192 | -- | 206 | Alireza Fathi, Ahmad Mozaffari. TGSR: the great salmon run optimisation algorithm |
207 | -- | 226 | Salima Ouadfel, Souham Meshoul. Bio-inspired algorithms for multilevel image thresholding |
227 | -- | 238 | Yaqing Tan, Wei Huang, Yanming Sun, Yong Yue. Scheduling and optimisation of batch plants: model development and comparison of approaches |
239 | -- | 250 | Alaa F. Sheta, Hossam Faris, Ertan Öznergiz. Improving production quality of a hot-rolling industrial process via genetic programming model |
251 | -- | 262 | Carsten Maple, Edmond Prakash, Wei Huang, Adnan N. Qureshi. Taxonomy of optimisation techniques and applications |
263 | -- | 269 | Abdesslem Layeb, Salim Chikhi. Two novel sweep-based heuristics for the vehicle routing problem |
270 | -- | 281 | Carlo Ciulla, Fadi P. Deek. The sub-pixel efficacy region of the bivariate linear interpolation function |
282 | -- | 296 | Xingwei Wang, Hui Cheng, Min Huang. QoS routing and rerouting optimisation in cognitive network |
297 | -- | 305 | Yongchang Chen, Weiyu Yu, Jiuchao Feng. A visual cryptography copyright protection method based on artificial bee colony algorithm |
306 | -- | 315 | Ying Chen, Longyuan Zhang, Xiuxiao Guo. Pose robust face recognition based on kernel regression in Bayesian framework |
316 | -- | 324 | Qingyuan Zhu, Haoyu Chen, Jian Yi, Chenglu Wen, Huosheng Hu. Modelling of stable angle-based instability threat indicator for articulated off-road vehicles |
325 | -- | 331 | Andranik S. Akopov. Parallel genetic algorithm with fading selection |
332 | -- | 339 | Gangfeng Deng, Xianxiang Huang, Qinhe Gao, Quanmin Zhu, Zhili Zhang, Ying Zhan. A real-time interaction strategy for virtual maintenance based on motion capture |
340 | -- | 351 | Yang Li, Xueli Wu, Quanmin Zhu, Jianhua Zhang. Adaptive terminal sliding mode control for finite-time chaos synchronisation with uncertainties and unknown parameters |
352 | -- | 364 | Shaimaa Ahmed El-Said, Hossam Mohamed Abol Atta. Geometrical face recognition after plastic surgery |
365 | -- | 371 | Chalee Vorakulpipat, Siwaruk Siwamogsatham, Asanee Kawtrakul. An investigation of information security as a service practice: case study in healthcare |
372 | -- | 377 | Asmaa Boughrara, Belhadri Messabih. Use partly hidden Markov model to evaluate a future failure |