Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
ISI
Archive
Archive
2024: Vol. 29
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 28
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 27
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 26
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 25
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 24
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2018: Vol. 23
No. 6, December
No. 5, October
No. 3-4, August
No. 2, April
No. 1, February
2017: Vol. 22
No. 6, December
No. 5, November
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2016: Vol. 21
No. 5-6, December
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2015: Vol. 20
No. 5, September
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2014: Vol. 19
No. 6, December
No. 5, September
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2013: Vol. 18
No. 1, February
2012: Vol. 17
No. 1, February
2011: Vol. 16
No. 1, February
2010: Vol. 15
No. 1, February
Cryptanalysis of a Pseudorandom Generator for Cross-Border E-Commerce
Lelai Shi, Suhui Liu, Slobodan Petrović
https://doi.org/10.18280/isi.240401
Page
361-365
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
The Ability to Think Creatively on SSCS Using Schoology Apps, How is the Student’s Language Metacognitive Awareness?
Kundharu Saddhono, Cahyo Hasanudin, Ayu Fitrianingsih
https://doi.org/10.18280/isi.240402
Page
367-375
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Fast Algorithm for Particle Stacking
Junzhen Meng, Junran Zhang
https://doi.org/10.18280/isi.240403
Page
377-384
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Performance and Cost Analysis of Web Application in Elastic Cloud Environment
Suneetha Bulla, Bobba Basaveswara Rao
https://doi.org/10.18280/isi.240404
Page
385-389
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Modelling of Monthly Rainfall Patterns in the North-West India Using SVM
Kalpana Polisetty, Kiran Kumar Paidipati, Jyostna Devi Bodapati
https://doi.org/10.18280/isi.240405
Page
391-395
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Novel Privacy Protection Protocol for Vehicular Ad Hoc Networks Based on Elliptic Curve Bilinear Mapping
Haijuan Zang, Yan Huang, Hongbo Cao, Chenchen Li
https://doi.org/10.18280/isi.240406
Page
397-402
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Feature Extraction Techniques in Associate with Opposition Based Whale Optimization Algorithm
Gottumukkala HimaBindu, Chinta Anuradha, Patnala S.R. Chandra Murty
https://doi.org/10.18280/isi.240407
Page
403-410
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Estimation of Neural Sources from EEG Measurements Using Sequential Monte Carlo Method
Santhosh Kumar Veeramalla, Venkata Krishna Hanumantha Rao Talari
https://doi.org/10.18280/isi.240408
Page
411-417
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
An Improved Energy-Efficient Cluster Routing Protocol for Wireless Sensor Network
Feifei Wang, Haifeng Hu
https://doi.org/10.18280/isi.240409
Page
419-424
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
An Evolving Hybrid Deep Learning Framework for Legal Document Classification
Neha Bansal, Arun Sharma, R.K. Singh
https://doi.org/10.18280/isi.240410
Page
425-431
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Design of a Privacy-Preserving Algorithm for Peer-to-Peer Network Based on Differential Privacy
Jian Yu
https://doi.org/10.18280/isi.240411
Page
433-437
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Modified Flower Pollination Algorithm Constrained Optimal Power Flow
Tahtah Hocine, Arif Salem
https://doi.org/10.18280/isi.240412
Page
439-444
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Design of a Reliable Current Starved Inverter Based Arbiter Physical Unclonable Functions (PUFs) for Hardware Cryptography
Anil Kumar Kurra, Usha Rani Nelakuditi
https://doi.org/10.18280/isi.240413
Page
445-454
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS