نتایج جستجو برای: compromise solution approach
تعداد نتایج: 1694063 فیلتر نتایج به سال:
The purpose of this article is to propose a scalable, topologically and traffic-wise self-adapting approach to a publish/subscribe paradigm for supporting event-based applications on a wide-area network. Large event systems requiring an efficient group communication as well as anonymity of particular peers tend to be fully decoupled. The publish/subscribe paradigm provides this requirement whic...
A Markov decision process (MDP) is a general model for solving planning problems under uncertainty. It has been extended to multiobjective MDP to address multicriteria or multiagent problems in which the value of a decision must be evaluated according to several viewpoints, sometimes con°icting. Although most of the studies concentrate on the determination of the set of Pareto-optimal policies,...
Design of an optimal controller requires the optimization of differential evolution performance measures that are often no commensurable and competing with each other. Being a population based approach; Differential Evolution (DE) is well suited to solve designing problem of TCSC – based controller. This paper investigates the application of DE-based multi-objective optimization technique for t...
This paper studies the Gaussian wiretap channel with correlated sources available not only at the transmitter and legitimate receiver, but also the eavesdropper. In particular, we are interested in the open problem of finding the optimal auxiliary random variable, which provides a closed-form solution to the secret-message and secret-key capacity region. To do that, we first take a deterministi...
In multi-objective scheduling problems, the objectives are usually in conflict. To obtain a satisfactory compromise and resolve the issue of NP-hardness, most existing works have suggested employing meta-heuristic methods, such as genetic algorithms. In this research, we propose a novel data-driven approach for generating a single solution that compromises multiple rules pursuing different obje...
Computer security has traditionally focused on system defense, concentrating on protection and recovery of victim machines. Moving from the opposite perspective, we propose a complementary approach that focuses on limiting the attacking capabilities of the hosts. Software design and implementation weaknesses usually are at the basis of computer ooensive capacities. Since software redesign or pa...
The sensitivity analysis for multi-attribute decision making (MADM) problems is important for two reasons: First, the decision matrix as the source of the results of a decision problem is inaccurate because it sorts the alternatives in each criterion inaccurately. Second, the decision maker may change his opinions in a time period because of changes in the importance of the criteria and in the ...
This paper proposes a Trust-Region Based Augmented Method (TRALM) to solve a combined Environmental and Economic Power Dispatch (EEPD) problem. The EEPD problem is a multi-objective problem with competing and non-commensurable objectives. The TRALM produces a set of non-dominated Pareto optimal solutions for the problem. Fuzzy set theory is employed to extract a compromise non-dominated sol...
The compromise value is introduced for cooperative games with random payoffs, that is, for cooperative games where the payoff to a coalition of players is a random variable. It is a compromise between utopia payoffs and minimal rights. This solution concept is based on the compromise value for NTU games and the τ -value for TU games. It is shown that the nonempty core of a game is bounded by th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید