Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
IJSSE
Archive
Archive
2025: Vol. 15
No. 7, July
No. 6, June
No. 5, May
No. 4, April
No. 3, March
No. 2, February
No. 1, January
2024: Vol. 14
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 13
No. 6, December
No. 5, October
No. 4, September
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 12
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 11
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 10
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 9
No. 4, November
No. 3, September
No. 2, June
No. 1, January
2018: Vol. 8
No. 4, September
No. 3, July
No. 2, February
No. 1, January
2017: Vol. 7
No. 4, November
No. 3, September
No. 2, June
No. 1, March
2016: Vol. 6
No. 4, December
No. 3, August
No. 2, June
No. 1, March
2015: Vol. 5
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2014: Vol. 4
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2013: Vol. 3
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2012: Vol. 2
No. 4, December
No. 3, November
No. 2, June
No. 1, March
2011: Vol. 1
No. 4, December
No. 3, September
No. 2, June
No. 1, March
Prototyping an IoT-Platform Embedded Device to Prevent the Failure of the Battery System at the Kedungbadak-Bogor Substation
Arief Goeritno, Yhudha Prasetiya, Yuhefizar Yuhefizar, Muhathir Muhathir, Selamat Lestari, Irham Muhammad Azama
https://doi.org/10.18280/ijsse.130301
Page
385-394
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Modeling the Performance of Criminal Law Functions in the Context of Safety and Security Development
Jafar Ali Ahmad Hammouri
https://doi.org/10.18280/ijsse.130302
Page
395-401
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
The Role of Recurrent Convolutional Neural Network in IoT for Building a Security Artificial Intelligence and Home Assistance System
Syahril Efendi, Fauzan Nurahmadi, Pauzi Ibrahim Nainggolan
https://doi.org/10.18280/ijsse.130303
Page
403-408
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Impact of Digital Financial Services on Customers’ Choice of Financial Institutions: A Modified UTAUT Study in Bangladesh
Mohammad Rifat Rahman, Md. Mufidur Rahman
https://doi.org/10.18280/ijsse.130304
Page
409-421
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Examining the Impact of HSE Stakeholder Engagement Strategies on University Construction Organizational Performance
Alya Khairunnisa Deza, Yusuf Latief, Ayu Herzanita, Budi Susilo Soepandji
https://doi.org/10.18280/ijsse.130305
Page
423-431
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Evaluating and Improving the Spatial Distribution Using GIS to Avoid Environmental Risks and Achieve Safety for Petrol Stations in the Nile District Center in Mahaweel / Iraq
Baydaa Abdul Hussein Bedewy, Marwan H. Abdulameer
https://doi.org/10.18280/ijsse.130306
Page
433-444
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Resilience Approach to Improving Safety Performance in Construction
Kevin Liong Kurniawan, Rossy Armyn Machfudiyanto
https://doi.org/10.18280/ijsse.130307
Page
445-455
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Fraud Detection in Utilities Using Data Analytics and Geospatial Analysis
Willian Antonio Pachón Rodríguez, Carlos Eduardo Melo Martínez
https://doi.org/10.18280/ijsse.130308
Page
457-467
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Identifying Burnt Areas in Forests and Land Fire Using Multitemporal Normalized Burn Ratio (NBR) Index on Sentinel-2 Satellite Imagery
Abdi Sukmono, Firman Hadi, Eko Widayanti, Arief Laila Nugraha, Nurhadi Bashit
https://doi.org/10.18280/ijsse.130309
Page
469-477
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Hybrid Text Summarization Approach Using Neural Networks and Metaheuristic Algorithms
Abdulrahman Mohsen Ahmed Zeyad, Arun Biradar
https://doi.org/10.18280/ijsse.130310
Page
479-489
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
LoRa-Based IoT System for Emergency Assistance and Safety in Mountaineering
Deeksha Rai Sharma, Rohini Ravindrasingh Raghuwanshi, Tanvi Chandak, Dipali Ramdasi
https://doi.org/10.18280/ijsse.130311
Page
491-500
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Methodological Approach for Developing Legal Frameworks to Protect Land Relations in Homeland Security
Hisham Jadallah Mansour Shakhatreh, Farouq Ahmad Faleh Alazzam, Mariya Vashchyshyn, Nazar Shparyk, Zoriana Gontar
https://doi.org/10.18280/ijsse.130312
Page
501-507
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Enhanced SVM Model with Orthogonal Learning Chaotic Grey Wolf Optimization for Cybersecurity Intrusion Detection in Agriculture 4.0
Khaja Shareef Shaik, Naga Siva Kumar Thumboor, Siva Prasad Veluru, Naga Jagadesh Bommagani, Dorababu Sudarsa, Ganesh Karthik Muppagowni
https://doi.org/10.18280/ijsse.130313
Page
509-517
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Model for Implementing Digital Personnel Management in Security and Safety for Engineering Enterprises
Orest Krasivskyу, Natalija Pirozhenko, Oksana Samborska, Valerii Harbusiuk, Oksana Inozemtseva
https://doi.org/10.18280/ijsse.130314
Page
519-526
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Proxy-Based and Collusion Resistant Multi-Authority Revocable CPABE Framework with Efficient User and Attribute-Level Revocation (PCMR-CPABE)
Shobha Chawla, Neha Gupta
https://doi.org/10.18280/ijsse.130315
Page
527-538
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Estimating the Economic Impact of Mining Accidents: A Case Study from Peru
Solio Marino Arango-Retamozo, Marco Antonio Cotrina-Teatino, Jairo Jhonatan Marquina-Araujo, Hans Roger Portilla-Rodríguez, Christian Michell Torres-Rivera, Juan Antonio Vega-Gonzalez
https://doi.org/10.18280/ijsse.130316
Page
539-545
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Personnel Management in the System of Ensuring Safety and Security of the Engineering Enterprise in the Conditions of Industry 4.0
Marta Kopytko, Larysa Liubokhynets, Andrii Kalinin, Lesia Sai, Olha Bala
https://doi.org/10.18280/ijsse.130317
Page
547-554
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Security Vulnerabilities and Threats in Robotic Systems: A Comprehensive Review
Mustafa Salah Abed, Qusay F. Al-Doori, Afrah Thamer Abdullah, Azhaar Akram Abdallah
https://doi.org/10.18280/ijsse.130318
Page
555-563
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Long-Term Forecasting of Crop Water Requirement with BP-RVM Algorithm for Food Security and Harvest Risk Reduction
Syaharuddin, Fatmawati, Herry Suprajitno
https://doi.org/10.18280/ijsse.130319
Page
565-575
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Live Forensic Environment with Parallel Data Acquisition for Investigating Private Mode Browsing
Herman, Anton Yudhana, Sarjimin
https://doi.org/10.18280/ijsse.130320
Page
577-585
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS