Content
Undated material is presented at the end, although it may be more recent than other items
March 2024, Volume 15, Issue 3
- 775-785 Fault prediction of pneumatic valves in an LNG plant by the DGM(1, 1) model
by Yan Chen & Junyi Qiu & Mengyi Wang & Jiaqi Rao & Tian Xia & Yuan Yang - 786-799 Deep learning based active image steganalysis: a review
by Punam Bedi & Anuradha Singhal & Veenu Bhasin - 800-838 A systematic literature review on soft computing techniques in cloud load balancing network
by Sarita Negi & Devesh Pratap Singh & Man Mohan Singh Rauthan - 839-853 Modified pavement condition assessment model for asphalt concrete pavements
by Pradeep Kumar & Madhavendra Sharma - 854-870 Consequence severity-probability importance measure for fault tree analysis
by Mei Y. Lau & Yunmei Liu & David B. Kaber - 871-897 Overcoming ignorance and the unknown in UAE projects: the role of improvisation
by Alya J. Abuseem & Udechukwu Ojiako & Fikri T. Dweiri - 898-916 Solving a fuzzy backlogging economic order quantity inventory model using volume of a fuzzy Hasse diagram
by Sujit Kumar De & Moumita Ojha - 917-930 Application of continuous wavelet transform based on Fast Fourier transform for the quality analysis of arc welding process
by Vikas Kumar & Subhadip Ghosh & Manoj Kumar Parida & Shaju K. Albert - 931-949 Agglomeration of deep learning networks for classifying binary and multiclass classifications using 3D MRI images for early diagnosis of Alzheimer’s disease: a feature-node approach
by Rashmi Kumari & Subhranil Das & Raghwendra Kishore Singh - 950-956 1-bit full adder design using next generation semiconductor devices and performance benchmarking at low supply voltages
by S. Lakshmanachari & Sadulla Shaik & G. S. R. Satyanarayana & Inapudi Vasavi & Vallabhuni Vijay & Chandra Shekar Pittala - 957-963 The influence of social media on investment decision-making: examining behavioral biases, risk perception, and mediation effects
by N. Sathya & C. Prabhavathi - 964-980 Hybrid deep neural network with clustering algorithms for effective gliomas segmentation
by Akshya Kumar Sahoo & Priyadarsan Parida & K. Muralibabu - 981-1014 Bug summary entropy based training candidates identification in cross project severity prediction
by Meera Sharma & Madhu Kumari & V. B. Singh - 1015-1036 Bayesian and classical inference in Maxwell distribution under adaptive progressively Type-II censored data
by Anita Kumari & Kapil Kumar & Indrajeet Kumar - 1037-1056 Enhancing facial expression recognition through generative adversarial networks-based augmentation
by Rajneesh Rani & Shefali Arora & Vipan Verma & Shilpa Mahajan & Ruchi Sharma - 1057-1069 A trust and optimal energy efficient data aggregation scheme for wireless sensor networks using QGAOA
by R. Nandha Kumar & P. Srimanchari - 1070-1085 A framework for software vendor selection by applying Inconsistency and Conflict Removal (ICR) method
by Anshul Rani & Deepti Mishra & Aida Omerovic - 1086-1097 Road safety analysis framework based on vehicle vibrations and sounds using deep learning techniques
by Permanki Guthu Rithesh Pakkala & R. Akhila Thejaswi & Bellipady Shamantha Rai & H. R. Nagesh - 1098-1108 Optimizing aging assets replacement in power systems
by Aidin Shaghaghi & Mohammad Taghitahooneh & Reza Dashti - 1109-1118 OptiCom: a joint optimization and compliance assurance method for resource management at SaaS level
by Leila Helali - 1119-1146 ECG signal analysis using autoregressive modelling with and without baseline wander
by Varun Gupta & Nitin Kumar Saxena & Abhas Kanungo & Sourav Diwania & Parvin Kumar & Vaishali Gupta - 1147-1171 Neutrosophic trade-credit EOQ model for deteriorating items considering expiration date of the items using different variants of particle swarm optimizations
by Puja supakar & Nirmal Kumar & Sanat Kumar Mahato & Pintu Pal - 1172-1182 Evaluation and prediction of impact of noise on a worker in noisy environment by using ANFIS model
by Tushar Kanta Mahapatra & Suchismita Satapathy & Subrat Kumar Panda - 1183-1202 An imperfect production model with shortage and screening constraint under time varying demand
by Madhusudan Dolai & Shyamal Kumar Mondal - 1203-1209 Do debt, and operating efficiency contributes to corporate performance?
by Prince Bhatia & Rahul Kumar - 1210-1230 Deceptive opinion spam detection using feature reduction techniques
by Sushil Kumar Maurya & Dinesh Singh & Ashish Kumar Maurya - 1231-1244 Energy consumption prediction of a smart home using non-intrusive appliance load monitoring
by Lazhar Chabane & Said Drid & Larbi Chrifi-Alaoui & Laurant Delahoche - 1245-1260 Reliability modelling using ranking algorithm for parameter evaluation
by Shalini Sharma & Naresh Kumar & Kuldeep Singh Kaswan - 1261-1272 Estimation of the reliability parameter for a Poisson-exponential stress-strength model
by Alessandro Barbiero - 1273-1284 Application of decision system design based on improved association rules in rural social security
by Dengpan Sun - 1285-1293 State-of-art design: data selectors using quantum-dot cellular automata
by Menda Sreevani & Vallabhuni Vijay & Kancharapu Chaitanya & Chelle Radhika & Nandi Manjula & D. Radha Krishna Koushik & B. Sai Venumadhav & T. Sai Jaideep & Chandra Shaker Pittala & Sadulla Shaik - 1294-1304 Wafer defect identification with optimal hyper-parameter tuning of support vector machine using the deep feature of ResNet 101
by Santi Kumari Behera & Shishir Prasad Dash & Rajat Amat & Prabira Kumar Sethy - 1305-1314 Modified chain group sampling inspection plan under item failure scenario based on time truncated scheme
by Harsh Tripathi & Mahendra Saha - 1315-1324 Case study for failure analysis and prevention in subsea axial check valves used on chemical injection lines
by Karan Sotoodeh
February 2024, Volume 15, Issue 2
- 577-577 Preface
by Gurdeep S. Hura & Deepak Kumar Gupta - 578-590 Malicious host detection and classification in cloud forensics with DNN and SFLO approaches
by G. Nandita & T. Munesh Chandra - 591-608 Forecasting US stock price using hybrid of wavelet transforms and adaptive neuro fuzzy inference system
by Dinesh K. Sharma & H. S. Hota & Aaron R. Rababaah - 609-620 Routing decisions for Buddhist pilgrimage: an elitist genetic algorithm approach
by Rabin K. Jana & Dinesh K. Sharma & Subrata K. Mitra & Bidushi Chakraborty - 621-634 Inter project defect classification based on word embedding
by Sushil Kumar & Meera Sharma & S. K. Muttoo & V. B. Singh - 635-645 Modelling the enablers for adoption of electric vehicles in India
by Anshu Gupta & Ananya Garg - 646-671 Model development for assessing inhibitors impacting Industry 4.0 implementation in Indian manufacturing industries: an integrated ISM-Fuzzy MICMAC approach
by Rimalini Gadekar & Bijan Sarkar & Ashish Gadekar - 672-686 Application of artificial bee colony algorithm on a green production inventory problem with preservation for deteriorating items in neutrosophic fuzzy environment
by Puja Supakar & Amalesh Kumar Manna & Sanat Kumar Mahato & Asoke Kumar Bhunia - 687-704 A multi-criteria cloud selection model based on fuzzy logic technique for QoS
by Mohammad Faiz & A. K. Daniel - 705-712 Fuzzy goal programming approach to solve fully fuzzy multi-objective quadratic programming problem
by Admasu Tadesse & M. M. Acharya & Srikumar Acharya & Manoranjan Sahoo - 713-726 Extractive text summarization of arabic multi-document using fuzzy C-means and Latent Dirichlet Allocation
by Ahmad T. Al-Taani & Sami H. Al-Sayadi - 727-744 Multi-objective multi-item four dimensional green transportation problem in interval-valued intuitionistic fuzzy environment
by Shivani & Deepika Rani - 745-757 Synergic impact of development cost and slippage cost on software delivery time
by Neha Neha & Abhishek Tandon & Gurjeet Kaur & Anu Gupta Aggarwal - 758-773 Influences of Indian postal service quality factors on customer satisfaction amidst Covid-19 pandemic: an empirical study
by Sengazhani Murugesan Vadivel & Kirubaharan Boobalan
January 2024, Volume 15, Issue 1
- 1-12 Improved face recognition method using SVM-MRF with KTBD based KCM segmentation approach
by Rangayya & Virupakshappa & Nagabhushan Patil - 13-20 Effective ensemble learning approach for large-scale medical data analytics
by Lakshmana Rao Namamula & Daniel Chaytor - 21-27 Intelligent edge based smart farming with LoRa and IoT
by S. Raja Gopal & V. S. V. Prabhakar - 28-34 Utilization of IoT-assisted computational strategies in wireless sensor networks for smart infrastructure management
by K. M Karthick Raghunath & Manjula Sanjay Koti & R. Sivakami & V. Vinoth Kumar & Grande NagaJyothi & V. Muthukumaran - 35-48 An adaptive teaching learning based optimization technique for feature selection to classify mammogram medical images in breast cancer detection
by L. Kanya Kumari & B. Naga Jagadesh - 49-59 Improved invasive weed-lion optimization-based process mining of event logs
by Swapna Neerumalla & L. Rama Parvathy - 60-72 Cloud storage based diagnosis of breast cancer using novel transfer learning with multi-layer perceptron
by Gul Shaira Banu Jahangeer & T. Dhiliphan Rajkumar - 73-83 Modified Otsu thresholding based level set and local directional ternary pattern technique for liver tumor segmentation
by Deepak S. Uplaonkar & Virupakshappa & Nagabhushan Patil - 84-97 An enhanced and hybrid fingerprint minutiae feature extraction method for identifying and authenticating the patient’s noisy fingerprint
by R. Raghavan & K. John Singh - 98-109 A novel way to compute association rules
by S. J. Vivekanandan & G. Gunasekaran - 110-123 Feature selection method on twitter dataset with part-of-speech (PoS) pattern applied to traffic analysis
by B. Mounica & K. Lavanya - 124-134 An MRI brain tumour detection using logistic regression-based machine learning model
by Srinivasarao Gajula & V. Rajesh - 135-151 A machine intelligence technique for predicting cardiovascular disease (CVD) using Radiology Dataset
by K. Saikumar & V. Rajesh - 152-160 Stochastic analysis approach of extended H-infinity filter for state estimation in uncertain sea environment
by Guduru Naga Divya & Sanagapallea Koteswara Rao - 161-173 Deep scalable and distributed restricted boltzmann machine for recommendations
by R. R. S. Ravi Kumar & G. Apparao & S. Anuradha - 174-187 Face recognition with illumination, scale and rotation invariance using multiblock LTP-GLCM descriptor and adaptive ANN
by Sachinkumar Veerashetty & Virupakshappa & Ambika - 188-197 Early predictive model for breast cancer classification using blended ensemble learning
by T. R. Mahesh & V. Vinoth Kumar & V. Vivek & K. M. Karthick Raghunath & G. Sindhu Madhuri - 198-204 Inter-domain learning for signal de-generation and validation on S-glass composite in performance estimation
by Chevuru Rajya lakshmi & G. V. Subba Rao - 205-215 QoS based soft computing techniques for evaluating efficient web service recommendation
by S. Senthil Kumar & P. K. Manoj Kumar & S. Arockia Panimalar & J. Vinoj - 216-231 An ensemble classification and binomial cumulative based PCA for diagnosis of parkinson’s disease and autism spectrum disorder
by A. Syed Haroon & T. Padma - 232-242 Secure two fold transmission of features using multimodal mask steganography and naive based random visual cryptography system
by S. Jahnavi & C. Nandini - 243-252 Detection of communicable and non-communicable disease using Lenet-Bi-Lstm model in pathology images
by C Nandini & Shiva Sumanth Reddy - 253-266 A case study for performance analysis of big data stream classification using spark architecture
by B. Srivani & N. Sandhya & B. Padmaja Rani - 267-278 Integrated GIS and AHP techniques for land suitability assessment of cotton crop in Perambalur District, South India
by Subbarayan Sathiyamurthi & Subbarayan Saravanan & Ramanarayan Sankriti & Manjunath Aluru & Sankaralingam Sivaranjani & Ravi Srivel - 279-286 Classification of user’s review using modified logistic regression technique
by Raghavendra Reddy & U. M. Ashwin Kumar - 287-299 Trust-based support vector regressive (TSVR) security mechanism to identify malicious nodes in the Internet of Battlefield Things (IoBT)
by P. Rutravigneshwaran & G. Anitha & K. Prathapchandran - 300-313 Analysis of feature selection techniques for prediction of boiler efficiency in case of coal based power plant using real time data
by Sailaja Thota & Muzamil Basha Syed - 314-323 Hyper-heuristic multi-objective online optimization for cyber security in big data
by Mohammed Ahmed & G. Rama Mohan Babu - 324-333 Smart and interactive healthcare system based on speech recognition using soft margin formulation and kernel trick
by Jalawi Sulaiman Alshudukhi - 334-345 Effective ensembling classification strategy for voice and emotion recognition
by Yasser Alharbi - 346-355 Big data analytics on the impact of OMICRON and its influence on unvaccinated community through advanced machine learning concepts
by Amalraj Irudayasamy & D. Ganesh & M. Natesh & N. Rajesh & Umi Salma - 356-366 Adaptive error approximate data reconciliation technique for healthcare framework
by S. Satheesh Kumar & Manjula Sanjay Koti - 367-381 Blockchain Based Epsilon Greedy and Hadamard Gradient Deep Secured Information Sharing for Pharma Supply Chain
by P. Anitha & C. Srimathi - 382-390 Prediction of target state using angles-only ensemble Kalman filter
by M. Kavitha Lakshmi & S. Koteswara Rao & K. Subrahmanyam - 391-411 Development of fading channel patch based convolutional neural network models for customer churn prediction
by Seema & Gaurav Gupta - 412-428 Multi-level classification technique for diagnosing osteoporosis and osteopenia using sequential deep learning algorithm
by T. Ramesh & V. Santhi - 429-438 Automatic detection of vocal cord disorders using machine learning method for healthcare system
by Kusum Yadav - 439-448 Fusion of hyperspectral and multispectral images based on principal component analysis and guided bilateral filtering
by Gunnam Suryanarayana & Bellamkonda Saidulu & Majeti Ratna Hari Priya & Kumpati Likhitha & Kumbha Pragathi & K. M. R. K. Srikanth - 449-461 Computer aided diagnostic support system for skin cancer using ELM classifier
by D. Jayalakshmi & J. Dheeba - 462-474 Machine learning based fault-oriented predictive maintenance in industry 4.0
by Vivek Justus & G. R. Kanagachidambaresan - 475-488 Predicting human behavior from social media using mRMR with COA
by Murari Devakannan Kamalesh & B. Bharathi - 489-502 A deep neural architecture for SOTA pneumonia detection from chest X-rays
by Sravani Nalluri & R. Sasikala - 503-518 Flexible access control mechanism for cloud stored EHR using consortium blockchain
by C. Eben Exceline & Sivakumar Nagarajan - 519-531 Classification of normal and abnormal overlapped squamous cells in pap smear image
by T. P. Deepa & A. Nagaraja Rao - 532-540 An intelligent deep learning LSTM-DM tool for finger vein recognition model USING DSAE classifier
by M. V. Madhusudhan & V. Udayarani & Chetana Hegde - 541-552 An efficient management education in developing women entrepreneurial aspirations
by Bharti Ayer & Dara Vijaya Lakshmi & Anita Mathew & M. Saradha & Sujayalakshmi Devarayasamudram & R. Karthik - 553-563 A combined deep CNN-lasso regression feature fusion and classification of MLO and CC view mammogram image
by V. Sridevi & J. Abdul Samath - 564-576 LQETA-RP: link quality based energy and trust aware routing protocol for wireless multimedia sensor networks
by G. Kirubasri & S. Sankar & M. S. Guru Prasad & G. Naga Chandrika & Somula Ramasubbareddy
December 2023, Volume 14, Issue 6
- 2019-2030 Demystifying sustainability challenges for the energy sector in developing economy
by Geetika Nair & Kshamta Chauhan & Vernika Agarwal & Prakash Bhatia - 2031-2047 E-textiles: a revolutionary technology
by Mohammad Mudassir Ahmad & Kiran Ahuja - 2048-2065 A bibliographic overview of financial engineering in the emerging financial market
by Jyoti Ranjan Jena & Saroj Kanta Biswal & Avinash K. Shrivastava & Rashmi Ranjan Panigrahi - 2066-2079 Efficiency enhancement of thresher by auto-controlling the cylinder clearance
by Rahul S. Warghane & Rajkumar Easwara Pillai - 2080-2087 A critical evaluation in analysing the influence of data analytics in enhancing supply chain management process through multiple regression analysis
by Hari Govind Mishra & Kumar Ratnesh & Korakod Tongkachok & Joel Alanya-Beltran & Dhiraj Kapila - 2088-2094 Ethical behavior a thought for defining loyalty in an offline
by Namita Rajput & Urvashi Sharma & Baljeet Kaur & Korakod Tongkachok & Venkata Harshavardhan Reddy Dornadula & Dharini Raje Sisodia - 2095-2119 Analyzing the effect of green human resource management to attain organizational sustainability
by Sandesh Deelip Tari & Rajanala Nirmala - 2120-2135 Review the role of artificial intelligence in detecting and preventing financial fraud using natural language processing
by Pallavi Sood & Chetan Sharma & Shivinder Nijjer & Sumit Sakhuja - 2136-2145 Stability analysis of multi-machine system using FACTS devices
by Manoj Kumar Kar - 2146-2159 A Markov-based model to mitigate human errors occurrence during maintenance activities in petrochemical systems
by Laith A. Hadidi & Ahmed Ghaithan & Awsan Mohammed & Naif Alhwoaikan - 2160-2175 Vibration analysis of BLDC motor drive employing model reference adaptive controller
by N. Veeramuthulingam & A. Ezhilarasi & M. Ramaswamy - 2176-2186 State of the art design of adder modules: performance validation of GDI methodology for energy harvesting applications
by Puli Raju & Vallabhuni Vijay & P. Ashok Babu & P. Sridhar - 2187-2207 A multi objective optimization modeling in WSN for enhancing the attacking efficiency of node capture attack
by Priyanka Ahlawat & Rohit Bathla - 2208-2217 Improved deep learning algorithm with innovation perspective: a prediction model of the mortality of respiratory infections
by Usharani Bhimavarapu - 2218-2234 A reward-based performability modelling of a fault-tolerant safety–critical system
by Shakeel Ahamad & Ratneshwer Gupta - 2235-2266 Sensitive crop leaf disease prediction based on computer vision techniques with handcrafted features
by Manoj A. Patil & Manohar Manur - 2267-2275 Development of a new task scheduling in cloud computing
by Nidhi Bansal & Ajay Kumar Singh - 2276-2288 An aspect of bilevel interval linear fractional transportation problem with disparate flows: a fuzzy programming approach
by Ritu Arora & Chandra K. Jaggi - 2289-2300 Rfpssih: reducing false positive text detection sequels in scenery images using hybrid technique
by Avaneesh Kumar Yadav & Animesh Sharma & Vikas Yadav & Neha Kalia - 2301-2311 Conflict management strategies: an empirical study on industrial conflict effect on employees' productivity
by S. Muthumani & M. Manoj Kumar - 2312-2328 Engineering agility in technology IoT projects
by Madhukar Rajaram Patil & M. Suresh - 2329-2336 The effectiveness of research and development tax incentives in India: a quasi-experimental approach
by Aakanksha Kaushik - 2337-2344 Termination detection in cloud
by Bharati Sinha & Awadhesh Kumar Singh & Poonam Saini - 2345-2353 Concurrent fault localization using ANN
by Debolina Ghosh & Jay Prakash Singh & Jagannath Singh - 2354-2364 Design of XGBoost prediction model for financial operation fraud of listed companies
by Yi Liu - 2365-2375 Integrating Burr type testing effort functions in logistic reliability growth model with uncertainty factor
by Javaid Iqbal & Nyla Manzoor & Avinash K. Shrivastava & Ishfaq A. Malik - 2376-2386 A mathematical model based on modified ID3 algorithm for healthcare diagnostics model
by Arun Agarwal & Khushboo Jain & Rakesh Kumar Yadav - 2387-2394 Novel architecture of FFT implementation for 5G module using machine learning algorithms
by Nagarjuna Malladhi & K. Narsimha Reddy & Rajeev Ratna Vallabhuni - 2395-2409 Study on proposed respectively method for marine propulsion plant system: a case study on passenger ship
by Tien Anh Tran - 2410-2422 A probabilistic approach to performance analysis of various subsystems in an Indian sugar plant
by Gaurav Sharma & Subhash Malik & Shakuntla Singla & Shubham Verma - 2423-2446 An efficient deep learning-based solution for network intrusion detection in wireless sensor network
by Hanjabam Saratchandra Sharma & Arindam Sarkar & Moirangthem Marjit Singh - 2447-2459 Congestion avoidance for electrically charged autonomous vehicles in vehicular Ad hoc network
by Kotakonda Madhubabu & N. Snehalatha - 2460-2469 Smith predictor controller design for TCP/AQM
by Richa Sharma & Purushottam Sharma & Deepak Nagaria - 2470-2484 New tuning formulas for a nonlinear PID control scheme
by Yung-Deug Son & Gang-Gyoo Jin & Tefera T. Yetayew & Pikaso Pal - 2485-2496 Formally modeling and verifying a software component retrieval system using mCRL2
by Nisha Pal & Dharmendra Kumar Yadav - 2497-2513 Fuzzy approach for safety integrity level evaluation to improve the safety of an industrial fired heater
by Batout Naoual & Riad Bendib & Zennir Youcef & Ahmed Tedjani - 2514-2526 Coordination analysis of system reliability using NSGA-II: a comparative study
by Hemant Kumar & R. N. Prajapati - 2527-2545 Detection of traffic rule violation in University campus using deep learning model
by Pooja Chaturvedi & Kruti Lavingia & Gaurang Raval - 2546-2558 Estimating the reliability of complex systems using various bounds methods
by Emad Kareem Mutar - 2559-2578 Provisioning trust-oriented role-based access control for maintaining data integrity in cloud
by Urvashi Rahul Saxena & Taj Alam - 2579-2585 Some new coupled fixed point results in complex value b-metric spaces
by Vishal Gupta & Rajani Saini - 2586-2594 Effects of mixed-ground condition on tool life and cutterhead maintenance of tunnel boring machines
by Sayfoddin Moosazadeh & Seyed Hadi Hoseinie & Behzad Ghodrati - 2595-2604 Stubs loaded multi band antenna for vehicle-to-vehicle communication
by T. Aathmanesan - 2605-2625 Design and simulation of six-phase UPFC power quality enhancement with improved GWO based decoupled power control strategy
by Srinivas Nakka & R. Brinda & T. Sairama - 2626-2641 SARS-CoV-2 forecasting using regression and ARIMA
by Chaman Verma & Purushottam Sharma & Sanjay Singla & Abhishek Srivastava & Ruchi Sharma - 2642-2660 Enhancing intrusion detection recursive feature elimination with resampling in WSN
by Ashwini B. Abhale & Jayaram Reddy Avulapalli - 2661-2673 Inference on adaptive Type-II progressive hybrid censoring under partially accelerated life test for Gompertz distribution
by Intekhab Alam & Sadia Anwar & Lalit Kumar Sharma - 2674-2683 A comparative study of machine learning and deep learning algorithms for predicting student’s academic performance
by Megha Bhushan & Satyam Vyas & Shrey Mall & Arun Negi - 2684-2694 A comparative analysis of genetic algorithms on a case study of asymmetric traveling salesman problem
by Amit Raj & Parul Punia & Pawan Kumar - 2695-2719 Analysis of reliability based on preventive maintenance of failures in the VSH-2 mechanical pumping unit for oil extraction
by C. A. Ropero-Gaona & A. Lucas-Marmol
October 2023, Volume 14, Issue 5
- 1587-1598 Optimal DSTATCOM, PVAs and WTGUs allocation for electrical distribution system performance improvement using improved TLBO
by T. Ramana & G. Nageswara Reddy & Kishore Yadlapati & K. Nagaraju & S. Sivanagaraju - 1599-1620 Impact of implementation of CMMS for enhancing the performance of manufacturing industries
by Lakshmi Shankar & Chandan Deep Singh & Ranjit Singh - 1621-1638 Real power loss reduction by Toxotes kimberleyensis, Opposition based Chaotic Septentrion Red Snapper and Charidotella based optimization algorithms
by Lenin Kanagasabai - 1639-1646 An approach to optimize performance of controller in networked control system
by Richa Sharma & Purushottam Sharma & Anshuman Singh & Veer Srivastava - 1647-1659 Data analysis framework of tourism enterprise human resource management system based on MySQL and fuzzy clustering
by Yuan Gao & Ximu Yan - 1660-1670 Design of FOPID controller for higher order MIMO systems using model order reduction
by RamaKoteswara Rao Alla & Kandipati Rajani & Ravindranath Tagore Yadlapalli - 1671-1690 Convexity analysis and cost optimization of a retrial queue with Bernoulli vacation and delayed phase mending
by Shweta Upadhyaya & Richa Sharma & Divya Agarwal & Geetika Malik - 1691-1702 Application and research of computer aided technology in clothing design driven by emotional elements
by Jing Liu - 1703-1717 The significant impact of parameter tuning on blocking bug prediction
by Selasie Aformaley Brown & Benjamin Asubam Weyori & Adebayo Felix Adekoya & Patrick Kwaku Kudjo - 1718-1725 Time-dependent entropic analysis of software bugs
by Kamlesh Kumar Raghuvanshi & Arun Agarwal & Amit Kumar Singh & Khushboo Jain - 1726-1737 Architectural analysis of 1-D to 2-D array conversion of priority encoder
by Alok Kumar Mishra & Shail Anand & Nishant Singh & Vaithiyanathan Dhandapani & Baljit Kaur - 1738-1755 Sustainable inventory management for a closed-loop supply chain with learning effect and carbon emission under the multi-shipment policy
by Amrina Kausar & Ahmad Hasan & Chandra K. Jaggi - 1756-1777 Adaptive remaining useful life prediction framework with stochastic failure threshold for experimental bearings with different lifetimes under contaminated condition
by Bahareh Tajiani & Jørn Vatn - 1778-1798 Failure mode and effects analysis for submersible pump component using proportionate risk assessment model: a case study in the power plant of Agartala
by Pushparenu Bhattacharjee & Syed Abou Iltaf Hussain & V. Dey & U. K. Mandal - 1799-1809 An efficient way to schedule dispersed generators for a microgrid system's economical operation under various power market conditions and grid involvement
by Srikant Misra & P. K. Panigrahi & Bishwajit Dey - 1810-1826 A systematic review of literature on Human capital investment and its significance for human resource development
by Lawrence Arokiasamy & Takemi Fujikawa & Shishi Kumar Piaralal & Thilageswary Arumugam - 1827-1840 Estimation and confidence intervals of a new loss based process capability index $${\mathcal {C}}^{\prime }_{pm}$$ C pm ′ with applications
by Mahendra Saha & Sanku Dey - 1841-1846 Design of compact hybrid profiled corrugated feed horn for SATCOM C band
by Ankit Raj & B M Jha & Ajay Kr. Sharma - 1847-1854 A method to solve Pythagorean fuzzy transportation problems
by Tanveen Kaur Bhatia & Amit Kumar & S. S. Appadoo & M. K. Sharma - 1855-1865 The effect of property rights and staff structure on the labor productivity, evidence of university spin-offs in Hubei Province, China
by Sanhua Sheng & Hua Li & Weijun He & Thomas Stephen Ramsey & Liang Yuan - 1866-1876 Optimal placement and sizing of BESS in RES integrated distribution systems
by Mohan Chaitanya Barla & Dipu Sarkar - 1877-1887 Multi-release testing coverage-based SRGM considering error generation and change-point incorporating the random effect
by Ritu Bibyan & Sameer Anand & Anu G. Aggarwal & Abhishek Tandon - 1888-1897 Uniform mixture designs using designs in 2-dimensional spherical region
by Poonam Singh & Himanshu Shukla - 1898-1911 Machine learning models for damage detection in steel beams
by Shree Harsha & Siddesha Hanumanthappa & Sreedhara B. Marulasiddappa & Sujay Raghavendra Naganna - 1912-1932 Load frequency control with moth-flame optimizer algorithm tuned 2-DOF-PID controller of the interconnected unequal three area power system with and without non-linearity
by Neelesh Kumar Gupta & Arun kumar Singh & Rabindra Nath Mahanty - 1933-1954 Real power loss reduction by enriched great frigatebird, grey forecast and constellation exploration optimization algorithms
by Lenin Kanagasabai - 1955-1960 Enhancing surface quality of SLM produced AlSi10Mg components through chemical polishing
by Ritesh Sharma & Sanjeev Kumar & Rajeev Saha - 1961-1980 Confronting Barriers: An Efficacious Higher Education System Implementation in India
by Sharad Singh & Akhilesh Barve & Saket Shanker & Hritika Sharma - 1981-1989 Quantifying charismatic quality parameters of MAMQ model using fuzzy logic for web development
by Nimish Kumar - 1990-2018 Integration of Lean Six Sigma with Internet of Things (IoT) for productivity improvement: a case study of contactor manufacturing industry
by Santosh B. Rane & Sandesh Wavhal & Prathamesh R. Potdar
December 2023, Volume 14, Issue 4
- 909-917 Effect on wear property of aluminium metal matrix composite reinforced with different solid lubricants: a review
by N. M. Siddesh Kumar - 918-923 Investigation on the impact of the supplier, customer, and organization collaboration factors on the performance of new product development
by S. Murali & M. Balasubramanian & Malepati Vineeth Choudary - 924-929 Application of market–basket analysis on healthcare
by Abishek B. Rao & Jammula Surya Kiran & Poornalatha G - 930-937 An expert system for life cycle assessment of casting process
by Karmjit Singh & Prince Pal Singh & Gopinath Chattopadhyay & Ibrahim A. Sultan - 938-945 RSM based expert system development for cutting force prediction during machining of Ti–6Al–4V under minimum quantity lubrication
by R. Shetty & C. R. Sanjeev Kumar & M. R. Ravindra - 946-953 Modelling uncertainty using neutrosophic sets for precise risk assessment of marine systems
by Sunay P. Pai & Rajesh S. Prabhu Gaonkar - 954-960 Studies on the impact of road freight transport and alternative modes in Australia: a literature study
by L. J. B. Peters & G. Chattopadhyay & M. A. Tuck - 961-979 Condition-based multi-component maintenance decision support under degradation uncertainties
by Abu MD Ariful Islam & Jørn Vatn - 980-989 Predictive maintenance methodology in sheet metal progressive tooling: a case study
by Ashutosh Kolhatkar & Anand Pandey
August 2023, Volume 14, Issue 4
- 1139-1150 A review of integer order PID and fractional order PID controllers using optimization techniques for speed control of brushless DC motor drive
by Vanchinathan Kumarasamy & Valluvan KarumanchettyThottam Ramasamy & Gokul Chandrasekaran & Gnanavel Chinnaraj & Padhmanabhaiyappan Sivalingam & Neelam Sanjeev Kumar - 1151-1182 Deep insight of HR management on work from home scenario during Covid pandemic situation using intelligent: analysis on IT sectors in Tamil Nadu
by Martin Selvakumar Mohanan & Vijayakumar Rajarathinam - 1183-1196 Investigating applicability of green supply chain management in manufacturing sectors
by Om Prakash Mishra & Mahesh Chand & Krishan Kumar & Prashant Mishra - 1197-1207 Legislative optimization algorithm for real power loss diminishing and voltage reliability escalation
by Lenin Kanagasabai - 1208-1217 Implementation of lean six sigma (LSS) techniques for tyre manufacturing in small and medium-sized enterprises
by G. Gokilakrishnan & R. Meenakshi & G. M. Pradeep & R. Kamalakannan & V. Manivelmuralidaran - 1218-1227 Mathematical formulation of multicarrier PWM techniques and design an eleven-level modular multilevel inverter to improve power quality
by Gnanavel Chinnaraj & Vanchinathan Kumarasamy & Muthukumar Paramasivan & Gokul Chandrasekaran & Neelam Sanjeev Kumar - 1228-1246 An efficient sum of disjoint product method for reliability evaluation of stochastic flow networks using d-MPs
by Esha Datta & Neeraj Goyal - 1247-1254 Comparative qualitative analysis and numerical solution of conformable fractional derivative generalized KdV-mKdV equation
by Rajeev Kumar & Rahul Dharra & Sanjeev Kumar - 1255-1275 Ranking of mitigation strategies for duck curve in Indian active distribution network using MCDM
by Harsh Wardhan Pandey & Ramesh Kumar & Rajib Kumar Mandal - 1276-1284 An intelligent node labelling maximum flow algorithm
by Trust Tawanda & Philimon Nyamugure & Santosh Kumar & Elias Munapo - 1285-1299 Targets for fuzzy enforcement scores; a way to set policies for helmet and seat-belt among countries
by Azdasheer Barhoum & Hamid Reza Behnood - 1300-1311 An approach to attain a balanced trade-off solution for dynamic economic emission dispatch problem on a microgrid system
by Bishwajit Dey & Saurav Raj & Rohit Babu & Tapas Chhualsingh - 1312-1339 Instantaneous failure analysis on Lindley distribution under progressive type II censoring
by K. Muralidharan & Pratima Bavagosai - 1340-1353 Study of mediating effect of interpersonal relationship and emotional coping ability in the relationship between emotional intelligence and wellness of nursing professionals
by Sumit Kumar Debnath & Puja Khatri