This paper explains an integrated production inventory supply chain model,which consists of a supplier,a manufacturer and a retailer under two-level credit *** is manufacturer’s credit period offered by the supplier,...
详细信息
This paper explains an integrated production inventory supply chain model,which consists of a supplier,a manufacturer and a retailer under two-level credit *** is manufacturer’s credit period offered by the supplier,and other is retailer’s credit period offered by the ***,the manufacturer replenishes raw materials from the supplier and produces non-deteriorating products in some cycles of equal *** is noted that here four inventory structures have been considered to show the flow of the materials as either raw materials or finished products from supplier to retailer via *** in this model,manufacturer’s imperfect production has been *** imperfect items are not *** retailer receives good finished products from the manufacturer and sells these to his/her customers during some cycles of equal length in total time *** main objective is to find the optimal number of production and business cycles of the manufacturer such that the integrated system can get the maximum *** above discussed model is elaborated with the help of a numerical example,and a sensitivity analysis is done with respect to some parameters used in this model.
Instead of the traditional 'system-environment' pair for objects of the regional economy, it is proposed to consider metasystems - these objects together with all interacting objects of the microenvironment. E...
详细信息
We explore a continuous aggregated dynamic model for developing two gas fields. The new borehole commissioning rates are the control parameters. Changes in the average flow rate of producing boreholes and current natu...
详细信息
the article proposes a method of zero-watermarking for colored RGB bitmap images. This algorithm can be used to protect property rights to multimedia resources in which it is impossible to use ordinary watermarks due ...
详细信息
The integration and detection of AI (Artificial Intelligence) in a variety of fields, primarily education, are examined in this paper. With an emphasis on virtual assistants and their uses, it explores the potential a...
详细信息
The most critical task of a social network is to identify a central node. Numerous methods for determining centrality are documented in the literature. It contributes to online commerce by disseminating news, advertis...
详细信息
作者:
Gancheva, VeskaTechnical University of Sofia
Faculty of Computer Systems and Technologies Department of Programming and Computer Technologies 8 Kliment Ohridski blvd. Sofia1000 Bulgaria
A growing range of data sets have been created in recent years;these are used by platforms and software applications and kept in remote access repositories. Datasets are therefore more susceptible to harmful attacks. ...
详细信息
In this paper, we explored approaches that improve the performance of ensemble bagging classifiers for identifying the state of a computer system. The following algorithms are considered: Ensemble pruning, Advanced Vo...
详细信息
An automated system for freight traffic optimization on a transport network has been developed, which is realized in the form of a complex computer program with application of the visual design environment of Embarcad...
详细信息
The idea of inverse fuzzy mixed graph (IFMG) was firstly introduced by Poulik and Ghorai (Granul Comput 7:549–559, 2021) in 2021 generalizing the idea of fuzzy mixed graphs. Here the idea of planarity is introduced i...
详细信息
暂无评论