نتایج جستجو برای: pharmaceutical policy fuzzy theory

تعداد نتایج: 1162013  

Journal: :international journal of industrial mathematics 2015
s. salahshour f. amini‎‎ m. ayatollahi‎ e. vaseghi

fuzzy control systems have had various applications in a wide range of science and engineering in recent years. since an unstable control system is typically useless and potentially dangerous, stability is the most important requirement for any control system (including fuzzy control system). conceptually, there are two types of stability for control systems: lyapunov stability (a special case ...

Journal: :Multiple-Valued Logic and Soft Computing 2011
Yu Liu Hong-Zhong Huang

In this paper, a system consisting of single multi-state element (MSE) with performance rates and transition intensities presented as fuzzy values is introduced. Due to the lack, inaccuracy or fluctuation of collected data, it is often too difficult to evaluate the performance rates and transition intensities of multi-state element/system with precise value, especially in the continuous degrada...

Journal: :J. Inf. Sci. Eng. 2010
Liang-Yuh Ouyang Jinn-Tsair Teng Mei-Chuan Cheng

The inventory problem associated with trade credit is a popular topic in which interest income and interest payments are important issues. Most studies related to trade credit assume that the interest rate is both fixed and predetermined. However, in the real market, many factors such as financial policy, monetary policy and inflation, may affect the interest rate. Moreover, within the environm...

2013

This study applies the Multiple Criteria Decision-Making (MCDM) which based on decision theories to evaluate the tourism policy of Taiwan. The sets of tourism policy are a composite of various conditions, and must be considered within uncertain and dynamic environments which are difficult to measure. In order to strengthen the comprehensiveness and reasonableness of evaluating process, we used ...

2012
Seema Mehra

Alaca, C. , Turkoglu, D. and Yildiz, C. , Fixed points in intuitionistic fuzzy metric spaces,Chaos, Solitons and Fractals, 29(2006), 10731078. Atanassov, K. , Intuitionistic fuzzy sets, Fuzzy sets and systems 20(1986) 87-96. Dubois, D. and Prade, H. , Fuzzy Sets: Theory and Applications to Policy Analysis and Information Systems Plenum Press, New York, 1980. George, A. and Veeramani, P. , On so...

Journal: :iranian journal of fuzzy systems 2013
antonio roldan juan martnez-moreno concepcion roldan

considering the increasing interest in fuzzy theory and possible applications,the concept of fuzzy metric space concept has been introduced by severalauthors from different perspectives. this paper interprets the theory in termsof metrics evaluated on fuzzy numbers and defines a strong hausdorff topology.we study interrelationships between this theory and other fuzzy theories suchas intuitionis...

2017
Xin Guan Guidong Sun Xiao Yi Jing Zhao

Quantitative and qualitative fuzzy measures have been proposed to hesitant fuzzy sets 9 (HFSs) from different points. However, few of the existing HFSs fuzzy measures refer to the grey 10 relational analysis (GRA) theory. Actually, the GRA theory is very useful in the fuzzy measure 11 domain, which has been developed for such the intuitionistic fuzzy sets. Therefore, in this paper, 12 we apply ...

2005
Robert Popovian Kathleen A. Johnson Michael B. Nichol Gordon Liu

ROBERT POPOVIAN, PHARM.D., MS., is Senior Medical Liaison, PJizer, Inc. At the time oj this study, he was Bristol-Myers Squibb Fellow, Department oj Pharmaceutical Economics and Policy, University oj Southern California School oj Pharmacy, Los Angeles, CA; KATHLEEN A. JOHNSON, PHARM.D., PH.D., is Associate proJessor oj Clinical Pharmacy and Pharmaceutical Economics and Policy, University oj Sou...

2013
Vivek P. Kshirsagar Madhuri S. Joshi

Intrusion detection (IDS) is a computer based information system designed to collect information about malicious activities in a set of targeted IT resources, analyze the information and respond to a predefined security policy. This paper describes a fuzzy frequency episodes and probabilistic classification for detecting intrusions in a network. There are two main reasons for introducing fuzzy ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید