نتایج جستجو برای: analytic network processanp
تعداد نتایج: 737460 فیلتر نتایج به سال:
We deene and characterize switching, an operation that takes two tableaux sharing a common border and \moves them through each other" giving another such pair. Several authors, including James and Kerber, Remmel, Haiman, and Shimozono, have deened switching operations; however, each of their operations is somewhat diierent from the rest and each imposes a particular order on the switches that c...
EEcient abstractions for Location management is a key consideration in wireless networks that support Universal Personal Communications. Location management involves a tracking component that maintains dynamic data on the location of mobile stations through a distributed database, and a search component that prescribes the manner in which the wireless network is to be paged so as to determine t...
In this paper, we study tree–like tableaux, combinatorial objects which exhibit a natural tree structure and are connected to the partially asymmetric simple exclusion process (PASEP). There was a conjecture made on the total number of corners in tree–like tableaux and the total number of corners in symmetric tree–like tableaux. In this paper, we prove both conjectures. Our proofs are based on ...
Forest road construction is the most costly operation in forestry. Road designing and construction in unsuitable areas may increase construction and maintenance costs and also cause many environmental impacts. Therefore, it is required to pay more attention to forest road design. In this research, we tried to introduce an appropriate method for locating forest roads using GIS and AHP simultaneo...
Encrypted protocols, such as SSL, are becoming more prevalent because of the growing use of e-commerce, anonymity services, and secure authentication. Likewise, traffic analysis is becoming more common because it is often the only way to analyze these protocols. Though there are many valid uses for traffic analysis (such as network policy enforcement and intrusion detection), it can also be use...
In this article we present a class of formulas φn, n ∈ Nat, that need at least 2 assumptions to be proved in a normal proof in Natural Deduction for purely implicational minimal propositional logic. In purely implicational classical propositional logic, with Peirce’s rule, each φn is proved with only one assumption in Natural Deduction in a normal proof. Hence, the formulas φn have exponentiall...
A sorting network is a shortest path from 12 · · · n to n · · · 21 in the Cayley graph of Sn generated by nearest-neighbour swaps. We prove that for a uniform random sorting network, as n → ∞ the spacetime process of swaps converges to the product of semicircle law and Lebesgue measure. We conjecture that the trajectories of individual particles converge to random sine curves, while the permuta...
Risk is an inevitable part of life, every day people are somehow at risk. Different risks in various forms and perspectives have different functions. Kurdistan province, with various heights and relatively good rainfall, It results the country's cold spots. Since most of seasonal rainfall occurs in winter, Snow cover is often the domain and passes it hillsides. One of the concerns of people in ...
Municipalities are in charge of running and managing public transport activities. This study aims to identify the factors affecting seaway passenger transportation via scheduled high-speed sea buses, motorboats, cityline from 11 points Kocaeli Bay. To provide service at a sustainable cost, which is legal obligation Metropolitan Municipalities, framing current system as whole light these another...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید