Fuzzy-Genetic Algorithm based inventory model for shortages and inflation under hybrid & PSO
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 5
Abstract
Abstract: The purpose of this article is to evaluate the value of integrating inventory decision. Therefore in this paper a inventory model for deteriorating items is considered under assumption that the Inventory cost (including Fuzzy holding cost and Fuzzy deterioration cost), Fuzzy Transportation cost is incurred and is function of distance irrespective of number of items and the capacity of vehicle. Four kinds of meta-heuristic algorithms or meta-heuristic Fuzzy hybrid algorithms: Fuzzy harmony search, Fuzzy particle swarm optimization, Fuzzy genetic algorithms, Fuzzy simulated annealing. A numerical example is presented to illustrate and validate the model and sensitivity analysis is carried out in case-1for different values of a parameter keeping rest unchanged.
Authors and Affiliations
Dr. Kusum Gupta, , Dr. Ajay Singh Yadav, , Mr. Ankur Garg, , Ms. Anupam Swami
A Block Cipher Based Cryptosystem through Modified Forward Backward Overlapped Modulo Arithmetic Technique (MFBOMAT)
In this paper, a new Cryptosystem based on block cipher has been proposed where the encryption is done through Modified Forward Backward Overlapped Modulo Arithmetic Technique (MFBOMAT). The original messag...
Clustering Algorithm Based On Correlation Preserving Indexing
Fast retrieval of the relevant information from the databases has always been a significant issue. Different techniques have been developed for this purpose; one of them is Data Clustering. In this paper Data &nb...
Gesture mimicking two Wheeler differential drive Arduino based robot and iRobot Create
Abstract: The project discussed here is a gesture controlled robot having two wheels on either side just like a car. The key features described in the project are i) controlling the movement of the wheels using an embedd...
Importance of Selecting Test Cases for Regression Testing
Abstract: There is a well-known discussion stating that “Under Testing is a crime and over testing is a Sin”. Regression testing also faces the same challenge regarding the selection of test cases which needs to re...
Detection of Clone Attack in Wsn
Abstract: One of the most vexing problems in wireless sensor network security is the node Clone attack. In thisattack, an adversary breaks into a sensor node, reprograms it, and inserts several copies of the node b...