Zobrazeno 1 - 10
of 26
pro vyhledávání: '"H. Motamen"'
Publikováno v:
Drug Safety. 31:885-960
Autor:
H. Motamen-Scobie
Publikováno v:
Economic Modelling. 9:306-312
Text of an invited lecture delivered at the Faculty of Economics and Commerce, University of Bologna, Italy, Friday, 31 January 1992
Publikováno v:
Journal of Artificial Intelligence and Data Mining, Vol 7, Iss 4, Pp 597-606 (2019)
World Wide Web is growing at a very fast pace and makes a lot of information available to the public. Search engines used conventional methods to retrieve information on the Web; however, the search results of these engines are still able to be refin
Externí odkaz:
https://doaj.org/article/db35c04633974331aa847f23abb3634b
Autor:
H. Motameni
Publikováno v:
Journal of Artificial Intelligence and Data Mining, Vol 4, Iss 1, Pp 67-76 (2016)
This paper proposes a method to solve multi-objective problems using improved Particle Swarm Optimization. We propose leader particles which guide other particles inside the problem domain. Two techniques are suggested for selection and deletion of s
Externí odkaz:
https://doaj.org/article/e0b68b6894b840db8516d1415dc36385
Autor:
M. Fayad, H. Motamen
Publikováno v:
Resources Policy. 10:190-212
This article focuses on how input-output techniques could be applied to study the petrochemical industry in general and plastics materials in particular. The theory serves as a tool for understanding the operations of the industry and, therefore, all
Autor:
H. Motamen, C. Schaller
Publikováno v:
Energy Economics. 7:220-230
This paper provides an analysis of the historical development of the UK primary energy market — more specifically of coal, gas and heavy fuel oil. The period considered for this investigation is 1960-83. A theoretical framework is set up and the si
Autor:
H. Motameni
Publikováno v:
Journal of Artificial Intelligence and Data Mining, Vol 3, Iss 1, Pp 77-83 (2015)
To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri n
Externí odkaz:
https://doaj.org/article/fe57f01427bd4652925ceb8d4e3a9801
Publikováno v:
Iranian Journal of Optimization, Vol 05, Iss 2, Pp 492-505 (2013)
This ability in fuzzy UML, practically leaves the customers and market’s need without response in this important and vital area. Here, the available sequence diagrams in fuzzy UML will map into fuzzy Petri net. However, the formal models ability wi
Externí odkaz:
https://doaj.org/article/c8312b3418b848e4b992cf78ce516774
Publikováno v:
Iranian Journal of Optimization, Vol 2, Iss 2, Pp 492-505 (2010)
This ability in fuzzy UML, practically leaves the customers and market’s need without response in this important and vital area. Here, the available sequence diagrams in fuzzy UML will map into fuzzy Petri net. However, the formal models ability wi
Externí odkaz:
https://doaj.org/article/f3824eb5141d476b8fa1ab520c41a11b
Autor:
L. G. Brookes, H. Motamen
Publikováno v:
The Economics of Nuclear Energy ISBN: 9789401537223
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fd6cc86b324de1838cfdf1277b419815
https://doi.org/10.1007/978-94-015-3720-9_20
https://doi.org/10.1007/978-94-015-3720-9_20