Username   Password       Forgot your password?  Forgot your username? 

ISSUES BY YEAR

Volume 14 - 2018

No.1 January 2018
No.1 January 2018
No.3 March 2018
No.3 March 2018
No.4 April 2018
No.4 April 2018
No.5 May 2018
No.5 May 2018
No.6 June 2018
No.6 June 2018
No.7 July 2018
No.7 July 2018
No.8 August 2018
No.8 August 2018
No.9 September 2018
No.9 September 2018
No.10 October 2018
No.10 October 2018
No.11 November 2018
No.11 November 2018

Volume 13 - 2017

No.4 July 2017
No.4 July 2017
No.5 September 2017
No.5 September 2017
No.7 November 2017
No.7 November 2017
No.8 December 2017
No.8 December 2017

Volume 12 - 2016

Volume 11 - 2015

Volume 10 - 2014

Volume 9 - 2013

Volume 8 - 2012

Volume 7 - 2011

Volume 6 - 2010

Volume 5 - 2009

Volume 4 - 2008

Volume 3 - 2007

Volume 2 - 2006

Comments on An Efficient Method based on Self-Generating Disjoint Minimal Cut-Sets for Evaluating Reliability Measures of Interconnection Networks

Volume 10, Number 7, November 2014 - Paper 9 - pp. 771-774

SUPARNA CHAKRABORTY, SANJAY K. CHATURVEDI and N. K. GOYAL

Reliability Engineering Centre, IIT Kharagpur, Kharagpur-721302 (WB) India

(Received on June 06, 2014, revised September 15, 2014)

Abstract:

The recent paper published in IJPE by Tripathy et al. [1] presented a new method based on self-generating, non-redundant and disjoint cutsets to evaluate the three important reliability measures, viz., two-terminal, all-terminal and k-terminal. Authors claim that their algorithm is much more efficient as it saves the overhead of disjointing process and redundant terms removal than the existing Sum-of-Disjoint-Product (SDP) form based algorithms available in the literature. However, we observe several discrepancies in the results generated by their proposed algorithm on the considered benchmark networks and even on the illustrative example taken to describe the algorithm.

 

References: 04

Click here to download the paper.

Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

 

 

CURRENT ISSUE

Prev Next

A Label Propagation Algorithm based on Circular Spread

Yong Wang, Xinzhen Fang, Jiahao Shi, and Jing Yang

Read more

Abnormal Information Identification and Elimination in Cognitive Networks

Ruowu Wu, Xiang Chen, Hui Han, Haojun Zhao, and Yun Lin

Read more

A Framework of Intrusion Detection System based on Bayesian Network in IoT

Qingping Shi, Jian Kang, Rong Wang, Hang Yi, Yun Lin, and Jie Wang

Read more

Marine Three-Shaft Intercooled-Cycle Gas Turbine Engine Transient Thermodynamic Simulation

Jingchao Li, Guoyin Zhang, Yulong Ying,Wanying Shi, and Dongyuan Bi

Read more

An Optimization Method for XML Twig Query

Zhixue He, Huan Wang, and Husheng Liao

Read more

An Indoor Fusion Localization Method using Pedestrian Dead Reckoning

Qian Zhao, Peng Luan, Huiqiang Wang, Hongwu Lv, Guangsheng Feng, and Mao Tang

Read more

Delay Constraint Data Collection Strategy in VANET

Huanhuan Yang, Zongpu Jia, and Guojun Xie

Read more

Parallel Optimization of KNN Query Strategy based on Road Network

Boqi Hu, Hailong Sun, Fangsong Li, Chao Jiang, and Weitao Zou

Read more

An Improved TOA Model based on Error Correction and Self-Genetic Algorithm

Xuyang Wang, Yaxi Wang, Zhongkai Dang, Hongmei Pei, and Long Zhang

Read more

A Bipartite Graph Matching Algorithm in Human-Computer Collaboration

Junfeng Man, Longqian Zhao, Ming Liu, Cheng Peng, and Qianqian Li

Read more

A Distributed Secure Monitoring System based on Blockchain

Guangsong Yang, Xinwen Wu, Yiliang Wu, and Chincheng Chen

Read more

Design of Outcome-based Education Blockchain

Tao Li, Bin Duan, Dayu Liu, and Zhen Fu

Read more

An Automatic Web Data Extraction Approach based on Path Index Trees

Yan Wen, Qingtian Zeng, Hua Duan, Feng Zhang, and Xin Chen

Read more

Deep Web Entity Identification Method with Unique Constraint

Xuefeng Xian, Pengpeng Zhao, Zhaobin Liu, Caidong Gu, and Victor S. Sheng

Read more

A Hierarchical Caching Decision Algorithm for Content-Centric Network

Zengyu Cai, Xuhui Wang, Jianwei Zhang, Wanwei Huang, and Yong Gan

Read more

New Polling Scheme based on Busy/Idle Queues Mechanism

Zhijun Yang, Yangyang Sun, and Jianhou Gan

Read more
This site uses encryption for transmitting your passwords. ratmilwebsolutions.com