Content
October 2019, Volume 10, Issue 5
- 1221-1233 Modelling and simulation of repairable mechanical systems reliability and availability
by Girish Kumar & Vipul Jain & Umang Soni - 1234-1264 Estimation of maintainability parameters for object-oriented software using hybrid neural network and class level metrics
by Lov Kumar & Sangeeta Lal & Lalita Bhanu Murthy - 1265-1275 Reliability analysis method of the uncertain system based on fuzzy GO methodology and its application in electro-hydrostatic actuator
by Haipeng Wang & Fuhai Duan - 1276-1301 Estimation for the generalized Fréchet distribution under progressive censoring scheme
by Kousik Maiti & Suchandan Kayal - 1302-1327 Evaluation of stochastic flow networks susceptible to demand requirements between multiple sources and multiple destinations
by Esha Datta & Neeraj Kumar Goyal - 1328-1352 Multi-attribute dependent bug severity and fix time prediction modeling
by Meera Sharma & Madhu Kumari & V. B. Singh - 1353-1360 Efficient triads related to transportation problem with common pivotal time
by Sanchita Sharma & Rita Malhotra & Shalini Arora - 1361-1368 A modelling applied to active renewable energy for an existing building of higher educational institution
by Tanmoy Chakraborty & Payel Ghosh & Satadal Mal & Utpal Biswas - 1369-1387 A cost-based failure prioritization approach for selecting maintenance strategies for thermal power plants: a case study context of developing countries
by J. Wakiru & P. N. Muchiri & L. Pintelon & P. Chemweno
August 2019, Volume 10, Issue 4
- 453-474 Survey of combined hardware–software reliability prediction approaches from architectural and system failure viewpoint
by Sourav Sinha & Neeraj Kumar Goyal & Rajib Mall - 475-483 Distance relay reliability enhancement using false trip root cause analysis
by Abdelkader Zitouni & Abderrahmane Ouadi & Hamid Bentarzi & Mahfoud Chafai - 484-490 Solving matrix games with linguistic payoffs
by Laxminarayan Sahoo - 491-498 Reliability improvement of fork biasing spring in MCCB mechanism
by Ajinkya Shirurkar & Yogesh Patil & D. Davidson Jebaseelan - 499-509 Wind energy conversion system based on dual stator induction generator controlled by nonlinear backstepping and pi controllers
by Meryem Benakcha & Leila Benalia & Abdelkrim Ammar & Amor Bourek - 510-518 Estimation for the parameters of the Burr Type XII distribution under doubly censored sample with application to microfluidics data
by Hanieh Panahi - 519-524 Factor based prediction model for customer behavior analysis
by D. Kalaivani & P. Sumathi - 525-532 The best single-observational and two-observational percentile estimations in the exponentiated Weibull-geometric distribution compared with maximum likelihood and percentile estimations
by Shahram Yaghoobzadeh Shahrastani & Masoud Yarmohammadi - 533-542 A robust extended H∞ observer based on the mean value theorem designed for induction motor drives
by Okba Zeghib & Abdelkrim Allag & Meriem Allag & Bilal Hamidani - 543-551 Sliding mode controller based on type-2 fuzzy logic PID for a variable speed wind turbine
by Zineb Lahlou & Khaddouj Ben Meziane & Ismail Boumhidi - 552-562 A two-echelon integrated inventory model under generalized lead time distribution with variable backordering rate
by M. Ganesh Kumar & R. Uthayakumar - 563-575 Modelling of the factors affecting lean implementation in healthcare using structural equation modelling
by Vineet Jain & Puneeta Ajmera - 576-601 An integration test coverage metric for Java programs
by Debashis Mukherjee & Rajib Mall - 602-622 The IMBES model for achieving excellence in manufacturing industry: an interpretive structural modeling approach
by Paranitharan Kannusamy Panneer Selvam & Ramesh Babu Thangavelu - 623-631 Bootstrap confidence intervals of CpTk for two parameter logistic exponential distribution with applications
by Mahendra Saha & Sanku Dey & Sudhansu S. Maiti - 632-643 Dynamic behavior analysis under a grid fault scenario of a 2 MW double fed induction generator-based wind turbine: comparative study of the reference frame orientation approach
by Ridha Cheikh & Hocine Belmili & Arezki Menacer & Said Drid & L. Chrifi-Alaoui - 644-660 An assessment and analysis of musculoskeletal disorders (MSDs) of Odisha farmers in India
by Debesh Mishra & Suchismita Satapathy - 661-675 Intuitionistic fuzzy solid assignment problems: a software-based approach
by P. Senthil Kumar - 676-695 Quality characteristics optimization in CNC end milling of A36 K02600 using Taguchi’s approach coupled with artificial neural network and genetic algorithm
by Shofique U. Ahmed & Rajesh Arora - 696-712 Analysis of cache behaviour and software optimizations for faster on-chip network simulations
by B. M. Prabhu Prasad & Khyamling Parane & Basavaraj Talawar - 713-730 Laplacian whale optimization algorithm
by Amarjeet Singh - 731-738 IoT based pollution monitoring and health correlation: a case study on smart city
by Debadri Dutta & Akshit Pradhan & O. P. Acharya & S. K. Mohapatra - 739-745 System availability assessment using a parametric Bayesian approach: a case study of balling drums
by Esi Saari & Jing Lin & Liangwei Zhang & Bin Liu - 746-764 Estimation and prediction using classical and Bayesian approaches for Burr III model under progressive type-I hybrid censoring
by Sukhdev Singh & Reza Arabi Belaghi & Mehri Noori Asl - 765-782 Text analytics based severity prediction of software bugs for apache projects
by Arvinder Kaur & Shubhra Goyal Jindal - 783-791 Attitude of mobile telecommunication subscribers towards sim card registration in Lagos State, Southwestern Nigeria
by O. Oyediran & A. Omoshule & Sanjay Misra & Rytis Maskeliūnas & Robertas Damaševičius - 792-800 Cost reduction and quality improvement through Lean-Kaizen concept using value stream map in Indian manufacturing firms
by Ashwani Kumar Dhingra & Sunil Kumar & Bhim Singh - 801-810 Selection of materialized views using stochastic ranking based Backtracking Search Optimization Algorithm
by Anjana Gosain & Kavita Sachdeva - 811-823 Validating object-oriented software at design phase by achieving MC/DC
by Swadhin Kumar Barisal & Suvam Suvabrata Behera & Sangharatna Godboley & Durga Prasad Mohapatra - 824-835 Benchmarking framework for class imbalance problem using novel sampling approach for big data
by Khyati Ahlawat & Anuradha Chug & Amit Prakash Singh - 836-847 Fault diagnosis for gearbox based on EMD-MOMEDA
by Xin Zhang & Jianmin Zhao & Xianglong Ni & Fucheng Sun & Hongyu Ge - 848-860 Maintenance scheduling optimization for industrial centrifugal pumps
by Augusto Bianchini & Marco Pellegrini & Jessica Rossi - 861-865 Factors influencing online shopping behavior of university students
by Ashish Kumar & Monika Saini & Preeti Hans
June 2019, Volume 10, Issue 3
- 299-315 Spares provisioning strategy for periodically replaced units within the fleet retirement period
by Jan Block & Alireza Ahmadi & Xun Xiao & Uday Kumar - 316-325 Test scenario prioritization for object-oriented systems using UML diagram
by Namita Panda & Arup Abhinna Acharya & Durga Prasad Mohapatra - 326-338 Intelligent control of a brushless doubly-fed induction generator
by Zoheir Tir & Om P. Malik & Mohammad Naser Hashemnia - 339-349 Artificial immune system based approach for size and location optimization of distributed generation in distribution system
by Vikas Singh Bhadoria & Nidhi Singh Pal & Vivek Shrivastava - 350-368 Cubic reward penalty structure for power distribution companies
by Sreenithya Sumesh & Vidyasagar Potdar & Aneesh Krishna - 369-383 Multi-objective reliability redundancy allocation problem considering two types of common cause failures
by Aniruddha Samanta & Kajla Basu - 384-398 A coordinated vendor–buyer system considering loss and damage claims, insurance cost and stochastic lead time
by Ivan Darma Wangsa & Hui Ming Wee & Shih-Hsien Tseng - 399-415 Reliability evaluation of mobile ad hoc networks by considering link expiration time and border time
by Gaurav Khanna & S. K. Chaturvedi & Sieteng Soh - 416-428 A redundancy allocation problem by using utility function method and ant colony optimization: tradeoff between availability and total cost
by Ali Salmasnia & Sadegh Noori & Hadi Mokhtari - 429-436 Statistical distributions comparison for remaining useful life prediction of components via ANN
by Mohammad Ali Farsi & S. Masood Hosseini - 437-452 An adaptive underdamped stochastic resonance based on NN and CS for bearing fault diagnosis
by Kuo Chi & Jianshe Kang & Fei Zhao & Long Liu
April 2019, Volume 10, Issue 2
- 149-159 Cybersecurity for eMaintenance in railway infrastructure: risks and consequences
by Adithya Thaduri & Mustafa Aljumaili & Ravdeep Kour & Ramin Karim - 160-172 Bi-level decision making models for advertising allocation problem under fuzzy environment
by Syed Mohd Muneeb & Ahmad Yusuf Adhami & Zainab Asim & Syed Aqib Jalil - 173-189 Multi-objective linear fractional inventory problem under intuitionistic fuzzy environment
by Irfan Ali & Srikant Gupta & Aquil Ahmed - 190-200 Classical and Bayes estimation of reliability characteristics of the Kumaraswamy-Inverse Exponential distribution
by M. K. Rastogi & P. E. Oguntunde - 201-211 Analyzing the productivity of maintenance systems using system dynamics modeling method
by Esmaeil Esmaeili & Hasan Karimian & Mohammad Najjartabar Bisheh - 212-227 AHP-Entropy based priority assessment of factors to reduce aviation fuel consumption
by Jagroop Singh & Somesh Kumar Sharma & Rajnish Srivastava - 228-241 An algorithm for performance evaluation of resilience engineering culture based on graph theory and matrix approach
by Masoud Rabbani & Reza Yazdanparast & Mahdi Mobini - 242-250 A study of software reliability on big data open source software
by Ranjan Kumar & Subhash Kumar & Sanjay K. Tiwari - 251-275 Evaluating the lifetime performance index of products based on generalized order statistics from two-parameter exponential model
by Mohammad Vali Ahmadi & Jafar Ahmadi & Mousa Abdi - 276-284 Multi-objective grey wolf optimizer approach to the reliability-cost optimization of life support system in space capsule
by Anuj Kumar & Sangeeta Pant & Mangey Ram & Shshank Chaube - 285-298 Coordination of a three-level supply chain with variable demand and order size dependent trade credit in healthcare industries
by S. K. Karuppasamy & R. Uthayakumar
November 2019, Volume 10, Issue 1
- 1-2 Special issue: Current research in life cycle engineering and management
by Ljubisa Papic - 3-11 Application of probability distributions mixture of safety indicator in risk assessment problems
by Lidiya N. Aleksandrovskaya & Anna E. Ardalionova & Ljubisa Papic - 12-20 Analysis and comparison of some criteria of checking the probability distribution deviation from the normal distribution law
by L. N. Aleksandrovskaya & P. A. Iosifov & A. V. Kirillin - 21-28 Statistical bootstrap in the problem of availability factor estimating: example of SRs 1200 excavator reliability
by Irina Gadolina & Ljubisa Papic & Rashid Zaynetdinov - 29-36 Control of consensus convergence in technical committees of standardization on the basis of regular Markov chains model
by Aleksandr V. Zazhigalkin & Iosif Z. Aronov & Olga V. Maksimova & Ljubisa Papic - 37-44 Estimation of risks related to the functioning of railway telecommunication
by V. A. Gapanovich & I. B. Shubinsky & I. N. Rosenberg & A. M. Zamyshlyaev - 45-57 Vulnerability assessment methodology and some methodical aspects of critical infrastructure protection
by Alexander V. Bochkov
February 2019, Volume 10, Issue 1
- 1-18 A review paper to examine the validity of Bayesian network to build rational consensus in subjective probabilistic failure analysis
by Mohammad Yazdi - 19-34 On two node tandem queueing model with time dependent service rates
by K. Srinivasa Rao & J. Durga Aparajitha - 35-43 Auto parts manufacturing quality assessment using design for six sigma (DFSS), case study in ISACO company
by Amir Abbas Shojaie & Elahe Kahedi - 44-56 Qualitative analysis of CNG dispensing system using fuzzy FMEA–GRA integrated approach
by Dilbagh Panchal & Priyank Srivastava - 57-82 Maintenance performance evaluation using an integrated approach of graph theory, ISM and matrix method
by V. N. Aju kumar & Piyush Gupta & O. P. Gandhi - 83-90 Modeling innovation adoption incorporating time lag between awareness and adoption process
by Richie Aggarwal & Ompal Singh & Adarsh Anand & P. K. Kapur - 91-96 Ant colony optimization technique for edge detection using fuzzy triangular membership function
by Ruchika Singh & Munish Vashishath & S. Kumar - 97-109 Reliability analysis of a rodding anode plant in aluminum industry with multiple units failure and single repairman
by Yaqoob Al Rahbi & S. M. Rizwan & B. M. Alkali & Andrew Cowell & G. Taneja - 110-125 Estimating the threshold of software metrics for web applications
by Ruchika Malhotra & Anjali Sharma - 126-141 A TISM based study of SSCM enablers: an Indian coal- fired thermal power plant perspective
by Jitendra Narayan Biswal & Kamalakanta Muduli & Suchismita Satapathy & Devendra K. Yadav - 142-147 The strategy of traffic congestion management based on case-based reasoning
by Hao Zhang & GuangLong Dai
December 2018, Volume 9, Issue 6
- 1235-1249 Bayesian inference for Poisson-inverse exponential distribution under progressive type-II censoring with binomial removal
by Manoj Kumar & Sanjay Kumar Singh & Umesh Singh - 1250-1259 A statistical analysis and simulation based approach to an uncertain supplier selection problem with discount option
by Ali Salmasnia & Hamid Daliri & Ali Ghorbanian & Hadi Mokhtari - 1260-1278 Preliminary test estimators of the reliability characteristics for the three parameters Burr XII distribution based on records
by Ajit Chaturvedi & Reza Arabi Belaghi & Ananya Malhotra - 1279-1286 Reliability estimation of multi-component cascade system through Monte-Carlo simulation
by A. N. Patowary & J. Hazarika & G. L. Sriwastav - 1287-1293 Improved acceptance sampling plans based on truncated life tests for Garima distribution
by Amer Al-Omari - 1294-1301 IoT enabled tracking and monitoring sensor for military applications
by Brijesh Iyer & Niket Patil - 1302-1314 An adaptive neuro-fuzzy inference system for makespan estimation of flexible manufacturing system assembly shop: a case study
by Vineet Jain & Tilak Raj - 1315-1325 MetaXplorer: an intelligent and adaptable metasearch engine using a novel ordered weighted averaging operator
by Neha Dimri & Himanshu Kaul & Daya Gupta - 1326-1335 Reliability analysis and optimization design on equilibrium elbow
by Jie Zhou & Yun-Xian Jia & Jie Li - 1336-1345 Research on optimization of spare parts inventory policy considering maintenance priority
by Yu-kun Chen & Qi Gao & Xiao-bo Su & Shun Fang & Chi-ming Guo - 1346-1354 Application of BOCR models in service oriented architecture (SOA): study on model validation through quantification for QoS considerations
by Ravi Kumar Gedela & K. Krishna Mohan & V. Kamakshi Prasad
October 2018, Volume 9, Issue 5
- 987-998 A multi-indicator modeling method for similarity-based residual useful life estimation with two selection processes
