Username   Password       Forgot your password?  Forgot your username? 

ISSUES BY YEAR

Volume 14 - 2018

No.1 January 2018
No.1 January 2018
No.3 March 2018
No.3 March 2018
No.4 April 2018
No.4 April 2018
No.5 May 2018
No.5 May 2018
No.6 June 2018
No.6 June 2018
No.7 July 2018
No.7 July 2018
No.8 August 2018
No.8 August 2018
No.9 September 2018
No.9 September 2018

Volume 13 - 2017

No.4 July 2017
No.4 July 2017
No.5 September 2017
No.5 September 2017
No.7 November 2017
No.7 November 2017
No.8 December 2017
No.8 December 2017

Volume 12 - 2016

Volume 11 - 2015

Volume 10 - 2014

Volume 9 - 2013

Volume 8 - 2012

Volume 7 - 2011

Volume 6 - 2010

Volume 5 - 2009

Volume 4 - 2008

Volume 3 - 2007

Volume 2 - 2006

Redundancy Optimization using Intuitionistic Fuzzy Multi-Objective Programming

Volume 7, Number 2, March 2011 - Paper 4 - pp. 155-164

G.S. MAHAPATRA1, and B.S. MAHAPATRA2

1 Department of Engineering Sciences and Humanities, Siliguri Institute of Technology, P.O.-Sukna, Siliguri-734009, West Bengal, India.
2 Department of Mathematics, Seacom Engineering College, JL-2, Jaladhulagori, Sankrail, Howrah-711302, West Bengal, India.

(Received on September 22, 2009, revised on September 4, 2010)


Abstract:

In this paper, redundancy allocation problem for system reliability has been presented with entropy as objective function. This model using entropy has been used to account for the lack of expert’s information. The goal of entropy redundancy allocation problem is to find out optimal level of redundancies at each subsystem in a way that maximizes reliability and entropy of the system subject to specified system cost. Intuitionistic fuzzy optimization technique is used to analyze an entropy based reliability redundancy optimization problem. Numerical examples have been provided to illustrate the model.

 

References: 37

Click here to download the paper.

Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

 

CURRENT ISSUE

Prev Next

Program Disturb Research and Error Avoidance Algorithm Design of 3D-TLC NAND Flash Memory

Xiaoshan Yang, Ligu Zhu, Qicong Zhang, Meng Zhang, Fei Wu, and Wei Zhang

Read more

Data Complexity Analysis for Software Defect Detection

Ying Ma, Yichang Li, Junwen Lu, Peng Sun, Yu Sun, and Xiatian Zhu

Read more

Fuzzy AHP-based Comprehensive Evaluation for Smart Grid in Energy Internet Systems

Ying Ma, Yichang Li, Shunzhi Zhu, Nan Qin, Guang Zhao, and Chao Huang

Read more

User Group-based Method for Cold-Start Recommendation

Jing He, Shuo Yuan, Yi Xiang, and Wei Zhou

Read more

Object Tracking Method based on 3D Cartoon Animation in Broadcast Soccer Videos

Chunlong Xie, Zhiqian Zhang, Chunsheng Wang, and Zhengqing Liu

Read more

Image Encryption Method based on Hill Matrix and Dynamic DNA Encoding

Xuncai Zhang, Zheng Zhou, Yishan Liu, Guangzhao Cui, Ying Niu, and Yanfeng Wang

Read more

Video Indexing and Retrieval based on Key Frame Extraction

Wenshi Wang, Zhangqin Huang, Weidong Wang, Shuo Zhang, and Rui Tian

Read more

Modeling Approach Combining Performance and Reliability for Mobile Cloud System

Han Xu, Haiqing Wang, Liang Luo, Xiwei Qiu, Sa Meng, and Xun Guo

Read more

Understanding the Similarity of Log Revision Behaviors in Open Source Software

Xu Niu, Shanshan Li, Zhouyang Jia, Shulin Zhou, Wang Li, and Xiangke Liao

Read more

Learning to Predict Price based on E-commerce Online Auction Machine

Xiaohui Li, Hongbin Dong, Xiaowei Wang, and Shuang Han

Read more

Rate Control Algorithm for Multiview Video Coding based on Human Visual Characteristics

Tao Yan, In-Ho Ra, Qiuwen Zhang, Hui Wen, Hang Xu, and Shuqing Chen

Read more
This site uses encryption for transmitting your passwords. ratmilwebsolutions.com