Content
June 2019, Volume 10, Issue 3
- 350-368 Cubic reward penalty structure for power distribution companies
by Sreenithya Sumesh & Vidyasagar Potdar & Aneesh Krishna - 369-383 Multi-objective reliability redundancy allocation problem considering two types of common cause failures
by Aniruddha Samanta & Kajla Basu - 384-398 A coordinated vendor–buyer system considering loss and damage claims, insurance cost and stochastic lead time
by Ivan Darma Wangsa & Hui Ming Wee & Shih-Hsien Tseng - 399-415 Reliability evaluation of mobile ad hoc networks by considering link expiration time and border time
by Gaurav Khanna & S. K. Chaturvedi & Sieteng Soh - 416-428 A redundancy allocation problem by using utility function method and ant colony optimization: tradeoff between availability and total cost
by Ali Salmasnia & Sadegh Noori & Hadi Mokhtari - 429-436 Statistical distributions comparison for remaining useful life prediction of components via ANN
by Mohammad Ali Farsi & S. Masood Hosseini - 437-452 An adaptive underdamped stochastic resonance based on NN and CS for bearing fault diagnosis
by Kuo Chi & Jianshe Kang & Fei Zhao & Long Liu
April 2019, Volume 10, Issue 2
- 149-159 Cybersecurity for eMaintenance in railway infrastructure: risks and consequences
by Adithya Thaduri & Mustafa Aljumaili & Ravdeep Kour & Ramin Karim - 160-172 Bi-level decision making models for advertising allocation problem under fuzzy environment
by Syed Mohd Muneeb & Ahmad Yusuf Adhami & Zainab Asim & Syed Aqib Jalil - 173-189 Multi-objective linear fractional inventory problem under intuitionistic fuzzy environment
by Irfan Ali & Srikant Gupta & Aquil Ahmed - 190-200 Classical and Bayes estimation of reliability characteristics of the Kumaraswamy-Inverse Exponential distribution
by M. K. Rastogi & P. E. Oguntunde - 201-211 Analyzing the productivity of maintenance systems using system dynamics modeling method
by Esmaeil Esmaeili & Hasan Karimian & Mohammad Najjartabar Bisheh - 212-227 AHP-Entropy based priority assessment of factors to reduce aviation fuel consumption
by Jagroop Singh & Somesh Kumar Sharma & Rajnish Srivastava - 228-241 An algorithm for performance evaluation of resilience engineering culture based on graph theory and matrix approach
by Masoud Rabbani & Reza Yazdanparast & Mahdi Mobini - 242-250 A study of software reliability on big data open source software
by Ranjan Kumar & Subhash Kumar & Sanjay K. Tiwari - 251-275 Evaluating the lifetime performance index of products based on generalized order statistics from two-parameter exponential model
by Mohammad Vali Ahmadi & Jafar Ahmadi & Mousa Abdi - 276-284 Multi-objective grey wolf optimizer approach to the reliability-cost optimization of life support system in space capsule
by Anuj Kumar & Sangeeta Pant & Mangey Ram & Shshank Chaube - 285-298 Coordination of a three-level supply chain with variable demand and order size dependent trade credit in healthcare industries
by S. K. Karuppasamy & R. Uthayakumar
November 2019, Volume 10, Issue 1
- 1-2 Special issue: Current research in life cycle engineering and management
by Ljubisa Papic - 3-11 Application of probability distributions mixture of safety indicator in risk assessment problems
by Lidiya N. Aleksandrovskaya & Anna E. Ardalionova & Ljubisa Papic - 12-20 Analysis and comparison of some criteria of checking the probability distribution deviation from the normal distribution law
by L. N. Aleksandrovskaya & P. A. Iosifov & A. V. Kirillin - 21-28 Statistical bootstrap in the problem of availability factor estimating: example of SRs 1200 excavator reliability
by Irina Gadolina & Ljubisa Papic & Rashid Zaynetdinov - 29-36 Control of consensus convergence in technical committees of standardization on the basis of regular Markov chains model
by Aleksandr V. Zazhigalkin & Iosif Z. Aronov & Olga V. Maksimova & Ljubisa Papic - 37-44 Estimation of risks related to the functioning of railway telecommunication
by V. A. Gapanovich & I. B. Shubinsky & I. N. Rosenberg & A. M. Zamyshlyaev - 45-57 Vulnerability assessment methodology and some methodical aspects of critical infrastructure protection
by Alexander V. Bochkov
February 2019, Volume 10, Issue 1
- 1-18 A review paper to examine the validity of Bayesian network to build rational consensus in subjective probabilistic failure analysis
by Mohammad Yazdi - 19-34 On two node tandem queueing model with time dependent service rates
by K. Srinivasa Rao & J. Durga Aparajitha - 35-43 Auto parts manufacturing quality assessment using design for six sigma (DFSS), case study in ISACO company
by Amir Abbas Shojaie & Elahe Kahedi - 44-56 Qualitative analysis of CNG dispensing system using fuzzy FMEA–GRA integrated approach
by Dilbagh Panchal & Priyank Srivastava - 57-82 Maintenance performance evaluation using an integrated approach of graph theory, ISM and matrix method
by V. N. Aju kumar & Piyush Gupta & O. P. Gandhi - 83-90 Modeling innovation adoption incorporating time lag between awareness and adoption process
by Richie Aggarwal & Ompal Singh & Adarsh Anand & P. K. Kapur - 91-96 Ant colony optimization technique for edge detection using fuzzy triangular membership function
by Ruchika Singh & Munish Vashishath & S. Kumar - 97-109 Reliability analysis of a rodding anode plant in aluminum industry with multiple units failure and single repairman
by Yaqoob Al Rahbi & S. M. Rizwan & B. M. Alkali & Andrew Cowell & G. Taneja - 110-125 Estimating the threshold of software metrics for web applications
by Ruchika Malhotra & Anjali Sharma - 126-141 A TISM based study of SSCM enablers: an Indian coal- fired thermal power plant perspective
by Jitendra Narayan Biswal & Kamalakanta Muduli & Suchismita Satapathy & Devendra K. Yadav - 142-147 The strategy of traffic congestion management based on case-based reasoning
by Hao Zhang & GuangLong Dai
December 2018, Volume 9, Issue 6
- 1235-1249 Bayesian inference for Poisson-inverse exponential distribution under progressive type-II censoring with binomial removal
by Manoj Kumar & Sanjay Kumar Singh & Umesh Singh - 1250-1259 A statistical analysis and simulation based approach to an uncertain supplier selection problem with discount option
by Ali Salmasnia & Hamid Daliri & Ali Ghorbanian & Hadi Mokhtari - 1260-1278 Preliminary test estimators of the reliability characteristics for the three parameters Burr XII distribution based on records
by Ajit Chaturvedi & Reza Arabi Belaghi & Ananya Malhotra - 1279-1286 Reliability estimation of multi-component cascade system through Monte-Carlo simulation
by A. N. Patowary & J. Hazarika & G. L. Sriwastav - 1287-1293 Improved acceptance sampling plans based on truncated life tests for Garima distribution
by Amer Al-Omari - 1294-1301 IoT enabled tracking and monitoring sensor for military applications
by Brijesh Iyer & Niket Patil - 1302-1314 An adaptive neuro-fuzzy inference system for makespan estimation of flexible manufacturing system assembly shop: a case study
by Vineet Jain & Tilak Raj - 1315-1325 MetaXplorer: an intelligent and adaptable metasearch engine using a novel ordered weighted averaging operator
by Neha Dimri & Himanshu Kaul & Daya Gupta - 1326-1335 Reliability analysis and optimization design on equilibrium elbow
by Jie Zhou & Yun-Xian Jia & Jie Li - 1336-1345 Research on optimization of spare parts inventory policy considering maintenance priority
by Yu-kun Chen & Qi Gao & Xiao-bo Su & Shun Fang & Chi-ming Guo - 1346-1354 Application of BOCR models in service oriented architecture (SOA): study on model validation through quantification for QoS considerations
by Ravi Kumar Gedela & K. Krishna Mohan & V. Kamakshi Prasad
October 2018, Volume 9, Issue 5
- 987-998 A multi-indicator modeling method for similarity-based residual useful life estimation with two selection processes
by Mengyao Gu & Youling Chen - 999-1013 A procedure for condition-based maintenance and diagnostics of submersible well pumps through vibration monitoring
by Augusto Bianchini & Jessica Rossi & Lauro Antipodi - 1014-1021 Integrated maintenance policy optimization with finite spares
by Ruifeng Yang & Jianshe Kang & Qiwei Hu - 1022-1033 A decentralized multi-level decision making model for solid transportation problem with uncertainty
by Syed Aqib Jalil & Shakeel Javaid & Syed Mohd Muneeb - 1034-1046 Fault diagnosis for machinery based on feature extraction and general regression neural network
by Haiping Li & Jianmin Zhao & Xianglong Ni & Xinghui Zhang - 1047-1056 Evaluating smart grid reliability based on impacts of cyber (control, monitoring and protection) network and its different topologies
by Amirreza Hassani Ahangar & Behrooz Vahidi & Hossein Askarian Abyaneh - 1057-1062 A study of the sensitivity of sequence stacking strategies for the storage location assignment problem for out-bound containers in a maritime terminal
by Roberto Guerra-Olivares & Neale R. Smith & Rosa G. González-Ramírez & Leopoldo Eduardo Cárdenas-Barrón - 1063-1079 Model based test case prioritization using UML behavioural diagrams and association rule mining
by Prateeva Mahali & Durga Prasad Mohapatra - 1080-1091 Information entropy applied to software based control flow graphs
by Aditya Akundi & Eric Smith & Tzu-Liang Tseng - 1092-1106 ANN embedded data envelopment analysis approach for measuring the efficiency of state boards in India
by Natthan Singh & Millie Pant & Amit Goel - 1107-1119 Estimation of stress–strength reliability for Maxwell distribution under progressive type-II censoring scheme
by Sachin Chaudhary & Sanjeev K. Tomer - 1120-1136 Role of non technical skill in human factor engineering: a crucial safety issue in Indian Railway
by Sudarson Nayak & Sushanta Tripathy & Aishwarya Dash - 1137-1146 Prediction of cutting force by using ANFIS
by Vineet Jain & Tilak Raj - 1147-1158 Plug in hybrid vehicle-wind-diesel autonomous hybrid power system: frequency control using FA and CSA optimized controller
by Abdul Latif & Arup Pramanik & Dulal Chandra Das & Israfil Hussain & Sudhanshu Ranjan - 1159-1164 Optimal annihilator immunity with suboptimal bound of other properties
by Rajni Goyal - 1165-1177 Risk scenario prediction for sudden water pollution accidents based on Bayesian networks
by Tiejun Cheng & Panpan Wang & Qianyi Lu - 1178-1197 Performance optimization of unique resilient human resource management system in a coal mine industry
by Ali Azadeh & Delaram Heydarian & Keivan Nemati & Reza Yazdanparast - 1198-1205 Efficient optimization of process parameters in 2.5 D end milling using neural network and genetic algorithm
by Dinesh Kumar & Pankaj Chandna & Mahesh Pal - 1206-1216 Voltage source converter in a microgrid
by Bharat Chetry & Adriano Carvalho & Rui Brito - 1217-1233 A risk-based maintenance approach for critical care medical devices: a case study application for a large hospital in a developing country
by Stephen Vala & Peter Chemweno & Liliane Pintelon & Peter Muchiri
August 2018, Volume 9, Issue 4
- 739-740 Special issue on swarm intelligence and its applications to engineering
by Jagdish Chand Bansal & Harish Sharma & Kusum Deep & Kedar Nath Das & Atulya Nagar - 741-754 Harmony search based memetic algorithms for solving sudoku
by Assif Assad & Kusum Deep - 755-773 Troop search optimization algorithm for constrained problems
by Biplab Chaudhuri & Kedar Nath Das - 774-783 Self balanced particle swarm optimization
by Pawan Bhambu & Sandeep Kumar & Kavita Sharma - 784-801 A new ants interaction scheme for continuous optimization problems
by Anand Kumar & Manoj Thakur & Garima Mittal - 802-810 Self-adaptive position update in artificial bee colony
by Shimpi Singh Jadon & Harish Sharma & Ritu Tiwari & Jagdish Chand Bansal - 811-820 Meta-heuristic based reliable and green workflow scheduling in cloud computing
by Nidhi Rehani & Ritu Garg - 821-829 Unsupervised data classification using improved biogeography based optimization
by Avinash Chandra Pandey & Raju Pal & Ankur Kulhari - 830-835 A performance evaluation of routing protocols for vehicular ad hoc networks with swarm intelligence
by Ramesh C. Poonia - 836-852 Three-dimensional path planning for unmanned aerial vehicles using glowworm swarm optimization algorithm
by Prashant Pandey & Anupam Shukla & Ritu Tiwari - 853-865 New chaotic flower pollination algorithm for unconstrained non-linear optimization functions
by Arvinder Kaur & Saibal K. Pal & Amrit Pal Singh - 866-874 Dynamic frequency based parallel k-bat algorithm for massive data clustering (DFBPKBA)
by Ashish Kumar Tripathi & Kapil Sharma & Manju Bala - 875-887 Quantum-inspired evolutionary approach for selection of optimal parameters of fuzzy clustering
by Neha Bharill & Om Prakash Patel & Aruna Tiwari - 888-900 MR-TP-QFPSO: map reduce two phases quantum fuzzy PSO for feature selection
by Shikha Agarwal & Prabhat Ranjan - 901-910 Hybridization of K-Means and Firefly Algorithm for intrusion detection system
by Arvinder Kaur & Saibal K. Pal & Amrit Pal Singh - 911-928 Hybrid Gbest-guided Artificial Bee Colony for hard partitional clustering
by J. Prakash & P. K. Singh - 929-941 Spider Monkey Optimization: a survey
by Vani Agrawal & Ratika Rastogi & D. C. Tiwari - 942-961 A novel cuckoo search strategy for automated cryptanalysis: a case study on the reduced complex knapsack cryptosystem
by Ashish Jain & Narendra S. Chaudhari - 962-971 A hybrid modified differential evolution-pattern search approach for SSSC based damping controller design under communication constraints
by B. D. Rout & B. B. Pati & Sidhartha Panda - 972-986 A novel cuckoo search technique for solving discrete optimization problems
by Ashish Jain & Narendra S. Chaudhari
June 2018, Volume 9, Issue 3
- 567-576 HIDS: A host based intrusion detection system for cloud computing environment
by Prachi Deshpande & S. C. Sharma & S. K. Peddoju & S. Junaid - 577-588 DE-IE: differential evolution for color image enhancement
by Sushil Kumar & Millie Pant & Amiya Kumar Ray - 589-601 Artificial bee colony algorithm with global and local neighborhoods
by Shimpi Singh Jadon & Jagdish Chand Bansal & Ritu Tiwari & Harish Sharma - 602-611 An optimal image watermarking approach through cuckoo search algorithm in wavelet domain
by Musrrat Ali & Chang Wook Ahn - 612-619 Energy optimization of energy aware routing protocol and bandwidth assessment for wireless sensor network
by Rajeev Arya & S. C. Sharma - 620-629 Sensitivity analysis on inverse characteristics of directional over current relays using differential evolution algorithm
by Srikanth Allamsetty & Radha Thangaraj & Thanga Raj Chelliah & Millie Pant - 630-638 A formal study on generative power of a class of array token Petri net structure
by T. Kamaraj & D. Lalitha & D. G. Thomas - 639-645 Novel GA for metropolitan stations of Indian railways when modelled as a TSP
by Kusum Deep & Hadush Mebrahtu & Atulya K. Nagar - 646-656 A study on impact of untrustworthy and older recommendations over T-Grid computational model
by P. Suresh Kumar & S. Ramachandram - 657-674 Additive manufacturing applications in Defence Support Services: current practices and framework for implementation
by Alessandro Busachi & John Erkoyuncu & Paul Colegrove & Richard Drake & Chris Watts & Stephen Wilding - 675-683 Research on building software usage model based on UML model
by Honghui Li & Aihua Zhao & Dalin Zhang & Junwen Zhang - 684-695 Research on the technological architectural design of geological hazard monitoring and rescue-after-disaster system based on cloud computing and Internet of things
by Lele Qin & Shuang Feng & Hongyi Zhu - 696-702 Multi objective optimization of railway emergency rescue resource allocation and decision
by Zhaoping Tang & Jianping Sun - 703-715 Enforcing compliance of hierarchical business process with visual security constraints
by Li Duan & Yang Zhang & Chang-ai Sun & Junliang Chen - 716-728 A matter-element method for risk identification of technology innovation
by Quan Xiao - 729-738 Research on risk assessment and control of inland navigation safety
by Ling Sun & Hanwen Zhang & Wei Liu & Fei Chen
April 2018, Volume 9, Issue 2
- 313-322 Certus: an organizational effort towards research-based innovation in software verification and validation
by Sagar Sen & Dusica Marijan & Arnaud Gotlieb - 323-334 Bridging the gap between research and agile practice: an evolutionary model
by Leonor Barroca & Helen Sharp & Dina Salah & Katie Taylor & Peggy Gregory - 335-343 Diagnosis of bearing defects in induction motors using discrete wavelet transform
by N. Bessous & S. E. Zouzou & W. Bentrah & S. Sbaa & M. Sahraoui - 344-353 Incorporation of ISO 25010 with machine learning to develop a novel quality in use prediction system (QiUPS)
by Osama Alshareet & Awni Itradat & Iyad Abu Doush & Ahmad Quttoum - 354-361 A novel method for localising a randomly distributed wireless sensor network
by Ahmad A. A. Alkhatib & Mohammad Alia & Adnan Hnaif & Sufian Yousef - 362-376 Automatic test case generation through collaboration diagram: a case study
by Arvinder Kaur & Vidhi Vig - 377-400 Reliability prediction of fault tolerant machining system with reboot and recovery delay
by Chandra Shekhar & Madhu Jain & Ather Aziz Raina & Javid Iqbal - 401-426 Investigation of various data analysis techniques to identify change prone parts of an open source software
by Ruchika Malhotra & Ankita Bansal - 427-439 Evaluating key performance indicators of leagile manufacturing using fuzzy TISM approach
by Naveen Virmani & Rajeev Saha & Rajeshwar Sahai - 440-451 Classical and Bayesian estimation in log-logistic distribution under random censoring
by Kapil Kumar - 452-466 A risk assessment method of deep excavation based on Bayesian analysis and expert elicitation
by Ning Wang & Cheng-shun Xu & Xiu-li Du & Ming-ju Zhang - 467-481 Study of nonparametric estimation details of instant system availability average
by Emmanuel Hagenimana & Song Lixin & Patrick Kandege - 482-493 Evading android anti-malware by hiding malicious application inside images
by Shikha Badhani & Sunil K. Muttoo - 494-508 Fault diagnosis of automobile systems using fault tree based on digraph modeling
by Ajith Tom James & O. P. Gandhi & S. G. Deshmukh - 509-516 Solving the problem of industry by formulating it as a fractional capacitated transportation problem with bounds on rim conditions
by Kavita Gupta & Ritu Arora - 517-524 Time synchronization problem of wireless sensor network using maximum probability theory
by Divya Upadhyay & Ashwani Kumar Dubey & P. Santhi Thilagam - 525-538 Analysis of an industrial system under uncertain environment by using different types of fuzzy numbers
by Harish Garg - 539-546 Modeling and characterizing viewers of You Tube videos
by Niyati Aggrawal & Anuja Arora & Adarsh Anand - 547-558 Performance evaluation of JIT enabled SCM using ANP method
by Om Prakash Mishra & Vikas Kumar & Dixit Garg - 559-566 Access the number of speakers through visual access tendency for effective speech clustering
by T. Suneetha Rani & M. H. M. Krishna Prasad
February 2018, Volume 9, Issue 1
- 1-1 Soft computing for problem solving (SocProS 2015)
by Millie Pant & Kusum Deep & Jagdish Chand Bansal & Kedar Nath Das & Atulya K. Nagar - 2-11 Optimization approach for energy minimization and bandwidth estimation of WSN for data centric protocols
by Rajeev Arya & S. C. Sharma - 12-17 A model to find optimal percentage of training and testing data for efficient ECG analysis using neural network
by Kartik Bhanot & Sateesh Kumar Peddoju & Tushar Bhardwaj - 18-25 Implementation of geographical location based routing protocols in vehicular environment
by Akhtar Husain & Subhash Chander Sharma - 26-32 Matching images captured from unmanned aerial vehicle
by Steven Lawrence Fernandes & G. Josemin Bala - 33-42 Spectral indices based object oriented classification for change detection using satellite data
by Abhishek Bhatt & S. K. Ghosh & Anil Kumar - 43-51 Identification of noise in multi noise plant using enhanced version of shuffled frog leaping algorithm
by Tarun Kumar Sharma & Millie Pant - 52-57 RF sensor for smart home application
by Brijesh Iyer & N. P. Pathak & D. Ghosh - 58-65 Enhanced ant colony optimization to solve the optimal power flow with ecological emission
by Vijay Raviprabakaran & Ravichandran Coimbatore Subramanian - 66-81 Psychology of adolescents: a fuzzy logic analysis
by Shilpa Srivastava & Millie Pant & Namrata Agrawal - 82-90 Role of decision tree in supplementing tacit knowledge for Hypothetico-Deduction in higher education
by Preeti Gupta & Deepti Mehrotra & Tarun Kumar Sharma - 91-97 Prediction of municipal solid waste generation for optimum planning and management with artificial neural network—case study: Faridabad City in Haryana State (India)
by Dipti Singh & Ajay Satija - 98-110 A multi-objective particle swarm optimization for the submission decision process
by Aderemi Oluyinka Adewumi & Peter Ayokunle Popoola - 111-130 Optimization of steam economy and consumption of heptad’s effect evaporator system in Kraft recovery process
by Om Prakash Verma & Toufiq Haji Mohammed & Shubham Mangal & Gaurav Manik - 131-138 Application of HAM to seventh order KdV equations
by Rajan Arora & Hariom Sharma - 139-146 Stacked arrangement of meandered patches for biomedical applications
by Love Jain & Raghvendra Singh & Sanyog Rawat & Kanad Ray - 147-154 An exploratory study to investigate value chain of Saharanpur wooden carving handicraft cluster
by Rohit Yadav & Tripti Mahara - 155-172 A survey of recent advances in vehicle routing problems
by Aderemi Oluyinka Adewumi & Olawale Joshua Adeleke - 173-179 Merging user and item based collaborative filtering to alleviate data sparsity
by Surya Kant & Tripti Mahara - 180-193 Performance measurement of an Indian higher education institute: a sustainable educational supply chain management perspective
by Sunil Kumar Jauhar & Millie Pant & Richa Dutt - 194-207 Security and service assurance issues in Cloud environment
by Prachi Deshpande & S. C. Sharma & Sateesh K. Peddoju & Ajith Abraham - 208-215 Training of neural network for pattern classification using fireworks algorithm
by Asaju La’aro Bolaji & Aminu Ali Ahmad & Peter Bamidele Shola - 216-229 ssFPA/DE: an efficient hybrid differential evolution–flower pollination algorithm based approach
by Meera Ramadas & Millie Pant & Ajith Abraham & Sushil Kumar - 230-244 Software reliability prediction using machine learning techniques
by Arunima Jaiswal & Ruchika Malhotra - 245-261 Recognition of noise source in multi sounds field by modified random localized based DE algorithm
by Pravesh Kumar & Millie Pant - 262-273 Opposition learning based phases in artificial bee colony
by Tarun Kumar Sharma & Preeti Gupta - 274-286 Quality assured and optimized image watermarking using artificial bee colony
by Irshad Ahmad Ansari & Millie Pant - 287-293 Protect botanical plants and pluck botanical products using robotics and image processing
by Om Prakash Dubey & Rani Manisha & Kusum Deep - 294-305 Genetic algorithm designed for solving portfolio optimization problems subjected to cardinality constraint
by Hemant Jalota & Manoj Thakur - 306-311 Optimal advertising on a two-dimensional web banner
by Arshia Kaul & Sugandha Aggarwal & Anshu Gupta & Niraj Dayama & Mohan Krishnamoorthy & P. C. Jha
December 2017, Volume 8, Issue 4
- 663-672 Reliability/environmental impacts of wind energy curtailment due to ramping constraints
by Malhar Padhee & Rajesh Karki - 673-682 Estimation of the Frank copula model for dependent competing risks in accelerated life testing
by Herbert Hove & Frank Beichelt & Parmod K. Kapur - 683-703 A manufacturing system energy-efficient optimisation model for maintenance-production workforce size determination using integrated fuzzy logic and quality function deployment approach
by D. E. Ighravwe & S. A. Oke - 704-718 Two-stage single period inventory management for a manufacturing vendor under green-supplier supply chain
by Marziyeh Karimi & Amir Hossein Niknamfar & Seyed Hamid Reza Pasandideh - 719-739 Assessment of failures in automobiles due to maintenance errors
by Ajith Tom James & O. P. Gandhi & S. G. Deshmukh - 740-746 A joint optimal policy of block preventive replacement and spare part inventory
by Ruifeng Yang & Jianshe Kang - 747-761 Research on digital measurement error and rectification algorithm for mechanical parts
by Zhi-ren Han & Wen-xin Liang & Zhen Jia & Ke Wang - 762-769 An integral sliding mode controller with super-twisting algorithm for direct power control of wind generator based on a doubly fed induction generator
by F. Z. Tria & K. Srairi & M. T. Benchouia & M. E. H. Benbouzid - 770-781 A bi-objective model to optimize periodic preventive maintenance strategy during warranty period by considering customer satisfaction
by Ali Salmasnia & Amin Yazdekhasti - 782-798 Modeling interrelationships between CSF in ERP implementations: total ISM and MICMAC approach
by Shruti Nagpal & Ashok Kumar & Sunil Kumar Khatri - 799-816 Modeling lean maintenance metric using incidence matrix approach
by Shashank Gupta & Piyush Gupta & Aditya Parida - 817-825 NSGA-II based fuzzy multi-objective reliability analysis
by Hemant Kumar & Shiv Prasad Yadav - 826-841 The Bernstein algorithm using the modified implicit Bernstein form and its GPU parallelization using CUDA
by P. S. Dhabe & P. S. V. Nataraj - 842-861 A goal programming approach for multi-objective warranty optimization
by Prashant M. Ambad & Makarand S. Kulkarni - 862-866 The nature of maritime security risk
by Amit J. Mokashi & Ajit Kumar Verma - 2045-2045 Preamble
by Ajit K. Verma & Rehan Sadiq & Ashok Deshpande - 2046-2050 Ranking discrete fuzzy linguistic performance based on TODIM method
by Shiyu Chen & Hongming Mo & Dongbo Pan & Rehan Sadiq & Yong Deng - 2051-2063 A comparison of membership function shapes in a fuzzy-based fugacity model for disinfection byproducts in indoor swimming pools
by Roberta Dyck & Rehan Sadiq & Manuel Rodriguez & Sabrina Simard & Robert Tardif - 2064-2070 Fault tree analysis based on TOPSIS and triangular fuzzy number
by Hongping Wang & Xi Lu & Yuxian Du & Chenwei Zhang & Rehan Sadiq & Yong Deng - 2071-2082 An integrated fuzzy algorithm approach to factory floor design incorporating environmental quality and health impact
by Ali Azadeh & Sahar Jebreili & Elizabeth Chang & Morteza Saberi & Omar Khadeer Hussain - 2083-2096 Computational intelligence based models for prediction of elemental composition of solid biomass fuels from proximate analysis
by Suhas B. Ghugare & Shishir Tiwary & Sanjeev S. Tambe - 2097-2108 Early software reliability analysis using reliability relevant software metrics
by Harikesh Bahadur Yadav & Dilip Kumar Yadav - 2109-2117 Software defects estimation using metrics of early phases of software development life cycle
by Chandan Kumar & Dilip Kumar Yadav - 2118-2128 Can fuzzy set theory bring complex issues in sizing air quality monitoring network into focus?
by Kamal Jyoti Maji & Anil Kumar Dikshit & Ashok Deshpande - 2129-2136 An algorithm for solving fuzzy advection diffusion equation and its application to transport of radon from soil into buildings
by D. Datta - 2137-2145 Application of neuro-fuzzy based expert system in water quality assessment
by E. Aghaarabi & F. Aminravan & R. Sadiq & M. Hoorfar & M. J. Rodriguez & H. Najjaran - 2146-2157 Computational intelligence framework for context-aware decision making
by Adithya Thaduri & Uday Kumar & Ajit Kumar Verma - 2158-2169 Optimal power flow using artificial bee colony algorithm with global and local neighborhoods
by Jagdish Chand Bansal & Shimpi Singh Jadon & Ritu Tiwari & Deep Kiran & B. K. Panigrahi - 2170-2183 A new guiding force strategy for differential evolution
by Hira Zaheer & Millie Pant & Sushil Kumar & Oleg Monakhov & Emilia Monakhova & Kusum Deep
November 2017, Volume 8, Issue 3
- 1959-1960 Preface
by Taihoon Kim & Mincong Tang - 1961-1965 Road segment hiding algorithm of preventing replay attack under road network environment
by Wen Chen - 1966-1975 A cloud-user behavior assessment based dynamic access control model
by Xu Jing & Zhengnan Liu & Shuqin Li & Bin Qiao & Gexu Tan - 1976-1980 Network traffic prediction based on improved support vector machine
by Qi-ming Wang & Ai-wan Fan & He-sheng Shi - 1981-1988 A bin packing problem of the laundry washing buckets scheduling based on the buffer area
by Quanming Cheng & Sen Wu & Yang Zhao - 1989-2000 Application of improved unascertained mathematical model in security evaluation of civil airport
by Jia-ni Zhao & Li-na Shi & Li Zhang - 2001-2008 Causes analysis and risk control of firm knowledge loss
by Bo Shen & Youwei Ke - 2009-2016 Online mechanism with latest-reservation for dynamic VMs allocation in private cloud
by Yonggen Gu & Jie Tao & Xiaohong Wu & Xiaolong Ma - 2017-2029 A new publicly verifiable blind detection scheme for intellectual property protection
by Wei Liang & Jing Long & Xuhui Chen & Yongkai Fan & Weidong Xiao - 2030-2035 The model of information security risk assessment based on advanced evidence theory
by Hou Qing & Xie Qingsheng & Li Shaobo - 2036-2043 Research on the development of China’s emergency industry based on system dynamics theory
by Pengyu Ding & Shujun Ye
September 2017, Volume 8, Issue 3
- 529-531 Special issue of IREC2016 conference selected papers
by Mohammad Pourgol-Mohammad & Alireza Ahmadi - 532-541 Reliability analysis of multi-state emergency detection system using simulation approach based on fuzzy failure rate
by Mohammad Nadjafi & Mohammad Ali Farsi & Hossein Jabbari - 542-552 Evaluating MTTF of 2-out-of-3 redundant systems with common cause failure and load share based on alpha factor and capacity flow models
by Seyed Mohammad Mortazavi & Mahdi Karbasian & Sareh Goli - 553-559 Change points estimations of bathtub-shaped hazard functions
by Robab Aghazadeh Chakherloo & Mohammad Pourgol-Mohammad & Kamran Sepanloo - 560-571 Reliable flight computer for sounding rocket with dual redundancy: design and implementation based on COTS parts
by Ghasem Kahe