|
|
 |
Calculating cost efficiency using prices dependent on time via approximate method |
P. 1-12 |
|
Jafar Pourmahmoud * , Naser Kaheh  |
|
Abstract
(3188 Views) |
Full-Text (PDF)
(9506 Downloads)
|
 |
Evaluation Efficiency of Large-Scale Data Set: Cerebellar Model Articulation Controller Neural Network |
P. 13-30 |
|
Dalal Modhej * , Adel Dahimavi  |
|
Abstract
(3228 Views) |
Full-Text (PDF)
(9923 Downloads)
|
 |
Evaluating the effectiveness of factors affecting the development of virtual education in the COVID-19 era based on SCORM model (Case Study: Ferdowsi University of Mashhad) |
P. 31-47 |
|
Ahmad Latifian *  |
|
Abstract
(2273 Views) |
Full-Text (PDF)
(8011 Downloads)
|
 |
Applying Branch and Cut Method to a Graph Based Reduction of UCTP |
P. 48-60 |
|
Mostafa Khorramizadeh *  |
|
Abstract
(2441 Views) |
Full-Text (PDF)
(7507 Downloads)
|
 |
Development of a comprehensive model for re-designing the organizational structure based on business intelligence
(case study: Esfahan Steel Company) |
P. 67-82 |
|
Mahdi Bahrami , Akbar Etebarian Khorasgani * , Reza Ebrahimzadeh Dastjerdi  |
|
Abstract
(5285 Views) |
Full-Text (PDF)
(7450 Downloads)
|
 |
Stochastic Optimal Operation of a Multi carrier Energy System with Electric Vehicles and Combined Heat and Power Units |
P. 83-102 |
|
Alireza Malekijavan * , Hamidreza Zafarani , Mehdi Aslinejad  |
|
Abstract
(2786 Views) |
Full-Text (PDF)
(7920 Downloads)
|
 |
Developing a capacitated hub location-routing model for the rapid transit network design under uncertainty |
P. 103-122 |
|
Malihe Fallah-Tafti , Mahboube Honarvar * , Reza Tavakkoli-Moghaddam , Ahmad Sadeghieh  |
|
Abstract
(3858 Views) |
Full-Text (PDF)
(6669 Downloads)
|
 |
Computing maximum proportion and most violated sets |
P. 123-134 |
|
Mehdi Ghiyasvand *  |
|
Abstract
(1590 Views) |
Full-Text (PDF)
(4460 Downloads)
|
 |
Inverse Data Envelopment Analysis on the Base of Non-Convex Cost Efficiency |
P. 135-148 |
|
Farzaneh Asadi , Sohrab Kordrostami * , Alireza Amirteimoori , Morteza Bazrafshan  |
|
Abstract
(2392 Views) |
Full-Text (PDF)
(5846 Downloads)
|
 |
Establishing secure communication based on the design of a visual secret sharing scheme |
P. 149-163 |
|
Avishan Salehi , Nikbakhsh Javadian *  |
|
Abstract
(3697 Views) |
Full-Text (PDF)
(5663 Downloads)
|
 |
A Systematic Literature Review on MOORA Methodologies and Applications |
P. 164-183 |
|
Mahdi Homayounfar , Mehdi Fadaei * , Hamed Gheibdoust , Hamidreza Rezaee Kelidbari  |
|
Abstract
(3530 Views) |
Full-Text (PDF)
(6497 Downloads)
|
 |
A Three-Stage Process for Fuzzy Stochastic Network Data Envelopment Analysis Models |
P. 184-197 |
|
Seyed Hadi Nasseri * , Parastoo Niksefat Dogori  |
|
Abstract
(4390 Views) |
Full-Text (PDF)
(5135 Downloads)
|