نتایج جستجو برای: compromise ratio method
تعداد نتایج: 2072202 فیلتر نتایج به سال:
What prevents majorities from extracting surplus from minorities in legislatures? We study an infinite horizon game where a legislative body votes to determine distributive policy each period. Proposals accepted by a simple majority are implemented, otherwise the status quo allocation prevails. We construct symmetric Markov perfect equilibria that exhibit compromise in the following sense: if t...
Cryptosystems rely on the assumption that the computer end-points can securely store and use cryptographic keys. Yet, this assumption is rather hard to justify in practice. New software vulnerabilities are discovered every day, and malware is pervasive on mobile devices and desktop PCs. This thesis provides research on how to mitigate private key compromise in three different cases. The first c...
Brute-force attacks are omnipresent and manyfold on the Internet, and aim at compromising user accounts by issuing large numbers of authentication attempts on applications and daemons. Widespread targets of such attacks are Secure SHell (SSH) and Web applications, for example. The impact of brute-force attacks and compromises resulting thereof is often severe: Once compromised, attackers gain a...
A realistic threat model for cryptographic protocols or for languagebased security should include a dynamically growing population of principals (or security levels), some of which may be compromised, that is, come under the control of the adversary. We explore such a threat model within a pi-calculus. A new process construct records the ordering between security levels, including the possibili...
Utilizing renewable energies is identified as one of significant issues for economical and social significance in future human life. Thus, choosing the best renewable energy among renewable energy candidates is more important. To address the issue, multi-criteria group decision making (MCGDM) methods with imprecise information could be employed to solve these problems. The aim of this paper is ...
This paper presents a position sensor based on novel configuration of linear variable differential transformer. Design and optimization the using finite element method are presented. The measurements also conducted to validate experimentally performance. has short air core coils long magnetic armatures. axis rectangular excitation coil two antiserially connected pick up is perpendicular motion ...
This paper proposes the method to the solution of multi objective linear programming problems in fuzzy environment. Here attention has been paid to the study of optimal compromise solution for multi objective fuzzy linear programming problems. Two algorithms have been presented to gives efficient solutions as well as an optimal compromise solution. An illustrative example is given to describe o...
In this paper, we have proposed an algorithm to solve bi-level linear programming problems with fuzzy parameters without converting it to crisp equivalent problem and obtained a fuzzy compromise solution. Since the decision variables and objective functions are represented as fuzzy membership functions, the proposed fuzzy compromise solution will be more practical and reasonable. A numerical ex...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید