Journal of Computer Applications in Technology, Volume 44 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 44, Number 1, 2012

Badr Haque:
Overcoming the challenges of automating and integrating virtual product development processes. 1-11

Yogesh Singh, Anju Saha:
Prediction of testability using the design metrics for object-oriented software. 12-22

Sa'ed Abed
, Kamran Hussain, Otmane Aït Mohamed:
Abstract property language for MDG model checking methodology. 23-36

Lidong Wang:
Enhanced homeland security and disaster emergency operations based on biometrics and RFID. 37-45

Jindan Feng, De-chen Zhan, Lanshun Nie, Xiaofei Xu
:
A feature-oriented approach to platform-specific modelling of coarse-grained components. 46-60

Peng Shao, Travis Atkison, Nicholas A. Kraft, Randy K. Smith:
Combining lexical and structural information for static bug localisation. 61-71
Volume 44, Number 2, 2012

Yong-wei Zhang, Lei Wang, Qidi Wu:
Modified Adaptive Cuckoo Search (MACS) algorithm and formal description for global optimisation. 73-79

Degang Xu, Renbin Xiao:
Modelling and intelligent solving of foodstuff distribution VRP based on disruption management. 80-87

Yi Zhang, Meng Zhang, Zhi-Li Pei:
Application with a hybrid ant colony optimisation in motif detecting problem. 88-93

Shizhong Chen, Sanyou Zeng, Yihui Lu, Zhengjun Li:
Automated antenna design using paralleled differential evolution algorithm. 94-100

Fengyun Li, Guiran Chang, Lan Yao, Fuxiang Gao:
Cooperative game-based routing approach for wireless sensor network. 101-108

Li Zhao, Jingkun Liang:
Cellular automata based nearest neighbour rule condensation. 109-116

Ji-Shan Fan:
Multi-region particle swarm optimisation algorithm. 117-123

You-Lian Zheng, Yuan-Xiang Li:
Artificial bee colony algorithm for fuzzy job shop scheduling. 124-129

Ling Chen, Wei Liu, Ling Qin, Bolun Chen:
An ant colony optimisation algorithm for constructing phylogenetic tree. 130-136

Xianjun Shen, Yanan Li, Caixia Chen, Jincai Yang, Dabin Zhang:
Greedy continuous particle swarm optimisation algorithm for the knapsack problems. 137-144

Ke Zhang, Shengze Wang:
Parallelism errors evaluation using a hybrid optimisation algorithm. 152-158

Huawang Shi:
Particle swarm optimisation-based support vector machine for intelligent fault diagnosis. 159-164

Jun-Lin Li, An-Qiang Dong, Xiu-Feng Xie:
Distributed disciplines of stress field near interface crack tip of double dissimilar materials and experiments' verification. 165-170
Volume 44, Number 3, 2012

Gang Shen, Yan-Qing Zhang:
An evolutionary linear programming algorithm for solving the stock reduction problem. 171-179

Gilmario B. Santos, Alexandre Gonçalves Silva
, Rangel Arthur:
Maps of distances for evaluating the tracking and measurement of electrical arcs by 3D-snake. 180-187

Bo Chen, Wenjia Liu:
A web-based structural health monitoring sensor network. 188-197

Tarek Al-Hawari
, Shadi Al-Bo'ol, Amer M. Momani
:
A software application for the selection of temperature measuring sensors using the analytic hierarchy process. 198-209

Ahmed Ali, Kenji Terada:
A fast approach for person detection and tracking. 210-216

Paulraj Ranjith Kumar
, Sankaran Palani:
An efficient energy and schedule length model for multiprocessor computers. 217-225

Julian Rojas Salazar, Seyed Omid Mobasseri, Sangarappillai Sivaloganathan:
Equivalent rigidity method for estimating the natural frequency of telescopic cantilever beams. 226-234
Volume 44, Number 4, 2012

Jianhua Zhang, Lilong Du, Aiping Wang, Hong Wang:
An entropy approach to filtering for networked control systems. 243-248

Shuhui Bi, Mingcong Deng
:
Operator-based robust control of MIMO aluminium plate thermal process. 249-256

Jun Wu, Yongji Wang, Jian Huang
, Kexin Xing:
Sliding mode control with fuzzy compensator of pneumatic muscle actuator. 257-268

C. Esakkiappan
, T. Thyagarajan:
Identification of inverse response process with time delay using relay feedback test. 269-275

Fei Yan, Yan Zhuang, Wei Wang:
Mobile robot 3D map building and path planning based on multi-sensor data fusion. 276-283

O. V. Ramana Murthy
, Madasu Hanmandlu:
An approach to offline handwritten Devanagari word segmentation. 284-292

G. Subashini
, M. C. Bhuvaneswari:
Task allocation in distributed computing systems using adaptive particle swarm optimisation. 293-302

Subramaniam Parasuraman, Soh Chin Yun:
Mobile robot navigation: neural Q-learning. 303-311

V. Shanmughaneethi, Ra. Yagna Praveen, S. Swamynathan:
CIVD: detection of command injection vulnerabilities in web services through aspect-oriented programming. 312-320

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







