Nothing Special »
Address
:
[go:
up one dir
,
main page
]
Include Form
Remove Scripts
Accept Cookies
Show Images
Show Referer
Rotate13
Base64
Strip Meta
Strip Title
Session Cookies
Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
ISI
Archive
Archive
2024: Vol. 29
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 28
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 27
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 26
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 25
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 24
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2018: Vol. 23
No. 6, December
No. 5, October
No. 3-4, August
No. 2, April
No. 1, February
2017: Vol. 22
No. 6, December
No. 5, November
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2016: Vol. 21
No. 5-6, December
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2015: Vol. 20
No. 5, September
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2014: Vol. 19
No. 6, December
No. 5, September
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2013: Vol. 18
No. 1, February
2012: Vol. 17
No. 1, February
2011: Vol. 16
No. 1, February
2010: Vol. 15
No. 1, February
A Secure Cloud Password and Secure Authentication Protocol for Electronic NFC Payment Between ATM and Smartphone
Samir Chabbi, Rachid Boudour, Fouzi Semchedine
https://doi.org/10.18280/isi.250201
Page
139-152
PDF Full-text
HTML Full-text
Copy
">Citation
DOWNLOAD PDF
OPEN ACCESS
A Novel Log-Based Tensor Completion Algorithm
Juan Geng, Liang Yan, Yichao Liu
https://doi.org/10.18280/isi.250202
Page
153-163
PDF Full-text
HTML Full-text
Copy
">Citation
DOWNLOAD PDF
OPEN ACCESS
COVID-19, Bacille Calmette-Guérin (BCG) and Tuberculosis: Cases and Recovery Previsions with Deep Learning Sequence Prediction
Bouhamed Heni
https://doi.org/10.18280/isi.250203
Page
165-172
PDF Full-text
HTML Full-text
Copy
">Citation
DOWNLOAD PDF
OPEN ACCESS
Preventing Malicious Packet Drops in MANETs by Counter Based Authenticated Acknowledgement
Mohammed Ali Hussain, Balaganesh Duraisamy
https://doi.org/10.18280/isi.250204
Page
173-181
PDF Full-text
HTML Full-text
Copy
">Citation
DOWNLOAD PDF
OPEN ACCESS
Analysis of the Impacts of Open Residential Communities on Road Traffic Based on AHP and Fuzzy Theory
Zaihua Yang
https://doi.org/10.18280/isi.250205
Page
183-190
PDF Full-text
HTML Full-text
Copy
">Citation
DOWNLOAD PDF
OPEN ACCESS
The Diagnosis of Online Game Addiction on Indonesian Adolescent Using Certainty Factor Method
Kundharu Saddhono, Bagus Wahyu Setyawan, Yusuf Muflikh Raharjo, Rio Devilito
https://doi.org/10.18280/isi.250206
Page
191-197
PDF Full-text
HTML Full-text
Copy
">Citation
DOWNLOAD PDF
OPEN ACCESS
Channel-Based Encrypted Binary Arithmetic Coding in Wireless Sensor Networks
Balaji Subramanian, Harold Robinson Yesudhas, Golden Julie Enoch
https://doi.org/10.18280/isi.250207
Page
199-206
PDF Full-text
HTML Full-text
Copy
">Citation
DOWNLOAD PDF
OPEN ACCESS
An Emergency Management System for Government Data Security Based on Artificial Intelligence
Haining Luo
https://doi.org/10.18280/isi.250208
Page
207-213
PDF Full-text
HTML Full-text
Copy
">Citation
DOWNLOAD PDF
OPEN ACCESS
Efficient Platform as a Service (PaaS) Model on Public Cloud for CBIR System
Fairouz Hadi, Zibouda Aliouat, Sarra Hammoudi
https://doi.org/10.18280/isi.250209
Page
215-225
PDF Full-text
HTML Full-text
Copy
">Citation
DOWNLOAD PDF
OPEN ACCESS
Secret Sharing with Reduced Share Size and Data Integrity
Prashanti Guttikonda, Nirupama Bhat Mundukur
https://doi.org/10.18280/isi.250210
Page
227-237
PDF Full-text
HTML Full-text
Copy
">Citation
DOWNLOAD PDF
OPEN ACCESS
A Traffic Signal Recognition Algorithm Based on Self-paced Learning and Deep Learning
Tingmei Wang, Haiwei Shen, Yuanjie Xue, Zhengkun Hu
https://doi.org/10.18280/isi.250211
Page
239-244
PDF Full-text
HTML Full-text
Copy
">Citation
DOWNLOAD PDF
OPEN ACCESS
Color QR Pattern-Driven Cancelable Biometric Fingerprint System
Devendra Reddy Rachapalli, Hemantha Kumar Kalluri
https://doi.org/10.18280/isi.250212
Page
245-251
PDF Full-text
HTML Full-text
Copy
">Citation
DOWNLOAD PDF
OPEN ACCESS
A Low-Signal-to-Noise Ratio Estimation Algorithm for Multipath Channels
Baohai Yang, Quanhui Ren, Haisheng Li, Junkang Song
https://doi.org/10.18280/isi.250213
Page
253-258
PDF Full-text
HTML Full-text
Copy
">Citation
DOWNLOAD PDF
OPEN ACCESS
Brain Tumor Detection Using Deep Features in the Latent Space
Jyostna Devi Bodapati, Annepu Vijay, Naralasetti Veeranjaneyulu
https://doi.org/10.18280/isi.250214
Page
259-265
PDF Full-text
HTML Full-text
Copy
">Citation
DOWNLOAD PDF
OPEN ACCESS
Fire Safety Assessment of High-Rise Buildings Based on Fuzzy Theory and Radial Basis Function Neural Network
Mingbiao Xu, Dehong Peng
https://doi.org/10.18280/isi.250215
Page
267-274
PDF Full-text
HTML Full-text
Copy
">Citation
DOWNLOAD PDF
OPEN ACCESS
Revised Grey Wolf Optimized SVM-KNN Ensemble Based Automated Diagnosis of Breast Cancer
Indu Singh, Rajni Jindal, Kanika Pandey, Kripali Agrawal, Kashish Kukreja
https://doi.org/10.18280/isi.250216
Page
275-284
PDF Full-text
HTML Full-text
Copy
">Citation
DOWNLOAD PDF
OPEN ACCESS