Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
RIA
Archive
Archive
2024: Vol. 38
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 37
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 36
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 35
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 34
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 33
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2018: Vol. 32
No. S1, December
No. 5-6, December
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2017: Vol. 31
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 1-2, April
2016: Vol. 30
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 1-2, April
2015: Vol. 29
No. 6, December
No. 5, October
No. 3-4, August
No. 2, April
No. 1, February
2014: Vol. 28
No. 6, December
No. 5, October
No. 4, August
No. 2-3, June
2013: Vol. 27
No. 6, December
No. 4-5, October
No. 3, June
No. 2, April
No. 1, February
2012: Vol. 26
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 1-2, April
2011: Vol. 25
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2010: Vol. 24
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
Vol. 33,
No. 1, February 2019
Type-1 and Type-2 fuzzy Sets to Control a Nonlinear Dynamic System
Kheir Saadaoui, Brahim Bouderah, Ouarda Assas, Mohammed Abdallah Khodja
https://doi.org/10.18280/ria.330101
Page
1-7
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Isolation of Wormhole Attackers in IOV Using WPWP Packet
Satya Sandeep Kanumalli, Anuradha Chinta, Patanala Sri Rama Chandra Murty
https://doi.org/10.18280/ria.330102
Page
9-13
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Knowledge Text Classification Based on Virtual Category Tree
Wei Zhao, Guangyu Wang, Bo Peng
https://doi.org/10.18280/ria.330103
Page
15-19
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Home Automation and Security System Using IOT
Naralasetti Veeranjaneyulu, Gavini Srivalli, Jyostna Devi Bodapati
https://doi.org/10.18280/ria.330104
Page
21-24
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Design and Application of Face Recognition Algorithm Based on Improved Backpropagation Neural Network
Qiao Huang, Limin Cui
https://doi.org/10.18280/ria.330105
Page
25-32
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
IBLIND Quantum Computing and HASBE for Secure Cloud Data Storage and Accessing
Kranthi Kumar Singamaneni, Pasala Sanyasi Naidu
https://doi.org/10.18280/ria.330106
Page
33-37
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Design of a Fire Detection System Based on Four-rotor Aircraft
Ya Wei
https://doi.org/10.18280/ria.330107
Page
39-43
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Avoiding Interoperability and Delay in Healthcare Monitoring System Using Block Chain Technology
Vejendla Lakshman Narayana, Arepalli Peda Gopi, Kosaraju Chaitanya
https://doi.org/10.18280/ria.330108
Page
45-48
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
An Attitude Motion Planning Algorithm for One-legged Hopping Robot Based on Spline Approximation and Particle Swarm Optimization
Lili Yang
https://doi.org/10.18280/ria.330109
Page
49-52
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
An Efferent and Secure Outsourced Data Aggregation Using Location Sharing Services
Thulasi Bikku
https://doi.org/10.18280/ria.330110
Page
53-60
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Recognition of the Purchasing Intentions of WeChat Users Based on Forgetting Curve
Feng Yang, Baoxin Liu, Laiqin Zhao, Xiangfang Peng
https://doi.org/10.18280/ria.330111
Page
61-65
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Frame Work for Hospital Readmission Based on Deep Learning Approach and Naive Bayes Classification Model
Thalakola Syam Sundara Rao, Bhanu Prakash Battula
https://doi.org/10.18280/ria.330112
Page
67-74
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Frequent Subtree Mining Algorithm for Ribonucleic Acid Topological Pattern
Zhiqiang Li, Chengjie Xu, Chen Liu
https://doi.org/10.18280/ria.330113
Page
75-80
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS