نتایج جستجو برای: compromise programming

تعداد نتایج: 353087  

Journal: :European Journal of Operational Research 2004
Serafim Opricovic Gwo-Hshiung Tzeng

The multiple criteria decision making (MCDM) methods VIKOR and TOPSIS are based on an aggregating function representing ‘‘closeness to the ideal’’, which originated in the compromise programming method. In VIKOR linear normalization and in TOPSIS vector normalization is used to eliminate the units of criterion functions. The VIKOR method of compromise ranking determines a compromise solution, p...

Journal: :Rairo-operations Research 2022

We present the framework of multiobjective fractional transportation problem in form pentagonal fuzzy supply and demand. The ideal model is set up to match decision makers’ preferences competing for criteria, costs, delivery time, degradation, environmental social concerns are objectives. employed flexible goal programming handle Model’s complexity improve reasonable compromise. real-world wind...

2011
Bein Elahi Seyed Mohammad Seyed-Hosseini Ahmad Makui Behin Elahi

Supplier selection is naturally a complex multi-objective problem including both quantitative and qualitative factors. This paper deals with this issue from a new view point. A quantity discount situation, which plays a role of motivator for buyer, is considered. Moreover, in order to find a reasonable compromise solution for this problem, at first a multi-objective modeling is presented. Then ...

Journal: :Operations Research 2016
Suvrajeet Sen Yifan Liu

Stochastic Programming (SP) has long been considered as a well-justified yet computationally challenging paradigm for practical applications. Computational studies in the literature often involve approximating a large number of scenarios by using a small number of scenarios to be processed via deterministic solvers, or running Sample Average Approximation on some genre of high performance machi...

Journal: :I. J. Network Security 2007
Ajith Abraham Crina Grosan Carlos Martín-Vide

Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromise the confidentiality, integrity, availability, or to bypass the security mechanisms of a computer or network. This paper proposes the development of an Intrusion Detection Program (IDP) which could detect known attack ...

Lixin Miao Mehrdad Mehrbod Nan Tu

The design of closed-loop logistics (forward and reverse logistics) has attracted growing attention with the stringent pressures of customer expectations, environmental concerns and economic factors. This paper considers a multi-product, multi-period and multi-objective closed-loop logistics network model with regard to facility expansion as a facility location–allocation problem, which more cl...

Journal: :European Journal of Operational Research 2007
Marco A. López Georg Still

A semi-infinite programming problem is an optimization problem in which finitely many variables appear in infinitely many constraints. This model naturally arises in an abundant number of applications in different fields of mathematics, economics and engineering. The paper, which intends to make a compromise between an introduction and a survey, treats the theoretical basis, numerical methods, ...

Journal: :British Dental Journal 2012

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید