default search action
International Journal of Computer Applications in Technology, Volume 68
Volume 68, Number 1, 2022
- Huili Wei, Shan Chen, Tianhong Pan, Jun Tao, Mingxing Zhu:
Capacity configuration optimisation of hybrid renewable energy system using improved grey wolf optimiser. 1-11 - Parul Choudhary, Rakesh Kr. Dwivedi, Umang Singh:
An analysis of real-time traffic congestion optimisation through VTL in VANETs. 12-26 - Bayang Zhang, Yaohong Zhu, Fachao Li, Jiawei Wang, Jue Zhu:
Numerical simulation of full-scale steel-frame undergoing soil pressure. 27-38 - Seema P. Nehete, Satish R. Devane:
Confirmed quality aware recommendations using collaborative filtering and review analysis. 39-48 - Qunpo Liu, Xiulei Xi, Weicun Zhang, Lingxiao Yang, Naohiko Hanajima:
Improved image matching algorithm based on LK optical flow and grid motion statistics. 49-57 - Mazin Kadhum Hameed, Ali Kadhum Idrees:
Sensor device scheduling-based cuckoo algorithm for enhancing lifetime of cluster-based wireless sensor networks. 58-69 - Sonia Aimene, Idir Rassoul:
Integration of ubiquitous specifications in the conception of objects system. 70-81 - Imen Ferjani, Minyar Sassi Hidri, Ali Frihida:
SiNoptiC: swarm intelligence optimisation of convolutional neural network architectures for text classification. 82-100
Volume 68, Number 2, 2022
- Onoise Gerald Kio, Lik-Kwan Shark:
Geometric distortion correction for projections on non-planar and deformable surfaces based on displacement of peripheral image points. 101-113 - Ayoub Sabraoui, Anas Abouzahra, Karim Afdel:
Metamodel extension approach applied to the model-driven development of mobile applications. 114-131 - Chao Wang, Ruifei Zhu:
Optical satellite image MTF compensation for remote-sensing data production. 132-142 - Mingyu Ji, Xinhai Zhang:
Research on semantic similarity calculation methods in Chinese financial intelligent customer service. 143-149 - Bijan Nahavandi, Mahdi Homayounfar, Amir Daneshvar, Mohammad Shokouhifar:
Hierarchical structure modelling in uncertain emergency location-routing problem using combined genetic algorithm and simulated annealing. 150-163 - Aymen Belghith:
Vulnerability assessment of services deployed in internet of things based smart cities. 164-174 - Pramod J. Bide, Sudhir Dhage:
Cross event detection and topic evolution analysis in cross events for man-made disasters in social media streams. 175-188 - Yunli Ren, Huaixin Liang, Jialin Song, Cunfang Zheng, Wenxue Hong:
Rule acquisition based on attribute partial order structure diagram. 189-202
Volume 68, Number 3, 2022
- Rida Mubashar, Mazhar Javed Awan, Muhammad Ahsan, Awais Yasin, Vishwa Pratap Singh:
Efficient residential load forecasting using deep learning approach. 205-214 - Mazhar Javed Awan, Muhammad Asad Khan, Zain Khalid Ansari, Awais Yasin, Hafiz Muhammad Faisal Shehzad:
Fake profile recognition using big data analytics in social media platforms. 215-222 - Ch Rajyalakshmi, Katta Subba Rao, R. Rajeswara Rao:
Comparative study of satellite multispectral image data processing with MapReduce and classification algorithm. 223-227 - Sudeshna Chakraborty, Vijay Bhanudas Gujar, Tanupriya Choudhury, Bhupesh Kumar Dewangan:
Improving software performance by automatic test cases through genetic algorithm. 228-234 - Abdulrahman Khamaj:
Towards an enhanced user experience with critical system interfaces in middle-eastern countries: a case study of usability evaluation of Saudi Arabia's weather interface system (Arsad). 235-241 - Pritidhara Hota, Bhagirathi Nayak, Sunil Kumar Mishra, Pratima Sarangi:
Management techniques and methods of total quality management implementation in management institutions of Odisha. 242-251 - N. Indumathi, R. Ramalakshmi:
Application of hazard identification and risk assessment for reducing the occupational accidents in firework industries - specific reference to Sivakasi. 252-259 - Amna Khalil, Mazhar Javed Awan, Awais Yasin, Vishwa Pratap Singh, Hafiz Muhammad Faisal Shehzad:
Flight web searches analytics through big data. 260-268 - Khaled Mohammed Al-Hamad, Anas Romaih Obaid, Ahmed S. Al-Obeidi:
The electrical circuit of a new seven-dimensional system with 21 boundaries and the phenomenon of complete synchronisation. 269-276 - Sudan Jha, Sidheswar Routray, Sultan Ahmad:
An expert system-based IoT system for minimisation of air pollution in developing countries. 277-285 - Guruprasad Dash, Bhagirathi Nayak:
An empirical study for customer relationship management in banking sector using machine learning techniques. 286-291 - Sumit Arun Hirve, Ch. Pradeep Reddy:
Data visualisation using augmented reality for education system. 292-297 - Hassan Jalel Hassan, Ghaida Muttasher Abdulsaheb, Osamah Ibrahim Khalaf:
Design of QoS on data collection in wireless sensor network for automation process. 298-304 - Nasser H. Binsaif:
Application of information technology to e-commerce. 305-311
Volume 68, Number 4, 2022
- Yanxin Zhang, Jing Chen, Yan Pu:
Biased compensation adaptive gradient algorithm for rational model with time-delay using self-organising maps. 313-320 - Roland Bartók, József Vásárhelyi:
Design of a FPGA accelerator for the FIVE fuzzy interpolation method. 321-331 - Paduloh Paduloh, Rifki Muhendra:
Overheat protection for motor crane hoist using internet of things. 332-344 - Shailendra Mishra, Waleed Bander Alotaibi, Mohammed Alshehri, Sharad Saxena:
Cyber-attacks visualisation and prediction in complex multi-stage network. 345-356 - Ali Kadhum M. Al-Qurabat, Hussein M. Salman, Abd Alnasir Riyadh Finjan:
Important extrema points extraction-based data aggregation approach for elongating the WSN lifetime. 357-368 - Liriam Enamoto, Alan R. Santos, Ricardo Maia, Weigang Li, Geraldo P. Rocha Filho:
Multi-label legal text classification with BiLSTM and attention. 369-378 - Mourad Chaa, Zahid Akhtar, Uroosa Sehar:
Finger-Knuckle-Print verification by fusing invariant texture and structure scores. 379-388 - Aaron Rasheed Rababaah, James Wolfer:
Convolution neural network model for an intelligent solution for crack detection in pavement images. 389-396 - Rachana Yogesh Patil:
DDoS attack detection and defence mechanism based on second-order exponential smoothing: Holt's model. 397-404 - Rachana Yogesh Patil:
Digital forensics evidence management based on proxy re-encryption. 405-413
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.