|
 |
Calculating cost efficiency using prices dependent on time via approximate method |
P. 1-12 |
|
Jafar Pourmahmoud * , Naser Kaheh  |
|
Abstract
(2379 Views) |
Full-Text (PDF)
(8021 Downloads)
|
 |
Evaluation Efficiency of Large-Scale Data Set: Cerebellar Model Articulation Controller Neural Network |
P. 13-30 |
|
Dalal Modhej * , Adel Dahimavi  |
|
Abstract
(2463 Views) |
Full-Text (PDF)
(9289 Downloads)
|
 |
Evaluating the effectiveness of factors affecting the development of virtual education in the COVID-19 era based on SCORM model (Case Study: Ferdowsi University of Mashhad) |
P. 31-47 |
|
Ahmad Latifian *  |
|
Abstract
(1613 Views) |
Full-Text (PDF)
(6444 Downloads)
|
 |
Applying Branch and Cut Method to a Graph Based Reduction of UCTP |
P. 48-60 |
|
Mostafa Khorramizadeh *  |
|
Abstract
(1807 Views) |
Full-Text (PDF)
(6016 Downloads)
|
 |
Development of a comprehensive model for re-designing the organizational structure based on business intelligence
(case study: Esfahan Steel Company) |
P. 67-82 |
|
Mahdi Bahrami , Akbar Etebarian Khorasgani * , Reza Ebrahimzadeh Dastjerdi  |
|
Abstract
(4371 Views) |
Full-Text (PDF)
(6320 Downloads)
|
 |
Stochastic Optimal Operation of a Multi carrier Energy System with Electric Vehicles and Combined Heat and Power Units |
P. 83-102 |
|
Alireza Malekijavan * , Hamidreza Zafarani , Mehdi Aslinejad  |
|
Abstract
(1946 Views) |
Full-Text (PDF)
(6849 Downloads)
|
 |
Developing a capacitated hub location-routing model for the rapid transit network design under uncertainty |
P. 103-122 |
|
Malihe Fallah-Tafti , Mahboube Honarvar * , Reza Tavakkoli-Moghaddam , Ahmad Sadeghieh  |
|
Abstract
(2897 Views) |
Full-Text (PDF)
(5165 Downloads)
|
 |
Computing maximum proportion and most violated sets |
P. 123-134 |
|
Mehdi Ghiyasvand *  |
|
Abstract
(1100 Views) |
Full-Text (PDF)
(3188 Downloads)
|
 |
Inverse Data Envelopment Analysis on the Base of Non-Convex Cost Efficiency |
P. 135-148 |
|
Farzaneh Asadi , Sohrab Kordrostami * , Alireza Amirteimoori , Morteza Bazrafshan  |
|
Abstract
(1665 Views) |
Full-Text (PDF)
(4345 Downloads)
|
 |
Establishing secure communication based on the design of a visual secret sharing scheme |
P. 149-163 |
|
Avishan Salehi , Nikbakhsh Javadian *  |
|
Abstract
(2821 Views) |
Full-Text (PDF)
(4639 Downloads)
|
 |
A Systematic Literature Review on MOORA Methodologies and Applications |
P. 164-183 |
|
Mahdi Homayounfar , Mehdi Fadaei * , Hamed Gheibdoust , Hamidreza Rezaee Kelidbari  |
|
Abstract
(2565 Views) |
Full-Text (PDF)
(4625 Downloads)
|
 |
A Three-Stage Process for Fuzzy Stochastic Network Data Envelopment Analysis Models |
P. 184-197 |
|
Seyed Hadi Nasseri * , Parastoo Niksefat Dogori  |
|
Abstract
(3353 Views) |
Full-Text (PDF)
(4174 Downloads)
|