by Mengyao Gu & Youling Chen - 999-1013 A procedure for condition-based maintenance and diagnostics of submersible well pumps through vibration monitoring
by Augusto Bianchini & Jessica Rossi & Lauro Antipodi - 1014-1021 Integrated maintenance policy optimization with finite spares
by Ruifeng Yang & Jianshe Kang & Qiwei Hu - 1022-1033 A decentralized multi-level decision making model for solid transportation problem with uncertainty
by Syed Aqib Jalil & Shakeel Javaid & Syed Mohd Muneeb - 1034-1046 Fault diagnosis for machinery based on feature extraction and general regression neural network
by Haiping Li & Jianmin Zhao & Xianglong Ni & Xinghui Zhang - 1047-1056 Evaluating smart grid reliability based on impacts of cyber (control, monitoring and protection) network and its different topologies
by Amirreza Hassani Ahangar & Behrooz Vahidi & Hossein Askarian Abyaneh - 1057-1062 A study of the sensitivity of sequence stacking strategies for the storage location assignment problem for out-bound containers in a maritime terminal
by Roberto Guerra-Olivares & Neale R. Smith & Rosa G. González-Ramírez & Leopoldo Eduardo Cárdenas-Barrón - 1063-1079 Model based test case prioritization using UML behavioural diagrams and association rule mining
by Prateeva Mahali & Durga Prasad Mohapatra - 1080-1091 Information entropy applied to software based control flow graphs
by Aditya Akundi & Eric Smith & Tzu-Liang Tseng - 1092-1106 ANN embedded data envelopment analysis approach for measuring the efficiency of state boards in India
by Natthan Singh & Millie Pant & Amit Goel - 1107-1119 Estimation of stress–strength reliability for Maxwell distribution under progressive type-II censoring scheme
by Sachin Chaudhary & Sanjeev K. Tomer - 1120-1136 Role of non technical skill in human factor engineering: a crucial safety issue in Indian Railway
by Sudarson Nayak & Sushanta Tripathy & Aishwarya Dash - 1137-1146 Prediction of cutting force by using ANFIS
by Vineet Jain & Tilak Raj - 1147-1158 Plug in hybrid vehicle-wind-diesel autonomous hybrid power system: frequency control using FA and CSA optimized controller
by Abdul Latif & Arup Pramanik & Dulal Chandra Das & Israfil Hussain & Sudhanshu Ranjan - 1159-1164 Optimal annihilator immunity with suboptimal bound of other properties
by Rajni Goyal - 1165-1177 Risk scenario prediction for sudden water pollution accidents based on Bayesian networks
by Tiejun Cheng & Panpan Wang & Qianyi Lu - 1178-1197 Performance optimization of unique resilient human resource management system in a coal mine industry
by Ali Azadeh & Delaram Heydarian & Keivan Nemati & Reza Yazdanparast - 1198-1205 Efficient optimization of process parameters in 2.5 D end milling using neural network and genetic algorithm
by Dinesh Kumar & Pankaj Chandna & Mahesh Pal - 1206-1216 Voltage source converter in a microgrid
by Bharat Chetry & Adriano Carvalho & Rui Brito - 1217-1233 A risk-based maintenance approach for critical care medical devices: a case study application for a large hospital in a developing country
by Stephen Vala & Peter Chemweno & Liliane Pintelon & Peter Muchiri
August 2018, Volume 9, Issue 4
- 739-740 Special issue on swarm intelligence and its applications to engineering
by Jagdish Chand Bansal & Harish Sharma & Kusum Deep & Kedar Nath Das & Atulya Nagar - 741-754 Harmony search based memetic algorithms for solving sudoku
by Assif Assad & Kusum Deep - 755-773 Troop search optimization algorithm for constrained problems
by Biplab Chaudhuri & Kedar Nath Das - 774-783 Self balanced particle swarm optimization
by Pawan Bhambu & Sandeep Kumar & Kavita Sharma - 784-801 A new ants interaction scheme for continuous optimization problems
by Anand Kumar & Manoj Thakur & Garima Mittal - 802-810 Self-adaptive position update in artificial bee colony
