نتایج جستجو برای: probabilistic programming model for designing a reliable multi
تعداد نتایج: 16371944 فیلتر نتایج به سال:
abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...
supply chain network design decisions are among the strategic decisions of supply chain management which play significant role on the efficient performance of the supply chain. however, there are two challenging factors which may have great impact on the supply chain performance. these factors are on the one hand disruptions and their attendant damages and on the other hand uncertain nature of ...
the main purpose of this research was to:1.develop a coking model for thermal cracking of naphtha.2.study coke inhibition methods using different coke inhibitors.developing a coking model in naphtha cracking reactors requires a suitable model of the thermal cracking reactor based on a reliable kinetic model.to obtain reliable results all these models shall be solved simultaneously.for this pu...
in traditional portfolio selection model coefficients often are certain and deterministic, but in real world these coefficients are probabilistic. so decision maker cannot estimate them exactly. financial optimization is one of the most attractive areas in decision under uncertainty. in the portfolio selection problem the decision maker considers simultaneously conflicting objectives such as ra...
investigating the feasibility of a proposed model for geometric design of deployable arch structures
deployable scissor type structures are composed of the so-called scissor-like elements (sles), which are connected to each other at an intermediate point through a pivotal connection and allow them to be folded into a compact bundle for storage or transport. several sles are connected to each other in order to form units with regular polygonal plan views. the sides and radii of the polygons are...
abstract this study aimed at investigating the effect of bilingual teaching of cognate words (persian-english) on iranian upper intermediate efl learners’ knowledge of lexical development. for this purpose,100 subjects participated in this study out of which 40 learners were selected for this study and they were assigned into two groups, control and experimental. cross-language cognates (wor...
abstract: in this thesis, we focus to class of convex optimization problem whose objective function is given as a linear function and a convex function of a linear transformation of the decision variables and whose feasible region is a polytope. we show that there exists an optimal solution to this class of problems on a face of the constraint polytope of feasible region. based on this, we dev...
This paper considers a multi-objective portfolio selection problem imposed by gaining of portfolio, divided yield and risk control in an ambiguous investment environment, in which the return and risk are characterized by probabilistic numbers. Based on the theory of possibility, a new multi-objective portfolio optimization model with gaining of portfolio, divided yield and risk control is propo...
over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...
due to extraordinary large amount of information and daily sharp increasing claimant for ui benefits and because of serious constraint of financial barriers, the importance of handling fraud detection in order to discover, control and predict fraudulent claims is inevitable. we use the most appropriate data mining methodology, methods, techniques and tools to extract knowledge or insights from ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید