Journal cover image

Browse issues


Vol. 56
Vol. 55
Vol. 54
Vol. 53
Vol. 52
Vol. 51
Vol. 50
Vol. 49
Vol. 48
Vol. 47
Vol. 46
Vol. 45
Vol. 44
Vol. 43
Vol. 42
Vol. 41
Vol. 40
Vol. 39
Vol. 38
Vol. 37
Vol. 36
Vol. 35
Vol. 34
Vol. 33
Vol. 32
Vol. 31
Vol. 30
Vol. 29
Vol. 28
Vol. 27
Vol. 26
Vol. 25
Vol. 24
Vol. 23
Vol. 22
Vol. 21
Vol. 20
Vol. 19
Vol. 18
Vol. 17
Vol. 16
Vol. 15
Vol. 14
Vol. 13
Vol. 12
Vol. 11
Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Computer Applications in Technology

2016 Vol. 54 No. 3

 

PagesTitle and authors
151-160Improving hand vein recognition by score weighted fusion of wavelet-domain multi-radius local binary patterns
Yiding Wang; Qiangyu Duan; Lik-Kwan Shark; Di Huang
DOI: 10.1504/IJCAT.2016.10000485

161-170Optimal design on the web stiffening and lip angle of cold-formed channel steel members
Yin-Hai Zhao; Xu-Hao Huang; Guo-Jun Sun; Lu Lu; Jue Zhu
DOI: 10.1504/IJCAT.2016.10000469

171-183A knowledge-based framework for automated layout design in an industrial environment
Andrea Egidio Ascheri; Francesco Furini; Giorgio Colombo; Eleonora Atzeni; Massimo Ippolito
DOI: 10.1504/IJCAT.2016.10000478

184-191A proposed priority dynamic quantum time algorithm to enhance varying time quantum round robin algorithm
Maysoon A. Mohammed; Mazlina AbdulMajid; Balsam A. Mustafa
DOI: 10.1504/IJCAT.2016.10000486

192-200Applying semantic web and big data techniques to construct a balance model referring to stakeholders of tourism intangible cultural heritage
Meiyu Shi; Wei Zhu; Hongji Yang; Chen Li
DOI: 10.1504/IJCAT.2016.10000522

201-210Sensitive dependence of complex systems: an agent-based modelling demonstration
Mahmoud T. Khasawneh; Jun Zhang
DOI: 10.1504/IJCAT.2016.10000456

211-219Improved control scheme of stand-alone DFIG-based wind energy conversion system with battery energy storage system
Dan-Yun Li; Qun-Tai Shen; Zhen-Tao Liu; Hui Wang
DOI: 10.1504/IJCAT.2016.10000523

220-228A tabu search method for block erection scheduling in shipbuilding with activity resource elasticity
Lei Wang; Lanshun Nie; Dechen Zhan
DOI: 10.1504/IJCAT.2016.10000458

229-235Convertible multi-authenticated encryption scheme with verification based on elliptic curve discrete logarithm problem
Nedal Tahat
DOI: 10.1504/IJCAT.2016.10000490