Skip to content
NADIA

IJAST Vol. 01, 2008

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2020 Issues
Vol. 135, 2020
Vol. 134, 2020
2019 Issues
Vol. 133, 2019
Vol. 132, 2019
Vol. 131, 2019
Vol. 130, 2019
Vol. 129, 2019
Vol. 128, 2019
Vol. 127, 2019
Vol. 126, 2019
Vol. 125, 2019
Vol. 124, 2019
Vol. 123, 2019
Vol. 122, 2019
2018 Issues
Vol. 121, 2018
Vol. 120, 2018
Vol. 119, 2018
Vol. 118, 2018
Vol. 117, 2018
Vol. 116, 2018
Vol. 115, 2018
Vol. 114, 2018
Vol. 113, 2018
Vol. 112, 2018
Vol. 111, 2018
Vol. 110, 2018
2017 Issues
Vol. 109, 2017
Vol. 108, 2017
Vol. 107, 2017
Vol. 106, 2017
Vol. 105, 2017
Vol. 104, 2017
Vol. 103, 2017
Vol. 102, 2017
Vol. 101, 2017
Vol. 100, 2017
Vol. 99, 2017
Vol. 98, 2017
2016 Issues
Vol. 97, 2016
Vol. 96, 2016
Vol. 95, 2016
Vol. 94, 2016
Vol. 93, 2016
Vol. 92, 2016
Vol. 91, 2016
Vol. 90, 2016
Vol. 89, 2016
Vol. 88, 2016
Vol. 87, 2016
Vol. 86, 2016
2015 Issues
Vol. 85, 2015
Vol. 84, 2015
Vol. 83, 2015
Vol. 82, 2015
Vol. 81, 2015
Vol. 80, 2015
Vol. 79, 2015
Vol. 78, 2015
Vol. 77, 2015
Vol. 76, 2015
Vol. 75, 2015
Vol. 74, 2015
2014 Issues
Vol. 73, 2014
Vol. 72, 2014
Vol. 71, 2014
Vol. 70, 2014
Vol. 69, 2014
Vol. 68, 2014
Vol. 67, 2014
Vol. 66, 2014
Vol. 65, 2014
Vol. 64, 2014
Vol. 63, 2014
Vol. 62, 2014
2013 Issues
Vol. 61, 2013
Vol. 60, 2013
Vol. 59, 2013
Vol. 58, 2013
Vol. 57, 2013
Vol. 56, 2013
Vol. 55, 2013
Vol. 54, 2013
Vol. 53, 2013
Vol. 52, 2013
Vol. 51, 2013
Vol. 50, 2013
2012 Issues
Vol. 49, 2012
Vol. 48, 2012
Vol. 47, 2012
Vol. 46, 2012
Vol. 45, 2012
Vol. 44, 2012
Vol. 43, 2012
Vol. 42, 2012
Vol. 41, 2012
Vol. 40, 2012
Vol. 39, 2012
Vol. 38, 2012
2011 Issues
Vol. 37, 2011
Vol. 36, 2011
Vol. 35, 2011
Vol. 34, 2011
Vol. 33, 2011
Vol. 32, 2011
Vol. 31, 2011
Vol. 30, 2011
Vol. 29, 2011
Vol. 28, 2011
Vol. 27, 2011
Vol. 26, 2011
2010 Issues
Vol. 25, 2010
Vol. 24, 2010
Vol. 23, 2010
Vol. 22, 2010
Vol. 21, 2010
Vol. 20, 2010
Vol. 19, 2010
Vol. 18, 2010
Vol. 17, 2010
Vol. 16, 2010
Vol. 15, 2010
Vol. 14, 2010
2009 Issues
Vol. 13, 2009
Vol. 12, 2009
Vol. 11, 2009
Vol. 10, 2009
Vol. 09, 2009
Vol. 08, 2009
Vol. 07, 2009
Vol. 06, 2009
Vol. 05, 2009
Vol. 04, 2009
Vol. 03, 2009
Vol. 02, 2009
2008 Issues
Vol. 01, 2008
2008
2008
Volume 01, 2008 December
  • DNS Spoofing Attack Simulation for Model-Based Security Evaluation, Golriz Khazan and Mohammad Abdollahi Azgomi (pp. 1-8).
  • Hybrid Watermarking Scheme for Halftone Images, Ching-Tang Hsieh, Yeh-Kuang Wu and Kuo-Ming Hung (pp. 9-20).
  • A Phased Framework for Countering VoIP SPAM, Jongil Jeong, Taijin Lee, Seokung Yoon, Hyuncheol Jeong, Yoojae Won and Myuhngjoo Kim (pp. 21-28).
  • Computer Virus Propagation Model Based on Variable Propagation Rate, Cong Jin, Qing-Hua Deng and Jun Liu (pp. 29-34).
  • Predict Software Failure-prone by Learning Bayesian Network, Yuyang Liu, Wooi Ping Cheah, Byung-Ki Kim and Hyukro Park (pp. 35-42).
  • Quality Validation for Mobile Embedded Software, Haeng-Kon Kim and Roger Y Lee (pp. 43-54).
  • Embedded System Software Testing Using Mobile Service Based On SOA, Myung-Hee Lee, Cheol-Jung Yoo and Ok-Bae Jang (pp. 55-64).
  • Data Modeling of Wf-XML Resource Model for Run-Time Integration of Workflow Engine, Myung-Ju Shin, Jin-Sung Kim, Dong-Soo Kim and Yong-Sung Kim (pp. 65-74).
  • Instructor’s Roles in Software Engineering Course Projects, Stan Kurkovsky (pp. 75-84).
  • An efficient content distribution method using segment metadata annotation in CDN, Jung-Eun Lim, O-Hoon Choi, Hong-Seok Na and Doo-Kwon Baik (pp. 85-90).
  • Security Enhancement in MANET Authentication by checking the CRL status of Servers, Azeem Irshad, Wajahat Noshairwan, Muhammad Shafiq, Shahzada Khurram, Ehtsham Irshad, Muhammad Usman (pp. 91-98).
  • Computer-based siRNA Design to Hepatitis B Virus and Its Expression Vector Construction, Hong Cao, Liang Peng, Zhenhua Ding, Zhihua Liu and Xiaolu Liu (pp. 99-108).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA