Skip to content
NADIA

IJAST Vol. 37, 2011

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2020 Issues
Vol. 135, 2020
Vol. 134, 2020
2019 Issues
Vol. 133, 2019
Vol. 132, 2019
Vol. 131, 2019
Vol. 130, 2019
Vol. 129, 2019
Vol. 128, 2019
Vol. 127, 2019
Vol. 126, 2019
Vol. 125, 2019
Vol. 124, 2019
Vol. 123, 2019
Vol. 122, 2019
2018 Issues
Vol. 121, 2018
Vol. 120, 2018
Vol. 119, 2018
Vol. 118, 2018
Vol. 117, 2018
Vol. 116, 2018
Vol. 115, 2018
Vol. 114, 2018
Vol. 113, 2018
Vol. 112, 2018
Vol. 111, 2018
Vol. 110, 2018
2017 Issues
Vol. 109, 2017
Vol. 108, 2017
Vol. 107, 2017
Vol. 106, 2017
Vol. 105, 2017
Vol. 104, 2017
Vol. 103, 2017
Vol. 102, 2017
Vol. 101, 2017
Vol. 100, 2017
Vol. 99, 2017
Vol. 98, 2017
2016 Issues
Vol. 97, 2016
Vol. 96, 2016
Vol. 95, 2016
Vol. 94, 2016
Vol. 93, 2016
Vol. 92, 2016
Vol. 91, 2016
Vol. 90, 2016
Vol. 89, 2016
Vol. 88, 2016
Vol. 87, 2016
Vol. 86, 2016
2015 Issues
Vol. 85, 2015
Vol. 84, 2015
Vol. 83, 2015
Vol. 82, 2015
Vol. 81, 2015
Vol. 80, 2015
Vol. 79, 2015
Vol. 78, 2015
Vol. 77, 2015
Vol. 76, 2015
Vol. 75, 2015
Vol. 74, 2015
2014 Issues
Vol. 73, 2014
Vol. 72, 2014
Vol. 71, 2014
Vol. 70, 2014
Vol. 69, 2014
Vol. 68, 2014
Vol. 67, 2014
Vol. 66, 2014
Vol. 65, 2014
Vol. 64, 2014
Vol. 63, 2014
Vol. 62, 2014
2013 Issues
Vol. 61, 2013
Vol. 60, 2013
Vol. 59, 2013
Vol. 58, 2013
Vol. 57, 2013
Vol. 56, 2013
Vol. 55, 2013
Vol. 54, 2013
Vol. 53, 2013
Vol. 52, 2013
Vol. 51, 2013
Vol. 50, 2013
2012 Issues
Vol. 49, 2012
Vol. 48, 2012
Vol. 47, 2012
Vol. 46, 2012
Vol. 45, 2012
Vol. 44, 2012
Vol. 43, 2012
Vol. 42, 2012
Vol. 41, 2012
Vol. 40, 2012
Vol. 39, 2012
Vol. 38, 2012
2011 Issues
Vol. 37, 2011
Vol. 36, 2011
Vol. 35, 2011
Vol. 34, 2011
Vol. 33, 2011
Vol. 32, 2011
Vol. 31, 2011
Vol. 30, 2011
Vol. 29, 2011
Vol. 28, 2011
Vol. 27, 2011
Vol. 26, 2011
2010 Issues
Vol. 25, 2010
Vol. 24, 2010
Vol. 23, 2010
Vol. 22, 2010
Vol. 21, 2010
Vol. 20, 2010
Vol. 19, 2010
Vol. 18, 2010
Vol. 17, 2010
Vol. 16, 2010
Vol. 15, 2010
Vol. 14, 2010
2009 Issues
Vol. 13, 2009
Vol. 12, 2009
Vol. 11, 2009
Vol. 10, 2009
Vol. 09, 2009
Vol. 08, 2009
Vol. 07, 2009
Vol. 06, 2009
Vol. 05, 2009
Vol. 04, 2009
Vol. 03, 2009
Vol. 02, 2009
2008 Issues
Vol. 01, 2008
2011
2011
Volume 37, 2011 December
  • Optimising Maintenance Intervals for a Component using a New Hill-Climbing Algorithm, Shawulu Hunira Nggada (pp. 1-14).
  • A Hybrid PSO Approach to Automate Test Data Generation for Data Flow Coverage with Dominance Concepts, Sanjay Singla, Dharminder Kumar, H M Rai and Priti Singla (pp. 15-26).
  • TCP Performance Degradation of In-Sequence Delivery in LTE Link Layer, Hyun-Seo Park, Jae-Yong Lee and Byung-Chul Kim (pp. 27-36).
  • Efficient BER Analysis of OFDM System over Nakagami-m Fading Channel, Mukesh Kumar Mishra, Neetu Sood and Ajay K Sharma (pp. 37-46).
  • Security Challenges for Expanding E-governments’ Services, Izzat Alsmadi (pp. 47-60).
  • Scheduling Grid Jobs Using Priority Rule Algorithms and Gap Filling Techniques, Zafril Rizal M Azmi, Kamalrulnizam Abu Bakar, Mohd Shahir Shamsir, Wan Nurulsafawati Wan Manan and Abdul Hanan Abdullah (pp. 61-76).
  • Granule based File Storage System with Secure Transparent Availability, A. Suthan and D. Kesavaraja (pp. 77-86).
  • Numerical Simulation of the Process of Bone Remodeling in the Context of Damaged Elastic, A. Idhammad, A. Abdali and P. Bussy (pp. 87-98).
  • Review Paper: Security in E-government Using Fuzzy Methods, Nadir Omer Fadl Elssied, Othman Ibrahim, Adil Ali A.alaziz and Adil Yousif (pp. 99-112).
  • Semantic Cartography in Information Retrieval Systems, FĂ©rihane Kboubi, Anja Habacha Chabi and Mohamed BenAhmed (pp. 113-128).
  • HF-hash: Hash Functions Using Restricted HFE Challenge-1, Dhananjoy Dey, Prasanna Raghaw Mishra and Indranath Sengupta (pp. 129-140).
  • Security Issues of Power Line Multi-Home Networks for Seamless Data Transmission, Sunguk Lee (pp. 141-146).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA