Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
IJSSE
CURRENT ISSUE
CURRENT ISSUE
Vol. 15, No. 5, May 2025
Automated Detection of Construction Opening Safety Risks Using Computer Vision
Yih-Tzoo Chen, Ting-Chuan Hu
https://doi.org/10.18280/ijsse.150501
Page
859-871
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Next-Gen Cloud Security: IRDS4C’s Deception Strategy for Early Intrusion and Ransomware Detection
Ahmed El-Kosairy, Nashwa AbdelBaki
https://doi.org/10.18280/ijsse.150502
Page
873-882
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Comparative Analysis of Machine Learning Models for Credit Card Fraud Detection Using SMOTE for Class Imbalance
Laberiano Andrade-Arenas, Cesar Yactayo-Arias
https://doi.org/10.18280/ijsse.150504
Page
893-901
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
GIS-Based Risk Assessment for Forest Fire Management Along Oil and Gas Pipelines in Algeria
Abdelkarim Slimani, Lylia Bahmed, Djilali Chacha, Kamel Gouaref, Mohammed Bougofa, Hefaidh Hadef
https://doi.org/10.18280/ijsse.150505
Page
903-912
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Impact of Road Geometry and Land Use on Motorcyclist Driving Stress
Iqra Mona Meilinda, Sugiarto Sugiarto, Sofyan M. Saleh, Ashfa Achmad
https://doi.org/10.18280/ijsse.150506
Page
913-923
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Dynamic Simulation and Network Analysis of Hate Speech Propagation on Social Media: Integrating Mathematical Modeling and Digital Humanities
Zulfan, Jonathan Liviera Marpaung, Rahmadsyah Rangkuti, Andi Pratama Lubis, Windi Chaldun
https://doi.org/10.18280/ijsse.150507
Page
925-935
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
An Enhanced Privacy-Preserving Federated Learning Framework Using Attribute-Based Encryption for Smart IoT Systems
Somireddy Pavani, Arun Sahayadhas
https://doi.org/10.18280/ijsse.150508
Page
937-954
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Hybrid Fuzzy System Framework for Breast Cancer Prediction via Automated Medical History Analysis
Maleeha Fathima, Moulana Mohammed
https://doi.org/10.18280/ijsse.150509
Page
955-961
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Risk Management in Sustainable Patchouli Supply Chain
Sofia Keumalasari, Ahmad Humam Hamid, Indra Indra, Agus Nugroho
https://doi.org/10.18280/ijsse.150510
Page
963-972
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Study on Causal Relationships Between Working Conditions and Occupational Diseases: A Case Study of a Phosphorus Plant in Kazakhstan
Alimzhan Bekmagambetov, Anar Rakhmetova, Laura Yedilbayeva , Gulzhan Daumova, Elmira Kulmagambetova, Nazgul Abdrakhmanova, Nurgul Sagindykova
https://doi.org/10.18280/ijsse.150511
Page
973-985
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
IoT-Based Vehicle Security System: Real-Time Monitoring and Event Logging
Linett Velasquez-Jimenez, Claudia Marrujo-Ingunza, Santiago Rubiños-Jimenez, Juan Grados-Gamarra, Herbert Grados-Espinoza
https://doi.org/10.18280/ijsse.150512
Page
987-996
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Economic Security of Agro-Industrial Organizations in the Era of Technological Singularity: A Hybrid Model Approach
Yuriy Katkov, Anastasiya Romanova, Ekaterina Katkova
https://doi.org/10.18280/ijsse.150513
Page
997-1005
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Video Steganography Using a 9-D Chaotic System and an Encryption Algorithm for Data Hiding
Suhad Naji Al-Rekaby, Maisa’a Abid Ali Khodher, Layth Kamil Adday
https://doi.org/10.18280/ijsse.150514
Page
1007-1018
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
SITUPANG: A Hybrid Agile-UML Food Security System for Enhancing Regional Competitiveness in Indonesia
Evi Gravitiani, Rochmat Aldy Purnomo, Brilyan Hendrasuryawan, M. Rudianto, Rebecca Cindy Sartika, Arief Budiono
https://doi.org/10.18280/ijsse.150515
Page
1019-1027
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Strengthening Cryptographic Keys Using User’s Voice Biometric
Ahmed A. Abbass, Hussein L. Hussein, Sinan A. Naji, Jasim H. Lafta, Robert Tornai
https://doi.org/10.18280/ijsse.150516
Page
1029-1034
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Mitigating Malicious and Unintentional Packet Drops in Mobile Ad Hoc Networks
Arshad Ahmad Khan Mohammad, Poonam Verma, Kumar Babu Batta, Jyothi Bankapalli, Mohammad Khaja Nizamuddin, Arif Mohammad Abdul
https://doi.org/10.18280/ijsse.150517
Page
1035-1048
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Development of an HCI-Based Safety Hazards Prediction Model for Indonesia's Electricity Industry
Pawenary, Hari Purnomo, Winda Nur Cahyo
https://doi.org/10.18280/ijsse.150518
Page
1049-1063
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Satellite Images Processing for Monitoring Lake Surface Area
Adil Ibrahim Khalil
https://doi.org/10.18280/ijsse.150519
Page
1065-1073
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
YOLO-Based Helmet Detection and Intelligent Parking System: A Case Study at Diponegoro University
Agustinus Adven Christo, M. Bintang Prayoga Utama, Yosia Aser Camme, Dania Eridani, Patricia Evericho Mountaines
https://doi.org/10.18280/ijsse.150520
Page
1075-1088
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS