|
 |
Calculating cost efficiency using prices dependent on time via approximate method |
P. 1-12 |
|
Jafar Pourmahmoud * , Naser Kaheh  |
|
Abstract
(1847 Views) |
Full-Text (PDF)
(7142 Downloads)
|
 |
Evaluation Efficiency of Large-Scale Data Set: Cerebellar Model Articulation Controller Neural Network |
P. 13-30 |
|
Dalal Modhej * , Adel Dahimavi  |
|
Abstract
(1957 Views) |
Full-Text (PDF)
(8586 Downloads)
|
 |
Evaluating the effectiveness of factors affecting the development of virtual education in the COVID-19 era based on SCORM model (Case Study: Ferdowsi University of Mashhad) |
P. 31-47 |
|
Ahmad Latifian *  |
|
Abstract
(1181 Views) |
Full-Text (PDF)
(5575 Downloads)
|
 |
Applying Branch and Cut Method to a Graph Based Reduction of UCTP |
P. 48-60 |
|
Mostafa Khorramizadeh *  |
|
Abstract
(1358 Views) |
Full-Text (PDF)
(5154 Downloads)
|
 |
Development of a comprehensive model for re-designing the organizational structure based on business intelligence
(case study: Esfahan Steel Company) |
P. 67-82 |
|
Mahdi Bahrami , Akbar Etebarian Khorasgani * , Reza Ebrahimzadeh Dastjerdi  |
|
Abstract
(3668 Views) |
Full-Text (PDF)
(5536 Downloads)
|
 |
Stochastic Optimal Operation of a Multi carrier Energy System with Electric Vehicles and Combined Heat and Power Units |
P. 83-102 |
|
Alireza Malekijavan * , Hamidreza Zafarani , Mehdi Aslinejad  |
|
Abstract
(1485 Views) |
Full-Text (PDF)
(6122 Downloads)
|
 |
Developing a capacitated hub location-routing model for the rapid transit network design under uncertainty |
P. 103-122 |
|
Malihe Fallah-Tafti , Mahboube Honarvar * , Reza Tavakkoli-Moghaddam , Ahmad Sadeghieh  |
|
Abstract
(2138 Views) |
Full-Text (PDF)
(4296 Downloads)
|
 |
Computing maximum proportion and most violated sets |
P. 123-134 |
|
Mehdi Ghiyasvand *  |
|
Abstract
(799 Views) |
Full-Text (PDF)
(2678 Downloads)
|
 |
Inverse Data Envelopment Analysis on the Base of Non-Convex Cost Efficiency |
P. 135-148 |
|
Farzaneh Asadi , Sohrab Kordrostami * , Alireza Amirteimoori , Morteza Bazrafshan  |
|
Abstract
(1210 Views) |
Full-Text (PDF)
(3526 Downloads)
|
 |
Establishing secure communication based on the design of a visual secret sharing scheme |
P. 149-163 |
|
Avishan Salehi , Nikbakhsh Javadian *  |
|
Abstract
(2118 Views) |
Full-Text (PDF)
(3873 Downloads)
|
 |
A Systematic Literature Review on MOORA Methodologies and Applications |
P. 164-183 |
|
Mahdi Homayounfar , Mehdi Fadaei * , Hamed Gheibdoust , Hamidreza Rezaee Kelidbari  |
|
Abstract
(1836 Views) |
Full-Text (PDF)
(3605 Downloads)
|
 |
A Three-Stage Process for Fuzzy Stochastic Network Data Envelopment Analysis Models |
P. 184-197 |
|
Seyed Hadi Nasseri * , Parastoo Niksefat Dogori  |
|
Abstract
(2507 Views) |
Full-Text (PDF)
(3491 Downloads)
|