Username   Password       Forgot your password?  Forgot your username? 

ISSUES BY YEAR

Volume 15 - 2019

No.1 January 2019
No.1 January 2019
No.2 February 2019
No.2 February 2019
No.3 March 2019
No.3 March 2019
No.4 April 2019
No.4 April 2019
No.5 May 2019
No.5 May 2019

Volume 14 - 2018

No.1 January 2018
No.1 January 2018
No.3 March 2018
No.3 March 2018
No.4 April 2018
No.4 April 2018
No.5 May 2018
No.5 May 2018
No.6 June 2018
No.6 June 2018
No.7 July 2018
No.7 July 2018
No.8 August 2018
No.8 August 2018
No.9 September 2018
No.9 September 2018
No.10 October 2018
No.10 October 2018
No.11 November 2018
No.11 November 2018
No.12 December 2018
No.12 December 2018

Volume 13 - 2017

No.4 July 2017
No.4 July 2017
No.5 September 2017
No.5 September 2017
No.7 November 2017
No.7 November 2017
No.8 December 2017
No.8 December 2017

Volume 12 - 2016

Volume 11 - 2015

Volume 10 - 2014

Volume 9 - 2013

Volume 8 - 2012

Volume 7 - 2011

Volume 6 - 2010

Volume 5 - 2009

Volume 4 - 2008

Volume 3 - 2007

Volume 2 - 2006

EDITORIAL

Volume 7, Number 4, July 2011, p. 301

Krishna B. Misra

      As usual, there are seven papers in this issue besides the review of three recently published books (by Springer and CRC Press). There is one short communication as well.

      The first paper relates to the subject of encryption in wireless sensor networks (WSN). Since full encryption to secure the transmitted data is costly and often not practical, the authors suggest a Selective Hybrid Cipher-based mechanism, which integrates AES-based SE and Forward Error Correction codes to achieve both secure and reliable data transmission in WSN.

      The second paper, relates to developing dependability models for architectural software systems using the AADL (Architecture Analysis and Design Language) which is a mature industry-standard well suited to address quality attributes. It presents reusable modeling patterns for fault-tolerant applications and demonstrates how these patterns can be used in the context of a subsystem of real-life applications. The authors apply this technique to evaluate two different architectures for French Air Traffic Control System.

      The third paper elaborates how to manage risks associated with rail accidents involving legitimate pedestrians crossing, particularly at user-controlled crossings. It considers some issues contributing to the risks including human factors, some modeling approaches as well as some potential ways of addressing the problem. Human behaviour is the key factor and modifying this reliably and consistently is difficult, while designing out the risk can be prohibitively expensive.

      The fourth paper deals with the subject of "risk governance", and indicates how one can deal with public risks and so-called complex, ambiguous and uncertain risks in an integrated manner besides providing a conceptual and theoretical basis to design a risk management program, based on risk reduction, resilience and discourse.

      In the fifth paper, reliability (or safety) index is computed for a pressure vessel made of titanium alloy. This index is evaluated based on the data collected during manufacturing and operation. Design of Experiment (DOE) and Two Point Adaptive Nonlinear Approximations (TANA) are used to establish the performance functions. AFOSM approach is found to give better results.

      The sixth paper provides a time-dependent probabilistic analysis of a structure. It is shown that the deterministic time dependent analysis can be done conveniently using lognormal probability model at every time instant. There is a good agreement with Monte Carlo simulation technique. The present study demonstrates that structural response in terms of deflection over a given life time is directly related to design criteria used by structural engineer.

      The last paper relates to the design of Quantum Cellular Automata (QCA), which is emerging as a very interesting computational nanotechnology paradigm. The aim of the paper is to create interest in this area of research.

      It is hoped that the readers of IJPE will find the coverage of this issue useful for their research and professional interest.

 

CURRENT ISSUE

Prev Next

Cascaded Trust Network-based Block-Incremental Recommendation Strategy

Shujuan Ji, Da Li, Qing Zhang, Chunjin Zhang, and Chunxiao Bao

Read more

Cuckoo-based Malware Dynamic Analysis

Lele Wang, Binqiang Wang, Jiangang Liu, Qiguang Miao, and Jianhui Zhang

Read more

Colorization for Anime Sketches with Cycle-Consistent Adversarial Network

Guanghua Zhang, Mengnan Qu, Yuhao Jin, and Qingpeng Song

Read more

Bayesian Network Model for Learning Arithmetic Concepts

Yali Lv, Tong Jing, Yuhua Qian, Jiye Liang, Jianai Wu, and Junzhong Miao

Read more

Collaboration System Design of the Transportation Platform

Zhongwen Wang, Dong Liang, Ruizhen Duan, and Mingshan Chi

Read more

Specific Emitter Identification based on Power Amplifier

Zhen Zhang, Jie Chang, Mengqiu Chai, and Nan Tang

Read more

NRSSD: Normalizing Received Signal Strength to Address Device Diversity Problem in Fingerprinting Po…

Chunxiu Li, Jianli Zhao, Qiuxia Sun, Xiang Gao, Guoqiang Sun, and Chendi Zhu

Read more

Fast AIS Data Decoding Algorithm for Multi-Core CPU

Xiangkun Zeng, Huaran Yan, Yingjie Xiao and Xiaoming Yang

Read more
This site uses encryption for transmitting your passwords. ratmilwebsolutions.com