Research Paper Engineering Optimization
Integrated and periodic relief logistics planning for reaction phase in uncertainty condition and model solving by PSO algorithm

B. Ejlali; S. F. Bagheri; Kh. Ghaziyani

Volume 8, Issue 4 , December 2019, Pages 294-311

https://doi.org/10.22105/riej.2020.219060.1120

Abstract
  Disaster relief logistics is considered to be one of the major activities in disaster management. This research studies response phase of the disaster management cycle. To do so, a multi-purpose integrated model for a three-level relief cycle logistics is provided under an uncertainty condition and on ...  Read More

Research Paper Case studies in industry and services
Selecting the optimal industrial investment by multi-criteria decision-making methods with emphasis on, TOPSIS, VIKOR, and COPRAS (case study of Guilan province)

S. F. Fakhrehosseini

Volume 8, Issue 4 , December 2019, Pages 312-324

https://doi.org/10.22105/riej.2020.216548.1117

Abstract
  The expansion of production and development in the industrial sector, it is necessary to increase the investment in that. But limits of the financial resources to the investment and high risk for investments in industrial and production activities on the one hand, and the frequency of necessities and ...  Read More

Research Paper Machine Learning
Improvement in video inpainting in presence of moving subjects

A. Ghanbari Talouki; M. Majdi

Volume 8, Issue 4 , December 2019, Pages 325-338

https://doi.org/10.22105/riej.2020.215689.1116

Abstract
  Inpainting or completion is used with the purpose of restoring damaged images and video frames. This paper proposes an applicable algorithm to inpaint corrupted subjects in video frames. To begin with, background and foreground (moving subject) are separated from each other in each frame, with the aim ...  Read More

Research Paper Decision analysis and methods
Application of fuzzy AHP and TOPSIS methods for risk evaluation of gas transmission facility

A. Lazar Farokhi

Volume 8, Issue 4 , December 2019, Pages 339-365

https://doi.org/10.22105/riej.2019.102689

Abstract
  Today, the use of risk assessment methods in various industries is expanding, as there are currently more than 70 different types of qualitative and quantitative risk assessment methods in the world. These methods are usually used to identify, control and mitigate the effects of hazards. Organizations ...  Read More

Review Paper Data Envelopment Analysis, DEA
The survey of data envelopment analysis models in fuzzy stochastic environments

F. Z. Montazeri

Volume 8, Issue 4 , December 2019, Pages 366-383

https://doi.org/10.22105/riej.2020.219518.1121

Abstract
  One of the best techniques for evaluating the performance of organizations is data envelopment analysis. Data Envelopment Analysis (DEA) is a non-parametric method for evaluating the performance of decision-making units (DMUs) that recognizes the relative performance of DMUs based on mathematical programming. ...  Read More

Research Paper Banking industry
A new method for solving fuzzy linear fractional programming problem with new ranking function

S. Kumar-Das

Volume 8, Issue 4 , December 2019, Pages 384-393

https://doi.org/10.22105/riej.2020.220850.1123

Abstract
  Because of uncertainty in the real life applications, reaching to the optimal solution is always time consuming and even sometimes impossible. In order to overcome these limitations the fuzzy set theory is introduced to handle it but not only incomplete information but also indeterminate and inconsistent ...  Read More

Research Paper Computational Intelligence
Restricting shoulder surfing: a modified graphical password Technique

P. Pandey

Volume 8, Issue 4 , December 2019, Pages 394-405

https://doi.org/10.22105/riej.2020.219732.1122

Abstract
  Graphical passwords are the ways in which user click on the image or user can select the image to authenticate themselves instead of giving passwords. This technique is more secure that textual password techniques. In this article, the shoulder surfing preventive mechanism of graphical password authentication ...  Read More