Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
ISI
Archive
Archive
2024: Vol. 29
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 28
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 27
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 26
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 25
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 24
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2018: Vol. 23
No. 6, December
No. 5, October
No. 3-4, August
No. 2, April
No. 1, February
2017: Vol. 22
No. 6, December
No. 5, November
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2016: Vol. 21
No. 5-6, December
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2015: Vol. 20
No. 5, September
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2014: Vol. 19
No. 6, December
No. 5, September
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2013: Vol. 18
No. 1, February
2012: Vol. 17
No. 1, February
2011: Vol. 16
No. 1, February
2010: Vol. 15
No. 1, February
Context-Aware Multi-layered Ontology for Composite Situation Model in Pervasive Computing
Abderrahim Lakehal, Adel Alti, Philippe Roose
https://doi.org/10.18280/isi.250501
Page
543-558
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
An Effective Recommendation System to Forecast the Best Educational Program Using Machine Learning Classification Algorithms
Joy Dhar, Asoke Kumar Jodder
https://doi.org/10.18280/isi.250502
Page
559-568
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Semi-supervised Deep Auto-encoder Based Intrusion Detection for IoT
Samir Fenanir, Fouzi Semchedine, Saad Harous, Abderrahmane Baadache
https://doi.org/10.18280/isi.250503
Page
569-577
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
An Effect Analysis Model for Corporate Marketing Mix Based on Artificial Neural Network
Haiping Wang
https://doi.org/10.18280/isi.250504
Page
579-587
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
An Automated CAD System of CT Chest Images for COVID-19 Based on Genetic Algorithm and K-Nearest Neighbor Classifier
Heba M. Afify, Ashraf Darwish, Kamel K. Mohammed, Aboul Ella Hassanien
https://doi.org/10.18280/isi.250505
Page
589-594
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Regression Analysis on the Influencing Factors of the Acceptance of Online Education Platform among College Students
Jia Wen, Xiaochong Wei, Tao He, Shangshang Zhang
https://doi.org/10.18280/isi.250506
Page
595-600
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Number of Pixel Change Rate and Unified Average Changing Intensity for Sensitivity Analysis of Encrypted inSAR Interferogram
Riad Saidi, Nada Cherrid, Tarek Bentahar, Hicham Mayache, Atef Bentahar
https://doi.org/10.18280/isi.250507
Page
601-607
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Analysis on Course Scores of Learners of Online Teaching Platforms Based on Data Mining
Nan Zhou, Zhaofeng Zhang, Jing Li
https://doi.org/10.18280/isi.250508
Page
609-617
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Unique Data Identification System for Wireless Sensor Networks Based on Enhanced Arithmetic Coding
Balaji Subramanian, Harold Robinson Yesudhas, Golden Julie Eanoch
https://doi.org/10.18280/isi.250509
Page
619-627
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
An Evaluation Model of Comprehensive Human Resources Quality of Financial Enterprises Based on Deep Neural Network
Yongda Hu, Xiyuan Li
https://doi.org/10.18280/isi.250510
Page
629-636
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Dangerous Prediction in Roads by Using Machine Learning Models
Shiva Prasad Satla, Manchala Sadanandam, Buradagunta Suvarna
https://doi.org/10.18280/isi.250511
Page
637-644
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Resource Classification and Knowledge Aggregation of Library and Information Based on Data Mining
Qin Xiao
https://doi.org/10.18280/isi.250512
Page
645-653
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Recombinant Sort: N-Dimensional Cartesian Spaced Algorithm Designed from Synergetic Combination of Hashing, Bucket, Counting and Radix Sort
Peeyush Kumar, Ayushe Gangal, Sunita Kumari, Sunita Tiwari
https://doi.org/10.18280/isi.250513
Page
655-668
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
User-Review Oriented Social Recommender System for Event Planning
Rahul Kumar Singh, Pardeep Singh, Gourav Bathla
https://doi.org/10.18280/isi.250514
Page
669-675
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Tracking and Extracting Action Trajectory of Athlete Based on Hierarchical Features
Tao Pan
https://doi.org/10.18280/isi.250515
Page
677-682
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Analytical Evaluation of Resource Estimation in Web Application Services
Suneetha Bulla, Chirra Venkata Rami Reddy, Panguluri Padmavathi, Turaka Padmasri
https://doi.org/10.18280/isi.250516
Page
683-690
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Object Detection Using Stacked YOLOv3
Sai Shilpa Padmanabula, Ramya Chowdary Puvvada, Venkatramaphanikumar Sistla, Venkata Krishna Kishore Kolli
https://doi.org/10.18280/isi.250517
Page
691-697
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Design and Application of a Virtual Simulation Teaching System Based on Cloud Service
Xiaogai Shen
https://doi.org/10.18280/isi.250518
Page
699-707
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS