|
 |
Calculating cost efficiency using prices dependent on time via approximate method |
P. 1-12 |
|
Jafar Pourmahmoud * , Naser Kaheh  |
|
Abstract
(2059 Views) |
Full-Text (PDF)
(7441 Downloads)
|
 |
Evaluation Efficiency of Large-Scale Data Set: Cerebellar Model Articulation Controller Neural Network |
P. 13-30 |
|
Dalal Modhej * , Adel Dahimavi  |
|
Abstract
(2143 Views) |
Full-Text (PDF)
(8895 Downloads)
|
 |
Evaluating the effectiveness of factors affecting the development of virtual education in the COVID-19 era based on SCORM model (Case Study: Ferdowsi University of Mashhad) |
P. 31-47 |
|
Ahmad Latifian *  |
|
Abstract
(1345 Views) |
Full-Text (PDF)
(5902 Downloads)
|
 |
Applying Branch and Cut Method to a Graph Based Reduction of UCTP |
P. 48-60 |
|
Mostafa Khorramizadeh *  |
|
Abstract
(1515 Views) |
Full-Text (PDF)
(5458 Downloads)
|
 |
Development of a comprehensive model for re-designing the organizational structure based on business intelligence
(case study: Esfahan Steel Company) |
P. 67-82 |
|
Mahdi Bahrami , Akbar Etebarian Khorasgani * , Reza Ebrahimzadeh Dastjerdi  |
|
Abstract
(3967 Views) |
Full-Text (PDF)
(5871 Downloads)
|
 |
Stochastic Optimal Operation of a Multi carrier Energy System with Electric Vehicles and Combined Heat and Power Units |
P. 83-102 |
|
Alireza Malekijavan * , Hamidreza Zafarani , Mehdi Aslinejad  |
|
Abstract
(1668 Views) |
Full-Text (PDF)
(6434 Downloads)
|
 |
Developing a capacitated hub location-routing model for the rapid transit network design under uncertainty |
P. 103-122 |
|
Malihe Fallah-Tafti , Mahboube Honarvar * , Reza Tavakkoli-Moghaddam , Ahmad Sadeghieh  |
|
Abstract
(2450 Views) |
Full-Text (PDF)
(4616 Downloads)
|
 |
Computing maximum proportion and most violated sets |
P. 123-134 |
|
Mehdi Ghiyasvand *  |
|
Abstract
(901 Views) |
Full-Text (PDF)
(2855 Downloads)
|
 |
Inverse Data Envelopment Analysis on the Base of Non-Convex Cost Efficiency |
P. 135-148 |
|
Farzaneh Asadi , Sohrab Kordrostami * , Alireza Amirteimoori , Morteza Bazrafshan  |
|
Abstract
(1370 Views) |
Full-Text (PDF)
(3844 Downloads)
|
 |
Establishing secure communication based on the design of a visual secret sharing scheme |
P. 149-163 |
|
Avishan Salehi , Nikbakhsh Javadian *  |
|
Abstract
(2397 Views) |
Full-Text (PDF)
(4164 Downloads)
|
 |
A Systematic Literature Review on MOORA Methodologies and Applications |
P. 164-183 |
|
Mahdi Homayounfar , Mehdi Fadaei * , Hamed Gheibdoust , Hamidreza Rezaee Kelidbari  |
|
Abstract
(2130 Views) |
Full-Text (PDF)
(3980 Downloads)
|
 |
A Three-Stage Process for Fuzzy Stochastic Network Data Envelopment Analysis Models |
P. 184-197 |
|
Seyed Hadi Nasseri * , Parastoo Niksefat Dogori  |
|
Abstract
(2845 Views) |
Full-Text (PDF)
(3796 Downloads)
|