نتایج جستجو برای: Mathematical Programming
تعداد نتایج: 519240 فیلتر نتایج به سال:
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
a strategy that integrates an organization's marketing goals into a cohesive whole, ideally drawn from market research, focuses on the ideal product mix in order to achieve maximum profit potential; the marketing strategy is set out as a marketing plan, a good idea, method, information, object, or service that is the end result of a process and serves as a need or want satisfier. it is usually ...
a linear programming model has been presented for finding an appropriate planning in order to maximize hotel revenue. in this model, a special planning horizon has been considered that includes several busy days of a year. there are several reservation periods that may start a few months earlier. each period of reservation may have different prices and so result different incomes. hotel custome...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید