Skip to content
NADIA

IJSIA Vol. 9, No. 10, 2015

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2015
2015
Volume 9, Number 10, 2015 October
    • Efficient Mining Maximal Constant Row Bicluster in Function-resource Matrix for IMA Safety Analysis, Miao Wang, Zhiyong Xiong, Liang Xu, Lihua Zhang,Qingfan Gu and Guoqing Wang (pp. 1-20).
    • LDPC Encoder and Decoder Architecture for Coding 3-bit Message Vector, Gade Sribala, D. V. N. Sukanya, K. Gouthami and Tai-hoon Kim (pp. 21-30).
    • Joint Encryption and Error Correction Technical Research Applied an Efficient Turbo Code, Jianbin Yao, Jianhua Liu and Yang Yang (pp. 31-44).
    • Application of Multi-attribute Cloud Decision Method in Congestion Control, Zhao Yu-hong, WuAi-Yan, Zheng Xue-feng, and Tu Xu-yan (pp. 47-58).
    • Security of Personal Bio Data in Mobile Health Applications for the Elderly, Jong Tak Kim, Un Gu Kang, Young Ho Lee and Byung Mun Lee (pp. 59-70).
    • Robust Fault Diagnosis Algorithm of Nonlinear System based on Group Algebra Theory, Zhao Jing-yun, Han Xiao, Fu Zhen-duo and Liao Yue-feng (pp. 71-82).
    • Fingerprint Spoof Detection Using Quality Features, Arunalatha G and M. Ezhilarasan (pp. 83-94).
    • Controlled Quantum Secure Direct Communication Protocol Based on Extended Three-particle GHZ State Decoy, Tao Fang (pp. 95-102).
    • An Adaptive Gray Scale Watermarking Method in Wavelet Domain, Jialing Han and Xiaohui Zhao (pp. 103-114).
    • Study on the System for Prevention of Harmful Invasion with Access from Wireless LAN Access Point, Chang-Su Kim (pp. 115-124).
    • Embedding Binary Image Watermark in DC Components of All Phase Discrete Cosine Biorthogonal Transform, Fanfan Yang, Chengyou Wang, Wei Huang, and Xiao Zhou (pp. 125-136).
    • Research on Detection Algorithm of WEB Crawler, Hongyan Zhao (pp. 137-146).
    • An Approach to Generate 2-Dimensional AVK to Enhance Security of Shared Information, Manash Pratim Dutta, Subhasish Banerjee and C. T. Bhunia (pp. 147-154).
    • Research on Approaching Error Boundary of Variable Universe Adaptive Fuzzy Controller, Hui Li (pp. 155-164).
    • The User Action Event Generator Design for Leading Malicious Behaviors from Malware in Sandbox, Jung-Uk Joo, Incheol Shin, Tong-Wook Hwang and Minsoo Kim (pp. 165-176).
    • An Optimized k-means Algorithm for Selecting Initial Clustering Centers, Jianhui Song, Xuefei Li and Yanju Liu (pp. 177-186).
    • Constraint Sequential Fault Diagnosis using An Inertial Velocity Differential Evolution Algorithm, Xiaohong Qiu, Yuting Hu and Bo Li (pp. 187-200).
    • Requirement of Security for IoT Application based on Gateway System, Jung Tae Kim (pp. 201-208).
    • Platformization Mechanism and Simulation Analysis of High-tech Service Innovation Network Based on Structural Holes Theory, Yaowu Sun and Xiaoye Gong (pp. 209-220).
    • Measurement for the Rehabilitation Efficacy of Aerobic Exercise of Male Elderly Patients with GPA based on Large-Scale Internet Data, Long Xiaodong, Tao Ganchen, Luo Hong, Wang Yuefeng and Chen Yuanping (pp. 221-230)
    • Evaluating Software Metrics as Predictors of Software Vulnerabilities, Mamdouh Alenezi and Ibrahim Abunadi, (pp. 231-240).
    • Rebuild the Basement Tectonic Framework of the Western South China Sea, Changsong Lin and Lihong Zhao (pp. 241-254).
    • Research on the Governance Structure of Little Science based on Network of Employment Relationship: Policy Implications for China, Zhen-yu Huang, Yun-long Ding (pp. 255-266).
    • A Comparative Study of the Proposed National Cyber-terror Prevention Act, Dea-woo Park and Jin Shin (pp. 267-274).
    • Research on the Impact of E-commerce to Logistics Economy: An Empirical Analysis based on Zhengzhou Airport Logistics, Lei Wang (pp. 275-286).
    • Research on the Influence of E-commerce Platform to Agricultural Logistics: An Empirical Analysis based on Agricultural Product Marketing, Yuqiu Cai, Yuqi Lang, Shulan Zheng and Yongqiang Zhang (pp. 287-296).
    • An Efficient and Robust Anonymous Authentication Scheme in Global Mobility Networks, Jaecheol Ha (pp. 297-312).
    • Research on Risk Early-Warning Model in Airport Flight Area based on Information Entropy Attribute Reduction and BP Neural Network, Li Shi and Fan Luo (pp. 313-322).
    • Online Marketing Strategy for Agricultural Supply Chain and Regional Economic Growth based on E-commerce Perspective, Hui Yang and Yajuan Zhang (pp. 323-332).
    • Quantum Secure Direct Communication Using Checking Sequence Coded, Zhao Guoan, Su Geng, Ning Fan and Gao Zehua (pp. 333-340).
    • Spam Filtering based on Knowledge Transfer Learning, Xing Wang, Bin-Xing Fang, Hui He and Hong-Li Zhang (pp. 341-352).
    • Cloud Security Algorithms, Ashima Pansotra and Simar Preet Singh (pp. 353-360).
    • Node Trust Assessment and Prediction in Mobile Ad Hoc Networks, Shaojie Zhou and Hui Xia (pp. 361-372).
    • A Study on Mobile Device Control Model for Critical Data Leakage Prevention in the Enterprise Business Service, Yong-Suk Kang, Yoondeok Kim, Yongtae Shin and Jong-Bae Kim (pp. 373-380).
    • Coverage Balancing Based Trust Evaluation Method for Wireless Sensor Networks, Shen Haibo, Dong Shengjie, Xu Jian and Zhang Hong (pp. 381-394).
    • Client Oriented Remote Attestation Model in Cloud Environment, Liu Zhenpeng, Wang Xu, Liu Yifan, Guo Ding and Zhu Xianchao (pp. 395-404).
    • Comparison of Genetic Algorithm based Watermarking Techniques using Tournament Selection Approach and Roulette Wheel Approach for Fidelity Optimization, Sachin Goyal and Roopam Gupta (pp. 405-412).
    • Research on the Impact of E-commerce on Enterprise Performance Based Factor Analysis, Xiong Hu (pp. 413-424).
    • Application of Data Mining based on Classifier in Class Label Prediction of Coal Mining Data, Haixu Xi, Dan Guo and Hongjin Zhu (pp. 425-432).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA