نتایج جستجو برای: compromise solution
تعداد نتایج: 487663 فیلتر نتایج به سال:
This note discusses the asymptotic behavior of optimal trajectories in infinite horizon control problems when the objective function is a compromise between two averaged discounted sums of the same stream of rewards. We show that the turnpike associated with the lowest discount rate is the one that will prevail. We also show that, when one discount rate is equal to 0, the problem of the best co...
This study proposes a combination of a fuzzy sliding mode controller (FSMC) with integral-proportion-Derivative switching surface based superconducting magnetic energy storage (SMES) and PID tuned by a multi-objective optimization algorithm to solve the load frequency control in power systems. The goal of design is to improve the dynamic response of power systems after load demand changes. In t...
An interactive procedure for group decision-making problems is presented in this paper. The procedure is based on the aspiration theory and utilizes both satisficing and optimizing approaches. The possibility of decision-makers forming coalitions is taken into account. The outcome of the modelled decision process is a compromise decision which can fulfill fairness and equity criteria. The compr...
Traditionalists will argue that conventional classroom lectures have been and always will be the most effective form of teaching. In contrast, people focusing on progress will put pure e-teaching on a pedestal. Confronted with these two extremes, a natural reflex is to search for a compromise. Hybrid learning could be such a compromise. However, the important question is whether this is only a ...
Authentication is a process by which one satisses another about one's claim of identity. Typically an authentication server provides the authentication service via an authentication protocol. The authentication service is a security bottleneck in that its compromise can lead to the compromise of the whole system. The service is also a performance bottleneck because many activities cannot procee...
This paper deals with the problem of existence of compromise decisions and conditions for a compromise decision to be weakly Pareto-optimal, i.e., to be a weak Pareto-maximizer, Pareto-maximizer, or strong Pareto-maximizer. The concept of compromise decision is generalized by adopting triangular norms. Further, a concept of fuzzy interval is introduced. Suucient conditions for the existence of ...
User provided passwords are a sources of insecurity in existing computer systems due to a compromise between security and ease of use. Multi-factor authentication attempts to strengthen this weakness, but users fail to implement it due to inconvenience. One possible solution is to use gestures as a form of authentication. We show that it is possible to distinguish between gestures as well as di...
abstract in this paper, a fuzzy pid with new structure is proposed to solve the load frequency control in interconnected power systems. in this study, a new structure and effective of the fuzzy pid-type load frequency control (lfc) is proposed to solve the load frequency control in interconnected power systems. the main objective is to eliminate the deviations in the frequency of different area...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید