2019 Issues Vol. 13, No. 3 Vol. 13, No. 2 Vol. 13, No. 1 2018 Issues Vol. 12, No. 6 Vol. 12, No. 5 Vol. 12, No. 4 Vol. 12, No. 3 Vol. 12, No. 2 Vol. 12, No. 1 2017 Issues Vol. 11, No. 12 Vol. 11, No. 11 Vol. 11, No. 10 Vol. 11, No. 9 Vol. 11, No. 8 Vol. 11, No. 7 Vol. 11, No. 6 Vol. 11, No. 5 Vol. 11, No. 4 Vol. 11, No. 3 Vol. 11, No. 2 Vol. 11, No. 1 2016 Issues Vol. 10, No. 12 Vol. 10, No. 11 Vol. 10, No. 10 Vol. 10, No. 9 Vol. 10, No. 8 Vol. 10, No. 7 Vol. 10, No. 6 Vol. 10, No. 5 Vol. 10, No. 4 Vol. 10, No. 3 Vol. 10, No. 2 Vol. 10, No. 1 2015 Issues Vol. 9, No. 12 Vol. 9, No. 11 Vol. 9, No. 10 Vol. 9, No. 9 Vol. 9, No. 8 Vol. 9, No. 7 Vol. 9, No. 6 Vol. 9, No. 5 Vol. 9, No. 4 Vol. 9, No. 3 Vol. 9, No. 2 Vol. 9, No. 1 2014 Issues Vol. 8, No. 6 Vol. 8, No. 5 Vol. 8, No. 4 Vol. 8, No. 3 Vol. 8, No. 2 Vol. 8, No. 1 2013 Issues Vol. 7, No. 6 Vol. 7, No. 5 Vol. 7, No. 4 Vol. 7, No. 3 Vol. 7, No. 2 Vol. 7, No. 1 2012 Issues Vol. 6, No. 4 Vol. 6, No. 3 Vol. 6, No. 2 Vol. 6, No. 1 2011 Issues Vol. 5, No. 4 Vol. 5, No. 3 Vol. 5, No. 2 Vol. 5, No. 1 2010 Issues Vol. 4, No. 4 Vol. 4, No. 3 Vol. 4, No. 2 Vol. 4, No. 1 2009 Issues Vol. 3, No. 4 Vol. 3, No. 3 Vol. 3, No. 2 Vol. 3, No. 1 2008 Issues Vol. 2, No. 4 Vol. 2, No. 3 Vol. 2, No. 2 Vol. 2, No. 1 2007 Issues Vol. 1, No. 2 Vol. 1, No. 1 2015 2015 Volume 9, Number 10, 2015 October Efficient Mining Maximal Constant Row Bicluster in Function-resource Matrix for IMA Safety Analysis, Miao Wang, Zhiyong Xiong, Liang Xu, Lihua Zhang,Qingfan Gu and Guoqing Wang (pp. 1-20). LDPC Encoder and Decoder Architecture for Coding 3-bit Message Vector, Gade Sribala, D. V. N. Sukanya, K. Gouthami and Tai-hoon Kim (pp. 21-30). Joint Encryption and Error Correction Technical Research Applied an Efficient Turbo Code, Jianbin Yao, Jianhua Liu and Yang Yang (pp. 31-44). Application of Multi-attribute Cloud Decision Method in Congestion Control, Zhao Yu-hong, WuAi-Yan, Zheng Xue-feng, and Tu Xu-yan (pp. 47-58). Security of Personal Bio Data in Mobile Health Applications for the Elderly, Jong Tak Kim, Un Gu Kang, Young Ho Lee and Byung Mun Lee (pp. 59-70). Robust Fault Diagnosis Algorithm of Nonlinear System based on Group Algebra Theory, Zhao Jing-yun, Han Xiao, Fu Zhen-duo and Liao Yue-feng (pp. 71-82). Fingerprint Spoof Detection Using Quality Features, Arunalatha G and M. Ezhilarasan (pp. 83-94). Controlled Quantum Secure Direct Communication Protocol Based on Extended Three-particle GHZ State Decoy, Tao Fang (pp. 95-102). An Adaptive Gray Scale Watermarking Method in Wavelet Domain, Jialing Han and Xiaohui Zhao (pp. 103-114). Study on the System for Prevention of Harmful Invasion with Access from Wireless LAN Access Point, Chang-Su Kim (pp. 115-124). Embedding Binary Image Watermark in DC Components of All Phase Discrete Cosine Biorthogonal Transform, Fanfan Yang, Chengyou Wang, Wei Huang, and Xiao Zhou (pp. 125-136). Research on Detection Algorithm of WEB Crawler, Hongyan Zhao (pp. 137-146). An Approach to Generate 2-Dimensional AVK to Enhance Security of Shared Information, Manash Pratim Dutta, Subhasish Banerjee and C. T. Bhunia (pp. 147-154). Research on Approaching Error Boundary of Variable Universe Adaptive Fuzzy Controller, Hui Li (pp. 155-164). The User Action Event Generator Design for Leading Malicious Behaviors from Malware in Sandbox, Jung-Uk Joo, Incheol Shin, Tong-Wook Hwang and Minsoo Kim (pp. 165-176). An Optimized k-means Algorithm for Selecting Initial Clustering Centers, Jianhui Song, Xuefei Li and Yanju Liu (pp. 177-186). Constraint Sequential Fault Diagnosis using An Inertial Velocity Differential Evolution Algorithm, Xiaohong Qiu, Yuting Hu and Bo Li (pp. 187-200). Requirement of Security for IoT Application based on Gateway System, Jung Tae Kim (pp. 201-208). Platformization Mechanism and Simulation Analysis of High-tech Service Innovation Network Based on Structural Holes Theory, Yaowu Sun and Xiaoye Gong (pp. 209-220). Measurement for the Rehabilitation Efficacy of Aerobic Exercise of Male Elderly Patients with GPA based on Large-Scale Internet Data, Long Xiaodong, Tao Ganchen, Luo Hong, Wang Yuefeng and Chen Yuanping (pp. 221-230) Evaluating Software Metrics as Predictors of Software Vulnerabilities, Mamdouh Alenezi and Ibrahim Abunadi, (pp. 231-240). Rebuild the Basement Tectonic Framework of the Western South China Sea, Changsong Lin and Lihong Zhao (pp. 241-254). Research on the Governance Structure of Little Science based on Network of Employment Relationship: Policy Implications for China, Zhen-yu Huang, Yun-long Ding (pp. 255-266). A Comparative Study of the Proposed National Cyber-terror Prevention Act, Dea-woo Park and Jin Shin (pp. 267-274). Research on the Impact of E-commerce to Logistics Economy: An Empirical Analysis based on Zhengzhou Airport Logistics, Lei Wang (pp. 275-286). Research on the Influence of E-commerce Platform to Agricultural Logistics: An Empirical Analysis based on Agricultural Product Marketing, Yuqiu Cai, Yuqi Lang, Shulan Zheng and Yongqiang Zhang (pp. 287-296). An Efficient and Robust Anonymous Authentication Scheme in Global Mobility Networks, Jaecheol Ha (pp. 297-312). Research on Risk Early-Warning Model in Airport Flight Area based on Information Entropy Attribute Reduction and BP Neural Network, Li Shi and Fan Luo (pp. 313-322). Online Marketing Strategy for Agricultural Supply Chain and Regional Economic Growth based on E-commerce Perspective, Hui Yang and Yajuan Zhang (pp. 323-332). Quantum Secure Direct Communication Using Checking Sequence Coded, Zhao Guoan, Su Geng, Ning Fan and Gao Zehua (pp. 333-340). Spam Filtering based on Knowledge Transfer Learning, Xing Wang, Bin-Xing Fang, Hui He and Hong-Li Zhang (pp. 341-352). Cloud Security Algorithms, Ashima Pansotra and Simar Preet Singh (pp. 353-360). Node Trust Assessment and Prediction in Mobile Ad Hoc Networks, Shaojie Zhou and Hui Xia (pp. 361-372). A Study on Mobile Device Control Model for Critical Data Leakage Prevention in the Enterprise Business Service, Yong-Suk Kang, Yoondeok Kim, Yongtae Shin and Jong-Bae Kim (pp. 373-380). Coverage Balancing Based Trust Evaluation Method for Wireless Sensor Networks, Shen Haibo, Dong Shengjie, Xu Jian and Zhang Hong (pp. 381-394). Client Oriented Remote Attestation Model in Cloud Environment, Liu Zhenpeng, Wang Xu, Liu Yifan, Guo Ding and Zhu Xianchao (pp. 395-404). Comparison of Genetic Algorithm based Watermarking Techniques using Tournament Selection Approach and Roulette Wheel Approach for Fidelity Optimization, Sachin Goyal and Roopam Gupta (pp. 405-412). Research on the Impact of E-commerce on Enterprise Performance Based Factor Analysis, Xiong Hu (pp. 413-424). Application of Data Mining based on Classifier in Class Label Prediction of Coal Mining Data, Haixu Xi, Dan Guo and Hongjin Zhu (pp. 425-432).