Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
IJSSE
Archive
Archive
2024: Vol. 14
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 13
No. 6, December
No. 5, October
No. 4, September
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 12
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 11
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 10
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 9
No. 4, November
No. 3, September
No. 2, June
No. 1, January
2018: Vol. 8
No. 4, September
No. 3, July
No. 2, February
No. 1, January
2017: Vol. 7
No. 4, November
No. 3, September
No. 2, June
No. 1, March
2016: Vol. 6
No. 4, December
No. 3, August
No. 2, June
No. 1, March
2015: Vol. 5
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2014: Vol. 4
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2013: Vol. 3
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2012: Vol. 2
No. 4, December
No. 3, November
No. 2, June
No. 1, March
2011: Vol. 1
No. 4, December
No. 3, September
No. 2, June
No. 1, March
Distributed vs. Hybrid Control Architecture Using STPA and AHP - Application to an Autonomous Mobile Multi-robot System
Chaima Bensaci, Youcef Zennir, Denis Pomorski, Fares Innal, Yiliu Liu
https://doi.org/10.18280/ijsse.110101
Page
1-12
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Received-Signal-Strength-Based Approach for Detection and 2D Indoor Localization of Evil Twin Rogue Access Point in 802.11
Roman Y. Korolkov, Serhii V. Kutsak
https://doi.org/10.18280/ijsse.110102
Page
13-20
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
ISO-26262 Compliant Safety-Critical Autonomous Driving Applications: Real-Time Interference-Aware Multicore Architectures
Abdullah El-Bayoumi
https://doi.org/10.18280/ijsse.110103
Page
21-34
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Driver Drowsiness Detection and Tracking Based on Yolo with Haar Cascades and ERNN
Belmekki Ghizlene Amira, Mekkakia Maaza Zoulikha, Pomares Hector
https://doi.org/10.18280/ijsse.110104
Page
35-42
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Emergency Preparedness within the Hotel Industry: A Case Study of Wuhan City, China
Lihui Wu, Huali Xia, Sarina Bao
https://doi.org/10.18280/ijsse.110105
Page
43-49
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Intrusion Detection Models Using Supervised and Unsupervised Algorithms - A Comparative Estimation
Aswadati Sirisha, Kosaraju Chaitanya, Komanduri Venkata Sesha Sai Rama Krishna, Satya Sandeep Kanumalli
https://doi.org/10.18280/ijsse.110106
Page
51-58
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Secure and Guarantee QoS in a Video Sequence: A New Approach Based on TLS Protocol to Secure Data and RTP to Ensure Real-Time Exchanges
Hamza Touil, Nabil El Akkad, Khalid Satori
https://doi.org/10.18280/ijsse.110107
Page
59-68
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Patent Trolling and Intellectual Property: Challenges for Innovations
Maryna Utkina, Olha Bondarenko, Petr Malanchuk
https://doi.org/10.18280/ijsse.110108
Page
69-77
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Icing Load and Risk Forecasting for Power Transmission Line Based on Multi-scale Time Series Phase-Space Reconstruction and Regression
Yong Chen, Peng Li, Huan Wang, Wenping Ren, Min Cao
https://doi.org/10.18280/ijsse.110109
Page
79-90
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Disaster Preparedness Analysis of Public Health Centers in DKI Jakarta Province in 2020
Nobella Firdausi, Fatma Lestari, Avinia Ismiyati
https://doi.org/10.18280/ijsse.110110
Page
91-99
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Business Organization Security Strategies to Cyber Security Threats
Bandr Fakiha
https://doi.org/10.18280/ijsse.110111
Page
101-104
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Non-motorized Vehicle Traffic Accidents in China: Analysing Road Users’ Precrash Behaviors and Implications for Road Safety
Xiaoxia Xiong, Shuichao Zhang, Lin Guo
https://doi.org/10.18280/ijsse.110112
Page
105-116
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Investigation of the Effect of Electromagnetic Radiation on Human Health Using Remote Sensing Technique
Mohammed Mejbel Salih
https://doi.org/10.18280/ijsse.110113
Page
117-122
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
An Integrated System for Smart Industrial Monitoring System in the Context of Hazards Based on the Internet of Things
Neelam Sanjeev Kumar, Gokul Chandrasekaran, Karthikeyan Panjappagounder Rajamanickam
https://doi.org/10.18280/ijsse.110114
Page
123-127
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS