International Journal of Systems Assurance Engineering and Management, Volume 6 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 6, Number 1, March 2015
Special Issue: Software Testing, Reliability and Successive Releases

Sunil Kumar Khatri
, P. K. Kapur
, Ompal Singh:
Preface. 1-2

Sunil Kumar Khatri
, Kamaldeep Kaur, Rattan Datta:
Testing Apache OpenOffice Writer using statistical usage testing technique. 3-17

Jagvinder Singh, Ompal Singh, P. K. Kapur
:
Multi up-gradation software reliability growth model with learning effect and severity of faults using SDE. 18-25

Remya Haridasan, Manoj Kumar
, P. P. Marathe:
Safety analysis of 2oo4 coincidence logic systems. 26-31

R. S. Sinha, A. K. Mukhopadhyay:
Reliability centered maintenance of cone crusher: a case study. 32-35

Ompal Singh, Deepti Aggrawal
, Adarsh Anand
, P. K. Kapur
:
Fault severity based multi-release SRGM with testing resources. 36-43

V. B. Singh
, K. K. Chaturvedi
, Sunil Kumar Khatri
, Vijay Kumar
:
Bug prediction modeling using complexity of code changes. 44-60

P. K. Kapur
, Jyotish N. P. Singh
, Ompal Singh:
Application of multi attribute utility theory in multiple releases of software. 61-70

Bharti Suri
, Shweta Singhal
:
Understanding the effect of time-constraint bounded novel technique for regression test selection and prioritization. 71-77

Upasana Sharma
, Dolly Sharma
, Sunil Kumar Khatri
:
Elimination based algorithm for link prediction on social networks. 78-82

Ompal Singh, P. K. Kapur
, Avinash K. Shrivastava
, Vijay Kumar
:
Release time problem with multiple constraints. 83-91
Volume 6, Number 2, June 2015

Amit Chandrakar
, Arun Kumar Nayak, Gopika Vinod:
Reliability analysis of process controlled systems considering dynamic failure of components. 93-102

Laith A. Hadidi
, Abdur Rahim:
Reliability for multiple units adopting sequential imperfect maintenance policies. 103-109

Ryan Jansen, Rajesh Karki:
Development of a smart micro-grid management system. 110-118

Panagiotis H. Tsarouhas
:
Maintainability analysis in the yogurt industry. 119-128

Sarbjeet Singh, Rupesh Kumar, Uday Kumar:
Modelling factors affecting human operator failure probability in railway maintenance tasks: an ISM-based analysis. 129-138

Linyan Cao, Meizhu Li, Rehan Sadiq, Sankaran Mahadevan, Yong Deng
:
Developing environmental indices using fuzzy numbers power average (FN-PA) operator. 139-149

Sarbjeet Singh, David Baglee
, Michael Knowles
, Diego Galar:
Developing RCM strategy for wind turbines utilizing e-condition monitoring. 150-156

Mohd. Sadiq
, S. K. Jain:
A fuzzy based approach for the selection of goals in goal oriented requirements elicitation process. 157-164

Ajit Kumar Verma, Ajit Srividya, Anil Rana
:
Use of stochastic petrinets in modeling of safety device inspection interval problem. 165-171

A. John Arul, N. Kannan Iyer, A. K. Verma:
Generalized hybrid approach to adjoint code derivation for efficient uncertainty and reliability studies. 172-182

Ashok Kumar Gaula
, Rajiv Kumar Sharma:
Analyzing the effect of maintenance strategies on throughput of a typical FMC (3-M, 1-R). 183-190

M. Hari Prasad, Gopika Vinod, V. V. S. Sanyasi Rao:
Risk management of NPPs using risk monitors. 191-197

Adithya Thaduri
, Ajit Kumar Verma, Uday Kumar:
Comparison of failure characteristics of different electronic technologies by using modified physics-of-failure approach. 198-205

Anil Kumar Nishad
, S. R. Singh:
Solving multi-objective decision making problem in intuitionistic fuzzy environment. 206-215
Volume 6, Number 3, September 2015

Elias Munapo
, 'Maseka Lesaoana, Philimon Nyamugure, Santosh Kumar:
A transportation branch and bound algorithm for solving the generalized assignment problem. 217-223

Laith A. Hadidi
, Umar Al-Turki
, Abdur Rahim:
Practical implications of managerial decisions to integrate production scheduling and maintenance. 224-230

Ruifeng Yang, Zhiwei Yan, Jianshe Kang:
An inspection maintenance model based on a three-stage failure process with imperfect maintenance via Monte Carlo simulation. 231-237

U. C. Moharana, Sarada Prasad Sarmah
:
Determination of optimal kit for spare parts using association rule mining. 238-247

Nishith Kumar Samal, Dilip Kumar Pratihar:
Joint optimization of preventive maintenance and spare parts inventory using genetic algorithms and particle swarm optimization algorithm. 248-258

Sujeet Kumar Singh
, Shiv Prasad Yadav:
Efficient approach for solving type-1 intuitionistic fuzzy transportation problem. 259-267

Jolly Puri, Shiv Prasad Yadav:
A fully fuzzy approach to DEA and multi-component DEA for measuring fuzzy technical efficiencies in the presence of undesirable outputs. 268-285

Amarjeet Singh, Kusum Deep
:
New variants of glowworm swarm optimization based on step size. 286-296

Mina Moghaddaszadeh, Amir Homayoun Sarfaraz, Alireza Rashidi Komijan, Amir Abbas Shojaie:
An integration of SWOT and factor analysis to determining and prioritizing strategies: case study of a Persian food industry. 297-303

Pawan Kumar Chhoker
, Atulya Nagar
:
Mathematical modeling and fuzzy availability analysis of stainless steel utensil manufacturing unit in steady state: a case study. 304-318

Kavita Sharma, Varsha Chhamunya, P. C. Gupta, Harish Sharma, Jagdish Chand Bansal
:
Fitness based particle swarm optimization. 319-329

Kapil Kumar
, Hare Krishna
, Renu Garg
:
Estimation of P(Y < X) in Lindley distribution using progressively first failure censoring. 330-341

Piyush Gupta
, Shashank Gupta
:
Investigation of pin-hole leaks in stainless steel water pipes. 342-349

Vineet Jain
, Tilak Raj:
Modeling and analysis of FMS flexibility factors by TISM and fuzzy MICMAC. 350-371
Volume 6, Number 4, December 2015

Veer Sain Dixit, Shveta Kundra Bhatia:
Refinement and evaluation of web session cluster quality. 373-389

Sandeep Kumar Mogha
, Shiv Prasad Yadav, S. P. Singh:
Technical efficiency and productivity growth in public sector hospitals of Uttarakhand (India). 390-406

Subhashish Chatterjee, Arunava Roy:
Application of non-decimated wavelet packet transfer function in web error prediction. 407-433

Behrooz Noori:
Strategic business unit ranking based on innovation performance: a case study of a steel manufacturing company. 434-446

Pankaj Sinha
, Abhishek Chandwani, Tanmay Sinha:
Algorithm of construction of optimum portfolio of stocks using genetic algorithm. 447-465

Sanjay Kumar Singh
, Umesh Singh, Abhimanyu Singh Yadav:
Reliability estimation and prediction for extension of exponential distribution using informative and non-informative priors. 466-478

Xiufeng Li, Renyang He, Zhiwei Yan, Haijun Hu, Guangxu Cheng:
A new imperfect maintenance model based on delay-time concepts for single components with multiple failure modes. 479-486

Devendra K. Tayal, Amita Jain
, Neha Dimri
, Shuchi Gupta:
MetaSurfer: a new metasearch engine based on FAHP and modified EOWA operator. 487-499

Javad Sadeghi
, Mahziar Taghizadeh, Ahamd Sadeghi, Reza Jahangard, Reza Tavakkoli-Moghaddam
:
Optimizing a vendor managed inventory (VMI) model considering delivering cost in a three-echelon supply chain using two tuned-parameter meta-heuristics. 500-510

Shailendra Kumar
, Rajiv Kumar Sharma:
An ISM based framework for structural relationship among various manufacturing flexibility dimensions. 511-521

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







