Journal of Computer Applications in Technology, Volume 49 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 49, Number 1, 2014

Frederico Grilo, João Figueiredo
, Octavio Dias:
Adaptive method for improvement of human skin detection in colour images. 1-11

Yun Du, Quanmin Zhu, Sabir Ghauri, Jianhua Zhai, Fan-Hua Meng, Yongchun Liang:
Review on reliability in pipeline robotic control systems. 12-21

Yogesh Singh, Arvinder Kaur, Ruchika Malhotra:
A comparative study of models for predicting fault proneness in object-oriented systems. 22-41

Bin Ma, Shuhai Bian, Kuan Huang, Changtao Wang, Zhonghua Han, Song Lin:
A study and analysis of digital image processing and recognition algorithms. 42-49

Maen Hammad, Mustafa Hammad
, Mohammad Bsoul:
An approach to automatically enforce object-oriented constraints. 50-59

Dongya Zhao, Jian Zhang, Zhaomin Li, Qingfang Li, Haili Liu, Shijian Lu:
An engineering-economic model for CO2 pipeline transportation in China. 60-68

Godfrey Winster Sathianesan
, S. Swamynathan:
Ontology-based blog collection and profile-based personalised ranking. 69-79

M. Maheswari
, G. Seetharaman:
Design of a novel error correction coding with crosstalk avoidance for reliable on-chip interconnection link. 80-88
Volume 49, Number 2, 2014

Hani Bani-Salameh
, Clinton L. Jeffery:
Collaborative and social development environments: a literature review. 89-103

Xiaodong Xu, Yi Zhang, Shuo Zhang, Huosheng Hu
:
3D hand gesture tracking and recognition for controlling an intelligent wheelchair. 104-112

L. R. Sudha, R. Bhavani:
A combined classifier kNN-SVM in gait-based biometric authentication system. 113-121

M. Ait Oussous, Noureddine Alaa, Youssef Ait Khouya:
Anisotropic and nonlinear diffusion applied to image enhancement and edge detection. 122-133

Nehru Kandasamy
, A. Shanmugam:
Design of high-performance low-power full adder. 134-140

Jiali Yang, Guanlin Wang, Jihong Zhu
:
Frequency-domain identification of a small-scale unmanned helicopter with harmony search algorithm. 141-149

Qianlei Cao, Shurong Li, Dongya Zhao:
Adaptive motion/force control of constrained manipulators using a new fast terminal sliding mode. 150-156

Fatima Zohra Laallam, Mohammed Lamine Kherfi, Sidi Mohamed Benslimane
:
A survey on the complementarity between database and ontologies: principles and research areas. 166-187
Volume 49, Numbers 3/4, 2014

Alireza Fathi
, Ahmad Mozaffari:
TGSR: the great salmon run optimisation algorithm. 192-206

Salima Ouadfel
, Souham Meshoul
:
Bio-inspired algorithms for multilevel image thresholding. 207-226

Yaqing Tan, Wei Huang, Yanming Sun
, Yong Yue
:
Scheduling and optimisation of batch plants: model development and comparison of approaches. 227-238

Alaa F. Sheta
, Hossam Faris
, Ertan Öznergiz:
Improving production quality of a hot-rolling industrial process via genetic programming model. 239-250

Carsten Maple, Edmond Prakash, Wei Huang, Adnan N. Qureshi:
Taxonomy of optimisation techniques and applications. 251-262

Abdesslem Layeb
, Salim Chikhi
:
Two novel sweep-based heuristics for the vehicle routing problem. 263-269

Carlo Ciulla, Fadi P. Deek:
The sub-pixel efficacy region of the bivariate linear interpolation function. 270-281

Xingwei Wang, Hui Cheng
, Min Huang:
QoS routing and rerouting optimisation in cognitive network. 282-296

Yongchang Chen, Weiyu Yu, Jiuchao Feng:
A visual cryptography copyright protection method based on artificial bee colony algorithm. 297-305

Ying Chen, Longyuan Zhang, Xiuxiao Guo:
Pose robust face recognition based on kernel regression in Bayesian framework. 306-315

Qingyuan Zhu, Haoyu Chen, Jian Yi, Chenglu Wen
, Huosheng Hu
:
Modelling of stable angle-based instability threat indicator for articulated off-road vehicles. 316-324

Andranik S. Akopov
:
Parallel genetic algorithm with fading selection. 325-331

Gangfeng Deng, Xianxiang Huang, Qinhe Gao, Quanmin Zhu, Zhili Zhang, Ying Zhan:
A real-time interaction strategy for virtual maintenance based on motion capture. 332-339

Yang Li
, Xueli Wu, Quanmin Zhu, Jianhua Zhang
:
Adaptive terminal sliding mode control for finite-time chaos synchronisation with uncertainties and unknown parameters. 340-351

Shaimaa Ahmed El-Said
, Hossam Mohamed Abol Atta:
Geometrical face recognition after plastic surgery. 352-364

Chalee Vorakulpipat, Siwaruk Siwamogsatham, Asanee Kawtrakul:
An investigation of information security as a service practice: case study in healthcare. 365-371

Asmaa Boughrara
, Belhadri Messabih
:
Use partly hidden Markov model to evaluate a future failure. 372-377

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







