Volume 8, Issue 2, January 2015

Table of Contents

Articles

Social Information Retrieval Based on Semantic Annotation and Hashing upon the Multiple Ontologies  | 
S. Vigneshwari, M. Aramudhan 103-107
DOI: 10.17485/ijst/2015/v8i2/57771 | Total views: 641
A New Architecture for Enterprise Resource Planning Systemsbased on a Combination of Event-Based Software Architecture and Service-Oriented Architecture  | 
Esmail Amini, Ali Ghaffari 108-119
DOI: 10.17485/ijst/2015/v8i2/57773 | Total views: 798
Futuristic Validation Method for Rough Fuzzy Clustering  | 
S. Revathy, B. Parvaathavarthini, S. Rajathi 120-127
DOI: 10.17485/ijst/2015/v8i2/58943 | Total views: 557
A Hybrid of Ant Colony Optimization and Chaos Optimization Algorithms Approach for Software Cost Estimation  | 
Zahra Asheghi Dizaji, Farhad Soleimanian Gharehchopogh 128-133
DOI: 10.17485/ijst/2015/v8i2/57776 | Total views: 283749
Unit Commitment in Power System t by Combination of Dynamic Programming (DP), Genetic Algorithm (GA) and Particle Swarm Optimization (PSO)  | 
Fazlollah Rouhi, Reza Effatnejad 134-141
DOI: 10.17485/ijst/2015/v8i2/57782 | Total views: 1707
Coordination of PSS and PID Controller for Power System Stability Enhancement – Overview  | 
Gowrishankar Kasilingam, Jagadeesh Pasupuleti 142–151
DOI: 10.17485/ijst/2015/v8i2/58441 | Total views: 1120
Average D-Distance Between Edges of a Graph  | 
D. Reddy Babu, P. L. N. Varma 152-156
DOI: 10.17485/ijst/2015/v8i2/58066 | Total views: 704
Two-Dimensional Legendre Wavelets and their Applications to Integral Equations  | 
Mosood Roodaki, Zahra JafariBehbahani 157-164
DOI: 10.17485/ijst/2015/v8i2/58075 | Total views: 696
An Optimized Multiple Semi-Hidden Markov Model for Credit Card Fraud Detection  | 
A. Prakash, C. Chandrasekar 165-171
DOI: 10.17485/ijst/2015/v8i2/58081 | Total views: 932
In silico Evaluation of the Effect of Pfl Gene Knockout on the Production of D-lactate by Escherichia coli Genome Scale Model Using the Optflux Software Platform  | 
Bashir Sajo Mienda, Mohd Shahir Shamsir, Faezah Mohd Salleh 172-177
DOI: 10.17485/ijst/2015/v8i2/56501 | Total views: 1053
Conservation Laws and Hamiltonian Symmetries of Whitham-Broer-Kaup Equations  | 
Mehdi Nadjafikhah, Parastoo Kabi-Nejad 178-184
DOI: 10.17485/ijst/2015/v8i2/47809 | Total views: 663
The Effect of Collar on the Size of Proper Riprap Cover around the Cylindrical Bridge Piers in the Rivers Bend  | 
Ebrahim Nohani 185-190
DOI: 10.17485/ijst/2015/v8i2/52576 | Total views: 605
Multi Objective Optimal Power Flow with STATCOM Using DE in WAFGP  | 
R. Vanitha, J. Baskaran, M. Sudhakaran 191-198
DOI: 10.17485/ijst/2015/v8i2/56654 | Total views: 826


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.