Journal cover image

Browse issues

Vol. 58
Vol. 57
Vol. 56
Vol. 55
Vol. 54
Vol. 53
Vol. 52
Vol. 51
Vol. 50
Vol. 49
Vol. 48
Vol. 47
Vol. 46
Vol. 45
Vol. 44
Vol. 43
Vol. 42
Vol. 41
Vol. 40
Vol. 39
Vol. 38
Vol. 37
Vol. 36
Vol. 35
Vol. 34
Vol. 33
Vol. 32
Vol. 31
Vol. 30
Vol. 29
Vol. 28
Vol. 27
Vol. 26
Vol. 25
Vol. 24
Vol. 23
Vol. 22
Vol. 21
Vol. 20
Vol. 19
Vol. 18
Vol. 17
Vol. 16
Vol. 15
Vol. 14
Vol. 13
Vol. 12
Vol. 11
Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Computer Applications in Technology

2014 Vol. 49 No. 3/4

Special Issue on Computational Optimisation and Engineering Applications

Guest Editors: Dr. Wei Huang, Professor Carsten Maple, Professor Hongji Yang and Dr. Paul Sant


PagesTitle and authors
192-206TGSR: the great salmon run optimisation algorithm
Alireza Fathi; Ahmad Mozaffari
DOI: 10.1504/IJCAT.2014.062357

207-226Bio-inspired algorithms for multilevel image thresholding
Salima Ouadfel; Souham Meshoul
DOI: 10.1504/IJCAT.2014.062358

227-238Scheduling and optimisation of batch plants: model development and comparison of approaches
Yaqing Tan; Wei Huang; Yanming Sun; Yong Yue
DOI: 10.1504/IJCAT.2014.062359

239-250Improving production quality of a hot-rolling industrial process via genetic programming model
Alaa F. Sheta; Hossam Faris; Ertan Öznergiz
DOI: 10.1504/IJCAT.2014.062360

251-262Taxonomy of optimisation techniques and applications
Carsten Maple; Edmond Prakash; Wei Huang; Adnan N. Qureshi
DOI: 10.1504/IJCAT.2014.062361

263-269Two novel sweep-based heuristics for the vehicle routing problem
Abdesslem Layeb; Salim Chikhi
DOI: 10.1504/IJCAT.2014.062362

270-281The sub-pixel efficacy region of the bivariate linear interpolation function
Carlo Ciulla; Fadi P. Deek
DOI: 10.1504/IJCAT.2014.062363

282-296QoS routing and rerouting optimisation in cognitive network
Xingwei Wang; Hui Cheng; Min Huang
DOI: 10.1504/IJCAT.2014.062364

297-305A visual cryptography copyright protection method based on artificial bee colony algorithm
Yongchang Chen; Weiyu Yu; Jiuchao Feng
DOI: 10.1504/IJCAT.2014.062365

306-315Pose robust face recognition based on kernel regression in Bayesian framework
Ying Chen; Longyuan Zhang; Xiuxiao Guo
DOI: 10.1504/IJCAT.2014.062366

316-324Modelling of stable angle-based instability threat indicator for articulated off-road vehicles
Qingyuan Zhu; Haoyu Chen; Jian Yi; Chenglu Wen; Huosheng Hu
DOI: 10.1504/IJCAT.2014.062367

325-331Parallel genetic algorithm with fading selection
Andranik S. Akopov
DOI: 10.1504/IJCAT.2014.062368

332-339A real-time interaction strategy for virtual maintenance based on motion capture
Gangfeng Deng; Xianxiang Huang; Qinhe Gao; Quanmin Zhu; Zhili Zhang; Ying Zhan
DOI: 10.1504/IJCAT.2014.062369

340-351Adaptive terminal sliding mode control for finite-time chaos synchronisation with uncertainties and unknown parameters
Yang Li; Xueli Wu; Quanmin Zhu; Jianhua Zhang
DOI: 10.1504/IJCAT.2014.062370

352-364Geometrical face recognition after plastic surgery
Shaimaa Ahmed El-said; Hossam Mohamed Abol Atta
DOI: 10.1504/IJCAT.2014.062371

365-371An investigation of information security as a service practice: case study in healthcare
Chalee Vorakulpipat; Siwaruk Siwamogsatham; Asanee Kawtrakul
DOI: 10.1504/IJCAT.2014.062372

372-377Use partly hidden Markov model to evaluate a future failure
Asmaa Boughrara; Belhadri Messabih
DOI: 10.1504/IJCAT.2014.062373