Ara
Toplam kayıt 87, listelenen: 81-87
PERFORMANCE-BASED PARAMETERIZATION STRATEGIES A theoretic framework and case studies
(CAADRIA-ASSOC COMPUTER-AIDED ARCHITECTURAL DESIGN RESEARCH ASIA, 2013)
In this paper, alternative approaches to structure the parametric geometry in relation to information on various performances are described and exemplified. They relate to different levels of knowledge that concern the ...
The linkage between competitive factors and value creation in local trade centers
(ELSEVIER SCIENCE BV, 2013)
Competition has always been a vital factor in the survival of organizations. In order to prevent from risks that might mainly arise from consumers, different kinds of inter-organizational structures are usually formed by ...
TTK FOR THE INTERRELATION OF INSURANCE IN THE INSURANCE OF CREDITS (COMMERCIAL RECOGNITION) M. 1472 PROVISIONAL LOAN?
(ISTANBUL UNIV, FAC LAW, 2013)
A General Variable Neighborhood Search Algorithm for the No-Idle Permutation Flowshop Scheduling Problem
(SPRINGER-VERLAG BERLIN, 2013)
In this study, a general variable neighborhood search (GVNS) is presented to solve no-idle permutation flowshop scheduling problem (NIPFS), where idle times are not allowed on machines. GVNS is a metaheuristic, where inner ...
A Populated Iterated Greedy Algorithm with Inver-Over Operator for Traveling Salesman Problem
(SPRINGER-VERLAG BERLIN, 2013)
In this study, we propose a populated iterated greedy algorithm with an Inver-Over operator to solve the traveling salesman problem. The iterated greedy (IG) algorithm is mainly based on the central procedures of destruction ...
Metaheuristic Algorithms for the Quadratic Assignment Problem
(IEEE, 2013)
This paper presents two meta-heuristic algorithms to solve the quadratic assignment problem. The iterated greedy algorithm has two main components, hich are destruction and construction procedures. The algorithm starts ...
Use of Cyberspace and Technology by Terrorists
(IOS PRESS, 2013)
Terrorists are increasingly finding the Internet, or cyberspace, a valuable forum them to operate in. Not only can they use cyberspace to conduct attacks, they can also use it to find recruits, train recruits, raise money, ...