Skip to content
NADIA

IJGDC Vol. 11, No. 8, 2018

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 12, No. 2
Vol. 12, No. 1
2018 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2017 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2016 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2015 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2014 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2013 Issues
Vol. 6, No. 6
Vol. 6, No. 5
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2012 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2011 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2010 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2009 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2008 Issues
Vol. 1, No. 1
2018
2018
Volume 11, Number 8, 2018 August
    • A Study on the Virtual Machine-based Anti-Theft System Running on IoT Devices, Jaehyun Kim and Yangsun Lee (pp. 1-12).
    • Traveling Salesman Problem with Ant Colony Optimization Algorithm for Cloud Computing Environment, Taskeen Zaidi and Prashanshi Gupta (pp. 13-22).
    • Improving Network Lifetime using Fuzzy Logic in Cluster-based WSN Protocol, Jong-Yong Lee and Daesung Lee (pp. 23-32).
    • Research of the Optimal Level of Compression by Using Haar Wavelet and Recognition System, Rachid El ayachi, Mohamed Biniz and Mohamed Fakir (pp. 33-42).
    • Analysis of Routing Attacks on RPL based 6LoWPAN Networks, Abhishek Verma and Virender Ranga (pp. 43-56).
    • Customized Mobile Marketing Platform Design Utilizing IoT based Beacon Sensor Devices, Ji-Hoon Seo and Jin-Tak Choi (pp. 57-68).
    • Heterogeneous Network Access for Seamless Data Transmission in Remote Healthcare, Piyush Yadav, Rajeev Agrawal and Komal Kashish (pp. 69-86).
    • Classification of Natural Disaster Prone Areas in Indonesia using K-Means, Bambang Supriyadi, Agus Perdana Windarto, Triyuni Soemartono and Mungad (pp. 87-98).
    • Study on the Low Energy Consumption Method for Light-Wight Devices in IoT Service Environment, Young-Hyun Kim, Myong-Soo Kim, Myung-Hye Park, Soo-Kyung Kang and Chang-Soo Eun (pp. 99-108).
    • Reliable Message Delivery Scheme to Transmit Safety-Message in Heterogeneous VANETs, Joosang Youn (pp. 109-118).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA