Adrijit Goswami

Adrijit Goswami
  • Ph.D.
  • Professor (Full) at Indian Institute of Technology Kharagpur

About

142
Publications
25,962
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,839
Citations
Current institution
Indian Institute of Technology Kharagpur
Current position
  • Professor (Full)

Publications

Publications (142)
Conference Paper
In several real-world engineering and industrial optimization problems, we only have historical data collected from physical experiments, numerical simulations, or production operations for performing optimization, and further, no expensive fitness evaluations are available during the optimization process. This class of optimization problems are ca...
Article
This research formulates a real-life multi-depot and multi-period vehicle routing problem (MDMPVRP) by imposing time window (TW) and many other constraints. A set of customers, spread in different locations, are to be served by a fleet of heterogeneous vehicles over a finite number of periods. Each customer is associated with combinations of routes...
Article
Integrated decision regarding routing plan for vehicles, inventory management and operational adjustments confer minimum cost and emission for a supply chain network. In view of the aforementioned facts, this paper develops a sustainable supply chain inventory management (SSCIM) model for a single-vendor and multiple-buyers’ integrated approach con...
Article
Full-text available
Large-scale graph processing is one of the recently developed signifcant research areas relevant to big data analytics. Distributed graph analytics is useful to see the intuitive insights of node interactions from large-scale network data. Distributed graph computing is an upcoming area in graph data mining that explores crucial node relationships...
Article
Pollution emitted by a vehicle can be checked by reducing the distance traveled and through operational adjustments. Optimized route and simultaneous pickup and delivery in a vehicle routing problem (VRP) can achieve the same. This paper investigates a two-echelon pollution routing problem with simultaneous pickup and delivery by considering multip...
Article
Large-scale graph processing is one of the recently developed significant research areas relevant to big data analytics. Distributed graph analytics is useful to see the intuitive insights of node interactions from large-scale network data. Distributed graph computing is an upcoming area in graph data mining that explores crucial node relationships...
Article
Full-text available
Brand substitution is common observed phenomenon in daily life. It is the decision makers’ economic understanding and potential scheme for business-industries. Also, it provides the flexibility in management and increases the ability to control the production. This works proposes an integrated supplier-retailer inventory model for substitutable pro...
Article
Operational adjustments in a supply chain and efficient inventory management, especially when demand is uncertain, can turn out to be an effective way in emission reduction. Different emission regulation strategies influence the firms to redesign their supply chain for sustainable management. This paper develops a sustainable supply chain inventory...
Article
Full-text available
This paper presents an EPQ model which illustrates imperfect production and imperfect inspection processes for items that are subject to a constant rate of deterioration. The model considers two types of inspection errors, namely, Type I error of falsely screening out a proportion of nondefects, thereby passing them on for rework and Type II error...
Article
Sustainable and efficient food supply chain has become an essential component of one’s life. The model proposed in this paper is deeply linked to people's quality of life as a result of which there is a large incentive to fulfil customer demands through it. This proposed model can enhance food quality by making the best possible food quality access...
Article
Optimization of vehicle speed during transportation has been an essential concern since it leads to reduction in carbon emission which decreases negative consequences on environment. This paper optimizes the vehicle speed for batches being shipped to customers to minimize the supply chain cost under uncertain demand and to reduce the carbon emissio...
Article
Full-text available
The traditional databases are not capable of handling unstructured data and high volumes of real-time datasets. Diverse datasets are unstructured lead to big data, and it is laborious to store, manage, process, analyze, visualize, and extract the useful insights from these datasets using traditional database approaches. However, many technical aspe...
Article
Full-text available
In this paper, a production inventory model is studied considering imperfect production and deterioration of item, simultaneously. Both the serviceable and reworkable items are assumed to deteriorate with time. A cost-minimizing model is developed incorporating both Type I and Type II inspection errors. Shortages are allowed that are completely bac...
Article
Full-text available
In this paper we introduce the different arithmetic operations on nonlinear intuitionistic fuzzy number (NIFN). All the arithmetic operations are done by max-min principle method which is nothing but the application of interval analysis. We also define the nonlinear intuitionistic fuzzy function which is used for finding the values, ambiguities, an...
Article
This article comprises a bi-objective Economic Production Quantity (EPQ) inventory problem under several marked unit selling price and all possible discount rates. In a competitive sphere, there are several companies which are usually producing similar items and getting hurry to launch their product first in the market. Under these circumstances tw...
Chapter
Due to the vast number of online business transactions on World Wide Web, mining and analyzing relevant data from the web log data for the users navigational behavior is a challenging task. Finding similar objects and mining top-k objects has a great significance in web recommender systems and social networks. In this paper, we define similar behav...
Conference Paper
The rapid growth of large-scale networks such as Social networks, Heterogeneous and Complex networks generate huge volumes of network data. The analysis of networks has a significant role in obtaining node behavior relevant to different kinds of real-life applications. Graph analytics is an emerging area of graph-based data mining that describes th...
Article
Abstract The traditional databases are not capable of handling unstructured data and high volumes of real-time datasets. Diverse datasets are unstructured lead to big data, and it is laborious to store, manage, process, analyze, visualize, and extract the useful insights from these datasets using traditional database approaches. However, many techn...
Chapter
Full-text available
This paper deals with a new fuzzy number namely, cloudy fuzzy number and its new defuzzification method for a classical economic order quantity (EOQ) inventory management problem. In fuzzy system, the measures of ambiguity depend upon the area of applicability and the observations of experimenters. The lack of insight over the set consideration cau...
Article
This paper deals with a stochastic deteriorating item inventory model with preservation technology and trade-credit finance. The planning horizon of many seasonal or fashionable items stochastically varies to some extent. On the other side, the demand of such items increases in initial phase followed by a constant. This type of demand pattern can b...
Article
This paper model a vendor-buyer integrated production-inventory system by considering issues of imperfect quality of the item, trade credit finance, setup cost reduction and shortages including partial backlogging and lost sale. The vendor produces a lot in one production setup and sends to the buyer in multiple shipments to fulfill customers' dema...
Article
Full-text available
This article comprises a bi-objective Economic Production Quantity (EPQ) inventory problem for two book producer groups. In a competitive world, there are several companies which are usually producing similar items and getting hurry to launch their product first in the market. Under these circumstances two different cases may occur i) early demand-...
Article
Full-text available
In real-life applications, ensuring secure transmission of data over public network channels to prevent malicious eavesdropping of the data is an important issue. Several potential security risks arise while protecting data and providing access control over the data. Due to the broadcast nature of the wireless channels, wireless networks are often...
Article
Full-text available
A wireless medical sensor network (WMSN ) is a professional application of the traditional wireless body area sensor networks in medicine. Using WMSNs, the parameters of patients? vital signs can be gathered from the sensor nodes deployed on the body of the patients and accessed by the healthcare professionals by using a mobile device. Due to wirel...
Article
Full-text available
This research formulates a multi-objective problem (MOP) for supply chain network (SCN) design by incorporating the issues of social relationship, carbon emissions, and supply chain risks such as disruption and opportunism. The proposed MOP includes three conflicting objectives: maximization of total profit, minimization of supply disruption and op...
Article
In recent times, environmental pollution is one of the most critical issues of any industrial set up throughout the globe. The excess of marginal pollution and risk for unsold goods (like chemical and plastic items etc.) and their decomposition play a vital role in any decision-making process. Also the uses of automation/technology in pollution con...
Article
Inventory models with imperfect quality items are studied by researchers in the past two decades. Till now none of them have considered the effect of substitutions to cope up with shortage and avoid lost sales. This paper presents an EOQ approach for inventory system with shortages and two types of products with imperfect quality by one way substit...
Article
Full-text available
This article leads to statistical approach on bi-objective economic production quantity (EPQ) inventory problemespecially on two book producers’ problemunder unit selling priceand production run timedependent demand rate. The concept of ‘early product-early demand’and ‘low price-high demand’ policy has been employed for developing this bi-objective...
Article
Production routing and pollution routing problems are two important issues of vehicle routing problem (VRP) of the supply chain planning system. Both determine an optimum path for the vehicle, in addition, production routing problem (PRP) deals with production and distribution whereas pollution routing problem deals with carbon footprint. In this p...
Article
Full-text available
In recent years, high utility itemsets (HUIs) mining from the transactional databases becomes one of the most emerging research topic in the field of data mining due to its wide range of applications in online e-commerce data analysis, identifying interesting patterns in biomedical data and for cross marketing solutions in retail business. It aims...
Article
Authentication protocol plays an important role in the short-range wireless communications for the Near Field Communication (NFC) technology. Due to the shared nature of wireless communication networks, there are several kinds of security vulnerabilities. Recently, a pseudonym-based NFC protocol (PBNFCP) has been proposed to withstand the security...
Article
In a time-bound cryptographic key assignment scheme, distinct temporal keys for distinct time periods are assigned to the channels in order to encrypt and decrypt the channels for secure broadcasting. It has numerous applications including the Pay-TV systems. In this paper, we aim to propose a novel time-bound hierarchical access control scheme for...
Article
Full-text available
This paper deals with a two-warehouse inventory control problem for non-instantaneous deteriorating items in stochastic framework, wherein shortages are permissible and are mixture of partially backlog and lost sales. The paper tackles a situation in which the retailer procures more quantity than his/her own warehouse (OW) storage capacity. In such...
Article
Full-text available
This research formulates a multi-objective problem (MOP) for supply chain net-work (SCN) design by incorporating the issues of social relationship, carbon emissions, and supply chain risks such as disruption and opportunism. The proposed MOP includes three conflicting objectives: maximization of total profit, minimization of supply disruption and o...
Article
Full-text available
With the rapid growth of the Internet, a lot of electronic patient records (EPRs) have been developed for e-medicine systems. The security and privacy issues of EPRs are important for the patients in order to understand how the hospitals control the use of their personal information, such as name, address, e-mail, medical records, etc. of a particu...
Article
Full-text available
This paper deals with a stochastic periodic review inventory system, wherein temporary price discount offer is taken into the account. The review period (time interval between two consecutive reviews) is considered as a random variable. In the real life, whereas, in one side, supplier stimulates the sale and/or rise cash flow by offering price disc...
Article
Full-text available
This paper deals with managerial decision-making for a deteriorating economic order quantity (EOQ) inventory model for natural idle time and imprecise demand under hesitant fuzzy environment. Also, the unavoidable situations like deterioration of the items and impreciseness of the demand rate are considered. However, the inventory processing time i...
Article
Recently, in 2014, He and Wang proposed a robust and efficient multi-server authentication scheme using biometrics-based smart card and elliptic curve cryptography (ECC). In this paper, we first analyze He-Wang’s scheme and show that their scheme is vulnerable to a known session-specific temporary information attack and impersonation attack. In add...
Article
The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash...
Article
Traditional association rule mining based on the support–confidence framework provides the objective measure of the rules that are of interest to users. However, it does not reflect the semantic measure among the items. The semantic measure of an itemset is characterized with utility values that are typically associated with transaction items, wher...
Article
In communication systems, authentication protocols play an important role in protecting sensitive information against a malicious adversary by means of providing a variety of services such as mutual authentication, user credentials' privacy, and user revocation facility when the smart card of the user is lost/stolen or user's authentication paramet...
Article
Recently, in 2013, Wu et al. proposed an efficient adaptable and scalable group access control scheme (GAC) for managing wireless sensor networks and they claimed that their proposed GAC approach provides the forward secrecy and backward secrecy, and it also prevents the man-in-the-middle attack. However, in this paper, we revisit Wu et al.’s schem...
Article
t This paper investigates a single-period production-inventory model in linguistic ‘imprecise’ and statistical ‘uncertain’ environment, where fuzziness and randomness appear simultaneously. In order to capture the stochastic variability of demand uncertainty, we consider it as a random variable. We also model the hazards of imperfect quality produc...
Article
Authentication protocol in wireless communication systems is important to protect the sensitive information against a malicious adversary by means of providing a variety of services, such as user credentials’ privacy, session key security (we call it as SK-security), mutual authentication, and user revocation facility when a user’s credentials are...
Article
In real-life applications, ensuring secure transmission of data over public network channels to prevent malicious eavesdropping of the data is an important issue in distributed network environment. There are several potential security risks in protecting data and providing access control over the data. It is a challenging problem to manage dynamica...
Conference Paper
Performance analysis in every sport is essential to find out the weaknesses and strengths of the players. In a team game like cricket, analysis of career-data is indispensable to get the insight of the players' performance, which helps the selectors to do their job flawlessly and also helps the players' themselves to identify their weaknesses and t...
Article
Full-text available
Several biometric-based remote user authentication schemes using smart cards have been proposed in the literature in order to improve the security weaknesses in user authentication system. In 2012, An proposed an enhanced biometric-based remote user authentication scheme using smart cards. It was claimed that the proposed scheme is secure against t...
Article
Full-text available
Product reliability is of significant importance in today’s technological world. People rely more and more upon the sustained functioning of machinery and complex equipments for purposes such as health, economic welfare, safety, to name just a few. Thus, in a business arena, it is critical to assess the reliability of new products. In this model, a...
Article
Full-text available
This paper describes a deteriorating inventory model with ramp-type demand pattern under stock-dependent consumption rate. The deterioration of the product is considered as probabilistic to make the research a more realistic one. The proposed model assumes partially backorder rate which follows a negative exponential with the waiting time. The effe...
Article
The authentication protocols are trusted components in a communication system in order to protect sensitive information against a malicious adversary in the client-server environment by means of providing a variety of services including users' privacy and authentication. In the cryptographic protocols, understanding the security failures is the key...
Article
Full-text available
Demand of many items begins to decrease with time due to obsolescence, quality degradation, competition etc. In marketplace new product is generally introduced at maximum retail price and retailers then lower the price with course of time due to competition to increase their demand. This increases the sales and saves some costs. This article tries...
Article
This paper presents a realistic manufacturing inventory model with process deterioration and machine breakdown. In economic manufacturing quantity model, process usually starts with ‘in-control’ state and produces items of good quality. After some random point of time, process may deteriorate and shift to ‘out-of-control’ state due to occurrence of...
Article
In many manufacturing systems, the production process may take some time to start the initial phase due to various reasons such as delay in installation of machines, short supply of raw materials, unavailability of workers, etc. Thus, the organization should plan accordingly so that the manufacturing process can start at the desired time. In an eco...
Article
Full-text available
Traditional association rule mining based on the support-confidence framework provides the objective measure of the rules that are of interest to users. However, it does not reflect the utility of the rules. To extract non-redundant association rules in support-confidence framework frequent closed itemsets and their generators play an important rol...
Article
A user authentication in the distributed computer networks (DCNs) plays a crucial rule to verify whether the user is a legal user and can therefore be granted access to the requested services to that user. In recent years, several RSA-based single sign-on mechanisms have been proposed in DCNs. However, most of them cannot preserve the user anonymit...
Conference Paper
Recently,Wu et al. proposed an adaptable and scalable group access control scheme (GAC) for managing wireless sensor networks (WSNs) [Telematics and Informatics, 30:144-157, 2013], and they claimed that their proposed GAC mechanism provides forward secrecy and backward secrecy, and it also prevents man-in-the-middle attack. However, in this paper,...
Article
Full-text available
This paper deals with a stock flow of an inventory problem over induced demand. The inventory is consumed through “core customer” or chain marketing system in an induced environment (inductance) to exhaust all the items of the stock inventory in an indefinite time. The demand rate is depicted due to induced factor which is generated from the same i...
Article
Lo et al. (2011) proposed an efficient key assignment scheme for access control in a large leaf class hierarchy where the alternations in leaf classes are more frequent than in non-leaf classes in the hierarchy. Their scheme is based on the public-key cryptosystem and hash function where operations like modular exponentiations are very much costly...
Article
Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava’s scheme and then show t...
Article
This paper deals with two-echelon integrated procurement production model for the manufacturer and the buyer integrated inventory system. The manufacturer procures raw material from outside suppliers (not a part of supply chain) then proceed to convert it as finished product, and finally delivers to the buyer, who faces imprecise and uncertain, cal...
Article
Full-text available
Government regulations, environmental taxes, media and growing environmental concern among customers have created a need for ecofriendly and economic manufacturing system. Since imperfect products are unavoidable due to faulty production, transport and storage conditions, they must be screened out before delivery to the customer through a 100% scre...
Article
Full-text available
In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed...
Article
Full-text available
Inventory models with imperfect quality items are studied by researchers in past two decades. Till now none of them have considered the effect of substitutions to cope up with shortage and avoid lost sales. This paper presents an EOQ approach for inventory system with shortages and two types of products with imperfect quality by one way substitutio...
Article
This article fuzzyfies EOQ crisp model with backlogged while demand of the customers varies with selling price and promotional effort. The demand rate in stock out situation decreases with duration of the shortage period and it comes back to its initial rate since promotional effort continues. The cost function consists of set up cost, inventory co...
Article
Association rule mining among itemsets is a fundamental task and is of great importance in many data mining applications including attacks in network data, stock market, financial applications, bioinformatics to find genetic disorders, etc. However, association rule extraction from a reasonable-sized database produces a large number of rules. As a...
Article
The hierarchical cryptographic key assignment is used to assign cryptographic keys to a set of partially ordered security classes so that the user in a higher security class can derive the cryptographic secret keys of the other users in a lower security class. In this paper, we propose a practical solution for dynamic access problems in a user hier...
Article
Full-text available
Imperfect quality Items are unavoidable in an Inventory system due to imperfect productionprocess, natural disasters, damages, or many other reasons. The setup cost and production cycletime can be related in terms of process deterioration and learning and forgetting effects. Learningreduces production run length and setup cost, whereas deterioratio...
Article
The sophisticated behaviour of the customers, availability of variety of products, stiff competition and product obsolescence results in limited selling period and uncertainty in demand for a product. In that context, the newsvendor models have found increasing applicability in supply chain management (SCM). This paper investigates a newsvendor mod...
Article
The article scrutinises the learning effect of the unit production time on optimal lot size for the uncertain and imprecise imperfect production process, wherein shortages are permissible and partially backlogged. Contextually, we contemplate the fuzzy chance of production process shifting from an ‘in-control’ state to an ‘out-of-control’ state and...
Conference Paper
In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics and the smart card have been proposed in the literature. In 2012, Sonwanshi et al. proposed a password-based remote user authentication scheme using smart car...
Article
Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to acc...
Article
Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in...
Article
This paper considers inventory models for items with imperfect quality and shortage backordering in fuzzy environments by employing two types of fuzzy numbers, which are trapezoidal and triangular. Two fuzzy models are developed. In the first model the input parameters are fuzzified, while the decision variables are treated as crisp variables. In t...
Conference Paper
Several key management schemes for access control in a user hierarchy have been proposed in the recent years. However, most of them have dealt with key management issues for tree structured hierarchies, which result overheads when they are applied to the linear hierarchies. Linear hierarchy comprises a particularly interesting type of hierarchies,...
Article
Several key management schemes for dynamic access control in a user hierarchy are proposed in the literature. Most schemes are based on elliptic curve cryptography (ECC) and polynomial interpolation. Due to time-consuming operations involved in the elliptic curve scalar multiplication and construction of interpolating polynomials, most existing sch...
Article
In this paper, we consider a manufacturing inventory system with process deterioration, machine breakdown, corrective and preventive maintenance. Demand rate of items follow discrete stochastic distribution. Normally, production process starts with 'in-control' state and produce good quality items. As time passes, production equipment may deteriora...
Conference Paper
Several key management schemes for dynamic access control in a user hierarchy are proposed in the literature based on elliptic curve cryptosystem (ECC) and polynomial interpolation. Since the elliptic curve scalar multiplication and construction of interpolating polynomials are time-consuming operations, most of the proposed schemes require high st...
Article
In this paper, an inventory model of two-warehouse is considered with quadratically increasing demand and time varying deterioration. Comparing to the existing literature, the model is derived with finite replenishment rate and unequal length of the cycle time. The associated cost of the system is minimized. A numerical example, the graphical repre...
Article
Full-text available
In this study, a fuzzy inventory model has been discussed for two cases: model start with no shortages; model start with shortages. Demand rate is of three folded ramp-type time dependent, deterioration rate of the item is time dependent(Weibull) and shortages are partially backlogged. For real situation, we have assumed the backlogging rate and al...
Article
Full-text available
This paper deals with the problem of determining the optimal retailer's replenishment decisions for deteriorating items under two levels of trade credit policy within the economic production quantity framework. We assume that the supplier would offer the retailer a delay period and the retailer also adopts the trade credit policy to stimulate his/h...
Article
Full-text available
Many real world problems involve imprecise and ambiguous information rather than crisp information. Recent trends in the database paradigm are to incorporate fuzzy sets to tackle imprecise and ambiguous information of real world problems. Fuzzy query processing in multidatabases have been extensively studied, however, the same has rarely been addre...
Article
Full-text available
In this paper, problems in integration of fuzzy relationaldatabases have been investigated and some solutions have beenproposed. In general, database integration consists of two mainprocesses called schema integration and instance integration thatresults into global schema and global instance respectively.Current work assumes a schema integration p...
Article
Full-text available
Normally, the real-world inventory control problems are imprecisely defined and human interventions are often required to solve these decision-making problems. In this paper, a realistic inventory model with imprecise inventory costs have been formulated for deteriorating items under trade credit policy within the economic production quantity (EPQ)...
Article
In this article, a probabilistic inventory model is developed for items that deteriorate at a constant rate and the demand is a random variable. It is also assumed that the supplier will offer a delay period to the retailer for payment and the retailer also extends the trade credit policy to his\her customer. Under these assumptions, we have constr...
Article
Full-text available
Purpose The purpose of this paper is to describe the development of a personalised information support system to help faculty members to search various portals and e‐resources without typing the search terms in different interfaces and to obtain results re‐ordered without human intervention. Design/methodology/approach After a careful survey of va...
Article
Full-text available
Normally, the real-world inventory control problems are imprecisely defined and human interventions are often required to solve these decision-making problems. In this paper, a realistic inventory model with imprecise inventory costs have been formulated for deteriorating items under inflation. Shortages are allowed and the demand rate is taken as...

Network

Cited By