Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
ISI
Archive
Archive
2025: Vol. 30
No. 11, November
No. 10, October
No. 9, September
No. 8, August
No. 7, July
No. 6, June
No. 5, May
No. 4, April
No. 3, March
No. 2, February
No. 1, January
2024: Vol. 29
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 28
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 27
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 26
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 25
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 24
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2018: Vol. 23
No. 6, December
No. 5, October
No. 3-4, August
No. 2, April
No. 1, February
2017: Vol. 22
No. 6, December
No. 5, November
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2016: Vol. 21
No. 5-6, December
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2015: Vol. 20
No. 5, September
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2014: Vol. 19
No. 6, December
No. 5, September
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2013: Vol. 18
No. 1, February
2012: Vol. 17
No. 1, February
2011: Vol. 16
No. 1, February
2010: Vol. 15
No. 1, February
A Survey on 6G Networks: Vision, Requirements, Architecture, Technologies and Challenges
Abderrahmane El Mettiti, Mohammed Oumsis
https://doi.org/10.18280/isi.270101
Page
1-10
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Comprehensive Review of Low Density Parity Check Encoder Techniques
Divyashree Yamadur Venkatesh, Komala Mallikarjunaiah, Mallikarjunaswamy Srikantaswamy
https://doi.org/10.18280/isi.270102
Page
11-20
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Controller Modeling of a Quadrotor
Erick P. Herrera-Granda, Leandro L. Lorente-Leyva, Jenny Yambay, Jesús Aranguren, Marcelo Ibarra, Julio Peña
https://doi.org/10.18280/isi.270103
Page
21-28
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Comprehensive Review on Intrusion Detection and Prevention Schemes for Network Coding Enabled Mobile Small Cells
Chanumolu Kiran Kumar, Nandhakumar Ramachandran
https://doi.org/10.18280/isi.270104
Page
29-39
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Vulnerability of the Dynamic Array PIN Protocol
Samir Chabbi, Djalel Chefrour
https://doi.org/10.18280/isi.270105
Page
41-47
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Automatic Generation and Optimization of Combinatorial Test Cases from UML Activity Diagram Using Particle Swarm Optimization
Subhash Tatale, Vudatha Chandra Prakash
https://doi.org/10.18280/isi.270106
Page
49-59
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Live-Streamed Video Reconstruction for Web Browser Forensics
Mahmoud El-Tayeb, Ahmed Taha, Zaki T. Fayed
https://doi.org/10.18280/isi.270107
Page
61-66
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Semi Global Pairwise Sequence Alignment Using New Chromosome Structure Genetic Algorithm
Jeevana Jyothi Pujari, Karteeka Pavan Kanadam
https://doi.org/10.18280/isi.270108
Page
67-74
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Automatic Traffic Red-Light Violation Detection Using AI
Le Quang Thao, Duong Duc Cuong, Nguyen Tuan Anh, Pham Mai Anh, Ha Minh Duc, Nguyen Minh
https://doi.org/10.18280/isi.270109
Page
75-80
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Analysis of E-Commerce Process in the Downstream Section of Supply Chain Management Based on Process and Data Mining
Ferra Arik Tridalestari, Mustafid, Budi Warsito, Adi Wibowo, Hanung Nindito Prasetyo
https://doi.org/10.18280/isi.270110
Page
81-91
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Fine-Tuning BERT Based Approach for Multi-Class Sentiment Analysis on Twitter Emotion Data
Eswariah Kannan, Lakshmi Anusha Kothamasu
https://doi.org/10.18280/isi.270111
Page
93-100
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Smart-Approach Based Internet of Things and Skyline Query for Multicriteria Decisions for Travel Services
Oum Elhana Maamra, Mohamed-Khireddine Kholladi, Okba Kazar, Saad Harous
https://doi.org/10.18280/isi.270112
Page
101-109
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Radio Frequency Identification Based Student Attendance System
Aaron Afan Izang, Chigozirim Ajaegbu, Wumi Ajayi, Ayokunle Ayobami Omotunde, Victor Oshoriamhe Enike, Brian Oisenosume Ifidon
https://doi.org/10.18280/isi.270113
Page
111-117
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Detecting and Mitigating Bias in Data Using Machine Learning with Pre-Training Metrics
Venkata Naresh Mandhala, Debnath Bhattacharyya, Divya Midhunchakkaravarthy, Hye-jin Kim
https://doi.org/10.18280/isi.270114
Page
119-125
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Enhanced CNN Model for Pancreatic Ductal Adenocarcinoma Classification Based on Proteomic Data
Kadiyala Laxminarayanamma, Ravilla Venkata Krishnaiah, Porika Sammulal
https://doi.org/10.18280/isi.270115
Page
127-133
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Transmission Control Protocol Analysis Using NS3
Ahmed B. Abdulkareem
https://doi.org/10.18280/isi.270116
Page
135-141
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Federated Learning for Medical Imaging: An Updated State of the Art
Naoual Mouhni, Abderrafiaa Elkalay, Mohamed Chakraoui, Abdelmounaim Abdali, Abdelkarim Ammoumou, Ibtissam Amalou
https://doi.org/10.18280/isi.270117
Page
143-150
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Effective Intrusion Detection System Using Classifier Ensembles
Muthukumarasamy Govindarajan
https://doi.org/10.18280/isi.270118
Page
151-156
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Spam Mail Detection Using Optimization Techniques
Koneru Anupriya, Kurakula Harini, Kethe Balaji, Karnati Geetha Sudha
https://doi.org/10.18280/isi.270119
Page
157-163
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Resource Based Attacks Security Using RPL Protocol in Internet of Things
RatnaKumari Challa, Kanusu Srinivasa Rao
https://doi.org/10.18280/isi.270120
Page
165-170
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS