Journal: Int. J. Systems Assurance Engineering and Management

Volume 15, Issue 3

775 -- 785Yan Chen, Junyi Qiu, Mengyi Wang, Jiaqi Rao, Tian Xia, Yuan Yang. Fault prediction of pneumatic valves in an LNG plant by the DGM(1, 1) model
786 -- 799Punam Bedi, Anuradha Singhal, Veenu Bhasin. Deep learning based active image steganalysis: a review
800 -- 838Sarita Negi, Devesh Pratap Singh, Man Mohan Singh Rauthan. A systematic literature review on soft computing techniques in cloud load balancing network
839 -- 853Pradeep Kumar, Madhavendra Sharma. Modified pavement condition assessment model for asphalt concrete pavements
854 -- 870Mei Ying Lau, Yunmei Liu, David B. Kaber. Consequence severity-probability importance measure for fault tree analysis
871 -- 897Alya J. Abuseem, Udechukwu Ojiako, Fikri T. Dweiri. Overcoming ignorance and the unknown in UAE projects: the role of improvisation
898 -- 916Sujit Kumar De, Moumita Ojha. Solving a fuzzy backlogging economic order quantity inventory model using volume of a fuzzy Hasse diagram
917 -- 930Vikas Kumar, Subhadip Ghosh, Manoj Kumar Parida, Shaju K. Albert. Application of continuous wavelet transform based on Fast Fourier transform for the quality analysis of arc welding process
931 -- 949Rashmi Kumari, Subhranil Das, Raghwendra Kishore Singh. Agglomeration of deep learning networks for classifying binary and multiclass classifications using 3D MRI images for early diagnosis of Alzheimer's disease: a feature-node approach
950 -- 956S. Lakshmanachari, Sadulla Shaik, G. S. R. Satyanarayana, Inapudi Vasavi, Vallabhuni Vijay, Chandra Shaker Pittala. 1-bit full adder design using next generation semiconductor devices and performance benchmarking at low supply voltages
957 -- 963N. Sathya, C. Prabhavathi. The influence of social media on investment decision-making: examining behavioral biases, risk perception, and mediation effects
964 -- 980Akshya Kumar Sahoo, Priyadarsan Parida, K. Muralibabu. Hybrid deep neural network with clustering algorithms for effective gliomas segmentation
981 -- 1014Meera Sharma, Madhu Kumari, V. B. Singh. Bug summary entropy based training candidates identification in cross project severity prediction
1015 -- 1036Anita Kumari, Kapil Kumar, Indrajeet Kumar. Bayesian and classical inference in Maxwell distribution under adaptive progressively Type-II censored data
1037 -- 1056Rajneesh Rani, Shefali Arora, Vipan Verma, Shilpa Mahajan, Ruchi Sharma. Enhancing facial expression recognition through generative adversarial networks-based augmentation
1057 -- 1069R. Nandha Kumar, P. Srimanchari. A trust and optimal energy efficient data aggregation scheme for wireless sensor networks using QGAOA
1070 -- 1085Anshul Rani, Deepti Mishra 0001, Aida Omerovic. A framework for software vendor selection by applying Inconsistency and Conflict Removal (ICR) method
1086 -- 1097Rithesh Pakkala Permanki Guthu, R. Akhila Thejaswi, Shamantha Rai Bellipady, H. R. Nagesh. Road safety analysis framework based on vehicle vibrations and sounds using deep learning techniques
1098 -- 1108Aidin Shaghaghi, Mohammad Taghitahooneh, Reza Dashti. Optimizing aging assets replacement in power systems
1109 -- 1118Leila Helali. OptiCom: a joint optimization and compliance assurance method for resource management at SaaS level
1119 -- 1146Varun Gupta, Nitin Kumar Saxena, Abhas Kanungo, Sourav Diwania, Parvin Kumar, Vaishali Gupta. ECG signal analysis using autoregressive modelling with and without baseline wander
1147 -- 1171Puja Supakar, Nirmal Kumar, Sanat Kumar Mahato, Pintu Pal. Neutrosophic trade-credit EOQ model for deteriorating items considering expiration date of the items using different variants of particle swarm optimizations
1172 -- 1182Tushar Kanta Mahapatra, Suchismita Satapathy, Subrat Kumar Panda. Evaluation and prediction of impact of noise on a worker in noisy environment by using ANFIS model
1183 -- 1202Madhusudan Dolai, Shyamal Kumar Mondal. An imperfect production model with shortage and screening constraint under time varying demand
1203 -- 1209Prince Bhatia, Rahul Kumar. Do debt, and operating efficiency contributes to corporate performance?
1210 -- 1230Sushil Kumar Maurya, Dinesh Singh, Ashish Kumar Maurya. Deceptive opinion spam detection using feature reduction techniques
1231 -- 1244Lazhar Chabane, Saïd Drid, Larbi Chrifi-Alaoui, Laurent Delahoche. Energy consumption prediction of a smart home using non-intrusive appliance load monitoring
1245 -- 1260Shalini Sharma, Naresh Kumar, Kuldeep Singh Kaswan. Reliability modelling using ranking algorithm for parameter evaluation
1261 -- 1272Alessandro Barbiero. Estimation of the reliability parameter for a Poisson-exponential stress-strength model
1273 -- 1284Dengpan Sun. Application of decision system design based on improved association rules in rural social security
1285 -- 1293Menda Sreevani, Vallabhuni Vijay, Kancharapu Chaitanya, Chelle Radhika, Nandi Manjula, D. Radha Krishna Koushik, B. Sai Venumadhav, T. Sai Jaideep, Chandra Shaker Pittala, Sadulla Shaik. State-of-art design: data selectors using quantum-dot cellular automata
1294 -- 1304Santi Kumari Behera, Shishir Prasad Dash, Rajat Amat, Prabira Kumar Sethy. Wafer defect identification with optimal hyper-parameter tuning of support vector machine using the deep feature of ResNet 101
1305 -- 1314Harsh Tripathi, Mahendra Saha. Modified chain group sampling inspection plan under item failure scenario based on time truncated scheme
1315 -- 1324Karan Sotoodeh. Case study for failure analysis and prevention in subsea axial check valves used on chemical injection lines