|
|
 |
Calculating cost efficiency using prices dependent on time via approximate method |
P. 1-12 |
|
Jafar Pourmahmoud * , Naser Kaheh  |
|
Abstract
(2926 Views) |
Full-Text (PDF)
(9160 Downloads)
|
 |
Evaluation Efficiency of Large-Scale Data Set: Cerebellar Model Articulation Controller Neural Network |
P. 13-30 |
|
Dalal Modhej * , Adel Dahimavi  |
|
Abstract
(3000 Views) |
Full-Text (PDF)
(9858 Downloads)
|
 |
Evaluating the effectiveness of factors affecting the development of virtual education in the COVID-19 era based on SCORM model (Case Study: Ferdowsi University of Mashhad) |
P. 31-47 |
|
Ahmad Latifian *  |
|
Abstract
(2068 Views) |
Full-Text (PDF)
(7648 Downloads)
|
 |
Applying Branch and Cut Method to a Graph Based Reduction of UCTP |
P. 48-60 |
|
Mostafa Khorramizadeh *  |
|
Abstract
(2233 Views) |
Full-Text (PDF)
(7164 Downloads)
|
 |
Development of a comprehensive model for re-designing the organizational structure based on business intelligence
(case study: Esfahan Steel Company) |
P. 67-82 |
|
Mahdi Bahrami , Akbar Etebarian Khorasgani * , Reza Ebrahimzadeh Dastjerdi  |
|
Abstract
(5078 Views) |
Full-Text (PDF)
(7250 Downloads)
|
 |
Stochastic Optimal Operation of a Multi carrier Energy System with Electric Vehicles and Combined Heat and Power Units |
P. 83-102 |
|
Alireza Malekijavan * , Hamidreza Zafarani , Mehdi Aslinejad  |
|
Abstract
(2573 Views) |
Full-Text (PDF)
(7732 Downloads)
|
 |
Developing a capacitated hub location-routing model for the rapid transit network design under uncertainty |
P. 103-122 |
|
Malihe Fallah-Tafti , Mahboube Honarvar * , Reza Tavakkoli-Moghaddam , Ahmad Sadeghieh  |
|
Abstract
(3611 Views) |
Full-Text (PDF)
(6327 Downloads)
|
 |
Computing maximum proportion and most violated sets |
P. 123-134 |
|
Mehdi Ghiyasvand *  |
|
Abstract
(1434 Views) |
Full-Text (PDF)
(4124 Downloads)
|
 |
Inverse Data Envelopment Analysis on the Base of Non-Convex Cost Efficiency |
P. 135-148 |
|
Farzaneh Asadi , Sohrab Kordrostami * , Alireza Amirteimoori , Morteza Bazrafshan  |
|
Abstract
(2163 Views) |
Full-Text (PDF)
(5505 Downloads)
|
 |
Establishing secure communication based on the design of a visual secret sharing scheme |
P. 149-163 |
|
Avishan Salehi , Nikbakhsh Javadian *  |
|
Abstract
(3474 Views) |
Full-Text (PDF)
(5469 Downloads)
|
 |
A Systematic Literature Review on MOORA Methodologies and Applications |
P. 164-183 |
|
Mahdi Homayounfar , Mehdi Fadaei * , Hamed Gheibdoust , Hamidreza Rezaee Kelidbari  |
|
Abstract
(3296 Views) |
Full-Text (PDF)
(6077 Downloads)
|
 |
A Three-Stage Process for Fuzzy Stochastic Network Data Envelopment Analysis Models |
P. 184-197 |
|
Seyed Hadi Nasseri * , Parastoo Niksefat Dogori  |
|
Abstract
(4132 Views) |
Full-Text (PDF)
(4941 Downloads)
|