by Shimpi Singh Jadon & Harish Sharma & Ritu Tiwari & Jagdish Chand Bansal - 811-820 Meta-heuristic based reliable and green workflow scheduling in cloud computing
by Nidhi Rehani & Ritu Garg - 821-829 Unsupervised data classification using improved biogeography based optimization
by Avinash Chandra Pandey & Raju Pal & Ankur Kulhari - 830-835 A performance evaluation of routing protocols for vehicular ad hoc networks with swarm intelligence
by Ramesh C. Poonia - 836-852 Three-dimensional path planning for unmanned aerial vehicles using glowworm swarm optimization algorithm
by Prashant Pandey & Anupam Shukla & Ritu Tiwari - 853-865 New chaotic flower pollination algorithm for unconstrained non-linear optimization functions
by Arvinder Kaur & Saibal K. Pal & Amrit Pal Singh - 866-874 Dynamic frequency based parallel k-bat algorithm for massive data clustering (DFBPKBA)
by Ashish Kumar Tripathi & Kapil Sharma & Manju Bala - 875-887 Quantum-inspired evolutionary approach for selection of optimal parameters of fuzzy clustering
by Neha Bharill & Om Prakash Patel & Aruna Tiwari - 888-900 MR-TP-QFPSO: map reduce two phases quantum fuzzy PSO for feature selection
by Shikha Agarwal & Prabhat Ranjan - 901-910 Hybridization of K-Means and Firefly Algorithm for intrusion detection system
by Arvinder Kaur & Saibal K. Pal & Amrit Pal Singh - 911-928 Hybrid Gbest-guided Artificial Bee Colony for hard partitional clustering
by J. Prakash & P. K. Singh - 929-941 Spider Monkey Optimization: a survey
by Vani Agrawal & Ratika Rastogi & D. C. Tiwari - 942-961 A novel cuckoo search strategy for automated cryptanalysis: a case study on the reduced complex knapsack cryptosystem
by Ashish Jain & Narendra S. Chaudhari - 962-971 A hybrid modified differential evolution-pattern search approach for SSSC based damping controller design under communication constraints
by B. D. Rout & B. B. Pati & Sidhartha Panda - 972-986 A novel cuckoo search technique for solving discrete optimization problems
by Ashish Jain & Narendra S. Chaudhari
June 2018, Volume 9, Issue 3
- 567-576 HIDS: A host based intrusion detection system for cloud computing environment
by Prachi Deshpande & S. C. Sharma & S. K. Peddoju & S. Junaid - 577-588 DE-IE: differential evolution for color image enhancement
by Sushil Kumar & Millie Pant & Amiya Kumar Ray - 589-601 Artificial bee colony algorithm with global and local neighborhoods
by Shimpi Singh Jadon & Jagdish Chand Bansal & Ritu Tiwari & Harish Sharma - 602-611 An optimal image watermarking approach through cuckoo search algorithm in wavelet domain
by Musrrat Ali & Chang Wook Ahn - 612-619 Energy optimization of energy aware routing protocol and bandwidth assessment for wireless sensor network
by Rajeev Arya & S. C. Sharma - 620-629 Sensitivity analysis on inverse characteristics of directional over current relays using differential evolution algorithm
by Srikanth Allamsetty & Radha Thangaraj & Thanga Raj Chelliah & Millie Pant - 630-638 A formal study on generative power of a class of array token Petri net structure
by T. Kamaraj & D. Lalitha & D. G. Thomas - 639-645 Novel GA for metropolitan stations of Indian railways when modelled as a TSP
by Kusum Deep & Hadush Mebrahtu & Atulya K. Nagar - 646-656 A study on impact of untrustworthy and older recommendations over T-Grid computational model
by P. Suresh Kumar & S. Ramachandram - 657-674 Additive manufacturing applications in Defence Support Services: current practices and framework for implementation
by Alessandro Busachi & John Erkoyuncu & Paul Colegrove & Richard Drake & Chris Watts & Stephen Wilding - 675-683 Research on building software usage model based on UML model
by Honghui Li & Aihua Zhao & Dalin Zhang & Junwen Zhang - 684-695 Research on the technological architectural design of geological hazard monitoring and rescue-after-disaster system based on cloud computing and Internet of things
by Lele Qin & Shuang Feng & Hongyi Zhu - 696-702 Multi objective optimization of railway emergency rescue resource allocation and decision
by Zhaoping Tang & Jianping Sun - 703-715 Enforcing compliance of hierarchical business process with visual security constraints
by Li Duan & Yang Zhang & Chang-ai Sun & Junliang Chen - 716-728 A matter-element method for risk identification of technology innovation
by Quan Xiao - 729-738 Research on risk assessment and control of inland navigation safety
by Ling Sun & Hanwen Zhang & Wei Liu & Fei Chen
April 2018, Volume 9, Issue 2
- 313-322 Certus: an organizational effort towards research-based innovation in software verification and validation
by Sagar Sen & Dusica Marijan & Arnaud Gotlieb - 323-334 Bridging the gap between research and agile practice: an evolutionary model
by Leonor Barroca & Helen Sharp & Dina Salah & Katie Taylor & Peggy Gregory - 335-343 Diagnosis of bearing defects in induction motors using discrete wavelet transform
by N. Bessous & S. E. Zouzou & W. Bentrah & S. Sbaa & M. Sahraoui - 344-353 Incorporation of ISO 25010 with machine learning to develop a novel quality in use prediction system (QiUPS)
by Osama Alshareet & Awni Itradat & Iyad Abu Doush & Ahmad Quttoum - 354-361 A novel method for localising a randomly distributed wireless sensor network
by Ahmad A. A. Alkhatib & Mohammad Alia & Adnan Hnaif & Sufian Yousef - 362-376 Automatic test case generation through collaboration diagram: a case study
by Arvinder Kaur & Vidhi Vig - 377-400 Reliability prediction of fault tolerant machining system with reboot and recovery delay
by Chandra Shekhar & Madhu Jain & Ather Aziz Raina & Javid Iqbal - 401-426 Investigation of various data analysis techniques to identify change prone parts of an open source software
by Ruchika Malhotra & Ankita Bansal - 427-439 Evaluating key performance indicators of leagile manufacturing using fuzzy TISM approach
by Naveen Virmani & Rajeev Saha & Rajeshwar Sahai - 440-451 Classical and Bayesian estimation in log-logistic distribution under random censoring
by Kapil Kumar - 452-466 A risk assessment method of deep excavation based on Bayesian analysis and expert elicitation
by Ning Wang & Cheng-shun Xu & Xiu-li Du & Ming-ju Zhang - 467-481 Study of nonparametric estimation details of instant system availability average
by Emmanuel Hagenimana & Song Lixin & Patrick Kandege - 482-493 Evading android anti-malware by hiding malicious application inside images
by Shikha Badhani & Sunil K. Muttoo - 494-508 Fault diagnosis of automobile systems using fault tree based on digraph modeling
by Ajith Tom James & O. P. Gandhi & S. G. Deshmukh - 509-516 Solving the problem of industry by formulating it as a fractional capacitated transportation problem with bounds on rim conditions
by Kavita Gupta & Ritu Arora - 517-524 Time synchronization problem of wireless sensor network using maximum probability theory
by Divya Upadhyay & Ashwani Kumar Dubey & P. Santhi Thilagam - 525-538 Analysis of an industrial system under uncertain environment by using different types of fuzzy numbers
by Harish Garg - 539-546 Modeling and characterizing viewers of You Tube videos
by Niyati Aggrawal & Anuja Arora & Adarsh Anand - 547-558 Performance evaluation of JIT enabled SCM using ANP method
by Om Prakash Mishra & Vikas Kumar & Dixit Garg - 559-566 Access the number of speakers through visual access tendency for effective speech clustering
by T. Suneetha Rani & M. H. M. Krishna Prasad
February 2018, Volume 9, Issue 1
- 1-1 Soft computing for problem solving (SocProS 2015)
by Millie Pant & Kusum Deep & Jagdish Chand Bansal & Kedar Nath Das & Atulya K. Nagar - 2-11 Optimization approach for energy minimization and bandwidth estimation of WSN for data centric protocols
by Rajeev Arya & S. C. Sharma - 12-17 A model to find optimal percentage of training and testing data for efficient ECG analysis using neural network
by Kartik Bhanot & Sateesh Kumar Peddoju & Tushar Bhardwaj - 18-25 Implementation of geographical location based routing protocols in vehicular environment
by Akhtar Husain & Subhash Chander Sharma - 26-32 Matching images captured from unmanned aerial vehicle
by Steven Lawrence Fernandes & G. Josemin Bala - 33-42 Spectral indices based object oriented classification for change detection using satellite data
by Abhishek Bhatt & S. K. Ghosh & Anil Kumar - 43-51 Identification of noise in multi noise plant using enhanced version of shuffled frog leaping algorithm
by Tarun Kumar Sharma & Millie Pant - 52-57 RF sensor for smart home application
by Brijesh Iyer & N. P. Pathak & D. Ghosh - 58-65 Enhanced ant colony optimization to solve the optimal power flow with ecological emission
by Vijay Raviprabakaran & Ravichandran Coimbatore Subramanian - 66-81 Psychology of adolescents: a fuzzy logic analysis
by Shilpa Srivastava & Millie Pant & Namrata Agrawal - 82-90 Role of decision tree in supplementing tacit knowledge for Hypothetico-Deduction in higher education
by Preeti Gupta & Deepti Mehrotra & Tarun Kumar Sharma - 91-97 Prediction of municipal solid waste generation for optimum planning and management with artificial neural network—case study: Faridabad City in Haryana State (India)
by Dipti Singh & Ajay Satija - 98-110 A multi-objective particle swarm optimization for the submission decision process
by Aderemi Oluyinka Adewumi & Peter Ayokunle Popoola - 111-130 Optimization of steam economy and consumption of heptad’s effect evaporator system in Kraft recovery process
by Om Prakash Verma & Toufiq Haji Mohammed & Shubham Mangal & Gaurav Manik - 131-138 Application of HAM to seventh order KdV equations
by Rajan Arora & Hariom Sharma - 139-146 Stacked arrangement of meandered patches for biomedical applications
by Love Jain & Raghvendra Singh & Sanyog Rawat & Kanad Ray - 147-154 An exploratory study to investigate value chain of Saharanpur wooden carving handicraft cluster
by Rohit Yadav & Tripti Mahara - 155-172 A survey of recent advances in vehicle routing problems
by Aderemi Oluyinka Adewumi & Olawale Joshua Adeleke - 173-179 Merging user and item based collaborative filtering to alleviate data sparsity
by Surya Kant & Tripti Mahara - 180-193 Performance measurement of an Indian higher education institute: a sustainable educational supply chain management perspective
by Sunil Kumar Jauhar & Millie Pant & Richa Dutt - 194-207 Security and service assurance issues in Cloud environment
by Prachi Deshpande & S. C. Sharma & Sateesh K. Peddoju & Ajith Abraham - 208-215 Training of neural network for pattern classification using fireworks algorithm
by Asaju La’aro Bolaji & Aminu Ali Ahmad & Peter Bamidele Shola - 216-229 ssFPA/DE: an efficient hybrid differential evolution–flower pollination algorithm based approach
by Meera Ramadas & Millie Pant & Ajith Abraham & Sushil Kumar - 230-244 Software reliability prediction using machine learning techniques
by Arunima Jaiswal & Ruchika Malhotra - 245-261 Recognition of noise source in multi sounds field by modified random localized based DE algorithm
by Pravesh Kumar & Millie Pant - 262-273 Opposition learning based phases in artificial bee colony
by Tarun Kumar Sharma & Preeti Gupta - 274-286 Quality assured and optimized image watermarking using artificial bee colony
by Irshad Ahmad Ansari & Millie Pant - 287-293 Protect botanical plants and pluck botanical products using robotics and image processing
by Om Prakash Dubey & Rani Manisha & Kusum Deep - 294-305 Genetic algorithm designed for solving portfolio optimization problems subjected to cardinality constraint
by Hemant Jalota & Manoj Thakur