Vol 8, No 2 (2015)

Table of Contents

Vol 8, No 2 (2015)

Articles

Social Information Retrieval Based on Semantic Annotation and Hashing upon the Multiple Ontologies
S. Vigneshwari, M. Aramudhan
DOI:10.17485/ijst/2015/v8i2/67351 ,  Vol 8, No 2 (2015), Pagination: 103-107
ABSTRACT |  PDF Abstract Views: 231  |  PDF Views: 0
A New Architecture for Enterprise Resource Planning Systemsbased on a Combination of Event-Based Software Architecture and Service-Oriented Architecture
Esmail Amini, Ali Ghaffari
DOI:10.17485/ijst/2015/v8i2/67352 ,  Vol 8, No 2 (2015), Pagination: 108-119
ABSTRACT |  PDF Abstract Views: 258  |  PDF Views: 0
Futuristic Validation Method for Rough Fuzzy Clustering
S. Revathy, B. Parvaathavarthini, S. Rajathi
DOI:10.17485/ijst/2015/v8i2/67353 ,  Vol 8, No 2 (2015), Pagination: 120-127
ABSTRACT |  PDF Abstract Views: 216  |  PDF Views: 0
A Hybrid of Ant Colony Optimization and Chaos Optimization Algorithms Approach for Software Cost Estimation
Zahra Asheghi Dizaji, Farhad Soleimanian Gharehchopogh
DOI:10.17485/ijst/2015/v8i2/67354 ,  Vol 8, No 2 (2015), Pagination: 128-133
ABSTRACT |  PDF Abstract Views: 265  |  PDF Views: 0
Unit Commitment in Power System t by Combination of Dynamic Programming (DP), Genetic Algorithm (GA) and Particle Swarm Optimization (PSO)
Fazlollah Rouhi, Reza Effatnejad
DOI:10.17485/ijst/2015/v8i2/67355 ,  Vol 8, No 2 (2015), Pagination: 134-141
ABSTRACT |  PDF Abstract Views: 235  |  PDF Views: 0
Coordination of PSS and PID Controller for Power System Stability Enhancement – Overview
Gowrishankar Kasilingam, Jagadeesh Pasupuleti
DOI:10.17485/ijst/2015/v8i2/67356 ,  Vol 8, No 2 (2015), Pagination: 142–151
ABSTRACT |  PDF Abstract Views: 239  |  PDF Views: 0
Average D-Distance Between Edges of a Graph
D. Reddy Babu, P. L. N. Varma
DOI:10.17485/ijst/2015/v8i2/67357 ,  Vol 8, No 2 (2015), Pagination: 152-156
ABSTRACT |  PDF Abstract Views: 245  |  PDF Views: 0
Two-Dimensional Legendre Wavelets and their Applications to Integral Equations
Mosood Roodaki, Zahra JafariBehbahani
DOI:10.17485/ijst/2015/v8i2/67358 ,  Vol 8, No 2 (2015), Pagination: 157-164
ABSTRACT |  PDF Abstract Views: 223  |  PDF Views: 0
An Optimized Multiple Semi-Hidden Markov Model for Credit Card Fraud Detection
A. Prakash, C. Chandrasekar
DOI:10.17485/ijst/2015/v8i2/67359 ,  Vol 8, No 2 (2015), Pagination: 165-171
ABSTRACT |  PDF Abstract Views: 270  |  PDF Views: 0
In silico Evaluation of the Effect of Pfl Gene Knockout on the Production of D-lactate by Escherichia coli Genome Scale Model Using the Optflux Software Platform
Bashir Sajo Mienda, Mohd Shahir Shamsir, Faezah Mohd Salleh
DOI:10.17485/ijst/2015/v8i2/67360 ,  Vol 8, No 2 (2015), Pagination: 172-177
ABSTRACT |  PDF Abstract Views: 437  |  PDF Views: 0
Conservation Laws and Hamiltonian Symmetries of Whitham-Broer-Kaup Equations
Mehdi Nadjafikhah, Parastoo Kabi-Nejad
DOI:10.17485/ijst/2015/v8i2/67361 ,  Vol 8, No 2 (2015), Pagination: 178-184
ABSTRACT |  PDF Abstract Views: 231  |  PDF Views: 0
The Effect of Collar on the Size of Proper Riprap Cover around the Cylindrical Bridge Piers in the Rivers Bend
Ebrahim Nohani
DOI:10.17485/ijst/2015/v8i2/67362 ,  Vol 8, No 2 (2015), Pagination: 185-190
ABSTRACT |  PDF Abstract Views: 242  |  PDF Views: 0
Multi Objective Optimal Power Flow with STATCOM Using DE in WAFGP
R. Vanitha, J. Baskaran, M. Sudhakaran
DOI:10.17485/ijst/2015/v8i2/67363 ,  Vol 8, No 2 (2015), Pagination: 191-198
ABSTRACT |  PDF Abstract Views: 222  |  PDF Views: 0