نتایج جستجو برای: compromise solution method
تعداد نتایج: 1999273 فیلتر نتایج به سال:
The extreme weakness of global navigation satellite system (GNSS) signals makes them vulnerable to almost every kind of interferences that, without adequate countermeasures, can heavily compromise the receiver performance. An effective solution is represented by time-frequency (TF) analysis that has proved to be able to detect and suppress a wide class of disturbing signals. However, high compu...
We propose the use of fuzzy neural networks for finding a good compromise solution to fuzzy multiple objective linear programs (FMOLP).
A key question about animal group decision making is which conditions promote shared or unshared decisions. A recent experiment on sticklebacks demonstrates a compromise solution: turn-taking.
Due to the increase in impact of different manufacturing processes on environment, green are prime focus many current pieces research. In article, a machining process for stainless steel and SS304 AISI1045 has been optimized using newly developed Fuzzy Measurement Alternatives Ranking according COmpromise Solution (F-MARCOS) method form two case studies. first study, nose radius, cutting speed,...
The efficiency of cutting methods in general and the grinding method particular is evaluated through many parameters such as surface roughness, machining productivity, system vibrations, etc. process considered highly efficient when it meets set requirements for these ensuring small high However, each specific condition, sometimes criteria output are opposite. In cases, required to solve Multi-...
In vector quantization the number of vectors used to construct the codebook is always an undefined problem, there is always a compromise between the number of vectors and the quantity of information lost during the compression. In this text we present a minimum of Entropy principle that gives solution to this compromise and represents an Entropy point of view of signal compression in general. A...
A forensics investigation after a breach often uncovers network and host indicators of compromise (IOCs) that can be deployed to sensors to allow early detection of the adversary in the future. Over time, the adversary will change tactics, techniques, and procedures (TTPs), which will also change the data generated. If the IOCs are not kept up-to-date with the adversary’s new TTPs, the adversar...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید