default search action
Adrijit Goswami
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j54]Jasashwi Mandal, Adrijit Goswami, Sushma Kumari, Nishikant Mishra:
A multi-agent framework for container booking and slot allocation in maritime shipping. Int. J. Prod. Res. 62(8): 3044-3058 (2024) - [j53]Rony Mitra, Ayush Dongre, Piyush Dangare, Adrijit Goswami, Manoj Kumar Tiwari:
Knowledge graph driven credit risk assessment for micro, small and medium-sized enterprises. Int. J. Prod. Res. 62(12): 4273-4289 (2024) - [j52]Tapan Kumar Datta, Sayantan Datta, Adrijit Goswami:
A sustainable bi-objective inventory model with source-based emissions and plan-based green investments under inflation and the present value of money. Oper. Res. Decis. 34(1) (2024) - 2023
- [j51]Abhijit Barman, Ashis Kumar Chakraborty, Adrijit Goswami, Parthasarathi Banerjee, Pijus Kanti De:
Pricing and inventory decision in a two-layer supply chain under the Weibull distribution product deterioration: an application of NSGA-II. RAIRO Oper. Res. 57(4): 2279-2300 (2023) - 2022
- [j50]Subhadip Pramanik, Adrijit Goswami:
Discovery of closed high utility itemsets using a fast nature-inspired ant colony algorithm. Appl. Intell. 52(8): 8839-8855 (2022) - [j49]Rony Mitra, Adrijit Goswami, Manoj Kumar Tiwari:
Financial supply chain analysis with borrower identification in smart lending platform. Expert Syst. Appl. 208: 118026 (2022) - 2021
- [j48]Chayanika Rout, Ravi Shankar Kumar, Arjun Paul, Debjani Chakraborty, Adrijit Goswami:
Designing a single-vendor and multiple-buyers' integrated production inventory model for interval type-2 fuzzy demand and fuzzy rule based deterioration. RAIRO Oper. Res. 55(6): 3715-3742 (2021) - [j47]Snigdha Karmakar, Sujit Kumar De, Tapan Kumar Datta, Adrijit Goswami:
An integrated production policy with defective items and stock-out based substitution under triangular dense fuzzy lock set environment. RAIRO Oper. Res. 55(Supplement): S2727-S2746 (2021) - [j46]Chayanika Rout, Debjani Chakraborty, Adrijit Goswami:
A production inventory model for deteriorating items with backlog-dependent demand. RAIRO Oper. Res. 55(Supplement): S549-S570 (2021) - [j45]T. Ramalingeswara Rao, Soumya Kanti Ghosh, Adrijit Goswami:
Mining user-user communities for a weighted bipartite network using spark GraphFrames and Flink Gelly. J. Supercomput. 77(6): 5984-6035 (2021) - 2020
- [j44]Chayanika Rout, Debjani Chakraborty, Adrijit Goswami:
An EPQ Model for Deteriorating Items With Imperfect Production, Two Types of Inspection Errors and Rework Under Complete Backordering. IGTR 22(2): 2040011:1-2040011:18 (2020) - [j43]Felix T. S. Chan, Zhengxu Wang, Adrijit Goswami, A. Singhania, Manoj Kumar Tiwari:
Multi-objective particle swarm optimisation based integrated production inventory routing planning for efficient perishable food logistics operations. Int. J. Prod. Res. 58(17): 5155-5174 (2020) - [j42]Jasashwi Mandal, Adrijit Goswami, Junwei Wang, Manoj Kumar Tiwari:
Optimization of vehicle speed for batches to minimize supply chain cost under uncertain demand. Inf. Sci. 515: 26-43 (2020) - 2019
- [j41]Sankar Prasad Mondal, Adrijit Goswami, Sujit Kumar De:
Nonlinear Triangular Intuitionistic Fuzzy Number and Its Application in Linear Integral Equation. Adv. Fuzzy Syst. 2019: 4142382:1-4142382:14 (2019) - [j40]Animesh Mahata, Sankar Prasad Mondal, Shariful Alam, Avishek Chakraborty, Sujit Kumar De, Adrijit Goswami:
Mathematical model for diabetes in fuzzy environment with stability analysis. J. Intell. Fuzzy Syst. 36(3): 2923-2932 (2019) - [j39]T. Ramalingeswara Rao, Pabitra Mitra, Ravindara Bhatt, Adrijit Goswami:
The big data system, components, tools, and technologies: a survey. Knowl. Inf. Syst. 60(3): 1165-1245 (2019) - 2018
- [j38]Dipana Jyoti Mohanty, Ravi Shankar Kumar, Adrijit Goswami:
Vendor-buyer integrated production-inventory system for imperfect quality item under trade credit finance and variable setup cost. RAIRO Oper. Res. 52(4): 1277-1293 (2018) - 2017
- [j37]Ravi Shankar Kumar, Alok Kumar Choudhary, Soudagar A. K. Irfan Babu, Sri Krishna Kumar, Adrijit Goswami, M. K. Tiwari:
Designing multi-period supply chain network considering risk and emission: a multi-objective approach. Ann. Oper. Res. 250(2): 427-461 (2017) - [j36]Ashok Kumar Das, Anil Kumar Sutrala, Vanga Odelu, Adrijit Goswami:
A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks. Wirel. Pers. Commun. 94(3): 1899-1933 (2017) - [j35]Vanga Odelu, Soumya Banerjee, Ashok Kumar Das, Samiran Chattopadhyay, Saru Kumari, Xiong Li, Adrijit Goswami:
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks. Wirel. Pers. Commun. 96(2): 2351-2387 (2017) - 2016
- [j34]Jayakrushna Sahoo, Ashok Kumar Das, Adrijit Goswami:
An efficient fast algorithm for discovering closed+ high utility itemsets. Appl. Intell. 45(1): 44-74 (2016) - [j33]Ravi Shankar Kumar, Karthik Kondapaneni, Vijaya Dixit, Adrijit Goswami, Lakshman S. Thakur, M. K. Tiwari:
Multi-objective modeling of production and pollution routing problem with time window: A self-learning particle swarm optimization approach. Comput. Ind. Eng. 99: 29-40 (2016) - [j32]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A secure and efficient time-bound hierarchical access control scheme for secure broadcasting. Int. J. Ad Hoc Ubiquitous Comput. 22(4): 236-248 (2016) - [j31]Ravi Shankar Kumar, M. K. Tiwari, Adrijit Goswami:
Two-echelon fuzzy stochastic supply chain for the manufacturer-buyer integrated production-inventory system. J. Intell. Manuf. 27(4): 875-888 (2016) - [j30]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system. J. King Saud Univ. Comput. Inf. Sci. 28(1): 68-81 (2016) - [j29]Dipana Jyoti Mohanty, Ravi Shankar Kumar, Adrijit Goswami:
An improved inventory model with random review period and temporary price discount for deteriorating items. Int. J. Syst. Assur. Eng. Manag. 7(1): 62-72 (2016) - [j28]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms. IEEE Trans. Consumer Electron. 62(1): 30-38 (2016) - 2015
- [j27]Ravi Shankar Kumar, Adrijit Goswami:
A fuzzy random EPQ model for imperfect quality items with possibility and necessity constraints. Appl. Soft Comput. 34: 838-850 (2015) - [j26]Ravi Shankar Kumar, Adrijit Goswami:
A continuous review production-inventory system in fuzzy random environment: Minmax distribution free procedure. Comput. Ind. Eng. 79: 65-75 (2015) - [j25]Jayakrushna Sahoo, Ashok Kumar Das, Adrijit Goswami:
An efficient approach for mining association rules from high utility itemsets. Expert Syst. Appl. 42(13): 5754-5778 (2015) - [j24]Ravi Shankar Kumar, Adrijit Goswami:
EPQ model with learning consideration, imperfect production and partial backlogging in fuzzy random environment. Int. J. Syst. Sci. 46(8): 1486-1497 (2015) - [j23]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card. J. Inf. Secur. Appl. 21: 1-19 (2015) - [j22]Ashok Kumar Das, Adrijit Goswami:
A robust anonymous biometric-based remote user authentication scheme using smart cards. J. King Saud Univ. Comput. Inf. Sci. 27(2): 193-210 (2015) - [j21]Ashok Kumar Das, Vanga Odelu, Adrijit Goswami:
A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS. J. Medical Syst. 39(9): 92:1-92:24 (2015) - [j20]Jayakrushna Sahoo, Ashok Kumar Das, Adrijit Goswami:
An effective association rule mining scheme using a new generic basis. Knowl. Inf. Syst. 43(1): 127-156 (2015) - [j19]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks. Secur. Commun. Networks 8(9): 1732-1751 (2015) - [j18]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards. Secur. Commun. Networks 8(18): 4136-4156 (2015) - [j17]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards. IEEE Trans. Inf. Forensics Secur. 10(9): 1953-1966 (2015) - [j16]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
DMAMA: Dynamic Migration Access Control Mechanism for Mobile Agents in Distributed Networks. Wirel. Pers. Commun. 84(1): 207-230 (2015) - [j15]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems. Wirel. Pers. Commun. 84(4): 2571-2598 (2015) - [j14]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A Secure and Scalable Group Access Control Scheme for Wireless Sensor Networks. Wirel. Pers. Commun. 85(4): 1765-1788 (2015) - 2014
- [j13]Sujit Kumar De, Adrijit Goswami, Shib Sankar Sana:
An interpolating by pass to Pareto optimality in intuitionistic fuzzy technique for a EOQ model with time sensitive backlogging. Appl. Math. Comput. 230: 664-674 (2014) - [j12]Ashok Kumar Das, Adrijit Goswami, Vanga Odelu:
An efficient access control scheme in user hierarchy based on polynomial interpolation and hash function. Int. J. Commun. Networks Distributed Syst. 12(2): 129-151 (2014) - [j11]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. Inf. Sci. 269: 270-285 (2014) - [j10]Ashok Kumar Das, Adrijit Goswami:
An Enhanced Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce Using Chaotic Hash Function. J. Medical Syst. 38(6): 27 (2014) - 2013
- [j9]Gour Chandra Mahata, Adrijit Goswami:
Fuzzy inventory models for items with imperfect quality and shortage backordering under crisp and fuzzy decision variables. Comput. Ind. Eng. 64(1): 190-199 (2013) - [j8]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A novel linear polynomial-based dynamic key management scheme for hierarchical access control. Int. J. Trust. Manag. Comput. Commun. 1(2): 156-174 (2013) - [j7]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System. J. Medical Syst. 37(2): 9920 (2013) - [j6]Ashok Kumar Das, Adrijit Goswami:
A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care. J. Medical Syst. 37(3): 9948 (2013) - [j5]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A New Key Management Scheme for a User Hierarchy based on a Hybrid Cryptosystem. Smart Comput. Rev. 3(1): 42-54 (2013) - 2012
- [j4]Ravi Shankar Kumar, Sujit Kumar De, Adrijit Goswami:
Fuzzy EOQ models with ramp type demand rate, partial backlogging and time dependent deterioration rate. Int. J. Math. Oper. Res. 4(5): 473-502 (2012) - 2010
- [j3]Adrijit Goswami, Gour Chandra Mahata, Om Prakash:
Optimal retailer replenishment decisions in the EPQ model for deteriorating items with two level of trade credit financing. Int. J. Math. Oper. Res. 2(1): 17-39 (2010) - 2009
- [j2]L. N. De, Adrijit Goswami:
Probabilistic EOQ model for deteriorating items under trade credit financing. Int. J. Syst. Sci. 40(4): 335-346 (2009) - 2006
- [j1]Sujit Kumar De, Adrijit Goswami:
An EOQ model with fuzzy inflation rate and fuzzy deterioration rate when a delay in payment is permissible. Int. J. Syst. Sci. 37(5): 323-335 (2006)
Conference and Workshop Papers
- 2021
- [c8]Jasashwi Mandal, Adrijit Goswami, Nishikant Mishra, Manoj Kumar Tiwari:
Liner Ship Freight Revenue and Fleet Deployment for Single Service. APMS (2) 2021: 123-131 - [c7]Rony Mitra, Mayank Shukla, Adrijit Goswami, Manoj Kumar Tiwari:
Digitization of Real-Time Predictive Maintenance for High Speed Machine Equipment. APMS (2) 2021: 132-140 - 2018
- [c6]Snigdha Karmakar, Sujit Kumar De, Adrijit Goswami:
A Study of an EOQ Model Under Cloudy Fuzzy Demand Rate. ICMC 2018: 149-163 - [c5]T. Ramalingeswara Rao, Pabitra Mitra, Adrijit Goswami:
The Taxonomy of Distributed Graph Analytics. SNAMS 2018: 315-322 - 2014
- [c4]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks. SSCC 2014: 10-19 - 2013
- [c3]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
LHSC: An effective dynamic key management scheme for linear hierarchical access control. COMSNETS 2013: 1-9 - [c2]Ashok Kumar Das, Vanga Odelu, Adrijit Goswami:
Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function. SSCC 2013: 236-242 - 2012
- [c1]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials. SNDS 2012: 1-10
Informal and Other Publications
- 2023
- [i5]Suvojit Dhara, Adrijit Goswami:
Analyzing Different Expert-Opined Strategies to Enhance the Effect on the Goal of a Multi-Attribute Decision-Making System Using a Concept of Effort Propagation and Application in Enhancement of High School Students' Performance. CoRR abs/2307.02254 (2023) - [i4]Sayan Mahapatra, Debtanu Datta, Shubham Soni, Adrijit Goswami, Saptarshi Ghosh:
Improving Access to Justice for the Indian Population: A Benchmark for Evaluating Translation of Legal Text to Indian Languages. CoRR abs/2310.09765 (2023) - 2015
- [i3]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices. IACR Cryptol. ePrint Arch. 2015: 841 (2015) - 2014
- [i2]Jayakrushna Sahoo, Ashok Kumar Das, Adrijit Goswami:
An Algorithm for Mining High Utility Closed Itemsets and Generators. CoRR abs/1410.2988 (2014) - [i1]Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
Cryptanalysis on 'Robust Biometrics-Based Authentication Scheme for Multi-server Environment'. IACR Cryptol. ePrint Arch. 2014: 715 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint