Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
ISI
Archive
Archive
2025: Vol. 30
No. 8, August
No. 7, July
No. 6, June
No. 5, May
No. 4, April
No. 3, March
No. 2, February
No. 1, January
2024: Vol. 29
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 28
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 27
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 26
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 25
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 24
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2018: Vol. 23
No. 6, December
No. 5, October
No. 3-4, August
No. 2, April
No. 1, February
2017: Vol. 22
No. 6, December
No. 5, November
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2016: Vol. 21
No. 5-6, December
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2015: Vol. 20
No. 5, September
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2014: Vol. 19
No. 6, December
No. 5, September
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2013: Vol. 18
No. 1, February
2012: Vol. 17
No. 1, February
2011: Vol. 16
No. 1, February
2010: Vol. 15
No. 1, February
A Survey on 6G Networks: Vision, Requirements, Architecture, Technologies and Challenges
Abderrahmane El Mettiti, Mohammed Oumsis
https://doi.org/10.18280/isi.270101
Page
1-10
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Comprehensive Review of Low Density Parity Check Encoder Techniques
Divyashree Yamadur Venkatesh, Komala Mallikarjunaiah, Mallikarjunaswamy Srikantaswamy
https://doi.org/10.18280/isi.270102
Page
11-20
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Controller Modeling of a Quadrotor
Erick P. Herrera-Granda, Leandro L. Lorente-Leyva, Jenny Yambay, Jesús Aranguren, Marcelo Ibarra, Julio Peña
https://doi.org/10.18280/isi.270103
Page
21-28
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Comprehensive Review on Intrusion Detection and Prevention Schemes for Network Coding Enabled Mobile Small Cells
Chanumolu Kiran Kumar, Nandhakumar Ramachandran
https://doi.org/10.18280/isi.270104
Page
29-39
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Vulnerability of the Dynamic Array PIN Protocol
Samir Chabbi, Djalel Chefrour
https://doi.org/10.18280/isi.270105
Page
41-47
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Automatic Generation and Optimization of Combinatorial Test Cases from UML Activity Diagram Using Particle Swarm Optimization
Subhash Tatale, Vudatha Chandra Prakash
https://doi.org/10.18280/isi.270106
Page
49-59
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Live-Streamed Video Reconstruction for Web Browser Forensics
Mahmoud El-Tayeb, Ahmed Taha, Zaki T. Fayed
https://doi.org/10.18280/isi.270107
Page
61-66
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Semi Global Pairwise Sequence Alignment Using New Chromosome Structure Genetic Algorithm
Jeevana Jyothi Pujari, Karteeka Pavan Kanadam
https://doi.org/10.18280/isi.270108
Page
67-74
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Automatic Traffic Red-Light Violation Detection Using AI
Le Quang Thao, Duong Duc Cuong, Nguyen Tuan Anh, Pham Mai Anh, Ha Minh Duc, Nguyen Minh
https://doi.org/10.18280/isi.270109
Page
75-80
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Analysis of E-Commerce Process in the Downstream Section of Supply Chain Management Based on Process and Data Mining
Ferra Arik Tridalestari, Mustafid, Budi Warsito, Adi Wibowo, Hanung Nindito Prasetyo
https://doi.org/10.18280/isi.270110
Page
81-91
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Fine-Tuning BERT Based Approach for Multi-Class Sentiment Analysis on Twitter Emotion Data
Eswariah Kannan, Lakshmi Anusha Kothamasu
https://doi.org/10.18280/isi.270111
Page
93-100
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Smart-Approach Based Internet of Things and Skyline Query for Multicriteria Decisions for Travel Services
Oum Elhana Maamra, Mohamed-Khireddine Kholladi, Okba Kazar, Saad Harous
https://doi.org/10.18280/isi.270112
Page
101-109
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Radio Frequency Identification Based Student Attendance System
Aaron Afan Izang, Chigozirim Ajaegbu, Wumi Ajayi, Ayokunle Ayobami Omotunde, Victor Oshoriamhe Enike, Brian Oisenosume Ifidon
https://doi.org/10.18280/isi.270113
Page
111-117
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Detecting and Mitigating Bias in Data Using Machine Learning with Pre-Training Metrics
Venkata Naresh Mandhala, Debnath Bhattacharyya, Divya Midhunchakkaravarthy, Hye-jin Kim
https://doi.org/10.18280/isi.270114
Page
119-125
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Enhanced CNN Model for Pancreatic Ductal Adenocarcinoma Classification Based on Proteomic Data
Kadiyala Laxminarayanamma, Ravilla Venkata Krishnaiah, Porika Sammulal
https://doi.org/10.18280/isi.270115
Page
127-133
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Transmission Control Protocol Analysis Using NS3
Ahmed B. Abdulkareem
https://doi.org/10.18280/isi.270116
Page
135-141
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Federated Learning for Medical Imaging: An Updated State of the Art
Naoual Mouhni, Abderrafiaa Elkalay, Mohamed Chakraoui, Abdelmounaim Abdali, Abdelkarim Ammoumou, Ibtissam Amalou
https://doi.org/10.18280/isi.270117
Page
143-150
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Effective Intrusion Detection System Using Classifier Ensembles
Muthukumarasamy Govindarajan
https://doi.org/10.18280/isi.270118
Page
151-156
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Spam Mail Detection Using Optimization Techniques
Koneru Anupriya, Kurakula Harini, Kethe Balaji, Karnati Geetha Sudha
https://doi.org/10.18280/isi.270119
Page
157-163
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Resource Based Attacks Security Using RPL Protocol in Internet of Things
RatnaKumari Challa, Kanusu Srinivasa Rao
https://doi.org/10.18280/isi.270120
Page
165-170
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS