Adrijit Goswami

Orcid: 0000-0002-4420-0077

According to our database1, Adrijit Goswami authored at least 67 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A sustainable bi-objective inventory model with source-based emissions and plan-based green investments under inflation and the present value of money.
Oper. Res. Decis., 2024

Knowledge graph driven credit risk assessment for micro, small and medium-sized enterprises.
Int. J. Prod. Res., 2024

A multi-agent framework for container booking and slot allocation in maritime shipping.
Int. J. Prod. Res., 2024

2023
Pricing and inventory decision in a two-layer supply chain under the Weibull distribution product deterioration: an application of NSGA-II.
RAIRO Oper. Res., 2023

Improving Access to Justice for the Indian Population: A Benchmark for Evaluating Translation of Legal Text to Indian Languages.
CoRR, 2023

Analyzing Different Expert-Opined Strategies to Enhance the Effect on the Goal of a Multi-Attribute Decision-Making System Using a Concept of Effort Propagation and Application in Enhancement of High School Students' Performance.
CoRR, 2023

2022
Financial supply chain analysis with borrower identification in smart lending platform.
Expert Syst. Appl., 2022

Discovery of closed high utility itemsets using a fast nature-inspired ant colony algorithm.
Appl. Intell., 2022

2021
Mining user-user communities for a weighted bipartite network using spark GraphFrames and Flink Gelly.
J. Supercomput., 2021

Designing a single-vendor and multiple-buyers' integrated production inventory model for interval type-2 fuzzy demand and fuzzy rule based deterioration.
RAIRO Oper. Res., 2021

A production inventory model for deteriorating items with backlog-dependent demand.
RAIRO Oper. Res., 2021

An integrated production policy with defective items and stock-out based substitution under triangular dense fuzzy lock set environment.
RAIRO Oper. Res., 2021

Digitization of Real-Time Predictive Maintenance for High Speed Machine Equipment.
Proceedings of the Advances in Production Management Systems. Artificial Intelligence for Sustainable and Resilient Production Systems, 2021

Liner Ship Freight Revenue and Fleet Deployment for Single Service.
Proceedings of the Advances in Production Management Systems. Artificial Intelligence for Sustainable and Resilient Production Systems, 2021

2020
Optimization of vehicle speed for batches to minimize supply chain cost under uncertain demand.
Inf. Sci., 2020

Multi-objective particle swarm optimisation based integrated production inventory routing planning for efficient perishable food logistics operations.
Int. J. Prod. Res., 2020

An EPQ Model for Deteriorating Items With Imperfect Production, Two Types of Inspection Errors and Rework Under Complete Backordering.
IGTR, 2020

2019
The big data system, components, tools, and technologies: a survey.
Knowl. Inf. Syst., 2019

Mathematical model for diabetes in fuzzy environment with stability analysis.
J. Intell. Fuzzy Syst., 2019

Nonlinear Triangular Intuitionistic Fuzzy Number and Its Application in Linear Integral Equation.
Adv. Fuzzy Syst., 2019

2018
Vendor-buyer integrated production-inventory system for imperfect quality item under trade credit finance and variable setup cost.
RAIRO Oper. Res., 2018

The Taxonomy of Distributed Graph Analytics.
Proceedings of the Fifth International Conference on Social Networks Analysis, 2018

A Study of an EOQ Model Under Cloudy Fuzzy Demand Rate.
Proceedings of the Mathematics and Computing - 4th International Conference, 2018

2017
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017

A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks.
Wirel. Pers. Commun., 2017

Designing multi-period supply chain network considering risk and emission: a multi-objective approach.
Ann. Oper. Res., 2017

2016
SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms.
IEEE Trans. Consumer Electron., 2016

An improved inventory model with random review period and temporary price discount for deteriorating items.
Int. J. Syst. Assur. Eng. Manag., 2016

A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system.
J. King Saud Univ. Comput. Inf. Sci., 2016

Two-echelon fuzzy stochastic supply chain for the manufacturer-buyer integrated production-inventory system.
J. Intell. Manuf., 2016

A secure and efficient time-bound hierarchical access control scheme for secure broadcasting.
Int. J. Ad Hoc Ubiquitous Comput., 2016

Multi-objective modeling of production and pollution routing problem with time window: A self-learning particle swarm optimization approach.
Comput. Ind. Eng., 2016

An efficient fast algorithm for discovering closed+ high utility itemsets.
Appl. Intell., 2016

2015
A Secure and Scalable Group Access Control Scheme for Wireless Sensor Networks.
Wirel. Pers. Commun., 2015

An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems.
Wirel. Pers. Commun., 2015

DMAMA: Dynamic Migration Access Control Mechanism for Mobile Agents in Distributed Networks.
Wirel. Pers. Commun., 2015

A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards.
IEEE Trans. Inf. Forensics Secur., 2015

An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards.
Secur. Commun. Networks, 2015

A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks.
Secur. Commun. Networks, 2015

An effective association rule mining scheme using a new generic basis.
Knowl. Inf. Syst., 2015

A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.
J. Medical Syst., 2015

A robust anonymous biometric-based remote user authentication scheme using smart cards.
J. King Saud Univ. Comput. Inf. Sci., 2015

An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card.
J. Inf. Secur. Appl., 2015

EPQ model with learning consideration, imperfect production and partial backlogging in fuzzy random environment.
Int. J. Syst. Sci., 2015

An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices.
IACR Cryptol. ePrint Arch., 2015

An efficient approach for mining association rules from high utility itemsets.
Expert Syst. Appl., 2015

A continuous review production-inventory system in fuzzy random environment: Minmax distribution free procedure.
Comput. Ind. Eng., 2015

A fuzzy random EPQ model for imperfect quality items with possibility and necessity constraints.
Appl. Soft Comput., 2015

2014
An Enhanced Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce Using Chaotic Hash Function.
J. Medical Syst., 2014

A secure effective key management scheme for dynamic access control in a large leaf class hierarchy.
Inf. Sci., 2014

An efficient access control scheme in user hierarchy based on polynomial interpolation and hash function.
Int. J. Commun. Networks Distributed Syst., 2014

Cryptanalysis on 'Robust Biometrics-Based Authentication Scheme for Multi-server Environment'.
IACR Cryptol. ePrint Arch., 2014

An Algorithm for Mining High Utility Closed Itemsets and Generators.
CoRR, 2014

An interpolating by pass to Pareto optimality in intuitionistic fuzzy technique for a EOQ model with time sensitive backlogging.
Appl. Math. Comput., 2014

Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks.
Proceedings of the Security in Computing and Communications, 2014

2013
A New Key Management Scheme for a User Hierarchy based on a Hybrid Cryptosystem.
Smart Comput. Rev., 2013

An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System.
J. Medical Syst., 2013

A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care.
J. Medical Syst., 2013

A novel linear polynomial-based dynamic key management scheme for hierarchical access control.
Int. J. Trust. Manag. Comput. Commun., 2013

Fuzzy inventory models for items with imperfect quality and shortage backordering under crisp and fuzzy decision variables.
Comput. Ind. Eng., 2013

Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

LHSC: An effective dynamic key management scheme for linear hierarchical access control.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013

2012
Fuzzy EOQ models with ramp type demand rate, partial backlogging and time dependent deterioration rate.
Int. J. Math. Oper. Res., 2012

A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

2010
Optimal retailer replenishment decisions in the EPQ model for deteriorating items with two level of trade credit financing.
Int. J. Math. Oper. Res., 2010

2009
Probabilistic EOQ model for deteriorating items under trade credit financing.
Int. J. Syst. Sci., 2009

2006
An EOQ model with fuzzy inflation rate and fuzzy deterioration rate when a delay in payment is permissible.
Int. J. Syst. Sci., 2006


  Loading...