Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
ISI
Archive
Archive
2024: Vol. 29
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 28
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 27
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 26
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 25
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 24
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2018: Vol. 23
No. 6, December
No. 5, October
No. 3-4, August
No. 2, April
No. 1, February
2017: Vol. 22
No. 6, December
No. 5, November
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2016: Vol. 21
No. 5-6, December
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2015: Vol. 20
No. 5, September
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2014: Vol. 19
No. 6, December
No. 5, September
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2013: Vol. 18
No. 1, February
2012: Vol. 17
No. 1, February
2011: Vol. 16
No. 1, February
2010: Vol. 15
No. 1, February
An Intelligent Approach for Protecting Privacy in Distributed Information Mining Using Secured Computation of Multiple Participating Sites
Vibhor Sharma, Shashi Bhushan, Bhim Singh Boahar, Pramod Kumar, Anuj Kumar
https://doi.org/10.18280/isi.260601
Page
515-522
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Detection of Hot Topic in Tweets Using Modified Density Peak Clustering
Sarvani Anandarao, Sweetlin Hemalatha Chellasamy
https://doi.org/10.18280/isi.260602
Page
523-531
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A SIFT Description Approach for Non-Uniform Illumination and Other Invariants
Krittachai Boonsivanon, Worawat Sa-Ngiamvibool
https://doi.org/10.18280/isi.260603
Page
533-539
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Framework Two-Tier Feature Selection on the Intelligence System Model for Detecting Coronary Heart Disease
Wiharto, Esti Suryani, Sigit Setyawan
https://doi.org/10.18280/isi.260604
Page
541-547
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Detection of Black Hole Attack Using Honeypot Agent-Based Scheme with Deep Learning Technique on MANET
Venkatasubramanian Srinivasan
https://doi.org/10.18280/isi.260605
Page
549-557
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Pragmatic Security-Aware Cross-Layer Design for Wireless Networks from Vampire Attacks
Battula Phijik, Chakunta Venkata Guru Rao
https://doi.org/10.18280/isi.260606
Page
559-567
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Consumer Conformity, Social Ties and EWOM in Digital Marketing
Badawi Badawi, Arif Nurudin, Muafi Muafi
https://doi.org/10.18280/isi.260607
Page
569-576
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Modified Jellyfish Search Optimizer with Opposition Based Learning and Biased Passive Swarm Motion
Jitendra Rajpurohit
https://doi.org/10.18280/isi.260608
Page
577-584
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Towards the Construction of Reed-Muller Code Based Symmetric Key FHE
Ratnakumari Challa, VijayaKumari Gunta
https://doi.org/10.18280/isi.260609
Page
585-590
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
High Efficient Virtual Machine Migration Using Glow Worm Swarm Optimization Method for Cloud Computing
Annabathula Phani Sheetal, Kongara Ravindranath
https://doi.org/10.18280/isi.260610
Page
591-597
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS