Skip to content
NADIA

IJDTA Vol. 7, No. 3, 2014

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2018 Issues
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2017 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2016 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2015 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2014 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2013 Issues
Vol. 6, No. 6
Vol. 6, No. 5
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2012 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2011 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2010 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2009 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2008 Issues
Vol. 1, No. 1
2014
2014
Volume 7, Number 3, 2014 June
    • Effective Metadata Cluster Management for Mass Data Storage, Chen Ningjiang, Xiao Zhongzheng and Zhang Wenbo (pp. 1-12).
    • A Succinct String Dictionary Index in External Memory, Guoqing Zhang, Mei Rong and Guangquan Zhang (pp. 13-22).
    • Efficient design of Certificateless Chameleon Signature from Bilinear Pairing, Tejeshwari Thakur, Neetu Sharma and Birendra Kumar Sharma (pp. 23-30).
    • Efficient Query Integrity Protection for Multi-tenant Database, Li Lin, Li Qingzhong, Kong Lanju and Shi Yuliang (pp. 31-40).
    • Research of parallel DBSCAN clustering algorithm based on MapReduce, Xiufen Fu, Shanshan Hu and Yaguang Wang (pp. 41-48).
    • Architecture Synthesis Process for Scheduler Concept Based On Design Algebra with Object Oriented Design Methods, P. Rajarajeswari, A. Ramamohanreddy and D. vasumathi (pp. 49-62).
    • Enabling Access Control in Partially Honest Outsourced Databases, Lanju Kong, Qingzhong Li and Lin Li (pp. 63-72).
    • An Effective Approach to Fuzzy Ontologies Alignment, Ling Qiu and Yong Liu (pp. 73-82).
    • Modeling Software Maintainability and Quality Assurance in the Agile Environment, Priyanka Upadhyay, Abhishek Singh and Naveen Garg (pp. 83-90).
    • Research and Implementation of Distributed Disaster Recovery System Based on PRS Algorithm, Jian Wan, Huijia Xuan and Jilin Zhang (pp. 91-106).
    • Mining Sequential Trees in a Tree Sequence Database, Yijun Bei, Zhen Lin, Qiyao Wang and Erteng Liu (pp. 107-120).
    • Eliminating unwanted messages in SNS using Decision tree, Venkata Naresh Mandhala, Debnath Bhattacharyya, Tai-hoon Kim (pp. 121-130).
    • Regional Economic Evaluation Based on a Novel Fuzzy Clustering Method in Big data, Liu Zhaohui, Li Liyan and Xu Wenjing (pp. 131-142).
    • Application of Data Mining in Network Instructional platform of “Modern Educational Technology” for Different Teaching, Qiuxiang Shi, Jianying Li and Liying Wang (pp. 143-158).
    • An Investigation into the Impact of False Minutiae Points on Fingerprint Matching, Iwasokun Gabriel Babatunde, Akinyokun Oluwole Charles and Ojo Sunday Olusegun (pp. 159-178).
    • Recursive Twig Pattern Query, Husheng Liao, Hongyu Gao and Zhaoning Guan (pp. 179-190).
    • An Improved Method for Robust and Efficient Clustering Using EM Algorithm with Gaussian Kernel, Aakash Soor and Vikas Mittal (pp. 191-200).
    • The Hierarchical Structure and Bridging Member of k-Clique Community, Kaikuo Xu, Changan Yuan and Xuzhong Wei (pp. 201-218).
    • Research on Target Tracking Algorithm based on Improved Mean Shift and Kalman Filter, Bian Minjie and Honghao Gao (pp. 219-230).
    • Analyzing the Goal Structured Requirements Engineering and Traceability Model, Vinay Kumar and Reema Thareja (pp. 231-244).
    • Exploration on Building the Campus Information Center for Cloud Computing, Zhou Zi-li and Lu Hui-juan (pp. 245-254).
    • Research on Consistency Maintenance of Right Management Operations in Real time Collaboration Environments, Liping Gao, Qiongqiong Fu, Lili Gao, Yuben Zhang and Qingkui Chen (pp. 255-264).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA