Development of a computational tool in the Python language for the application of the AHP-Gaussian method

VR dos Santos, LPL Fávero, MÂL Moreira… - Procedia Computer …, 2023 - Elsevier
A known barrier to the adoption of mathematical methods in decision-making in everyday
problems is the lack of basic knowledge of the applicable methods, as well as of adequate …

A two-stage group stochastic preference analysis based on best-worst method

N Dai, L Zhou, Q Wu - Applied Intelligence, 2024 - Springer
… to find the best acceptable alternative with the goal of eradicating differences of opinions (or …
Aleksic [30] combined BWM with VIKOR method and applied it to multi-attribute group …

[PDF][PDF] Survey and inventory of the archaeological sites in the valley of the Karakol (Uch-Enmek Park). Report on the Belgian-Russian expedition in the Russian Altay …

J Bourgeois, W Gheyle, R Goossens… - University of Gent …, 2007 - academia.edu
… The main goal of this project is the preservation and conservation of the frozen tombs of
the Scythian culture, that lie scattered in the Altay Mountains across Russia, Kazakhstan, …

[HTML][HTML] ITION 969 COMMUNICATIONS N79-17082 Cat. 32 ecita arter EVEGE

ITF METEOROLOGICAL… - Scientific and …, 1979 - books.google.com
target extractor (MOTE), to minimize excessive radar return data rates from weather clutter
with minimum reduction in target … arrays in Author (GRA) communication and radar systems. …

[图书][B] Framers: Human advantage in an age of technology and turmoil

K Cukier, V Mayer-Schönberger, F de Véricourt - 2022 - books.google.com
“Cukier and his co-authors have a more ambitious project than Kahneman and Harari. They
don’t want to just point out how powerfully we are influenced by our perspectives and …

Surge protection of buildings connected to an overhead low-voltage network

V Milardić, I Uglešić, I Pavić - Journal of Energy-Energija, 2006 - 217.68.82.81
There are three classes of surge protective devices for low-voltage systems. The method for
the selection of surge protective devices presented can be used to determine which class of …

Performance-based SLO recovery for containerized applications

O Pozdniakova, D Mažeika - DAMSS 2023: 14th conference on data …, 2023 - vb.vgtu.lt
… The goal of this research was to make the analysis of cybersecurity competence assessment
methods based on data collected using questionaries, interviews, and observations. …

[引用][C] Multiple-Criteria Decision-Making Tool for Local Governments to Evaluate the Global and Local Sustainability of Transportation Systems in Urban Areas: Case …

U Osés Orbegozo, E Rojí Chandro, J Cuadrado Rojo… - 2017 - ASCE

PRENAPONSKA ZAŠTITA OBJEKATA SPOJENIH NA NADZEMNU NISKONAPONSKU MREŽU

V Milardić, I Uglešić, I Pavić - Journal of Energy: Energija, 2006 - hrcak.srce.hr
U prenaponskoj zaštiti na niskom naponu postoje tri klase uređaja prenaponske zaštite.
Predstavljena metoda izbora uređaja prenaponske zaštite može se koristiti pri donošenju …

Comparative analysis of eleven dynamic artificial neural networks

M Dumpis, D Navakauskas - DAMSS 2023: 14th conference on data …, 2023 - vb.vgtu.lt
… The goal of this research was to make the analysis of cybersecurity competence assessment
methods based on data collected using questionaries, interviews, and observations. …