نتایج جستجو برای: compromise programming
تعداد نتایج: 353087 فیلتر نتایج به سال:
The multiple criteria decision making (MCDM) methods VIKOR and TOPSIS are based on an aggregating function representing ‘‘closeness to the ideal’’, which originated in the compromise programming method. In VIKOR linear normalization and in TOPSIS vector normalization is used to eliminate the units of criterion functions. The VIKOR method of compromise ranking determines a compromise solution, p...
We present the framework of multiobjective fractional transportation problem in form pentagonal fuzzy supply and demand. The ideal model is set up to match decision makers’ preferences competing for criteria, costs, delivery time, degradation, environmental social concerns are objectives. employed flexible goal programming handle Model’s complexity improve reasonable compromise. real-world wind...
Supplier selection is naturally a complex multi-objective problem including both quantitative and qualitative factors. This paper deals with this issue from a new view point. A quantity discount situation, which plays a role of motivator for buyer, is considered. Moreover, in order to find a reasonable compromise solution for this problem, at first a multi-objective modeling is presented. Then ...
Stochastic Programming (SP) has long been considered as a well-justified yet computationally challenging paradigm for practical applications. Computational studies in the literature often involve approximating a large number of scenarios by using a small number of scenarios to be processed via deterministic solvers, or running Sample Average Approximation on some genre of high performance machi...
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromise the confidentiality, integrity, availability, or to bypass the security mechanisms of a computer or network. This paper proposes the development of an Intrusion Detection Program (IDP) which could detect known attack ...
The design of closed-loop logistics (forward and reverse logistics) has attracted growing attention with the stringent pressures of customer expectations, environmental concerns and economic factors. This paper considers a multi-product, multi-period and multi-objective closed-loop logistics network model with regard to facility expansion as a facility location–allocation problem, which more cl...
A semi-infinite programming problem is an optimization problem in which finitely many variables appear in infinitely many constraints. This model naturally arises in an abundant number of applications in different fields of mathematics, economics and engineering. The paper, which intends to make a compromise between an introduction and a survey, treats the theoretical basis, numerical methods, ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید