نتایج جستجو برای: fuzzy inference system for evaluating the implementation of business intelligence systems in software industry. iranian software development organizations have been facing a lot of problems in case of implementing business intelligence systems. this system would be helpful in recognizing the conditions and prerequisites of success or failure. organizations can recalculate the neuro
تعداد نتایج: 28157843 فیلتر نتایج به سال:
the main goal of research is designing an adaptive nuero-fuzzy inference system for evaluating the implementation of business intelligence systems in software industry. iranian software development organizations have been facing a lot of problems in case of implementing business intelligence systems. this system would be helpful in recognizing the conditions and prerequisites of success or fail...
with the increasing population and the need for more food, as well as with the development of science and technology, human approach to unnatural and often chemical inputs to increase agricultural production has been a great expansion and problems such as increased cancers, chronic diseases has created environmental pollution. implementation of organic organic is a solution to these problems . ...
in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...
there is no doubt that human being needs to become integrated with industry and industry needs to be progressed, daily. on the other hand, serious events in industrial units specially in oil industries has been shown that such damages and events are industry related ones. the consequence of such events and damages which resulted in chemical and poisoned explosions and loss of life and property ...
abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...
the poor orientation of the restaurants toward the information technology has yet many unsolved issues in regards to the customers. one of these problems which lead the appeal list of later, and have a negative impact on the prestige of the restaurant is the case when the later does not respond on time to the customers’ needs, and which causes their dissatisfaction. this issue is really sensiti...
the changes in todays world organization, to the extent that instability can be characterized with the most stable organizations called this afternoon. if you ever change management component, an additional value to the organization was considered, today, these elements become the foundation the organization is survival. the definition of the entrepreneur to identify opportunities to exploit a...
the application of e-learning systems - as one of the solutions to the issue of anywhere and anytime learning – is increasingly spreading in the area of education. content management - one of the most important parts of any e-learning system- is in the concern of tutors and teachers through which they can obtain means and paths to achieve the goals of the course and learning objectives. e-learn...
if the precise implementation of the principle of proportion and:balance between the violation and the penalty as well as the other dimensions could be considered as a stick yard for the imptementation of justice any lack of preciseness in carrying out such principle would not indeed be much too far from injustice . naturally ,if it would be imagined that the objective of balance between...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید