期刊文献+
共找到70篇文章
< 1 2 4 >
每页显示 20 50 100
Business Email Compromise Challenges to Medium and Large-Scale Firms in USA: An Analysis
1
作者 Okechukwu Ogwo-Ude 《Open Journal of Applied Sciences》 2023年第6期803-812,共10页
Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC... Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC attacks resulted in financial losses exceeding $1.8 billion in the USA in 2019 alone. Business Email Compromise (BEC) attacks have emerged as a significant cybersecurity threat, leading to substantial financial losses for organizations. According to the FBI’s Internet Crime Complaint Center (IC3), BEC attacks resulted in financial losses exceeding $1.8 billion in the USA in 2019 alone. BEC attacks target a wide range of sectors. No industry is immune to these attacks, which emphasizes the need for increased vigilance across all sectors. Attackers often impersonate high-level executives or vendors to gain credibility and manipulate employees into complying with fraudulent requests. BEC attacks have a global reach, with threat actors operating from various countries, including Nigeria, Russia, China, and Eastern European nations. We will examine the unique difficulties SMEs encounter in relation to BEC attacks. This study provides a more excellent knowledge of the severity of the problem and offers ideas for efficient mitigation solutions through an investigation of attack characteristics, tactics, and impacts. 展开更多
关键词 SMEs VULNERABILITY THREAT Business Email Compromise (BEC) Email Security FRAUD
下载PDF
A New Approach for Solving Fuzzy Linear Multi-Criterion Problems: An Approach Based on Minimization of the Errors Functions
2
作者 Joél Lema Makubikua Amani Wema +2 位作者 Yves Tinda Mangongo Joseph-Désiré Kyemba Bukweli Justin Dupar Busili Kampempe 《American Journal of Operations Research》 2023年第1期1-17,共17页
The main purpose of this paper is to build a new approach for solving a fuzzy linear multi-criterion problem by defining a function called “error function”. For this end, the concept of level set  is used to co... The main purpose of this paper is to build a new approach for solving a fuzzy linear multi-criterion problem by defining a function called “error function”. For this end, the concept of level set  is used to construct the error function. In addition, we introduce the concept of deviation variable in the definition of the error function. The algorithm of the new approach is summarized in three main steps: first, we transform the original fuzzy problem into a deterministic one by choosing a specific level . second, we solve separately each uni-criteria problem and we compute the error function for each criteria. Finally, we minimize the sum of error functions in order to obtain the desired compromise solution. A numerical example is done for a comparative study with some existing approaches to show the effectiveness of the new approach. 展开更多
关键词 Deviation Variable Compromise Solution Membership Function Error Function Decision-Making Function
下载PDF
窗无恶
3
作者 张利 《世界建筑》 2016年第8期12-13,共2页
窗是建筑得以成立的基本要素之一。我们今天还在引用的“……凿户牖以为室,有室之用……”足以证明先人在文明之初给予窗的重视。在不同时代与不同文化的建筑中,如果审视墙、柱、顶、台阶、门、窗等这些建筑基本要素,不难发现窗是几乎... 窗是建筑得以成立的基本要素之一。我们今天还在引用的“……凿户牖以为室,有室之用……”足以证明先人在文明之初给予窗的重视。在不同时代与不同文化的建筑中,如果审视墙、柱、顶、台阶、门、窗等这些建筑基本要素,不难发现窗是几乎唯一的总与正向的事物联系在一起的要素。当墙与割裂、柱与耻辱、顶与压迫、台阶与距离、门与特权可以产生各种暗淡的社会文化纠葛时,窗似乎是完全幸免的。 展开更多
关键词 事物联系 无恶 有室 物质形态 COMPROMISE 朗香教堂 REFERENTIAL 柯布西耶 TALKING 玫瑰窗
下载PDF
莎士比亚与英语词汇(18)
4
作者 杨俊峰 《英语知识》 2004年第6期24-25,共2页
该词的意思是“相互承诺,达成一致”。英语的释义是to bind by mutual agreement;to come to terms。
关键词 莎士比亚 英语 词汇 释义 COMPROMISE
下载PDF
An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation 被引量:3
5
作者 Inam ul haq Jian Wang +1 位作者 Youwen Zhu Saad Maqbool 《Digital Communications and Networks》 SCIE CSCD 2021年第1期140-150,共11页
During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure ... During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure seamless online services to end-users.To ensure the security of this online communication,researchers have proposed several multi-server authentication schemes incorporating various cryptographic primitives.Due to the low power and computational capacities of mobile devices,the hash-based multi-server authenticated key agreement schemes with offline Registration Server(RS)are the most efficient choice.Recently,Kumar-Om presented such a scheme and proved its security against all renowned attacks.However,we find that their scheme bears an incorrect login phase,and is unsafe to the trace attack,the Session-Specific Temporary Information Attack(SSTIA),and the Key Compromise Impersonation Attack(KCIA).In fact,all of the existing multi-server authentication schemes(hash-based with offline RS)do not withstand KCLA.To deal with this situation,we propose an improved hash-based multi-server authentication scheme(with offline RS).We analyze the security of the proposed scheme under the random oracle model and use the t4Automated Validation of Internet Security Protocols and Applications''(AVISPA)tool.The comparative analysis of communication overhead and computational complexity metrics shows the efficiency of the proposed scheme. 展开更多
关键词 Multi-server architecture Authenticated key agreement Registration server One-way hash function Key compromise impersonation
下载PDF
Resolution of epidural hematoma related to osteoporotic fracture after percutaneous vertebroplasty 被引量:2
6
作者 Hidenari Hirata Akio Hiwatashi +5 位作者 Takashi Yoshiura Osamu Togao Koji Yamashita Hironori Kamano Kazufumi Kikuchi Hiroshi Honda 《World Journal of Radiology》 CAS 2013年第8期325-327,共3页
We are the first to report a case that showed spontaneous resolution of epidural hematoma which was related to a steroid-induced osteoporotic compression fracture.The patient had a painful fracture with an intraverteb... We are the first to report a case that showed spontaneous resolution of epidural hematoma which was related to a steroid-induced osteoporotic compression fracture.The patient had a painful fracture with an intravertebral cleft at L1 accompanying an epidural hematoma posteriorly.Immediate pain relief was achieved after percutaneous vertebroplasty.Complete resolution of hematoma was noted three months after procedure.We theorized that intravertebral stability after treatment might have played a role in this patient. 展开更多
关键词 VERTEBROPLASTY Osteoporosis EPIDURAL HEMATOMA Spinal CANAL COMPROMISE Intravertebral CLEFT
下载PDF
Method for multi-attribute group decision-making based on the compromise weights 被引量:2
7
作者 Shengbao Yao Wan'an Cui 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第4期591-597,共7页
Multi-attribute group decision-making problems are considered where information on both attribute weights and value scores of consequences is incomplete.In group decision analysis,if preference information about alter... Multi-attribute group decision-making problems are considered where information on both attribute weights and value scores of consequences is incomplete.In group decision analysis,if preference information about alternatives is provided by participants,it should be verified whether there exist compromise weights that can support all the preference relations.The different compromise weight vectors may differ for the ranking of the alternatives.In the case that compromise weights exist,the method is proposed to find out all the compromise weight vectors in order to rank the alternatives.Based on the new feasible domain of attribute weights determined by all the compromise weight vectors and the incomplete information on value scores of consequences,dominance relations between alternatives are checked by a nonlinear goal programming model which can be transformed into a linear one by adopting a transformation.The checked dominance relations uniformly hold for all compromise weight vectors and the incomplete information on value scores of consequences.A final ranking of the alternatives can be obtained by aggregating these dominance relations. 展开更多
关键词 group decision-making incomplete information preference relation compromise weight.
下载PDF
Multi-criteria group decision making with fuzzy data:an extension of the VIKOR method 被引量:2
8
作者 Wenqi Jiang Jennifer Shang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第4期764-773,共10页
The VIKOR method is a multi-criteria decision making aid, which employs linear normalization to offer compromise solu- tions and has been successfully applied to various group decision making problems. However, the co... The VIKOR method is a multi-criteria decision making aid, which employs linear normalization to offer compromise solu- tions and has been successfully applied to various group decision making problems. However, the conventional VIKOR techniques used to integrate group judgments and the information loss arising from defuzzification are problematic and distort final outcomes. An improved integration method, which is optimization-based, is proposed. And it can handle fuzzy criteria values and weights. The precondition for accurately defuzzifying triangular fuzzy num- bers is identified. Several effective defuzzification procedures are proposed to improve the extant VIKOR, and a comprehensive evaluation framework is offered to aid multi-criteria group decision making. Finally, a numerical example is provided to illustrate the practicability of the proposed method. 展开更多
关键词 multi-criteria group decision making triangular fuzzynumbers VlKOR compromise solution.
下载PDF
Fuzzy distances based FMAGDM compromise ratio method and application 被引量:2
9
作者 Zhenfeng Rui Dengfeng Li 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第3期455-460,共6页
An extended compromise ratio method(CRM) based on fuzzy distances is developed to solve fuzzy multi-attribute group decision making problems in which weights of attributes and ratings of alternatives on attributes a... An extended compromise ratio method(CRM) based on fuzzy distances is developed to solve fuzzy multi-attribute group decision making problems in which weights of attributes and ratings of alternatives on attributes are expressed with values of linguistic variables parameterized using triangular fuzzy numbers.A compromise solution is determined by introducing the ranking index based on the concept that the chosen alternative should be as close as possible to the positive ideal solution and as far away from the negative ideal solution as possible simultaneously.This proposed method is compared with other existing methods to show its feasibility and effectiveness and illustrated with an example of the military route selection problem as one of the possible applications. 展开更多
关键词 fuzzy multi-attribute group decision making(FMAGDM) compromise ratio method(CRM) linguistic variable fuzzy number fuzzy distance.
下载PDF
Molecular Dynamics Simulation of Effect of Salt on the Compromise of Hydrophilic and Hydrophobic Interactions in Sodium Dodecyl Sulfate Micelle Solutions 被引量:1
10
作者 高健 任瑛 葛蔚 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2009年第4期654-660,共7页
The presence of salt has a profound effect on the size,shape and structure of sodium dodecyl sulfate(SDS)micelles.There have been a great number of experiments on SDS micelles in the presence and absence of salt to st... The presence of salt has a profound effect on the size,shape and structure of sodium dodecyl sulfate(SDS)micelles.There have been a great number of experiments on SDS micelles in the presence and absence of salt to study this complex problem.Unfortunately,it is not clear yet how electrolyte ions influence the structure of micelles.By describing the compromise between dominant mechanisms,a simplified atomic model of SDS in presence of salt has been developed and the molecular dynamics(MD)simulations of two series of systems with different concentrations of salt and charges of ion have been performed.Polydispersity of micelle size is founded at relatively high concentration of SDS and low charge of cation.Although the counter-ion pairs with head groups are formed,the transition of micelle shape is not observed because the charge of cation is not enough to neutralize the polar of micelle surface. 展开更多
关键词 molecular dynamics simulation COMPROMISE sodium dodecyl sulfate SALT MICELLE
下载PDF
Emergent reintubation following elective cervical surgery:A case series 被引量:1
11
作者 Joshua Schroeder Stephan N Salzmann +3 位作者 Alexander P Hughes James D Beckman Jennifer Shue Federico P Girardi 《World Journal of Orthopedics》 2017年第6期465-470,共6页
AIM To review cases of emergent reintubation after cervical surgery.METHODS Patients who were emergently intubated in the postoperative period following cervical surgery were identified. The patients' prospectivel... AIM To review cases of emergent reintubation after cervical surgery.METHODS Patients who were emergently intubated in the postoperative period following cervical surgery were identified. The patients' prospectively documented demographic parameters, medical history and clinical symptoms were ascertained. Pre-operative radiographs were examined for the extent of their pathology. The details of the operative procedure were discerned.RESULTS Eight hundred and eighty patients received anterioror combined anterior-posterior cervical surgery from 2008-2013. Nine patients(1.02%) required emergent reintubation. The interval between extubation to reintubation was 6.2 h [1-12]. Patients were kept intubated after reintubation for 2.3 d [2-3]. Seven patients displayed moderate postoperative edema. One patient was diagnosed with a compressive hematoma whichwas subsequently evacuated in the OR. Another patient was diagnosed with a pulmonary effusion and treated with diuretics. One patient received a late debridement for an infected hematoma. Six patients reported residual symptoms and three patients made a complete recovery. CONCLUSION Respiratory compromise is a rare but potentially life threatening complication following cervical surgery. Patients at increased risk should be monitored closely for extended periods of time post-operatively. If the airway is restored adequately in a timely manner through emergent re-intubation, the outcome of the patients is generally favorable. 展开更多
关键词 Cervical surgery COMPLICATION AIRWAY COMPROMISE REINTUBATION HEMATOMA
下载PDF
A neighbor information based false data filtering scheme in wireless sensor networks 被引量:1
12
作者 刘志雄 王建新 张士庚 《Journal of Central South University》 SCIE EI CAS 2012年第11期3147-3153,共7页
In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carrie... In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carried in each data report on intermediate nodes,thus cannot filter out fake reports that are forged in a collaborative manner by a group of compromised nodes,even if these compromised nodes distribute in different geographical areas.Furthermore,if the adversary obtains keys from enough (e.g.,more than t in SEF) distinct key partitions,it then can successfully forge a data report without being detected en-route.A neighbor information based false report filtering scheme (NFFS) in wireless sensor networks was presented.In NFFS,each node distributes its neighbor information to some other nodes after deployment.When a report is generated for an observed event,it must carry the IDs and the MACs from t detecting nodes.Each forwarding node checks not only the correctness of the MACs carried in the report,but also the legitimacy of the relative position of these detecting nodes.Analysis and simulation results demonstrate that NFFS can resist collaborative false data injection attacks efficiently,and thus can tolerate much more compromised nodes than existing schemes. 展开更多
关键词 wireless sensor network false report filtering neighbor information collaborative attack compromise tolerance
下载PDF
Fermented Black Turmeric Designed by Lactobacillus Rearranged Leukocyte Subsets and Anti-Oxidative Activity 被引量:2
13
作者 Yousuke Watanabe Nobuo Yamaguchi +1 位作者 Isao Horiuch Tsugia Murayama 《Open Journal of Immunology》 2015年第3期199-214,共16页
A plant fermentation was carried out by Yeast and Lactobaccilli against fermented black turmeric, Kaempferia parviflora (FBT). These materials were proved by as safe in animal safety experiment. We tried to investigat... A plant fermentation was carried out by Yeast and Lactobaccilli against fermented black turmeric, Kaempferia parviflora (FBT). These materials were proved by as safe in animal safety experiment. We tried to investigate changes of immune-competent cells that commonly utilized FBT, including after administration of immno-suppressed animals, the effects by FBT on the regulated effect on the cells were evaluated. Our results showed that FBT augmented the level of lymphocytes in number, while FBT regulated the level of granulocytes in both number and function. In our clinical study with 20 healthy volunteers, granulocyte and lymphocyte ratio suggesting their constitution as neutral in peripheral blood were increased significantly 30 days after the administration of FBT in rodents, and compromised host was prepared with cancer chemotherapeutic agent (Mytomycin-C). Our observations showed against intracellular parasite, and that FBT augmented intercellular pathogen through humoral immunity. We discussed the significance and mechanism of FBT on the level of leukocyte subsets in number and function that were considered to be potential indicators for the activation of the compromised host. We also proposed an idea that FBT exhibited tonic effects via activating complement components. The evidences were shown by immune-electrophoretic method. Moreover, we tried to access further to the anti-oxidative activities of this FBT. This modification brought to the significant lift up for antibody producing cells and anti-oxidative activity for phagocytic cells. 展开更多
关键词 Family Turmeric LACTOBACILLUS Fermentation LACTOBACILLI Cancer CHEMOTHERAPEUTIC Agent Compromised Host COMPLEMENT Alternative COMPLEMENT Activation
下载PDF
Ranking Method for Complementary Judgment Matrixes with Fuzzy Numbers Based on Hausdorff Metric Distance 被引量:1
14
作者 侯福均 吴祈宗 《Journal of Beijing Institute of Technology》 EI CAS 2005年第4期458-461,共4页
A method for ranking complementary judgment matrixes with traspezoidal fuzzy numbers based on Hausdorff metric distance and fuzzy compromise decision approach is proposed. With regard to fuzzy number complementary jud... A method for ranking complementary judgment matrixes with traspezoidal fuzzy numbers based on Hausdorff metric distance and fuzzy compromise decision approach is proposed. With regard to fuzzy number complementary judgment matrixes given by a decider group whose members have various weights, the expert's information was aggregated first by means of simple weight average(SWA) method and Bonissone calculational method. Hence a matrix including all the experts' preference information was got. Then the matrix' column members were added up and the fuzzy evaluation values of the alternatives were got. Lastly, the Hausdorff metric distance and fuzzy compromise decision approach were used to rank the fuzzy evaluation values and then the ranking values of all the alternatives were got. Because exact numbers and triangular fuzzy numbers could all be transformed into trapezoidal fuzzy numbers, the method developed can rank complementary judgment matrixes with trapezoidal fuzzy numbers, triangular fuzzy numbers and exact numbers as well. An illustrative example is also given to verify the developed method and to demonstrate its feasibility and practicality. 展开更多
关键词 complementary judgment matrix trapezoidal fuzzy number Bonissone calculational method fuzzy compromise decision approach Hausdorff metric distance
下载PDF
Coordination, Compromise, and Change: A Case of US-Japan Conflict Over Commercial Whaling 被引量:2
15
作者 Takashi Sekiyama 《International Relations and Diplomacy》 2014年第5期310-322,共13页
This paper, for the goal of revealing the mechanism of compromise and change in coordination, will focus on US-Japan conflict over commercial whaling. The regime like the international whaling regulation, where countr... This paper, for the goal of revealing the mechanism of compromise and change in coordination, will focus on US-Japan conflict over commercial whaling. The regime like the international whaling regulation, where countries agree in general but disagree on coordination methods, is known as the Battle of the Sexes in game theory. It has been believed that in regimes presented as the Battle of the Sexes (BoS) situation, once the countries could somehow coordinate their interests and reach an agreement on the specific method of coordination, neither country would have the incentive to withdraw from that agreement. This case study, however, shows that this belief is not always true. From the analysis of this study, it will be concluded that coordination methods change over time even in regimes where the countries agree in general and disagree on coordination methods. In this case, "power," "institution" and "consensus" are pointed out as incentives to make the two countries accept a specific coordination method. 展开更多
关键词 the Battle of the Sexes (BoS) International Whaling Commission (IWC) The United States JAPAN COORDINATION COMPROMISE
下载PDF
DNS analysis of incipient drop impact dynamics using an accurate level set method 被引量:2
16
作者 Min Chai Kun Luo +2 位作者 Changxiao Shao Song Chen Jianren Fan 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2017年第1期1-10,共10页
A series of 2D direct numerical simulations were performed with an accurate level set method for single drop impacts.The adopted ACLS method was validated to be efficient with perfect mass conservation in both normal ... A series of 2D direct numerical simulations were performed with an accurate level set method for single drop impacts.The adopted ACLS method was validated to be efficient with perfect mass conservation in both normal and oblique impacts.A square-root correction for neck bases was modified in accuracy as well as scope of applications.In addition,process of jet formation and evolution was studied to reveal internal dynamics in drop impacts.It's found that pressure gradient and vortex are coexisting and completive reasons for jet topology while the inclined angle has a significant effect on them.Mechanisms of jet formation and evolution are different in the front and back necks.With the help of PDF distribution and correction calculation,a compromise in the competition is observed.This work lays a solid foundation for further studies of dynamics in gas-liquid flows. 展开更多
关键词 Numerical simulation Accurate level set Gas-liquid flow Interface Mechanism completion Compromise
下载PDF
Single Cellular Algae Digestive Supplement Designed by Yeast &Lactobacillus Rearranged Leukocyte Subsets through Activation of Complement Components 被引量:1
17
作者 Hitoshi Kubota Nurmuhamamt Amat +2 位作者 Dilxat Yimit Parida Hoxur Nobuo Yamaguchi 《Open Journal of Immunology》 2015年第3期104-121,共18页
A plant fermentation was carried out by Yeast and Lactobacilli against single cellular algae (f-Chlorella). These materials were proved by as safe in animal safety experiment. We sought to look into changes of immune-... A plant fermentation was carried out by Yeast and Lactobacilli against single cellular algae (f-Chlorella). These materials were proved by as safe in animal safety experiment. We sought to look into changes of immune-competent cells that commonly utilized f-Chlorella including after administration of immno-suppressed animals. The effects by f-Chlorella on the regurational effect to the host were measured. Our results showed that f-Chlorella regulated the level of lymphocytes, while conventional-Chlorella worked to adjust the level of granulocytes. In our clinical study with 20 healthy volunteers, granulocyte and lymphocyte ratio was obtained as neutral in the peripheral blood. In rodents, immune-compromised host as well as normal animal were prepared with cancer chemotherapeutic agent (Mytomycin-C), and then tried to rescue the immune-competent rebel. Our observations showed that both Chlorella derivatives regulated in number and functions. The effect was more prominent in f-Chlorella than that of conventional one. We discussed the significance and mechanism of f-Chlorella on the level of leukocyte subsets in number and function. These effects were considered to bring the potential elevation of antibody secreting cell by the localized heamolysis in gel method. We also proposed an idea that exhibited tonic effects were brought via activating the complement components in the serum. Moreover, we tried to access further to the anti-oxidative activities of this f-Chlorella. This modification brought to the significant lifted up for immune competent cells and anti-oxidative activity for phagocytic cells. 展开更多
关键词 Family POACEAE CHLORELLA pyrenoidosa Fermentation YEAST LACTOBACILLUS Cancer CHEMOTHERAPEUTIC Agent Compromised Host LIPIDOSIS Cardiovascular Disease Diabetes Meritus Immune Augmentation
下载PDF
Subcute Combined Degenaration亚急性联合变性
18
作者 bradley wg zwiebel wj +1 位作者 roberts a 关键 《影像诊断与介入放射学》 2016年第5期428-430,共3页
Key facts Synonyms:dysfunction of renal transplant due to renal artery stenosis.Classic imaging appearance:narrowing of the transplant renal artery Renal artery stenosis most common vascular complication,.venous ste... Key facts Synonyms:dysfunction of renal transplant due to renal artery stenosis.Classic imaging appearance:narrowing of the transplant renal artery Renal artery stenosis most common vascular complication,.venous stenosis may also be responsible for renal dysfunction. 展开更多
关键词 TRANSPLANT STENOSIS 亚急性联合变性 appearance facts ANASTOMOSIS rejection donor COMPROMISE GRAFT
下载PDF
Twist deformation and buckling behavior of veins
19
作者 Justin Garcia Haichao Han 《医用生物力学》 EI CAS CSCD 北大核心 2013年第S1期25-28,共4页
Introduction Twisted arteries and veins disrupt normal blood flow and elevate the risk for clinical complications such as thrombosis,heart attack,stroke,and organ dysfunction.Veins should remain mechanically stable fo... Introduction Twisted arteries and veins disrupt normal blood flow and elevate the risk for clinical complications such as thrombosis,heart attack,stroke,and organ dysfunction.Veins should remain mechanically stable for normal function.However,compared to arteries,veins are more vulnerable to collapse because they are thin-walled and under lower lumen pressure.Twisted veins have been shown to occur with head turning or after inadvertent twist during various vascular surgeries.In vivo and cadaver studies have demonstrated that turning the head to one side can result in torsion and compression of the internal jugular vein and can compromise cranial drain- 展开更多
关键词 VEINS buckling JUGULAR ARTERIES COMPROMISE disrupt TORSION walled VULNERABLE torque
下载PDF
A Compromise Programming to Task Assignment Problem in Software Development Project
20
作者 Ngo Tung Son Jafreezal Jaafar +3 位作者 Izzatdin Abdul Aziz Bui Ngoc Anh Hoang Duc Binh Muhammad Umar Aftab 《Computers, Materials & Continua》 SCIE EI 2021年第12期3429-3444,共16页
The scheduling process that aims to assign tasks to members is a difficult job in project management.It plays a prerequisite role in determining the project’s quality and sometimes winning the bidding process.This st... The scheduling process that aims to assign tasks to members is a difficult job in project management.It plays a prerequisite role in determining the project’s quality and sometimes winning the bidding process.This study aims to propose an approach based on multi-objective combinatorial optimization to do this automatically.The generated schedule directs the project to be completed with the shortest critical path,at the minimum cost,while maintaining its quality.There are several real-world business constraints related to human resources,the similarity of the tasks added to the optimization model,and the literature’s traditional rules.To support the decision-maker to evaluate different decision strategies,we use compromise programming to transform multiobjective optimization(MOP)into a single-objective problem.We designed a genetic algorithm scheme to solve the transformed problem.The proposed method allows the incorporation of the model as a navigator for search agents in the optimal solution search process by transferring the objective function to the agents’fitness function.The optimizer can effectively find compromise solutions even if the user may or may not assign a priority to particular objectives.These are achieved through a combination of nonpreference and preference approaches.The experimental results show that the proposed method worked well on the tested dataset. 展开更多
关键词 MAKESPAN RCPSP SCHEDULING MOP combinatorial optimization compromise programming genetic algorithm
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部