Skip to content
NADIA

IJSIA Vol. 10, No. 2, 2016

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2016
2016
Volume 10, Number 2, 2016 February
    • Improved Bat Algorithm for Reliability-Redundancy Allocation Problems, Yubao Liu (pp. 1-12).
    • Security Threats on Mobile Devices and their Effects: Estimations for the Future, Murat Yesilyurt, Yildiray Yalman (pp. 13-26).
    • Image Forgery Detection Algorithm Based on Non Sampling Wavelet Transform and Zernike Moments, Xiao Jinke (pp. 27-38).
    • Combination Weighting Method Based on Maximizing Deviations and Normalized Constraint Condition, Fulian Yin, Lu Lu, Jianping Chai and Yanbing Yang (pp. 39-51).
    • A View on LSB Based Audio Steganography, Ratul Chowdhury, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay and Tai-hoon Kim (pp. 51-62).
    • Vehicle Scheduling Optimization Based on Chaos Ant Colony Algorithm in Emergency Rescue, Lingxia Liu, Xuexia Gao and Qiang Song (pp. 63-74).
    • Improvement Framework of Korean Certification System for Cloud Service Focus on Security, Hangoo Jeon, Young-Gi Min and Kwang-Kyu Seo (pp. 75-84).
    • Research on the Strategy of Role Management Based on Grid Environment, Yi He Liu, Yu Ping Qin, Shuang Zhang (pp. 95-94).
    • Research on Ant Colony Algorithm Optimization Neural Network Weights Blind Equalization Algorithm, Yanxiang Geng, Liyi Zhang, Yunshan Sun, Yao Zhang, Nan Yang and Jiawei Wu (pp. 95-104).
    • Application of Audio Watermarking Procedures for Mix Music, Youngseok Lee, Jongweon Kim (pp. 105-114).
    • The Lightweight Ownership Transfer Protocol using Physically Unclonable Function, Xuejun Zhang, Wanlu Huang, He Xu and Yu Wang (pp. 115-128).
    • Multi-sensor Information Fusion Steady-State Kalman Estimator for Systems with System Errors and Sensor Errors, Yun Li, Ming Zhao, Gang Hao (pp. 129-140).
    • Security Enhancement Scheme supporting range queries on encrypted DB for Secure e-Navigation Era, Donghyeok Lee and Namje Park (pp. 141-150).
    • The Improvement of the Design Standard of Overloaded Highway, Dou Yuanming, Zhang Jingjing and Hu Chao (pp. 151-162).
    • Cryptanalysis of a Biometric-based Multi-Server Authentication Scheme, Tao Wan, Nan Jiang, Jianfeng Ma, Lin Yang (pp. 163-170).
    • On the Deployment of Citizens’ Privacy Preserving Collective Intelligent eBusiness Models in Smart Cities, Artemis Avgerou, Panayotis E. Nastou, Dimitra Nastouli, Panos M. Pardalos and Yannis C. Stamatiou (pp. 171-184).
    • Dynamic Assessment of Business Performance in Green Supply Chain based on Analytic Hierarchy Process Method, Xueling Nie (pp. 185-196).
    • Evaluating Teaching Quality in Higher Education: Analytical Modelling and Computerized Implementation, Jingyun Zheng (pp. 197-204).
    • A Novel Lossless Image Encryption Method using DNA Substitution and Chaotic Logistic Map, Shouvik Chakraborty, Arindrajit Seal, Mousomi Roy, Kalyani Mali (pp. 205-216).
    • Effective and Secure Access Control for Multi-Authority Cloud Storage Systems, Lin Xin, Xingming Sun, Zhangjie Fu, Liang-Ao Zhang and Jie Xi (pp. 217-236).
    • Network Traffic Classification using Genetic Algorithms based on Support Vector Machine, Jie Cao, Zhiyi Fang (pp. 237-246).
    • User Action-based Financial Fraud Detection Method by SVDD, Seong-Ho An, Kihyo Nam, Mun-Kweon Jeong, Yong-Rak Choi (pp. 247-254).
    • Study on Multimedia Teaching and the Reform of College Physical Education: Evaluation of Teaching Effect, Lifeng Xu (pp. 255-266).
    • Effects of Salt Water Drip Irrigation on Jujube Roots Soil Available Nitrogen Distribution: A Security Assurance Perspective, Xingpeng Wang, Tiecheng Bai, Jinhu Zhi and Zhaoyang Li (pp. 267-278).
    • A Study to Examine the Superiority of CSAVK, AVK over Conventional Encryption with a Single Key, Rajat S Goswami, Swarnendu K Chakraborty, Chandan T Bhunia (pp. 279-286).
    • An Electronic Cash System Based on Certificateless Group Signature, Liang Yan, Zhang Xiao and Zheng Zhi-ming (pp. 287-300).
    • Cryptographic Protocols for Secure Cloud Computing, S. A. Alhumrani and Jayaprakash Kar (pp. 301-310).
    • Research on the Security Enhanced Smart Hardware Assisted Regression Analysis and Health Monitoring Technique based Expanded Training Exercise Effect Evaluation Model, Kejin Shi (pp. 311-324).
    • An Improved Event Scenario Correlation Method for Multi-Source Security Log, Qianyun Wang, Shuyu Chen, Hancui Zhang and Tianshu Wu (pp. 325-340).
    • AL-Museelem Waleed, Li Chunlin, “User Privacy and Security in Cloud Computing”,(pp. 341-352).
    • Novel Quantum-Inspired Co-evolutionary Algorithm, Ming Shao, Liang Zhou (pp. 353-364).
    • An Extension Approach for Threat Detection and Defense of Software-Defined Networking, Hui Xu, Chunzhi Wang and Hongwei Chen (pp. 365-374).
    • Network Security in Embedded System Using TLS, Vivek Negi, Himanshu Verma, Ipsita Singh, Aditya Vikram, Kanika Malik, Archana Singh, Gaurav Verma (pp. 375-384).
    • Smartly Time of Arrival Interpretation in the Wide Band Ranging System, Xiaolin Liang, Hao Zhang, Tingting Lv, T. Aaron Gulliver (pp. 385-410).
    • A Hybrid Key Establishment Scheme for Wireless Sensor Networks, Jianmin Zhang, Qingmin Cui, Rui Yang (pp. 411-422).
    • Secure Linear Feedback Shift Register based IPv6 in VANET, Abhishek singh, Shekhar Verma and Geetam Singh Tomar (pp. 423-436).
    • A Novel Intelligent Recommendation Algorithm based on Web Data Mining Technique under the Background of Deep Neural Network, Changchun Yang, Jun Wang, Min Yuan, Chenyang Lei (pp. 432-450).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA