Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Evaluation of UDP-Based DDoS Attack Detection by Neural Network Classifier with Convex Optimization and Activation Functions
https://iieta.org/sites/default/files/pdf/2024-06/isi_29.03_21.pdf
A Comprehensive Literature Review on Image and Video Compression: Trends, Algorithms, and Techniques
https://iieta.org/sites/default/files/pdf/2024-06/isi_29.03_07.pdf
Comparative Analysis of LSTM, ARIMA, and Hybrid Models for Forecasting Future GDP
https://iieta.org/sites/default/files/pdf/2024-06/isi_29.03_06.pdf
Analyzing Customer Engagement with Gamification Approach in the Banking Sector Using the Rasch Model
https://iieta.org/sites/default/files/pdf/2024-06/isi_29.03_23_0.pdf
Self-Supervised Spoken Term Detection for Query by Example
https://iieta.org/sites/default/files/pdf/2024-06/isi_29.03_34_0.pdf
ERS – GARNET: An Ensemble Recommendation System for Sentiment Analysis Using Gated Attention-Based Recurrent Networks
https://iieta.org/sites/default/files/pdf/2024-06/isi_29.03_05.pdf
Detection and Mitigation Distribution Denial of Service Attack Based on Blockchain Concept
https://iieta.org/sites/default/files/pdf/2024-06/isi_29.03_22.pdf
Cluster Visualized Topic Modeling Paradigms for Recognition of Health-Related Topics Through a Machine Learning
https://iieta.org/sites/default/files/pdf/2024-06/isi_29.03_20.pdf
Accuracy Rate of Least Square Support Vector Machine Method and Its Various Modifications: A Forecasting Evaluation on Multi-Type Data
https://iieta.org/sites/default/files/pdf/2024-06/isi_29.03_37.pdf
Hybrid Clustering-Based Technique to Isolate Tumors in PET/CT Images
https://iieta.org/sites/default/files/pdf/2024-06/isi_29.03_24.pdf
Pages
« first
‹ previous
…
133
134
135
136
137
138
139
140
141
…
next ›
last »