Skip to content
NADIA

IJAST Vol. 47, 2012

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2020 Issues
Vol. 135, 2020
Vol. 134, 2020
2019 Issues
Vol. 133, 2019
Vol. 132, 2019
Vol. 131, 2019
Vol. 130, 2019
Vol. 129, 2019
Vol. 128, 2019
Vol. 127, 2019
Vol. 126, 2019
Vol. 125, 2019
Vol. 124, 2019
Vol. 123, 2019
Vol. 122, 2019
2018 Issues
Vol. 121, 2018
Vol. 120, 2018
Vol. 119, 2018
Vol. 118, 2018
Vol. 117, 2018
Vol. 116, 2018
Vol. 115, 2018
Vol. 114, 2018
Vol. 113, 2018
Vol. 112, 2018
Vol. 111, 2018
Vol. 110, 2018
2017 Issues
Vol. 109, 2017
Vol. 108, 2017
Vol. 107, 2017
Vol. 106, 2017
Vol. 105, 2017
Vol. 104, 2017
Vol. 103, 2017
Vol. 102, 2017
Vol. 101, 2017
Vol. 100, 2017
Vol. 99, 2017
Vol. 98, 2017
2016 Issues
Vol. 97, 2016
Vol. 96, 2016
Vol. 95, 2016
Vol. 94, 2016
Vol. 93, 2016
Vol. 92, 2016
Vol. 91, 2016
Vol. 90, 2016
Vol. 89, 2016
Vol. 88, 2016
Vol. 87, 2016
Vol. 86, 2016
2015 Issues
Vol. 85, 2015
Vol. 84, 2015
Vol. 83, 2015
Vol. 82, 2015
Vol. 81, 2015
Vol. 80, 2015
Vol. 79, 2015
Vol. 78, 2015
Vol. 77, 2015
Vol. 76, 2015
Vol. 75, 2015
Vol. 74, 2015
2014 Issues
Vol. 73, 2014
Vol. 72, 2014
Vol. 71, 2014
Vol. 70, 2014
Vol. 69, 2014
Vol. 68, 2014
Vol. 67, 2014
Vol. 66, 2014
Vol. 65, 2014
Vol. 64, 2014
Vol. 63, 2014
Vol. 62, 2014
2013 Issues
Vol. 61, 2013
Vol. 60, 2013
Vol. 59, 2013
Vol. 58, 2013
Vol. 57, 2013
Vol. 56, 2013
Vol. 55, 2013
Vol. 54, 2013
Vol. 53, 2013
Vol. 52, 2013
Vol. 51, 2013
Vol. 50, 2013
2012 Issues
Vol. 49, 2012
Vol. 48, 2012
Vol. 47, 2012
Vol. 46, 2012
Vol. 45, 2012
Vol. 44, 2012
Vol. 43, 2012
Vol. 42, 2012
Vol. 41, 2012
Vol. 40, 2012
Vol. 39, 2012
Vol. 38, 2012
2011 Issues
Vol. 37, 2011
Vol. 36, 2011
Vol. 35, 2011
Vol. 34, 2011
Vol. 33, 2011
Vol. 32, 2011
Vol. 31, 2011
Vol. 30, 2011
Vol. 29, 2011
Vol. 28, 2011
Vol. 27, 2011
Vol. 26, 2011
2010 Issues
Vol. 25, 2010
Vol. 24, 2010
Vol. 23, 2010
Vol. 22, 2010
Vol. 21, 2010
Vol. 20, 2010
Vol. 19, 2010
Vol. 18, 2010
Vol. 17, 2010
Vol. 16, 2010
Vol. 15, 2010
Vol. 14, 2010
2009 Issues
Vol. 13, 2009
Vol. 12, 2009
Vol. 11, 2009
Vol. 10, 2009
Vol. 09, 2009
Vol. 08, 2009
Vol. 07, 2009
Vol. 06, 2009
Vol. 05, 2009
Vol. 04, 2009
Vol. 03, 2009
Vol. 02, 2009
2008 Issues
Vol. 01, 2008
2012
2012
Volume 47, 2012 October
  • Development and Application of E-Learning Content for Advertising Education, Jaemu Lee and Yong-Jae Lee (pp. 1-12).
  • String Matching Evaluation Methods for DNA Comparison, Izzat Alsmadi and Maryam Nuser (pp. 13-32).
  • Features of Adaptive Test Suites, Narendra Kumar Rao B. and RamaMohan Reddy A. (pp. 33-42).
  • Effort Reduction in RUP using CRM for Project Development: Mapping the Best Practices of CRM into RUP, Muhammad Javed, Bashir Ahmad, Muhammad Ali Abid, Muhammad Ahmad Jan Sheikh Muhammad Saqib and Muhammad Ali Shah (pp. 43-50).
  • Application and Development of High-efficiency Abrasive Process, S. Wang and C. H. Li (pp. 51-64).
  • FFT-Based Audio Watermarking Method with a Gray Image for Copyright Protection, Md. Iqbal Hasan Sarker, Mohammad Ibrahim Khan, Kaushik Deb and Md. Faisal Faruque (pp. 65-76).
  • Integration of Pseudospectral Segments of Sound Signals for Fault Location in Motorcycles, Basavaraj S. Anami and Veerappa B. Pagi (pp. 77-90).
  • Job Scheduling and Data Replication in Hierarchical Data Grid, Somayeh Abdi and Sayyed Mohsen Hashemi (pp. 91-100).
  • A Controlled Knowledge Base Evolution Approach for Query Hits Merging in P2P Systems, Rim Mghirbi, Hanen Majdoub, Khedija Arour and Bruno Defude (pp. 101-114).
  • Secure Personal Recognition System based on Hashes Keys, Deepak Sharma and Sonakshi Khurana (pp. 115-122).
  • Intercultural Challenges Mitigation Model for Software Development Outsourcing Vendors, Muhammad Ilyas Azeem and Siffat Ullah Khan (pp. 123-132).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA