to let a thin layer of one of the material on the other. The level of stress imposed on the film during the heating phase due to the mismatch of ther...
25 26 This article describes the development, validation and application of a rapid screening method 27 for the detection and identification of undesirable organic compounds in aquaculture products. 28 A generic sample treatment was applied without any purification or preconcentration step. After 29 extracting the samples with acetonitrile/water 80:20 (0.1% formic acid), the extracts were 30 ce...
1,4-Benzoquinones have been found to prevent olefin isomerization of a number of allylic ethers and long-chain aliphatic alkenes during ruthenium-catalyzed olefin metathesis reactions. Electron-deficient benzoquinones are the most effective additives for the prevention of olefin migration. This mild, inexpensive, and effective method to block olefin isomerization increases the synthetic utility...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید