Stochastic Modelling & Computational Sciences
Vol. 2 No. 2 (December, 2022)
1. Linear Memory Theorem with Suspension Bridge on Global Attractors
Date of Submission: 12th April 2022 Revised: 16th May 2022 Accepted: 10th June 2022
How to Cite:
Wenjun Hui
, 2022.
Linear Memory Theorem with Suspension Bridge on Global Attractors.
Stochastic Modelling and Computational Sciences, 2(2), pp.50-60.
2. Application of Fractional Derivative to functions System
Date of Submission: 10th May 2022 Revised: 16th June 2022 Accepted: 05th July 2022
How to Cite:
S. R. Deshmukh
, 2022.
Application of Fractional Derivative to functions System.
Stochastic Modelling and Computational Sciences, 2(2), pp.61-72.
3. Inventory Model for Deteriorating Stocks Items with Time-Dependent Demand, Backlogged Partially When
Late Payment is Allowed
Date of Submission: 20th April 2022 Revised: 18th June 2022 Accepted: 15th July 2022
How to Cite:
Kritsana Kaewkhao
, 2022.
Inventory Model for Deteriorating Stocks Items with Time-Dependent Demand, Backlogged Partially When Late Payment is Allowed.
Stochastic Modelling and Computational Sciences, 2(2), pp.73-91.
4. Symmetric Coordinate System in Narrow Route by Transformation Method
Date of Submission: 17th June 2022 Revised: 18th September 2022 Accepted: 13th October 2022
How to Cite:
J. Firozi,
2022.
Symmetric Coordinate System in Narrow Route by Transformation Method.
Stochastic Modelling and Computational Sciences, 2(2), pp.92-107.
5. Handwritten Numeral Recognition for mistake free Fuzzy System Grammar
Date of Submission: 12th June 2022 Revised: 15th August 2022 Accepted: 16th October 2022
How to Cite:
Rudra Pratap,
2022.
Handwritten Numeral Recognition for mistake free Fuzzy System Grammar.
Stochastic Modelling and Computational Sciences, 2(2), pp.108-119.
6. Subdivision Algorithms for Solving a Polynomial Systems: Empirical Comparisons
How to Cite:
Deepak Gawali,
2022.
Subdivision Algorithms for Solving a Polynomial Systems: Empirical Comparisons.
Stochastic Modelling and Computational Sciences, 2(2), pp.120 - 133.
7. A Deterministic Inventory Model for Deteriorating Items with On-Hand Inventory Dependent, Qubic Demand Rate
How to Cite:
Dr. Prakash D Patel,
2022.
A Deterministic Inventory Model for Deteriorating Items with On-Hand Inventory Dependent, Qubic Demand Rate.
Stochastic Modelling and Computational Sciences, 2(2), pp.134 - 145.
8. A Taxonomy Of Human And Ml Strengthsin Decision-Making: Aclassification
How to Cite:
K. Sujatha, V.M. Venkateswara Rao,
2022.
A Taxonomy Of Human And Ml Strengthsin Decision-Making: Aclassification.
Stochastic Modelling and Computational Sciences, 2(2), pp.146-154.
...
2022. ...
.
Stochastic Modelling and Computational Sciences, 2(2), pp.155-169.
10. Analysis of Perishable Inventory Management & Control Fuzzy Model with Triangular Fuzzy Number
How to Cite:
Chandrashekara A C,
2022.
Analysis of Perishable Inventory Management & Control Fuzzy Model with Triangular Fuzzy Number.
Stochastic Modelling and Computational Sciences, 2(2), pp.170-179.
11. IoT-Enabled Automation Integration in Mechanical Engineering
How to Cite:
Shelke Rahul Dnyanoba and Dr. Deepak Kumar,
2022.
IoT-Enabled Automation Integration in Mechanical Engineering.
Stochastic Modelling and Computational Sciences, 2(2), pp.180-184.
12. On Maximum Degree Energy of Graphs
Date of Submission: 20th June 2022 Revised: 25th August 2022 Accepted: 25th October 2022
How to Cite:
Shivakumar Swamy. C. S,
2022.
On Maximum Degree Energy of Graphs.
Stochastic Modelling and Computational Sciences, 2(2), pp.185-188.
13. Unveiling graph properties through algebraic invariants
Author: Syeda Farra Fatima Nahri
Page No. 189 – 192
14. Stochastic model for reliability analysis of multi-component systems
Author: Viresh Sharma, B. K. Chauhan, Prof. Mukesh Kumar Sharma, Rashmi Deswal
Page No. 193 – 199
15. Food safety of sea moss
Author: Keshava Reddy Depa
Page No. 200 – 223
16. Impact of renewable thermal technologies on home value
Author: Krupa Goel
Page No. 224 – 244
17. Effective project management strategies for large-scale iam implementations in cloud-based environments
Author: Surendra Vitla
Page No. 245 – 265
18. Improperly secured iot devices and how identity and access management (iam) helps secure iot devices
Author: Surendra Vitla
Page No. 266 – 291