Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
RIA
Archive
Archive
2024: Vol. 38
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 37
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 36
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 35
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 34
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 33
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2018: Vol. 32
No. S1, December
No. 5-6, December
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2017: Vol. 31
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 1-2, April
2016: Vol. 30
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 1-2, April
2015: Vol. 29
No. 6, December
No. 5, October
No. 3-4, August
No. 2, April
No. 1, February
2014: Vol. 28
No. 6, December
No. 5, October
No. 4, August
No. 2-3, June
2013: Vol. 27
No. 6, December
No. 4-5, October
No. 3, June
No. 2, April
No. 1, February
2012: Vol. 26
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 1-2, April
2011: Vol. 25
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2010: Vol. 24
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
Ensemble Learning with Supervised Machine Learning Models to Predict Credit Card Fraud Transactions
Mohammed Rashad Baker, Zuhair Norii Mahmood, Ehab Hashim Shaker
https://doi.org/10.18280/ria.360401
Page
509-518
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Hybrid Model Integrating Adaboost Approach for Sentimental Analysis of Airline Tweets
Rajat Yadu, Ragini Shukla
https://doi.org/10.18280/ria.360402
Page
519-528
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Classification of Arrhythmia Using Machine Learning Algorithm
Suguna G. Chickaramanna, Sondekere Thippeswamy Veerabhadrappa, Puranik Math Shivakumaraswamy, Seenapahalli Nanjundaiah Sheela, Shivapura Krishna Keerthana, Umesh Likith, Likith Swaroop, Vasudevarao Meghana
https://doi.org/10.18280/ria.360403
Page
529-534
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
An AHP-TOPSIS Integrated Model for QoS-Aware Energy Efficiency in Green Cognitive Radio Networks
Mohammed Salih Bendella, Badr Benmammar, Francine Krief
https://doi.org/10.18280/ria.360404
Page
535-541
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Transfer Learning Technique with EfficientNet for Facial Expression Recognition System
Islam Nur Alam, Iman H. Kartowisastro, Pandu Wicaksono
https://doi.org/10.18280/ria.360405
Page
543-552
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Faulty Node Detection in HDFS Using Machine Learning Techniques
Reshma S. Gaykar, Velu Khanaa, Shashank D. Joshi
https://doi.org/10.18280/ria.360406
Page
553-560
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
GAN-Based Encoding Model for Reversible Image Steganography
Afolashade Kuyoro, Uchenna J. Nzenwata, Oludele Awodele, Sunday Idowu
https://doi.org/10.18280/ria.360407
Page
561-567
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Factors Affecting the Academic Performance of Students with Hearing Impairment
Raji Nirmala Rajamoni, Retnaswamy MathuSoothana Satheesh Kumar, Biji Christopher Leela
https://doi.org/10.18280/ria.360408
Page
569-574
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Deep Named Entity Recognition in Hindi Using Neural Networks
Rita Shelke, Sandeep Vanjale
https://doi.org/10.18280/ria.360409
Page
575-580
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Performance Evaluation of E-Voting Based on Hyperledger Fabric Blockchain Platform
Shatha H. Saeed, Suha M. Hadi, Ali H. Hamad
https://doi.org/10.18280/ria.360410
Page
581-587
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Big Data in Academia: A Proposed Framework for Improving Students Performance
Imran Rashid Banday, Majid Zaman, Syed Mohammad Khurshid Quadri, Sheikh Amir Fayaz, Muheet Ahmed Butt
https://doi.org/10.18280/ria.360411
Page
589-595
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Integrated Framework for Intrusion Detection Through Adversarial Sampling and Enhanced Deep Correlated Hierarchical Network
Deepa Venkatraman, Radha Narayanan
https://doi.org/10.18280/ria.360412
Page
597-605
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Severity Classification of Alzheimer Dementia Based on MRI Images Using Deep Neural Network
Nofitasari Dwi Rezeki, Suci Aulia, Sugondo Hadiyoso
https://doi.org/10.18280/ria.360413
Page
607-613
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Jamming Attack Mitigation in CR-IoT Using Game Theory
Nallarasan Venkatachalam, Kottilingam Kottursamy
https://doi.org/10.18280/ria.360414
Page
615-620
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Online Transaction Fraud Detection Using Efficient Dimensionality Reduction and Machine Learning Techniques
Rathan Kumar Chenoori, Radhika Kavuri
https://doi.org/10.18280/ria.360415
Page
621-628
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Detection of Cardiac Arrhythmia Using Multi-Perspective Convolutional Neutral Network for ECG Heartbeat Classification
Devaganugula N.V.S.L.S. Indira, Vyakaranam Sita Maha Lakshmi, Babu Rao Markapudi, Adilakshmi Yannam, Munagala Babu Prasad, Chandanapalli Suresh Babu, Kodepogu Koteswara Rao
https://doi.org/10.18280/ria.360416
Page
629-634
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
IFAA: An Intelligent Framework Aware Algorithm to Determine the Boundary of Area under Attack in Military Surveillance and Reconnaissance WSN
Deepak S. Raj, Ramesh H.S. Babu
https://doi.org/10.18280/ria.360417
Page
635-640
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Comprehensive Analysis on Numerous Learning Models for Intrusion Detection for Security Conservation
Kurra Santhi Sri, Bhargavi Peddireddy, Venkata Bhujanga Rao Madamanchi, Gottumukkala Hima Bindu
https://doi.org/10.18280/ria.360418
Page
641-646
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Network Data Center Traffic Predictive Model Analysis Based on Machine Learning
Ayushi Kamboj, Harikrishnan R, Dayanand Waghmare, Priyanka Tupe Waghmare
https://doi.org/10.18280/ria.360419
Page
647-655
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Special Issue