International Journal of Computer Applications in Technology (Int J Comput Appl Tech )

Publisher: Inderscience

Journal description

IJCAT addresses issues of computer applications, information and communication systems, software engineering and management, CAD/CAM/CAE, numerical analysis and simulations, finite element methods and analyses, robotics, computer applications in multimedia and new technologies, computer aided learning and training. The objective of IJCAT is to help professionals working in the field, educators and policy makers to contribute, to disseminate information and to learn from each other's work. IJCAT also aims at establishing channels of communication between Centres of Excellence for computer applications, computer manufacturers, software developers and users worldwide. IJCAT is the official publication of the International Network of Centres for Computer Applications (INCCA).

Current impact factor: 0.00

Impact Factor Rankings

2015 Impact Factor Available summer 2015
2000 Impact Factor 0.041
1999 Impact Factor 0.068
1998 Impact Factor 0.015
1997 Impact Factor 0.058

Impact factor over time

Impact factor

Additional details

5-year impact 0.00
Cited half-life 0.00
Immediacy index 0.00
Eigenfactor 0.00
Article influence 0.00
Website International Journal of Computer Applications in Technology website
Other titles IJCAT
ISSN 0952-8091
OCLC 163253392
Material type Internet resource
Document type Internet Resource, Computer File, Journal / Magazine / Newspaper

Publisher details


  • Pre-print
    • Author can archive a pre-print version
  • Post-print
    • Author cannot archive a post-print version
  • Restrictions
    • 6 months embargo
  • Conditions
    • Cannot archive until publication
    • Author's pre-print and Author's post-print on author's personal website, institutional repository or subject repository
    • Publisher copyright and source must be acknowledged
    • Must link to journal webpage and /or DOI
    • Publisher's version/PDF cannot be used, unless covered by funding agency rules
    • Authors covered by funding agency rules, may post the Publisher's Version/PDF in subject repositories after a 6 months embargo
    • Reviewed 10/02/2014
    • Author's post-print equates to Inderscience's Proof
  • Classification
    ​ yellow

Publications in this journal

  • International Journal of Computer Applications in Technology 07/2015; 12(I):233-240.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Abstract This paper proposes a two-stage multiple-scan Total Variation (TV) median filter for speckle noise reduction. In the first stage, the total variation method is applied to the speckled image. It is based on the principle that signals with excessive and possibly spurious detail have high total variation, that is, the integral of the absolute gradient of the signal is high. In the second stage, the image is scanned from three other directions also and the above mentioned method is applied to all the scans. The value of each pixel in the final output is then calculated by taking the median of the corresponding pixel in the four scans. The proposed technique is very effective for both low and high level speckle noise corrupted images. Extensive computer simulations indicate that this technique provides significant improvement over many other existing techniques in terms of PSNR.
    International Journal of Computer Applications in Technology 09/2014; 2:28-31.
  • International Journal of Computer Applications in Technology 09/2014;
  • [Show abstract] [Hide abstract]
    ABSTRACT: The vehicle routing problem (VRP) is a well-known complex problem and widely used in supply chains. The objective is to construct an optimal set of routes serving a number of customers under some constraints. The purpose of this study is to present two novel heuristics based on a new density distance which uses the polar coordinates of the sweep algorithm and the customer demand. The proposed algorithms use the ratio between the customer demands and the polar coordinates as ordering criteria. The proposed heuristics are based on three steps. In the first step, a giant tour is constructed by using two new ordering criteria. Next, the split procedure is applied to get feasible routes subject to the vehicles' capacities. Finally, each route of the constructed solution is improved by the application of the nearest neighbour heuristic. The results of the experiment indicate that the proposed heuristics are encouraging
    International Journal of Computer Applications in Technology 06/2014; 49(3/4):263 - 269.
  • [Show abstract] [Hide abstract]
    ABSTRACT: To reduce the effect brought by variation of pose, a face recognition system is proposed, in which the correlation between two faces by probabilistic models is computed and the gallery is extended with profile faces generated by a regression-based method. Each face is divided into 3 × 3 regions, and by measuring the distance between the two corresponding regions the distributions of similarities are learned and Bayesian models are formed for each region. These probabilistic models are used to determine whether two faces belong to the same subject. Besides, the gallery is expanded with profile facial images. With this approach, the landmarks on non-frontal faces can be estimated from their frontal landmarks by the mappings learned offline via kernel rank reduced regression (KRRR). Then the profile images are achieved by piecewise affine warping from the corresponding frontal face. Experiments indicate the proposed method performed well, especially when the head rotation angle is large.
    International Journal of Computer Applications in Technology 01/2014; 49(3/4):ications in Technology.
  • [Show abstract] [Hide abstract]
    ABSTRACT: The purpose of the current research is to introduce a novel heuristic natural inspired optimisation algorithm based on the annual migration of salmons and common the menaces that lie behind their pathways. This simulation provides a powerful tool for optimising complex multi-dimensional and multi-modal problems. For demonstrating the high robustness and acceptable quality of the great salmon run (TGSR), it is compared with some well-known optimisation techniques such as genetic algorithm (GA), particle swarm optimisation (PSO) and artificial bee colony (ABC). Simulated experiments are conducted on several benchmark problems and one real-life engineering problem. The obtained results confirm the high performance of the proposed method in both robustness and quality for different optimisation problems.
    International Journal of Computer Applications in Technology 01/2014; 49(3/4):ications in Technology.
  • [Show abstract] [Hide abstract]
    ABSTRACT: This paper presents a new method to identify the model of a small-scale helicopter in frequency domain using harmony search (HS) algorithm. The dynamics of the small-scale helicopter are simplified to four single-input/single-output (SISO) linear subsystems near the hover point, and the HS optimisation algorithm is used to identify each subsystem's parameters. Time-domain verification is made to check the validity of the identified models. The verification results show that the identified models are accurate and effective enough to describe the dynamics of the helicopter. The identified models show that the dynamics of the roll, pitch and yaw channels are mainly dominated by the lightly damped second-order modes. Identification and verification results show that the application of HS algorithm in system identification is suitable and useful.
    International Journal of Computer Applications in Technology 01/2014; 49(2):ications in Technology.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Brain computer interface (BCI) technology potentially opens the door to allowing our brain to influence the outside world without the use of muscles. This research concentrates on developing new augmentative communication and control technologies for those with severe neuromuscular disorders, such as stroke and spinal cord injury. Most BCIs decode the intent of the user from the brain's electrical activity as recorded from the scalp (electroencephalography, EEG). The EEG signal is very difficult to process, but many advances have been made to translate the signal into commands. At The University of Auckland, EEG-based BCIs have been under development for the past few years. Our laboratory has produced excellent results including an EEG controlled video game, an EEG phone dialing system, and an EEG active rehabilitation exercise. Research is ongoing in this area, with new projects starting for control of prostheses or rehabilitation robots in clinical trials.
    International Journal of Computer Applications in Technology 01/2014; 50(1/2):ications in Technology.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Bi-level image thresholding methods can be easily extended to multilevel cases. However, extended versions are computationally expensive. In this paper, we propose first a differential evolution (DE) algorithm using Tsallis entropy as objective function. Second, we conduct a comprehensive comparative study by investigating the potential of the proposed algorithm to find the optimal threshold values along with two other bio-inspired algorithms namely artificial bees colony (ABC) and particle swarm optimisation (PSO). Two entropy-based measures have been considered as objective functions. Real images with different complexities have been used to evaluate the performance of the three algorithms. Experimental results demonstrated that DE and ABC achieve the same quality of solutions in terms of peak signal to noise ratio values and uniformity values. They are more robust than PSO. Furthermore, DE has shown to be the most stable and ABC the fastest with the advantage of employing few control parameters.
    International Journal of Computer Applications in Technology 01/2014; 49(3/4):ications in Technology.
  • [Show abstract] [Hide abstract]
    ABSTRACT: The objective of this paper is to develop an efficient authentication system with reduced search space to recognise individuals based on their gait when they enter into surveillance area. To achieve this objective: 1) we have split the database into two based on gender and then the search is restricted to the identified gender database; 2) based on one gaitcycle, we have selected gait representing static and dynamic features which are invariant to various covariate factors such as wearing coats and carrying; 3) we used the decisions of both k-nearest neighbour (kNN) and support vector machine (SVM) by decision level fusion. Experimental results evaluated on the benchmark CASIA B gait dataset shows superior performance in terms of correct classification rate and it shows robustness to variations in clothing and carrying conditions.
    International Journal of Computer Applications in Technology 01/2014; 49(2):ications in Technology.
  • [Show abstract] [Hide abstract]
    ABSTRACT: To achieve accurate measurements of large scale machine parts with machine vision techniques, a new image matching method for image sequences is selected. And the matching method is one of the most critical influences on measuring speed and measuring precision. This paper aims at improving measuring speed. The proposed method bases on a straight profile. It mainly consists of two stages: One is adjusting image sequences to the same direction of coordinate axis to eliminate rotating deviation. It is realised by searching the straight profile with chain code. The other is sequences matching to eliminate translational deviation. The new algorithm focuses on eliminating translational deviation. It makes good use of differences of nearest neighbour grey values. Two templates are taken separately from two neighbour sequences. Those templates complete matching by the minimum value of the sum of adjacent-pixel-difference. In experiments, the new method is contrasted with the classical algorithm of the normalised cross correlation method. Experimental result demonstrates that the proposed algorithm is more effective than the NCC for image matching.
    International Journal of Computer Applications in Technology 01/2014; 50(1/2):ications in Technology.
  • [Show abstract] [Hide abstract]
    ABSTRACT: This paper presents a real-time interaction strategy for virtual maintenance based on motion capture system. The strategy has integrated the real-time control function of motion capture systems and reusable function of motion capture data to solve the limited captured-domain problem in the motion capture system. The main techniques for this cross boundary research include maintenance feature matrix calculation, collision detection, interpolation algorithm, oriented switch, data glove and path planning, which have overcome a number of critical issues, such as data storage, automotive generation of transition frames, transformation of operation location and shifting of control approaches. Further the research has implemented the real-time interaction control of large-domain virtual maintenance operation.
    International Journal of Computer Applications in Technology 01/2014; 49(3/4):ications in Technology.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Age-related macular (ARM) degeneration is an eye disease, that gradually degrades the macula, a part of the retina, which is responsible for central vision. It occurs in one of the two types, dry and wet age-related macular degeneration. The purpose of this paper is to diagnose the retinal disease age-related macular degeneration. An automated approach is proposed to help in the early detection of age-related macular degeneration using three models and their performances are compared. The amount of the disease spread in the retina can be identified by extracting the features of the retina. Detection of age-related macular degeneration disease has been done using probabilistic neural network (PNN), Bayesian classification and support vector machine (SVM) and the two types of age-related macular degeneration are classified and diagnosed successfully. The results show that SVM achieves a higher performance measure than probabilistic neural network and Bayes classification.
    International Journal of Computer Applications in Technology 01/2014; 49(2):ications in Technology.
  • [Show abstract] [Hide abstract]
    ABSTRACT: The paper presents important factors that influence the development of information security as a service in four small-sized healthcare sectors. The analysis shows that information security services have two perspectives: an information security management system (ISMS) perspective and a business-oriented perspective. An organisation needs to determine its perspective before implementing security services. The analysis of the findings leads to the development of a conceptual model of information security as a service that combines these two perspectives. The study suggests that using security services from third parties such as consulting services, network services, helpdesk services and software development services must be highly controlled to archive confidentiality, integrity and availability (CIA). Finally, a variety of services should be provided on an ease-of-use and pay-as-you-go basis to help improve processes and save costs.
    International Journal of Computer Applications in Technology 01/2014; 49(3/4):ications in Technology.