Skip to content
NADIA

IJDTA Vol. 9, No. 6, 2016

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2018 Issues
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2017 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2016 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2015 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2014 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2013 Issues
Vol. 6, No. 6
Vol. 6, No. 5
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2012 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2011 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2010 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2009 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2008 Issues
Vol. 1, No. 1
2016
2016
Volume 9, Number 6, 2016 June
    • Research on Data Prediction Based on Data Mining Combined Model, Dong Han and Chunhua Wang (pp. 1-8).
    • Designing and Implementing of Dynamic Technique for Detecting Learning Style Using Literature Based Approach, Hadeel Ateia and Thair Hamtini (pp. 9-20).
    • Group Rejuvenation: A New Software Rejuvenation Framework, Li Su, Pengfei Chen, Yong Qi and Xinyi Li (pp. 21-32).
    • Discovering Gangs of Criminals Using Data Fusion With Social Networks, Yang Jie and Wang Huadong (pp. 33-44).
    • A Novel Dataset Generating Method for Fine-Grained Vehicle Classification with CNN, Shaoyong Yu, Zhijun Song, Songzhi Su, Wei Li,Yun Wu and Wenhua Zeng (pp. 45-52).
    • Multi-objective Optimization of the Steering Linkages Considering Transmitting Ratios, Gu Yufeng and Dong Fulong (pp. 53-66).
    • The Impact of Feature Reduction Techniques on Arabic Document Classification, Abdullah Ayedh, Guanzheng Tan and Hamdi Rajeh (pp. 67-80).
    • PFIN: A Parallel Frequent Itemset Mining Algorithm Using Nodesets, Chen Lin and Junzhong Gu (pp. 81-92).
    • Semantic Role Labeling Based Event Argument Identification, Wen Zhou, Yajun Zhang, Xiaoying Su, Yao Li and Zongtian Liu (pp. 93-102).
    • A Study on the Public Auditing Mechanisms for Privacy Preserving and Maintaining Data Integrity in Cloud Computing, V. Saranya, R. G. Suresh Kumar and T. Nalini (pp. 103-108).
    • Based on Multi-Thread Dynamic Self-Healing Technology Application Research in Big Data Image Processing, Guangyu Xu and Xiaohua Qiao (pp. 109-118).
    • Research of Association Rules Algorithm in Data Mining, Yingmei Xu (pp. 119-130).
    • Query Recommendation Based on User Browsing History, Shilpa Sethi, Ashutosh Dixit (pp. 131-144).
    • Research into Protecting and Developing Intangible Cultural Heritage in Database of Government, Colleges and Enterprises in Cloud Computing, Hang Shen and Miao Wang (pp. 145-150).
    • Simultaneous Entities and Relationship Extraction from Unstructured Text, Jingtai Zhang, Jin Liu and Xiaofeng Wang (pp. 151-160).
    • An Improved Framework for Requirement Implementation in the context of Global Software Development: A Systematic Literature Review Protocol, Muhammad Yaseen, Sikandar Ali, Abullah, Naeem Ullah (pp. 161-170).
    • Framework and Key Technology Review of Big Data Analysis in the Social Network Background, Zhendong Ji (pp. 171-180).
    • Research and Application of a Combined Art Image Query Method, Cheng Mao, Chai Wenlei and Wang Fuqiang (pp. 181-190).
    • Analyze NYC Taxi Data Using Hive and Machine Learning, Bayan Alghuraybi, Krishna Marvaniya, Guojun xia and Jongwook Woo (pp. 191-198).
    • Research on the Art Image Query Method Based on Hierarchical Semantic and Incomplete Filtration, Cheng Mao, Chai Wenlei and Wang Fuqiang (pp. 199-208).
    • Hierarchical Community Detection Algorithm Based on Node Similarity, Jingke Xi, Wenwei Zhan and Zhixiao Wang (pp. 209-218).
    • Multi Query Optimization Algorithm Using Semantic and Heuristic Approaches, L. J. Muhammad, Yahaya Bala Zakariyau, Abdullahi Garba Ali Ibrahim A. Mohammed (pp. 219-226).
    • An Improved Affinity Propagation Clustering Algorithm Based on Entropy Weight Method and Principal Component Analysis, Wang Limin, Zhang Li, Han Xuming, Ji Qiang, Mu Guangyu and Liu Ying (pp. 227-238).
    • Stability Threshold-based Affinity Propagation and Its Application, Limin Wang, Yizhang Wang, Xuming Han and Qiang Ji (pp. 239-246).
    • WordNet in Malay Language, Jer Lang Hong (pp. 247-256).
    • Sequential Association Rules Based on Apriori Algorithm Applied in Personal Recommendation, Wang Yonggang (pp. 257-264).
    • Research on Database Remote Disaster Recovery and Backup Technology Based on Multi Point and Multi Hop, Guoyong Lin and Fan Huang (pp. 265-274).
    • Application of Teaching Data Mining Based on Cloud Computing in the Prediction of Learning Achievement, Jianfen Liu and Junhui Zheng (pp. 275-284).
    • Dynamic Cost-Sensitive Extreme Learning Machine for Classification of Incomplete Data Based on the Deep Imputation Network, Fuxian Huang, Chunying Liu, Yuwen Huang and Jijiang Yu (pp. 285-298).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA