Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
RIA
Archive
Archive
2024: Vol. 38
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 37
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 36
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 35
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 34
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 33
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2018: Vol. 32
No. S1, December
No. 5-6, December
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2017: Vol. 31
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 1-2, April
2016: Vol. 30
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 1-2, April
2015: Vol. 29
No. 6, December
No. 5, October
No. 3-4, August
No. 2, April
No. 1, February
2014: Vol. 28
No. 6, December
No. 5, October
No. 4, August
No. 2-3, June
2013: Vol. 27
No. 6, December
No. 4-5, October
No. 3, June
No. 2, April
No. 1, February
2012: Vol. 26
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 1-2, April
2011: Vol. 25
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2010: Vol. 24
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
Adaptive Ciphertext Policy Attribute Based Encryption Scheme for Internet of Things Devices Using Decision Tree
Mohammad Bany Taha, Hanan Suwi, Fawaz Khaswneh, Khaled Alzaareer
https://doi.org/10.18280/ria.340301
Page
233-241
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
State-of-the Art Optimal Multilevel Thresholding Methods for Brain MR Image Analysis
Akankshya Das, Sanjay Agrawal, Leena Samantaray, Rutuparna Panda, Ajith Abraham
https://doi.org/10.18280/ria.340302
Page
243-256
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Traffic Flow Prediction Using SPGAPSO-CKRVM Model
Hao Lin, Leixiao Li, Hui Wang, Yongsheng Wang, Zhiqiang Ma
https://doi.org/10.18280/ria.340303
Page
257-265
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Performance Evaluation of Machine Learning for Recognizing Human Facial Emotions
Farid Ayache, Adel Alti
https://doi.org/10.18280/ria.340304
Page
267-275
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Recognition of Intrusive Alphabets to the Arabic Language Using a Deep Morphological Gradient
Mouhssine El Atillah, Khalid El Fazazy
https://doi.org/10.18280/ria.340305
Page
277-284
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Apple Variety Recognition Based on Multiview Feature Fusion
Jinjin Cai, Jie Li, Bo Liu, Wei Yao
https://doi.org/10.18280/ria.340306
Page
285-295
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Using Metaheuristic Algorithms to Improve k-Means Clustering: A Comparative Study
Sasan Harifi, Madjid Khalilian, Javad Mohammadzadeh, Sadoullah Ebrahimnejad
https://doi.org/10.18280/ria.340307
Page
297-305
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Deep Convolution Features in Non-linear Embedding Space for Fundus Image Classification
Venkatesulu Dondeti, Jyostna Devi Bodapati, Shaik Nagur Shareef, Veeranjaneyulu Naralasetti
https://doi.org/10.18280/ria.340308
Page
307-313
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
An Insurance Sales Prediction Model Based on Deep Learning
Haiping Wang
https://doi.org/10.18280/ria.340309
Page
315-321
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Predictive Model for Network Intrusion Detection System Using Deep Learning
Venkatramaphanikumar Sstla, Venkata K.K. Kolli, Lakshmi K. Voggu, Ramyasri Bhavanam, Sasikala Vallabhasoyula
https://doi.org/10.18280/ria.340310
Page
323-330
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Neighbor Propagation Clustering Algorithm for Intrusion Detection
Zheng Li
https://doi.org/10.18280/ria.340311
Page
331-336
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Improving the Energy Efficiency in Mobile Ad-Hoc Network Using Learning-Based Routing
Vijay Vasanth Aroulanandam, Thamarai Pugazhendhi Latchoumi, Karnan Balamurugan, Tiruchengode Lakshmanasamy Yookesh
https://doi.org/10.18280/ria.340312
Page
337-343
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Construction and Application of a Financial Big Data Analysis Model Based on Machine Learning
Ling Pang, Yongli Liu
https://doi.org/10.18280/ria.340313
Page
345-350
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
An Extensive Review on Lung Cancer Detection Using Machine Learning Techniques: A Systematic Study
Eali Stephen Neal Joshua, Midhun Chakkravarthy, Debnath Bhattacharyya
https://doi.org/10.18280/ria.340314
Page
351-359
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Classifying Brain State in Sentence Polarity Exposure: An ANN Model for fMRI Data
Ashish Ranjan, Vibhav Prakash Singh, Anil Kumar Singh, Anil Kumar Thakur, Ravi Bhushan Mishra
https://doi.org/10.18280/ria.340315
Page
361-368
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Analysis on Class Participation Based on Artificial Intelligence
Limin Liu
https://doi.org/10.18280/ria.340316
Page
369-375
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS