archive-org.com » ORG » I » IJORCS.ORG

Total: 231

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Studies on the Production of Rhamnolipids by Pseudomonas Putida
    second day Production of biosurfactants depends on the nutrient media The surface tension was decreased with increasing time and growth References Cited By Costerton JW 1980 Pseudomonas aeruginosa in nature and disease In Sabath CD ed Pseudomonas aeruginosa the organism diseases it causes and their treatment Hans Huber Publishers Bern Switzerland pp 15 24 Lyczak JB Cannon CL Pier GB 2000 Establishment of Pseudomonas aeruginosa infection lessons from a Versatile opportunist Microbes Infect 2 1051 1060 doi 10 1016 S1286 4579 00 01259 4 Jarvis FG Johnson MJ 1949 A glycolipide produced by Pseudomonas aeruginosa J Am Chem Soc 71 4124 4126 doi 10 1021 ja01180a073 Burger MM Glaser L Burton RM 1966 Formation of rhamnolipids of Pseudomonas aeruginosa Methods Enzymol 8 441 445 doi 10 1016 0076 6879 66 08082 0 Zhang Y Miller RM 1995 Effect of rhamnolipid biosurfactant structure on solubilisation and biodegradation on n alkanes Appl Environ Microbiol 61 2247 2251 Beal R Betts WB 2000 Role of rhamnolipid biosurfactants in the uptake and mineralization of hexadecane In Pseudomonas aeruginosa J Appl Microbiol 89 158 168 doi 10 1016 0076 6879 66 08082 0 Lang S Wullbrandt D 1999 Rhamnose lipids biosynthesis microbial production and application potential Appl Microbiol Biotechnol 51 22 32 doi 10 1007 s002530051358 Maier RM Soberón Chávez G 2000 Pseudomonas aeruginosa rhamnolipids biosynthesis and potential applications Appl Microbiol Biotechnol 54 625 633 Stanghellini ME Miller RM 1997 Biosurfactants their identity and potential efficacy in the biological control of Zoosporic plant pathogens Plant Dis 81 4 12 doi 10 1094 PDIS 1997 81 1 4 Venkata Ramana K Karanth NG 1989 Factors affecting biosurfactant production using Pseudomonas aeruginosa CFTR 6 under submerged conditions J Chem Technol Biotechnol 45 249 257 doi 10 1002 jctb 280450402 Déziel É Paquette G Villemur R Lépine F Bisaillon J G 1996 Biosurfactant production by a soil Pseudomonas strain growing on polycyclic aromatic hydrocarbons Appl Environ Microbiol 62 1908 1912 Finnerty W R 1994 Biosurfacatants in environmental biotechnology Curr Opin Biotechnol 5 291D295 doi 10 1016 0958 1669 94 90031 0 Rosenberg E 1986 Microbial surfacatants Crit Rev Biotechnol 3 109D132 Rouse J D Sabatini D A Suflita G M and Harwell J H 1994 Influence of surfactants on microbial de gradation of organic compounds Crit Rev Environ Sci Technol 24 325D370 doi 10 1080 10643389409388471 Gerson D F 1993 The biophysics of microbial surfactants growth on insoluble substrates In Surfactant Science Series Biosurfactants Production Properties Applications N Kozaric ed Marcel Dekker New York USA pp 269D286 Koch A K Reiser J Kappeli O and Fiechter A 1988 Genetic construction of lactose utilizing strains of Pseudomonas aeruginosa and their application in bio surfactant production Bio Techn 6 1335D1339 doi 10 1038 nbt1188 1335 Johnson M K and Boese Marrazzo D 1980 Pro duction and properties of heat stable extracellular he molysin from Pseudomonas aeruginosa Infect Im mun 29 1028D1033 Itoch S Honda H Tomita F and Suzuki T 1971 Rhamnolipid produced by Pseudomonas aeruginosa Grown on n paraffin

    Original URL path: http://www.ijorcs.org/manuscript/id/35/harikrishna-yadav-nanganuru/studies-on-the-production-of-rhamnolipids-by-pseudomonas-putida (2016-05-01)
    Open archived version from archive

  • A Data Hiding Techniques Based on Length of English Text using DES and attacks
    Mohite A Data Hiding Techniques Based on Length of English Text using DES and attacks International Journal of Research in Computer Science 2 no 4 2012 23 29 doi 10 7815 ijorcs 24 2012 036 Close Abstract The comparing recent proposal for multimedia applications network security remains an important topic for researchers The security deals with both wired and wireless communication Network is defined as it is a large system consisting of many similar parts that are connected together to allow the movement or communication between or along the parts or between the parts and a control center There are the main components of the network information system such as end systems terminals servers and intermediate systems hubs switches gateways Every node has its own set of vulnerabilities that can be related to hardware software protocol stack etc Nodes are interconnected by physical supports in a network for example connected with cables in wired Local Area Network LAN or radio waves Wi Fi in Wireless Local Area Network WLAN Some nodes are able to provide services FTP HTTP browsing database access If two nodes want to communicate together they must be interconnected physically and logically Network security deals with also information hiding technique Now day s security deals with heterogeneous networks The use of different wireless and wired network which are working on different platform is heterogeneous So design of network security for such type of heterogeneous network is difficult task References Cited By Stefan Katzenbeisser Fabien A P Petitcolas Information hiding techniques for stegnography and digital watermarking Artech House Publishers 2000 Peticolas F A P Anderson R J Kuhn M G information Hiding Asurvey Proceedings of the IEEE 1999 87 7 PP 1062 107 Cachin C An information Theoretic model for stegnography in proceeding of the second international workshop on information hiding vol 1525 of lecture notes in computer science Springer 1998 pp 306 308 Jeremiah J Haarmsen William A Pearlman Steganalysis of additive noise modelable information hiding Electrical Computer and systems Engineering Department Rensselar Polytechnic Institute Troy NY Neil F Jhonson and Sushil Jajodia Steganalysis The investigation of hidden information The 1998 IEEE Information Technology Conference September 1st 3rd 1998 Jonathan Watkins Steganography Message Hidden in Bits Multimedia Systems Coursework Department of Electronics and computer Science University of Southampton 15th December 2001 Leonid Reyzin and Scott Russell More efficient provably Secure Stegnography Department of computer science Boston University May 15 2003 P Davern M Scott Steganography its history and its application to computer based data files Dublin City University Liu Cuilin Shen Yongiun Zhang Guidong Di Changyan A Data Hiding System Based on Length of English Text 2010 first ACIS International Symposium on Cryptography and Network Security Data Mining and Knowledge Discovery E Commerce and Its Applications and Embedded Systems Samuel King Opoku A Robust Cryptographic System using Neighborhood Generated Keys International Journal of Research in Computer Science 2 5 pp 1 9 September 2012 doi 10 7815 ijorcs 25 2012 041 Pandey Nikita Sayani Nandy and Shelly

    Original URL path: http://www.ijorcs.org/manuscript/id/36/sanjay-jadhav/a-data-hiding-techniques-based-on-length-of-english-text-using-des-and-attacks (2016-05-01)
    Open archived version from archive

  • A Survey on Clustering Techniques for Wireless Sensor Network
    its internal memory to store the information regarding the event packets In this paper we will come to know the various algorithms in clustering techniques for wireless sensor networks and discuss them Clustering is a key technique used to extend the lifetime of a sensor network by reducing energy consumption It can also increase network scalability Sensor nodes are considered to be homogeneous since the researches in the feild of WSNs have been evolved but in reality homogeneous sensor networks hardly exist Here we will discuss some of the impact of heterogeneous sensor networks on WSN and various clustering algorithms used in HWSN References Cited By I F Akyildiz W Su Y Sankarasubramaniam and E Cayirci Wireless sensor networks a survey Computer Networks 38 4 2002 393 422 doi 10 1016 S1389 1286 01 00302 4 K Romer O Kastin and F Mattern Middleware challenges for wireless sensor networks ACM SIGMOBILE Mobile Computing and Communications Review Vol 6 No 4 2002 59 61 R Shorey A Ananda and W T Ooi Mobile wireless and sensor networks 1st edition IEEE Press John Wiley Sons 2006 I F Akyildiz W Su Y Sankarasubramaniam and E Cayirci A Survey on Sensor Netowrks IEEE Communications Magazine vol 40 no 8 pp 102 114 Aug 2002 S Meyer and A Rakotonirainy A Survey of Research on Context Aware Homes Workshop on Wearable Invisible Context Aware Ambient Pervasive and Ubiquitous Computing Adelaide Australia 2003 B Warneke M Last B Liebowitz Kristofer and S Pister Smart Dust Communicating with a Cubic Millimeter Computer Computer Magazine vol 34 no 1 pp 44 51 Jan 2001 doi 10 1109 2 895117 A A Abbasi and M Younis A survey on clustering algorithms for wireless sensor networks Computer Communication 30 14 15 2826 2841 2007 doi 10 1016 j comcom 2007 05 024 I F Akyildiz T Melodia and K R Chowdhury A survey on wireless multimedia sensor networks Computer Networks 51 4 921 960 2007 doi 10 1016 j comnet 2006 10 002 I F Akyildiz W Su Y Sankarasubramaniam and E Cayirci A survey on sensor networks IEEE Communications Magazine 2002 doi 10 1109 MCOM 2002 1024422 Buadhacháin Séamus Ó and Gregory Provan An efficient decentralized clustering algorithm for aggregation of noisy multi mean data Journal of Heuristics 21 2 2014 301 328 Kaur Deepinder and Kamaljit Kaur Reliable Energy Efficient Clustering Scheme Analysis Using Mobile Sink in Wireless Sensor Networks International Journal of Computer Trends and Technology IJCTT 4 2013 2589 2594 Das Suvabrata Design and Development of Energy Efficient Routing Protocol for Heterogeneous Wireless Sensor Networks Diss Jadavpur University Kolkata 2014 Singh Karampal and Varinder Attri A Survey on various Clustering Algorithms in Wireless Sensor Network Mohamed Amina Ahmed and Tat Chee Wan Enhanced mobile lightweight medium access control protocol for multi hop wireless sensor network Region 10 Symposium 2014 IEEE IEEE 2014 Panwar Mansi and S D Samantaray An Improved E DEEC Protocol using Periodic and Threshold Sensitive Data Transmission in Heterogeneous Wireless Sensor Network

    Original URL path: http://www.ijorcs.org/manuscript/id/40/rudranath-mitra/a-survey-on-clustering-techniques-for-wireless-sensor-network (2016-05-01)
    Open archived version from archive

  • Texture Classification Based on Gabor Wavelets
    International Journal of Research in Computer Science 2 no 4 2012 39 44 doi 10 7815 ijorcs 24 2012 038 Close Abstract This paper presents the comparison of Texture classification algorithms based on Gabor Wavelets The focus of this paper is on feature extraction scheme for texture classification The texture feature for an image can be classified using texture descriptors In this paper we have used Homogeneous texture descriptor that uses Gabor Wavelets concept For texture classification we have used online texture database that is Brodatz s database and three advanced well known classifiers Support Vector Machine K nearest neighbor method and decision tree induction method The results shows that classification using Support vector machines gives better results as compare to the other classifiers It can accurately discriminate between a testing image data and training data References Cited By Andrew Roberts DB32 Guide to Weka 2005 http www comp leeds ac uk andyr Asadollah Shahbahrami Demid Borodin Ben Juurlink 2007 Comparison between Color and Texture Features for Image Retrieval pp 1 11 B S Manjunath and W Y Ma August 1996 Texture features for browsing and retrieval of image data IEEE Transactions on Pattern Analysis and Machine Intelligence Special Issue on Digital Libraries Vol 18 8 pp 837 842 B S Manjunath P Wu S Newsam H D 2000 A texture descriptor for browsing and similarity retrieval Signal Processing Image Communication pp1 11 Mihran Tuceryan and Anil K Jain 1998 Texture Analysis The handbook of pattern recognition and computer vision 2nd edition pp 207 248 Peng Wu Yong Man Ro Texture Descriptor in MPEG 7 W Skarbek Ed CAIP 2001 LNCS 2124 pp 21 28 Shih Fu Chang Thomas Sikora 2001 Overview of the MPEG 7 Standard IEEE Trans on Circuits and Systems for video technology Special issue on MPEG

    Original URL path: http://www.ijorcs.org/manuscript/id/38/amandeep-kaur/texture-classification-based-on-gabor-wavelets (2016-05-01)
    Open archived version from archive

  • A Study and Comparative Analysis of Conditional Random Fields for Intrusion Detection
    protecting computer systems and networks from abuse Intrusion detection plays one of the key roles in computer security techniques and is one of the prime areas of research Due to complex and dynamic nature of computer networks and hacking techniques detecting malicious activities remains a challenging task for security experts that is currently available defense systems suffer from low detection capability and high number of false alarms An intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic In this paper we study the Machine Learning and data mining techniques to solve Intrusion Detection problems within computer networks and compare the various approaches with conditional random fields and address these two issues of Accuracy and Efficiency using Conditional Random Fields and Layered Approach References Cited By SANS Institute Intrusion Detection FAQ http www sans org resources idfaq 2010 Autonomous Agents for Intrusion Detection http www cerias purdue edu research aafid 2010 CRF Yet Another CRF Toolkit http crfpp sourceforge net 2010 KDD Cup 1999 Intrusion Detection Data http kdd ics uci edu databases kddcup99 kddcup99 html 2010 Overview of Attack Trends http www cert org archive pdf attack trends pdf 2002 Kapil Kumar Gupta Baikunth Nath Ramamohanarao Kotagiri Layered Approach Using Conditional Random Fields for Intrusion Detection IEEE Transactions on Dependable and Secure Computing vol 7 no 1 pp 3 5 49 2010 doi 10 1109 TDSC 2008 20 J P Anderson Computer Security Threat Monitoring and Surveillance http csrc nist gov publications history ande80 pdf 2010 W Lee and S Stolfo Data Mining Approaches for Intrusion Detection Proc Seventh USENIX Security Symp Security 98 pp 79 94 1998 H Shah J Undercoffer and A Joshi Fuzzy Clustering for Intrusion Detection Proc 12th IEEE Int l Conf Fuzzy Systems FUZZ IEEE 03 vol 2 pp 1274 1278 2003 doi 10 1109 FUZZ 2003 1206614 C Kruegel D Mutz W Robertson and F Valeur Bayesian Event Classification for Intrusion Detection Proc 19th Ann Computer Security Applications Conf ACSAC 03 pp 14 23 2003 doi 10 1109 CSAC 2003 1254306 N B Amor S Benferhat and Z Elouedi Naive Bayes vs Decision Trees in Intrusion Detection Systems Proc ACM Symp Applied Computing SAC 04 pp 420 424 2004 W Lee and S Stolfo Data Mining Approaches for Intrusion Detection Proc Seventh USENIX Security Symp Security 98 pp 79 94 1998 H Debar M Becke and D Siboni A Neural Network Component for an Intrusion Detection System Proc IEEE Symp Research in Security and Privacy RSP 92 pp 240 250 1992 doi 10 1109 RISP 1992 213257 Y Du H Wang and Y Pang A Hidden Markov Models Based Anomaly Intrusion Detection Method Proc Fifth World Congress on Intelligent Control and Automation WCICA 04 vol 5 pp 4348 4351 2004 A McCallum Efficiently Inducing Features of Conditional Random Fields Proc 19th Ann Conf Uncertainty in Artificial Intelligence UAI 03 pp 403 410 2003 J Lafferty A McCallum and F

    Original URL path: http://www.ijorcs.org/manuscript/id/37/deepa-guleria/a-study-and-comparative-analysis-of-conditional-random-fields-for-intrusion-detection (2016-05-01)
    Open archived version from archive

  • A Robust Cryptographic System using Neighborhood-Generated Keys
    Ali Shazia Yasin Secure E commerce Protocol International Journal of Computer Science and Security IJCSS Vol 5 No 1 April 2011 pp 742 751 Cheraghchi M Didier F Shokrollahi A Invertible Extractors and Wiretap Protocols IEEE Transactions on Information Theory Volume 58 Issue 2 2012 pp 1254 1274 doi 10 1109 TIT 2011 2170660 Jikai T Chuankun W A Provable Authenticated Certificateless Group Key Agreement With Constant Rounds Journal of Communications and Networks Volume 14 Issue 1 2012 pp 104 110 Zhao S Aggarwal A Frost R Bai X A Survey of Applications of Identity Based Cryptography in Mobile Ad Hoc Networks IEEE Communications Surveys Tutorials Volume 14 Issue 2 2012 pp 380 400 doi 10 1109 SURV 2011 020211 00045 Shyamalendu Kandar Arnab Maiti Bibhas Chandra Dhara Visual Cryptography Scheme for Color Image Using Random Number with Enveloping by Digital Watermarking International Journal of Computer Science Issues Vol 8 Issue 3 No 1 2011 pp 543 549 Kamlesh Gupta Sanjay Silakari ECC over RSA for Asymmetric Encryption A Review International Journal of Computer Science Issues Vol 8 Issue 3 No 2 May 2012 pp 370 375 Nicanfar H Leung V C M EIBC Enhanced Identity Based Cryptography a Conceptual Design IEEE International Systems Conference SysCon 2012 pp 1 7 doi 10 1109 SysCon 2012 6189541 Y Fang X Zhu and Y Zhang Securing Resource Constrained Ad hoc Networks Wireless Communication Vol 16 No 2 2009 pp 24 29 Y Zhang W Liu W Lou and Y Fang Securing Mobile Ad hoc Networks with Certificateless Public Keys IEEE Transaction on Dependable Security and Computation Vol 3 No 4 2006 pp 386 399 doi 10 1109 TDSC 2006 58 Shazia Yasin Khalid Haseeb Rashid Jalal Qureshi Cryptography Based E Commerce Security A Review International Journal of Computer Science Issues Vol 9 Issue 2 No 1 March 2012 pp 132 137 Sanjay Jahdav Viddhulata Mohite A Data Hiding Technique Based on Length of English Text Using DES and Attacks International Journal of Research in Computer Science Volume 2 Issue 4 2012 pp 23 29 Shiguo Lian Jinsheng Sun Zhiquan Wang A block cipher based on a suitable use of the chaotic standard map Solitons and Fractals Vol 26 2005 pp 117 129 doi 10 1016 j chaos 2004 11 096 Kulis B and Darrell T Learning to hash with binary reconstructive embeddings In NIPS 22 2010 Landwehr C Boneh D Mitchell J C Bellovin S M Landau S Lesk M E Privacy and Cybersecurity The Next 100 Years IEEE Proceedings Volume 100 Issue Special Centennial Issue 2012 pp 1659 1673 doi 10 1109 JPROC 2012 2189794 Ritter T Linear Cryptanalysis A Literature Survey Available www ciphersbyritter com RES LINANA HTM Schaefer E Linear Cryptanalysis of Block Ciphers Available http math scu edu eschaefe linear pdf Bar El H Introduction to Side Channel Attacks Discretix Technologies Ltd Available www discretix com PDF Introduction 20to Side 20Channel 20Attacks pdf Chong H K Improved Differential Fault Analysis on AES Key Schedule IEEE Transactions on Information

    Original URL path: http://www.ijorcs.org/manuscript/id/41/samuel-king-opoku/a-robust-cryptographic-system-using-neighborhood-generated-keys (2016-05-01)
    Open archived version from archive

  • Development of an E-Learning System Incorporating Semantic Web
    Learning is efficient task relevant and just in time learning grown from the learning requirements of the new and dynamically changing world The term Semantic Web covers the steps to create a new WWW architecture that augments the content with formal semantics enabling better possibilities of navigation through the cyberspace and its contents In this paper we present the Semantic Web Based model for our e learning system taking into account the learning environment at Saudi Arabian universities The proposed system is mainly based on ontology based descriptions of content context and structure of the learning materials It further provides flexible and personalized access to these learning materials The framework has been validated by an interview based qualitative method References Cited By B Ruttenbur G Spickler and S Lurie eLearning The Engine of the Knowledge Economy Morgan Keegan Co Inc eLearning Industry Report 2001 109 p L Stojanovic S Staab and R Studer eLearning basedon the Semantic Web Web Net 2001 World Conference on the WWW and Internet Orlando Florida USA 2001 Heflin J Hendler J A Portrait of The Semantic Web in Action IEEE Intelligent Systems 16 2 54 59 2001 doi 10 1109 5254 920600 Gómez Pérez A Corcho O Ontology Languages for the Semantic Web IEEE Intelligent Systems 17 1 54 60 2002 doi 10 1109 5254 988453 McIlraith S A Son T C Zeng H Semantic Web Services IEEE Intelligent Systems 16 2 46 53 2001 doi 10 1109 5254 988453 W3C site http www w3c org see www w3 org XML www w3 org RDF www w3 org TR 2004 REC owl features 2004 0210 andhttp www w3 org 2000 10 swap Primer html Scott Cost R Finin T Joshi A Peng Y Nicholas C Soboroff I et al IT talks A Case Study in the Semantic Web and DAML OIL IEEE Intelligent Systems 17 1 40 47 2002 doi 10 1109 5254 988447 Junuz E 2009 Preparation of the Learning Content for Semantic E Learning Environment doi 10 1109 5254 988447 Berners Lee T Hendler J Lassila O 2001 The Semantic Web Scientific American Magazine doi 10 1038 scientificamerican0501 34 W3C Semantic Web 2008 Retrieved 2010 from World Wide Web Consortium Berners Lee T 2000 What the Semantic Web can represent http www w3 org DesignIssues RDFnot html Stumme G Hotho A Berendt B 2005 Semantic Web Mining State of the Art and the Future Directions Romero C Ventura S Garcia E 2007 Data Mining in Course Management Systems Moodle Case Study and Tutorial doi 10 1016 j eswa 2006 04 005 Biswanath Dutta Semantic Web Based E learning Documentation Research and Training Centre Indian Statistical Institute Bangalore 2006 Yas A Alsultanny e Learning System Overview based on Semantic Web Graduate College of Computing Studies Amman Jordan 2006 Dario Bonino FulvioCorno Giovanni Squillero Dynamic Optimization of Semantic Annotation Relevance Dipartimento di Automaticaed Informatica Politecnico di Torino Torino Italy Lect Dr Sabin Buraga Lect Dr Marius Cioca Modeling Aspectsof Semantic Web based E learning System

    Original URL path: http://www.ijorcs.org/manuscript/id/42/khurram-naim-shamsi/development-of-an-e-learning-system-incorporating-semantic-web (2016-05-01)
    Open archived version from archive

  • Study of Influencing Factors of Tender Evaluation: An Evidential Reasoning Approach
    both quantitative and qualitative data is applied to find out the influencing factors as a means of solving the tender evaluation problem The process of building a multiple criteria decision model of a hierarchical structure is presented in which both quantitative and qualitative information is represented in a unified manner By using a case study of Bangladesh the tender evaluation problem is then fully investigated using the ER approach Finally we show the rank of influencing factors of best tender References Cited By Guidelines on tender Evaluation using weighted criteria for Building Works and Services Tasmania Department Of Treasury And Finance version 2 0 pp 1 12 2006 Standard Tender Documents Procurement of Works User Guide European Bank for Reconstruction and development pp 1 122 August 2010 J B Yang and M G Singh An Evidential Reasoning Approach for Multiple Attribute Decision Making with Uncertainty IEEE Trans Syst Man Cybern vol 24 no 1 pp 1 4 1994 J B Yang and D L Xu On the Evidential Reasoning Algorithm for Multiple Attribute Decision Analysis with Uncertainty IEEE Trans Syst Man Cybern A vol 32 pp 289 304 May 2002 J B Yang and D L Xu Nonlinear Information Aggregation via Evidential Reasoning in Multiattribute Decision Analysis Under Uncertainty IEEE Trans Syst Man Cybern A vol 32 no 4 pp 376 393 May 2002 J B Yang Rule and Utility Based Evidential Reasoning Approach for Multiple Attribute Decision Analysis Under Uncertainty Eur J Oper Res vol 131 no 1 pp 31 61 2001 doi 10 1016 S0377 2217 99 00441 5 D L Xu Assessment of Nuclear Waste Repository Options Using the Er Approach Int J of I T DM vol 8 no 3 pp 581 607 2009 doi 10 1142 S021962200900351X P Gustafsson R Lagerström P Närman and M Simonsson The Ics Dempster Shafer how to unpublished Y Wang J B Yang and D L Xu Environmental Impact Assessment using the Evidential Reasoning Approach Eur J Oper Res vol 174 pp 1885 1913 2005 M Soenmez J B Yang G D Holt Addressing the contractor selection problem using an evidential reasoning approach Blackwell Science Ltd Engineering Construction and Architectural Management vol 8 no 3 pp 198 210 2001 M Soenmez J B Yang G D Holt G Graham Applying Evidential Reasoning to Prequalifying Construction Contractors Journal of Management in Engineering vol 18 no 3 pp 111 119 July 2002 G Graham G Hardakder Contractor Evaluation in the Aerospace Industry using the Evidential Reasoning Approach Journal of Research in Marketing Entrepreneurship vol 3 no 3 pp 162 173 2001 L E Clarker Factors in the Selection of Contractors for University of Southern Queensland Faculty of Engineering and Surveying pp 1 172 November 2007 E purchase to check rigged bids 2009b Daily Star Online Available at http www thedailystar net story php nid 77043 Accessed on April 25 2010 Public procurement and corruption 2010 Daily Star Online Available at www thedailystar net law 2010 04 04 watch htm Accessed on April

    Original URL path: http://www.ijorcs.org/manuscript/id/43/mohammad-salah-uddin-chowdury/study-of-influencing-factors-of-tender-evaluation-an-evidential-reasoning-approach (2016-05-01)
    Open archived version from archive



  •