Skip to content
NADIA

IJSIA Vol. 10, No. 3, 2016

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2016
2016
Volume 10, Number 3, 2016 March
    • Landing Risk Evaluation of Carrier-Based Aircraft Based on Mean-Variance Statistics Error Multi-Attribute Dynamic Decision Making, Li Hui(pp. 1-10).
    • Improving Korea’s Societal Security by Preparing for Unforeseen Disasters: Focused on the Horizontal Collaboration Approach, Younhee Kim, Hakkyong Kim (pp. 11-20).
    • Extracting Clone Genealogies for Tracking Code Clone Changes, Chun-Hui Wang, Ying Tu, Li-Ping Zhang, Dong-Sheng Liu (pp. 21-28).
    • Secure Signature Authentication Algorithm in Mobile Internet, Hua Lin Sun (pp. 29-40).
    • Detecting Sinkhole Attack in Wireless Sensor Network using Enhanced Particle Swarm Optimization Technique, G. Keerthana, G. Padmavathi (pp. 41-54).
    • A secure Certificateless Aggregate Signature Scheme, Baoyuan Kang and Danhui Xu (pp. 55-68, 06).
    • Research on the Relationship of Optical Illusion Deceleration Marking and Changing Rate of Pupil, Ting Shang, Boming Tang and Panpan Tao (pp. 69-80).
    • Face Recognition Using Neural Network: A Review, Manisha M. Kasar, Debnath Bhattacharyya and Tai-hoon Kim (pp. 81-100).
    • Moving Object Detection and Identification Method Based on Vision, Tao Jian-Ping, Lv Xiao-lan and Liu Jun (pp. 101-110).
    • Holistic Performance Model for Cyber Security Implementation Frameworks, Issa Atoum and Ahmed Otoom (pp. 111-120).
    • Bagging eEP-based Classifiers for Junk Mail Classification, Yan Li and Hua Zhou (pp. 121-128).
    • A Systematic Review of Network Flow Watermarking In Anonymity Systems, Tianbo Lu, Rui Guo, Lingling Zhao and Yang Li (pp. 129-138).
    • A Secure Score Report Implemented in a Spreadsheet without Privacy Concerns, Dongchang Yoo, Minyoung Bae and Yongjin Yeom (pp. 139-150).
    • Transfer Model Based on State of Finite Semi-Markov Automata Intrusion Tolerance, Wang Guangze, Wang Peng, Luo Zhiyong and Zhu Suxia (pp. 151-160).
    • A Light Weight Security Scheme for Network Coding Based on a Mobius Transformation, M. H. Tadayon (pp. 161-172).
    • Application of BP Neural Network Model based on Particle Swarm Optimization in Enterprise Network Information Security, Shumei Liu (pp. 173-182).
    • Research of Automatic Recognition Double Layers Intrusion Intention Algorithm Based on Attack Graph, Wang Guangze, Wang Peng, Luo Zhiyong, Zhu Suxia (pp. 183-192).
    • A Provably-Anonymous Authentication Scheme for Roaming Services, Junghyun Nam, Kim-Kwang Raymond Choo and Juryon Paik (pp. 193-204).
    • Color Digital Image Encryption Technology and Software Implementation based on Chaotic Map, Pei Wang (pp. 205-214).
    • Research on User Identification Algorithm based on Rewriting URL, Zhou Jiadi and Geng Hai (pp. 215-222).
    • Android Permissions Management at App Installing, Sujit Biswas, Wang Haipeng and Javed Rashid (pp. 223-232).
    • Food Supply Chain Safety Risk Evaluation Based on AHP Fuzzy Integrated Evaluation Method, Wang Xiaoping (pp. 233-244).
    • Overview of Risk Management System of Commercial Bank Data Center, Zheng Li, Shanlin Yang and Zhenyao Lis (pp. 245-258).
    • Critical Analysis of Steganography “An Art of Hidden Writing”, Aqsa Rashid, Muhammad Khurrum Rahim (pp. 259-282).
    • Slope Stability Analysis of Open Pit Mine Based on AHP and Entropy Weight Method, Hongsen Luo, Yong He, Guohui Li and Ji Li (pp. 283-294).
    • Novel Digital Signature Schemes based on Factoring and Discrete Logarithms, Shin-Yan Chiou (pp. 295-310).
    • Research on Stability of Strategic Alliance in Heilongjiang Soybean Processing Industry: an Empirical Study based on AHP and FCE Method, Xiaomei Zhang, Na Liu and Yang Wang (pp. 311-320).
    • Overflow Mechanism and Demonstration of Knowledge Flow on Enterprise Endogenous Innovation by the Three-Dimensional Space: Based on the Open Innovation Perspective, Min Yang, Jingxian Wang (pp. 321-332).
    • Study on the Organizational Structure of Rural Land Stock Cooperative System based on Game Theory and Network Data, Liang Xiao (pp. 333-344).
    • Performance Analysis of LSB Based Watermarking for Optimization of PSNR and MSE, Sehra Jindal, Shreya Goel, Tanya Puri, Asheesh Bhardwaj, Ishan Mahant, Sartaj Singh, Dhairya Sood (pp. 345-350).
    • Empirical Research on Relationship between Entrepreneurial Resource, Strategy and Performance under Different Environment, Shaozhong Yu and Le Zhang (pp. 351-368).
    • RFID Bi-Directional Authentication Protocol Based on Dynamic Coupled Integer Tent Map, Liu Jiandong, Zhang Xiao, Wang Yequan, Shang Kai (pp. 369-382).
    • A Random PRESENT Encryption Algorithm Based on Dynamic S-box, Zhiying Tang, Jie Cui, Hong Zhong, Mingyong Yu (pp. 383-392, 33).
    • Study on Dynamic Guidance Obstacle Avoidance of UAV based on the Minimum Angle Shift, Xiong Zhiyong, Yang Xiuxia, Zhang Yi, Hua Wei, Liu Xiaowei (pp. 393-404).
    • A Survey on Wireless Mesh Networks and its Security Issues, R. Regan and J. Martin Leo Manickam (pp. 405-418).
    • Modeling the Spread of Computer Viruses under the Effects of Infected External Computers and Removable Storage Media, Xulong Zhang (pp. 419-428).
    • SVDD-Based Financial Fraud Detection Method through Respective Learnings of Normal/Abnormal Behaviors, Mun-Kweon Jeong, Seong-Ho An and Kihyo Nam (pp. 429-438).
    • A Novel Method of Searching Primitive Roots Modulo Fermat Prime Numbers, Dalei Zhang and Hong Zhong (pp. 439-448).
    • Research on Computer Network Virus Defense Technology in Cloud Technology Environment, Zhao Sheng, Han Hui Shan, Shi Xue Kui (pp. 449-460).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA