Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
ISI
Archive
Archive
2025: Vol. 30
No. 12, December
No. 11, November
No. 10, October
No. 9, September
No. 8, August
No. 7, July
No. 6, June
No. 5, May
No. 4, April
No. 3, March
No. 2, February
No. 1, January
2024: Vol. 29
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 28
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 27
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 26
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 25
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 24
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2018: Vol. 23
No. 6, December
No. 5, October
No. 3-4, August
No. 2, April
No. 1, February
2017: Vol. 22
No. 6, December
No. 5, November
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2016: Vol. 21
No. 5-6, December
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2015: Vol. 20
No. 5, September
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2014: Vol. 19
No. 6, December
No. 5, September
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2013: Vol. 18
No. 1, February
2012: Vol. 17
No. 1, February
2011: Vol. 16
No. 1, February
2010: Vol. 15
No. 1, February
Cryptanalysis of a Pseudorandom Generator for Cross-Border E-Commerce
Lelai Shi, Suhui Liu, Slobodan Petrović
https://doi.org/10.18280/isi.240401
Page
361-365
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
The Ability to Think Creatively on SSCS Using Schoology Apps, How is the Student’s Language Metacognitive Awareness?
Kundharu Saddhono, Cahyo Hasanudin, Ayu Fitrianingsih
https://doi.org/10.18280/isi.240402
Page
367-375
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Fast Algorithm for Particle Stacking
Junzhen Meng, Junran Zhang
https://doi.org/10.18280/isi.240403
Page
377-384
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Performance and Cost Analysis of Web Application in Elastic Cloud Environment
Suneetha Bulla, Bobba Basaveswara Rao
https://doi.org/10.18280/isi.240404
Page
385-389
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Modelling of Monthly Rainfall Patterns in the North-West India Using SVM
Kalpana Polisetty, Kiran Kumar Paidipati, Jyostna Devi Bodapati
https://doi.org/10.18280/isi.240405
Page
391-395
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Novel Privacy Protection Protocol for Vehicular Ad Hoc Networks Based on Elliptic Curve Bilinear Mapping
Haijuan Zang, Yan Huang, Hongbo Cao, Chenchen Li
https://doi.org/10.18280/isi.240406
Page
397-402
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Feature Extraction Techniques in Associate with Opposition Based Whale Optimization Algorithm
Gottumukkala HimaBindu, Chinta Anuradha, Patnala S.R. Chandra Murty
https://doi.org/10.18280/isi.240407
Page
403-410
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Estimation of Neural Sources from EEG Measurements Using Sequential Monte Carlo Method
Santhosh Kumar Veeramalla, Venkata Krishna Hanumantha Rao Talari
https://doi.org/10.18280/isi.240408
Page
411-417
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
An Improved Energy-Efficient Cluster Routing Protocol for Wireless Sensor Network
Feifei Wang, Haifeng Hu
https://doi.org/10.18280/isi.240409
Page
419-424
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
An Evolving Hybrid Deep Learning Framework for Legal Document Classification
Neha Bansal, Arun Sharma, R.K. Singh
https://doi.org/10.18280/isi.240410
Page
425-431
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Design of a Privacy-Preserving Algorithm for Peer-to-Peer Network Based on Differential Privacy
Jian Yu
https://doi.org/10.18280/isi.240411
Page
433-437
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Modified Flower Pollination Algorithm Constrained Optimal Power Flow
Tahtah Hocine, Arif Salem
https://doi.org/10.18280/isi.240412
Page
439-444
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Design of a Reliable Current Starved Inverter Based Arbiter Physical Unclonable Functions (PUFs) for Hardware Cryptography
Anil Kumar Kurra, Usha Rani Nelakuditi
https://doi.org/10.18280/isi.240413
Page
445-454
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS