نتایج جستجو برای: compromise solution

تعداد نتایج: 487663  

2002
Alain Haurie Alain B. Haurie

This note discusses the asymptotic behavior of optimal trajectories in infinite horizon control problems when the objective function is a compromise between two averaged discounted sums of the same stream of rewards. We show that the turnpike associated with the lowest discount rate is the one that will prevail. We also show that, when one discount rate is equal to 0, the problem of the best co...

This study proposes a combination of a fuzzy sliding mode controller (FSMC) with integral-proportion-Derivative switching surface based superconducting magnetic energy storage (SMES) and PID tuned by a multi-objective optimization algorithm to solve the load frequency control in power systems. The goal of design is to improve the dynamic response of power systems after load demand changes. In t...

2002
Gregory E. Kersten

An interactive procedure for group decision-making problems is presented in this paper. The procedure is based on the aspiration theory and utilizes both satisficing and optimizing approaches. The possibility of decision-makers forming coalitions is taken into account. The outcome of the modelled decision process is a compromise decision which can fulfill fairness and equity criteria. The compr...

2010
Andreas Henrich Stefanie Gooren-Sieber

Traditionalists will argue that conventional classroom lectures have been and always will be the most effective form of teaching. In contrast, people focusing on progress will put pure e-teaching on a pedestal. Confronted with these two extremes, a natural reflex is to search for a compromise. Hybrid learning could be such a compromise. However, the important question is whether this is only a ...

Journal: :IEEE Journal on Selected Areas in Communications 1993
Li Gong

Authentication is a process by which one satisses another about one's claim of identity. Typically an authentication server provides the authentication service via an authentication protocol. The authentication service is a security bottleneck in that its compromise can lead to the compromise of the whole system. The service is also a performance bottleneck because many activities cannot procee...

1998
Jaroslav Ramík Milan Vlach

This paper deals with the problem of existence of compromise decisions and conditions for a compromise decision to be weakly Pareto-optimal, i.e., to be a weak Pareto-maximizer, Pareto-maximizer, or strong Pareto-maximizer. The concept of compromise decision is generalized by adopting triangular norms. Further, a concept of fuzzy interval is introduced. Suucient conditions for the existence of ...

2016
Scott Davidson Derrick Smith Chen Yang Sebastian Cheah

User provided passwords are a sources of insecurity in existing computer systems due to a compromise between security and ease of use. Multi-factor authentication attempts to strengthen this weakness, but users fail to implement it due to inconvenience. One possible solution is to use gestures as a form of authentication. We show that it is possible to distinguish between gestures as well as di...

Journal: :international journal of smart electrical engineering 0
ehsan tehrani 1department of electrical engineering, buinzahra branch, isamic azad university, buinzahra, amir reza zare bidaki young researchers and elite club, buinzahra branch, islamic azad university, buinzahra mohsen farahani young researchers and elite club, east tehran branch, islamic azad university, tehran iran

abstract in this paper, a fuzzy pid with new structure is proposed to solve the load frequency control in interconnected power systems. in this study, a new structure and effective of the fuzzy pid-type load frequency control (lfc) is proposed to solve the load frequency control in interconnected power systems. the main objective is to eliminate the deviations in the frequency of different area...

Journal: :The Yale Law Journal 1991

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید