Content
August 2018, Volume 9, Issue 4
- 802-810 Self-adaptive position update in artificial bee colony
by Shimpi Singh Jadon & Harish Sharma & Ritu Tiwari & Jagdish Chand Bansal - 811-820 Meta-heuristic based reliable and green workflow scheduling in cloud computing
by Nidhi Rehani & Ritu Garg - 821-829 Unsupervised data classification using improved biogeography based optimization
by Avinash Chandra Pandey & Raju Pal & Ankur Kulhari - 830-835 A performance evaluation of routing protocols for vehicular ad hoc networks with swarm intelligence
by Ramesh C. Poonia - 836-852 Three-dimensional path planning for unmanned aerial vehicles using glowworm swarm optimization algorithm
by Prashant Pandey & Anupam Shukla & Ritu Tiwari - 853-865 New chaotic flower pollination algorithm for unconstrained non-linear optimization functions
by Arvinder Kaur & Saibal K. Pal & Amrit Pal Singh - 866-874 Dynamic frequency based parallel k-bat algorithm for massive data clustering (DFBPKBA)
by Ashish Kumar Tripathi & Kapil Sharma & Manju Bala - 875-887 Quantum-inspired evolutionary approach for selection of optimal parameters of fuzzy clustering
by Neha Bharill & Om Prakash Patel & Aruna Tiwari - 888-900 MR-TP-QFPSO: map reduce two phases quantum fuzzy PSO for feature selection
by Shikha Agarwal & Prabhat Ranjan - 901-910 Hybridization of K-Means and Firefly Algorithm for intrusion detection system
by Arvinder Kaur & Saibal K. Pal & Amrit Pal Singh - 911-928 Hybrid Gbest-guided Artificial Bee Colony for hard partitional clustering
by J. Prakash & P. K. Singh - 929-941 Spider Monkey Optimization: a survey
by Vani Agrawal & Ratika Rastogi & D. C. Tiwari - 942-961 A novel cuckoo search strategy for automated cryptanalysis: a case study on the reduced complex knapsack cryptosystem
by Ashish Jain & Narendra S. Chaudhari - 962-971 A hybrid modified differential evolution-pattern search approach for SSSC based damping controller design under communication constraints
by B. D. Rout & B. B. Pati & Sidhartha Panda - 972-986 A novel cuckoo search technique for solving discrete optimization problems
by Ashish Jain & Narendra S. Chaudhari
June 2018, Volume 9, Issue 3
- 567-576 HIDS: A host based intrusion detection system for cloud computing environment
by Prachi Deshpande & S. C. Sharma & S. K. Peddoju & S. Junaid - 577-588 DE-IE: differential evolution for color image enhancement
by Sushil Kumar & Millie Pant & Amiya Kumar Ray - 589-601 Artificial bee colony algorithm with global and local neighborhoods
by Shimpi Singh Jadon & Jagdish Chand Bansal & Ritu Tiwari & Harish Sharma - 602-611 An optimal image watermarking approach through cuckoo search algorithm in wavelet domain
by Musrrat Ali & Chang Wook Ahn - 612-619 Energy optimization of energy aware routing protocol and bandwidth assessment for wireless sensor network
by Rajeev Arya & S. C. Sharma - 620-629 Sensitivity analysis on inverse characteristics of directional over current relays using differential evolution algorithm
by Srikanth Allamsetty & Radha Thangaraj & Thanga Raj Chelliah & Millie Pant - 630-638 A formal study on generative power of a class of array token Petri net structure
by T. Kamaraj & D. Lalitha & D. G. Thomas - 639-645 Novel GA for metropolitan stations of Indian railways when modelled as a TSP
by Kusum Deep & Hadush Mebrahtu & Atulya K. Nagar - 646-656 A study on impact of untrustworthy and older recommendations over T-Grid computational model
by P. Suresh Kumar & S. Ramachandram - 657-674 Additive manufacturing applications in Defence Support Services: current practices and framework for implementation
by Alessandro Busachi & John Erkoyuncu & Paul Colegrove & Richard Drake & Chris Watts & Stephen Wilding - 675-683 Research on building software usage model based on UML model
by Honghui Li & Aihua Zhao & Dalin Zhang & Junwen Zhang - 684-695 Research on the technological architectural design of geological hazard monitoring and rescue-after-disaster system based on cloud computing and Internet of things
by Lele Qin & Shuang Feng & Hongyi Zhu - 696-702 Multi objective optimization of railway emergency rescue resource allocation and decision
by Zhaoping Tang & Jianping Sun - 703-715 Enforcing compliance of hierarchical business process with visual security constraints
by Li Duan & Yang Zhang & Chang-ai Sun & Junliang Chen - 716-728 A matter-element method for risk identification of technology innovation
by Quan Xiao - 729-738 Research on risk assessment and control of inland navigation safety
by Ling Sun & Hanwen Zhang & Wei Liu & Fei Chen
April 2018, Volume 9, Issue 2
- 313-322 Certus: an organizational effort towards research-based innovation in software verification and validation
by Sagar Sen & Dusica Marijan & Arnaud Gotlieb - 323-334 Bridging the gap between research and agile practice: an evolutionary model
by Leonor Barroca & Helen Sharp & Dina Salah & Katie Taylor & Peggy Gregory - 335-343 Diagnosis of bearing defects in induction motors using discrete wavelet transform
by N. Bessous & S. E. Zouzou & W. Bentrah & S. Sbaa & M. Sahraoui - 344-353 Incorporation of ISO 25010 with machine learning to develop a novel quality in use prediction system (QiUPS)
by Osama Alshareet & Awni Itradat & Iyad Abu Doush & Ahmad Quttoum - 354-361 A novel method for localising a randomly distributed wireless sensor network
by Ahmad A. A. Alkhatib & Mohammad Alia & Adnan Hnaif & Sufian Yousef - 362-376 Automatic test case generation through collaboration diagram: a case study
by Arvinder Kaur & Vidhi Vig - 377-400 Reliability prediction of fault tolerant machining system with reboot and recovery delay
by Chandra Shekhar & Madhu Jain & Ather Aziz Raina & Javid Iqbal - 401-426 Investigation of various data analysis techniques to identify change prone parts of an open source software
by Ruchika Malhotra & Ankita Bansal - 427-439 Evaluating key performance indicators of leagile manufacturing using fuzzy TISM approach
by Naveen Virmani & Rajeev Saha & Rajeshwar Sahai - 440-451 Classical and Bayesian estimation in log-logistic distribution under random censoring
by Kapil Kumar - 452-466 A risk assessment method of deep excavation based on Bayesian analysis and expert elicitation
by Ning Wang & Cheng-shun Xu & Xiu-li Du & Ming-ju Zhang - 467-481 Study of nonparametric estimation details of instant system availability average
by Emmanuel Hagenimana & Song Lixin & Patrick Kandege - 482-493 Evading android anti-malware by hiding malicious application inside images
by Shikha Badhani & Sunil K. Muttoo - 494-508 Fault diagnosis of automobile systems using fault tree based on digraph modeling
by Ajith Tom James & O. P. Gandhi & S. G. Deshmukh - 509-516 Solving the problem of industry by formulating it as a fractional capacitated transportation problem with bounds on rim conditions
by Kavita Gupta & Ritu Arora - 517-524 Time synchronization problem of wireless sensor network using maximum probability theory
by Divya Upadhyay & Ashwani Kumar Dubey & P. Santhi Thilagam - 525-538 Analysis of an industrial system under uncertain environment by using different types of fuzzy numbers
by Harish Garg - 539-546 Modeling and characterizing viewers of You Tube videos
by Niyati Aggrawal & Anuja Arora & Adarsh Anand - 547-558 Performance evaluation of JIT enabled SCM using ANP method
by Om Prakash Mishra & Vikas Kumar & Dixit Garg - 559-566 Access the number of speakers through visual access tendency for effective speech clustering
by T. Suneetha Rani & M. H. M. Krishna Prasad
February 2018, Volume 9, Issue 1
- 1-1 Soft computing for problem solving (SocProS 2015)
by Millie Pant & Kusum Deep & Jagdish Chand Bansal & Kedar Nath Das & Atulya K. Nagar - 2-11 Optimization approach for energy minimization and bandwidth estimation of WSN for data centric protocols
by Rajeev Arya & S. C. Sharma - 12-17 A model to find optimal percentage of training and testing data for efficient ECG analysis using neural network
by Kartik Bhanot & Sateesh Kumar Peddoju & Tushar Bhardwaj - 18-25 Implementation of geographical location based routing protocols in vehicular environment
by Akhtar Husain & Subhash Chander Sharma - 26-32 Matching images captured from unmanned aerial vehicle
by Steven Lawrence Fernandes & G. Josemin Bala - 33-42 Spectral indices based object oriented classification for change detection using satellite data
by Abhishek Bhatt & S. K. Ghosh & Anil Kumar - 43-51 Identification of noise in multi noise plant using enhanced version of shuffled frog leaping algorithm
by Tarun Kumar Sharma & Millie Pant - 52-57 RF sensor for smart home application
by Brijesh Iyer & N. P. Pathak & D. Ghosh - 58-65 Enhanced ant colony optimization to solve the optimal power flow with ecological emission
by Vijay Raviprabakaran & Ravichandran Coimbatore Subramanian - 66-81 Psychology of adolescents: a fuzzy logic analysis
by Shilpa Srivastava & Millie Pant & Namrata Agrawal - 82-90 Role of decision tree in supplementing tacit knowledge for Hypothetico-Deduction in higher education
by Preeti Gupta & Deepti Mehrotra & Tarun Kumar Sharma - 91-97 Prediction of municipal solid waste generation for optimum planning and management with artificial neural network—case study: Faridabad City in Haryana State (India)
by Dipti Singh & Ajay Satija - 98-110 A multi-objective particle swarm optimization for the submission decision process
by Aderemi Oluyinka Adewumi & Peter Ayokunle Popoola - 111-130 Optimization of steam economy and consumption of heptad’s effect evaporator system in Kraft recovery process
by Om Prakash Verma & Toufiq Haji Mohammed & Shubham Mangal & Gaurav Manik - 131-138 Application of HAM to seventh order KdV equations
by Rajan Arora & Hariom Sharma - 139-146 Stacked arrangement of meandered patches for biomedical applications
by Love Jain & Raghvendra Singh & Sanyog Rawat & Kanad Ray - 147-154 An exploratory study to investigate value chain of Saharanpur wooden carving handicraft cluster
by Rohit Yadav & Tripti Mahara - 155-172 A survey of recent advances in vehicle routing problems
by Aderemi Oluyinka Adewumi & Olawale Joshua Adeleke - 173-179 Merging user and item based collaborative filtering to alleviate data sparsity
by Surya Kant & Tripti Mahara - 180-193 Performance measurement of an Indian higher education institute: a sustainable educational supply chain management perspective
by Sunil Kumar Jauhar & Millie Pant & Richa Dutt - 194-207 Security and service assurance issues in Cloud environment
by Prachi Deshpande & S. C. Sharma & Sateesh K. Peddoju & Ajith Abraham - 208-215 Training of neural network for pattern classification using fireworks algorithm
by Asaju La’aro Bolaji & Aminu Ali Ahmad & Peter Bamidele Shola - 216-229 ssFPA/DE: an efficient hybrid differential evolution–flower pollination algorithm based approach
by Meera Ramadas & Millie Pant & Ajith Abraham & Sushil Kumar - 230-244 Software reliability prediction using machine learning techniques
by Arunima Jaiswal & Ruchika Malhotra - 245-261 Recognition of noise source in multi sounds field by modified random localized based DE algorithm
by Pravesh Kumar & Millie Pant - 262-273 Opposition learning based phases in artificial bee colony
by Tarun Kumar Sharma & Preeti Gupta - 274-286 Quality assured and optimized image watermarking using artificial bee colony
by Irshad Ahmad Ansari & Millie Pant - 287-293 Protect botanical plants and pluck botanical products using robotics and image processing
by Om Prakash Dubey & Rani Manisha & Kusum Deep - 294-305 Genetic algorithm designed for solving portfolio optimization problems subjected to cardinality constraint
by Hemant Jalota & Manoj Thakur - 306-311 Optimal advertising on a two-dimensional web banner
by Arshia Kaul & Sugandha Aggarwal & Anshu Gupta & Niraj Dayama & Mohan Krishnamoorthy & P. C. Jha
December 2017, Volume 8, Issue 4
- 663-672 Reliability/environmental impacts of wind energy curtailment due to ramping constraints
by Malhar Padhee & Rajesh Karki - 673-682 Estimation of the Frank copula model for dependent competing risks in accelerated life testing
by Herbert Hove & Frank Beichelt & Parmod K. Kapur - 683-703 A manufacturing system energy-efficient optimisation model for maintenance-production workforce size determination using integrated fuzzy logic and quality function deployment approach
by D. E. Ighravwe & S. A. Oke - 704-718 Two-stage single period inventory management for a manufacturing vendor under green-supplier supply chain
by Marziyeh Karimi & Amir Hossein Niknamfar & Seyed Hamid Reza Pasandideh - 719-739 Assessment of failures in automobiles due to maintenance errors
by Ajith Tom James & O. P. Gandhi & S. G. Deshmukh - 740-746 A joint optimal policy of block preventive replacement and spare part inventory
by Ruifeng Yang & Jianshe Kang - 747-761 Research on digital measurement error and rectification algorithm for mechanical parts
by Zhi-ren Han & Wen-xin Liang & Zhen Jia & Ke Wang - 762-769 An integral sliding mode controller with super-twisting algorithm for direct power control of wind generator based on a doubly fed induction generator
by F. Z. Tria & K. Srairi & M. T. Benchouia & M. E. H. Benbouzid - 770-781 A bi-objective model to optimize periodic preventive maintenance strategy during warranty period by considering customer satisfaction
by Ali Salmasnia & Amin Yazdekhasti - 782-798 Modeling interrelationships between CSF in ERP implementations: total ISM and MICMAC approach
by Shruti Nagpal & Ashok Kumar & Sunil Kumar Khatri - 799-816 Modeling lean maintenance metric using incidence matrix approach
by Shashank Gupta & Piyush Gupta & Aditya Parida - 817-825 NSGA-II based fuzzy multi-objective reliability analysis
by Hemant Kumar & Shiv Prasad Yadav - 826-841 The Bernstein algorithm using the modified implicit Bernstein form and its GPU parallelization using CUDA
by P. S. Dhabe & P. S. V. Nataraj - 842-861 A goal programming approach for multi-objective warranty optimization
by Prashant M. Ambad & Makarand S. Kulkarni - 862-866 The nature of maritime security risk
by Amit J. Mokashi & Ajit Kumar Verma - 2045-2045 Preamble
by Ajit K. Verma & Rehan Sadiq & Ashok Deshpande - 2046-2050 Ranking discrete fuzzy linguistic performance based on TODIM method
by Shiyu Chen & Hongming Mo & Dongbo Pan & Rehan Sadiq & Yong Deng - 2051-2063 A comparison of membership function shapes in a fuzzy-based fugacity model for disinfection byproducts in indoor swimming pools
by Roberta Dyck & Rehan Sadiq & Manuel Rodriguez & Sabrina Simard & Robert Tardif - 2064-2070 Fault tree analysis based on TOPSIS and triangular fuzzy number
by Hongping Wang & Xi Lu & Yuxian Du & Chenwei Zhang & Rehan Sadiq & Yong Deng - 2071-2082 An integrated fuzzy algorithm approach to factory floor design incorporating environmental quality and health impact
by Ali Azadeh & Sahar Jebreili & Elizabeth Chang & Morteza Saberi & Omar Khadeer Hussain - 2083-2096 Computational intelligence based models for prediction of elemental composition of solid biomass fuels from proximate analysis
by Suhas B. Ghugare & Shishir Tiwary & Sanjeev S. Tambe - 2097-2108 Early software reliability analysis using reliability relevant software metrics
by Harikesh Bahadur Yadav & Dilip Kumar Yadav - 2109-2117 Software defects estimation using metrics of early phases of software development life cycle
by Chandan Kumar & Dilip Kumar Yadav - 2118-2128 Can fuzzy set theory bring complex issues in sizing air quality monitoring network into focus?
by Kamal Jyoti Maji & Anil Kumar Dikshit & Ashok Deshpande - 2129-2136 An algorithm for solving fuzzy advection diffusion equation and its application to transport of radon from soil into buildings
by D. Datta - 2137-2145 Application of neuro-fuzzy based expert system in water quality assessment
by E. Aghaarabi & F. Aminravan & R. Sadiq & M. Hoorfar & M. J. Rodriguez & H. Najjaran - 2146-2157 Computational intelligence framework for context-aware decision making
by Adithya Thaduri & Uday Kumar & Ajit Kumar Verma - 2158-2169 Optimal power flow using artificial bee colony algorithm with global and local neighborhoods
by Jagdish Chand Bansal & Shimpi Singh Jadon & Ritu Tiwari & Deep Kiran & B. K. Panigrahi - 2170-2183 A new guiding force strategy for differential evolution
by Hira Zaheer & Millie Pant & Sushil Kumar & Oleg Monakhov & Emilia Monakhova & Kusum Deep
November 2017, Volume 8, Issue 3
- 1959-1960 Preface
by Taihoon Kim & Mincong Tang - 1961-1965 Road segment hiding algorithm of preventing replay attack under road network environment
by Wen Chen - 1966-1975 A cloud-user behavior assessment based dynamic access control model
by Xu Jing & Zhengnan Liu & Shuqin Li & Bin Qiao & Gexu Tan - 1976-1980 Network traffic prediction based on improved support vector machine
by Qi-ming Wang & Ai-wan Fan & He-sheng Shi - 1981-1988 A bin packing problem of the laundry washing buckets scheduling based on the buffer area
by Quanming Cheng & Sen Wu & Yang Zhao - 1989-2000 Application of improved unascertained mathematical model in security evaluation of civil airport
by Jia-ni Zhao & Li-na Shi & Li Zhang - 2001-2008 Causes analysis and risk control of firm knowledge loss
by Bo Shen & Youwei Ke - 2009-2016 Online mechanism with latest-reservation for dynamic VMs allocation in private cloud
by Yonggen Gu & Jie Tao & Xiaohong Wu & Xiaolong Ma - 2017-2029 A new publicly verifiable blind detection scheme for intellectual property protection
by Wei Liang & Jing Long & Xuhui Chen & Yongkai Fan & Weidong Xiao - 2030-2035 The model of information security risk assessment based on advanced evidence theory
by Hou Qing & Xie Qingsheng & Li Shaobo - 2036-2043 Research on the development of China’s emergency industry based on system dynamics theory
by Pengyu Ding & Shujun Ye
September 2017, Volume 8, Issue 3
- 529-531 Special issue of IREC2016 conference selected papers
by Mohammad Pourgol-Mohammad & Alireza Ahmadi - 532-541 Reliability analysis of multi-state emergency detection system using simulation approach based on fuzzy failure rate
by Mohammad Nadjafi & Mohammad Ali Farsi & Hossein Jabbari - 542-552 Evaluating MTTF of 2-out-of-3 redundant systems with common cause failure and load share based on alpha factor and capacity flow models
by Seyed Mohammad Mortazavi & Mahdi Karbasian & Sareh Goli - 553-559 Change points estimations of bathtub-shaped hazard functions
by Robab Aghazadeh Chakherloo & Mohammad Pourgol-Mohammad & Kamran Sepanloo - 560-571 Reliable flight computer for sounding rocket with dual redundancy: design and implementation based on COTS parts
by Ghasem Kahe - 572-583 Design for reliability of automotive systems; case study of dry friction clutch
by Mohammad Pourgol-Mohammad & Amirmohsen Hejazi & Morteza Soleimani & Pejman Ghasemi & Alireza Ahmadi & Davoud Jalali-Vahid - 584-593 Risk assessment of sensor failures in a condition monitoring process; degradation-based failure probability determination
by Farzin Salehpour-Oskouei & Mohamad Pourgol-Mohammad - 594-601 Gas turbine preventive maintenance optimization using genetic algorithm
by Fatemeh Moinian & Hamed Sabouhi & Jafar Hushmand & Ahmad Hallaj & Hiwa Khaledi & Mojtaba Mohammadpour - 602-611 Risk based maintenance strategy: a quantitative approach based on time-to-failure model
by Ali Nouri Gharahasanlou & Mohammad Ataei & Reza Khalokakaie & Abbas Barabadi & Vahid Einian - 612-624 Effects of shutdown period extension on core damage frequency
by Shahabeddin Kamyab & Faramarz Yousefpour & Alireza Yousefi & Kaveh Karimi - 625-634 Probabilistic analysis of containment structural performance in severe accidents
by Seyed Mojtaba Hoseyni & Seyed Mohsen Hoseyni & Faramarz Yousefpour & Kaveh Karimi - 635-645 Evaluating thermo-hydraulics uncertainties of success criteria in probabilistic risk assessment
by Seyed Mohsen Hoseyni & Kaveh Karimi & Faramarz Yousefpour - 646-654 Identification of plastic properties of metallic structures by artificial neural networks based on plane strain small punch test
by Mohammad Ehsan Hassani & Wenke Pan - 655-662 Brain tumor growth simulation: model validation through uncertainty quantification
by N. Meghdadi & H. Niroomand-Oscuii & M. Soltani & F. Ghalichi & M. Pourgolmohammad
June 2017, Volume 8, Issue 2
- 197-204 Outage probability analysis and design of routing algorithm for Space Time Cooperation
by Sindhu Hak Gupta & R. K. Singh & S. N. Sharan - 205-222 Maintainability prediction of web service using support vector machine with various kernel methods
by Lov Kumar & Mukesh Kumar & Santanu Ku. Rath - 223-241 Setup cost reduction EMQ inventory system with probabilistic defective and rework in multiple shipments management
by S. Priyan & R. Uthayakumar - 242-252 Generating and evaluating effectiveness of test sequences using state machine
by Vikas Panthi & Durga Prasad Mohapatra - 253-263 Modelling and analysis of agile manufacturing system by ISM and MICMAC analysis
by Rahul Sindhwani & Vasdev Malhotra - 264-274 Construction of t-way covering arrays using genetic algorithm
by Sangeeta Sabharwal & Priti Bansal & Nitish Mittal - 275-286 A Hybrid Big Bang–Big Crunch optimization algorithm for solving the different economic load dispatch problems
by Yacine Labbi & Djilani Ben Attous - 287-300 Virtual flux direct power control of the three-level NPC shunt active power filter based on backstepping control
by M. Bouzidi & A. Benaissa & S. Barkat & S. Bouafia & A. Bouzidi - 301-307 Power swing blocking (PSB) function for distance relay using prediction technique
by A. V. Koteswara Rao & Aziz Ahmad - 308-317 Diagnosis and detection of short circuit in asynchronous motor using three-phase model
by Saadi Sakhara & Salah Saad & Leila Nacib - 318-333 Assessing lifetime performance index of Weibull distributed products using progressive type II right censored samples
by Sanku Dey & Vikas Kumar Sharma & M. Z. Anis & Babita Yadav - 334-351 Prediction of defect severity by mining software project reports
by Rajni Jindal & Ruchika Malhotra & Abha Jain - 352-377 An investigation on the effect of cross project data for prediction accuracy
by Aarti & Geeta Sikka & Renu Dhir - 378-392 Mathematical model on vulnerability characterization and its impact on network epidemics
by Kaushik Haldar & Bimal Kumar Mishra - 393-407 Components integration-effect graph: a black box testing and test case generation technique for component-based software
by Umesh Kumar Tiwari & Santosh Kumar - 408-422 Analyzing the factors affecting the flexibility in FMS using weighted interpretive structural modeling (WISM) approach
by Suman Gothwal & Tilak Raj - 423-431 Reliability indices of a redundant system with standby failure and arbitrary distribution for repair and replacement times
by R. K. Bhardwaj & Komaldeep Kaur & S. C. Malik - 432-444 Optimum surface roughness evaluation of dies steel H-11 with CNC milling using RSM with desirability function
by Mandeep Chahal & Vikram Singh & Rohit Garg - 445-457 Analysis of maintenance cost for an asset using the genetic algorithm
by Mohammad Asjad & Shahbaz Khan - 458-467 Tool life management of unmanned production system based on surface roughness by ANFIS
by Vineet Jain & Tilak Raj - 468-478 The exponentiated Perks distribution
by Bhupendra Singh & Neha Choudhary - 479-487 Performability of solar thermal power plant under reliability characteristics
by Nupur Goyal & Mangey Ram & Ajay Kaushik - 488-492 Ratio estimators for the finite population mean under simple random sampling and rank set sampling
by Monika Saini & Ashish Kumar - 493-514 An approach to solve the target coverage problem by efficient deployment and scheduling of sensor nodes in WSN
by Devesh Pratap Singh & Bhaskar Pant - 515-527 Quantifying the quality of higher and technical education: salient perspectives
by Vivek B. Kamat & Jayant K. Kittur
November 2017, Volume 8, Issue 2
- 555-575 Energy efficient clearance routing in WSN
by Devesh Pratap Singh & R. H. Goudar - 576-576 Erratum to: Energy efficient clearance routing in WSN
by Devesh Pratap Singh & R. H. Goudar - 577-584 A proposed quantitative approach to classify brain MRI
by Madhulika Bhatia & Abhay Bansal & Divakar Yadav - 585-591 Optimum quadratic step-stress accelerated life test plan for Weibull distribution under type-I censoring
by N. Chandra & Mashroor Ahmad Khan & G. Gopal - 592-598 Differential relay reliability enhancement using fourth harmonic for a large power transformer
by Rachid Bouderbala & Hamid Bentarzi - 599-616 An empirical study of software entropy based bug prediction using machine learning
by Arvinder Kaur & Kamaldeep Kaur & Deepti Chopra - 617-630 Evaluation of benchmarking attribute for service quality using multi attitude decision making approach
by Bhupender Singh & Sandeep Grover & Vikram Singh - 631-644 SECSIX: security engine for CSRF, SQL injection and XSS attacks
by Bharti Nagpal & Naresh Chauhan & Nanhay Singh - 645-655 A redundancy strategy for minimizing cost in systems with non-disjoint subsystems under reliability constraint
by Debasis Bhattacharya & Soma Roychowdhury - 656-662 Reliability prediction of smart pressure transmitter for use in NPPs
by Y. Munindra Reddy & Rajendraprasad Narne & T. V. Santhosh & V. Gopika & N. B. Shreshta - 663-675 Contribution to improve the dynamic control of a binary distillation column
by Riad Bendib & Hamid Bentarzi - 676-689 Evaluation of gas turbine power plant efficiency using graph theoretic approach
by Nikhil Dev & Rajesh Kumar Attri - 690-702 Performance evaluation of various MANET routing protocols for adaptability in VANET environment
by Kamlesh Chandra Purohit & Sushil Chandra Dimri & Sanjay Jasola - 703-715 Empirical analysis of metrics for object oriented multidimensional model of data warehouse using unsupervised machine learning techniques
by Sangeeta Sabharwal & Sushama Nagpal & Gargi Aggarwal - 716-729 MAQM: a generic object-oriented framework to build quality models for Web-based applications
by Nimish Kumar & Reena Dadhich & Aditya Shastri - 730-733 New cloud offloading algorithm for better energy consumption and process time
by R. Aldmour & S. Yousef & M. Yaghi & S. Tapaswi & K. K. Pattanaik & M. Cole - 734-757 Economic ordering policy for single item inventory model over finite time horizon
by R. Udayakumar & K. V. Geetha - 758-764 Voice performance analysis using voice codec by packet fragmentation and contention free periods in wireless networks
by M. Fakrudeen & S. Yousef & S. Tapaswi & K. K. Patnaik & M. Cole - 765-772 Functional testing and performance assessment of smart pressure transmitters used in NPPs
by Yernagu Satheesh Kumar Reddy & K. V. R. B. Prasad & Gopika Vinod & N. B. Shrestha - 773-787 A fast and reliable perturb and observe maximum power point tracker for solar PV system
by Ahteshamul Haque & Zaheeruddin - 788-798 Sliding mode control of grid connected brushless doubly fed induction generator driven by wind turbine in variable speed
by M. Abdelbasset Mahboub & Said Drid & M. A. Sid & Ridha Cheikh - 799-810 Bayesian estimation on interval censored Lindley distribution using Lindley’s approximation
by Vikas Kumar Sharma & Sanjay Kumar Singh & Umesh Singh & Khair Ul-Farhat - 811-822 Preventive maintenance task balancing with spare parts optimisation via big-bang big-crunch algorithm
by D. E. Ighravwe & S. A. Oke & K. A. Adebiyi - 823-835 Tri-service model: a concept of service quality
by Indu Uprety & Amit Chaudhary - 836-848 Estimation and testing procedures for the reliability functions of a family of lifetime distributions based on records
by Ajit Chaturvedi & Ananya Malhotra - 849-856 Optimum simple accelerated life tests based on progressively Type-I hybrid censoring
by Chunfang Zhang & Yimin Shi - 857-866 Cell-like P-systems using deterministic update rules to solve Sudoku
by Garima Singh & Kusum Deep - 867-885 Constrained Laplacian biogeography-based optimization algorithm
by Vanita Garg & Kusum Deep - 886-909 A guideline for software architecture selection based on ISO 25010 quality related characteristics
by Mariem Haoues & Asma Sellami & Hanêne Ben-Abdallah & Laila Cheikhi - 910-924 Root cause analysis and reliability improvement methods for orbital TIG welding process for propulsion feed system of satellites
by M. Karthikeyan & V. N. A. Naikan & R. Narayan - 925-936 Hybrid algorithm DE–TLBO for optimal H∞ and PID control for multi-machine power system
by Faiza Dib & Ismail Boumhidi - 937-953 A survey of machine-learning and nature-inspired based credit card fraud detection techniques
by Aderemi O. Adewumi & Andronicus A. Akinyelu - 954-960 Research on the adaptability evaluation model for emergency response plan based on 2-tuple linguistic
by Tiejun Cheng & Qianli Xu & Fengping Wu - 961-973 A fuzzy-grey-weighted aggregate sum product assessment methodical approach for multi-criteria analysis of maintenance performance systems
by D. E. Ighravwe & S. A. Oke - 974-982 Identifying and eliminating less complex instances from software fault data
by Raed Shatnawi - 983-989 Development of low cost instrumentation to monitor coasting-down time of rotating shaft
by Piyush Gupta & R. N. Dutt & O. P. Gandhi - 990-1007 An evaluation of maintenance practices in Kenya: preliminary results
by A. K. Muchiri & B. W. Ikua & P. N. Muchiri & P. K. Irungu & K. Kibicho - 1008-1025 A new framework to model and analyze organizational aspect of safety control structure
by Ahmad Dehghan Nejad & Reza Gholamnia & Ahmad Alibabaee