Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
ISI
Archive
Archive
2025: Vol. 30
No. 8, August
No. 7, July
No. 6, June
No. 5, May
No. 4, April
No. 3, March
No. 2, February
No. 1, January
2024: Vol. 29
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 28
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 27
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 26
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 25
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 24
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2018: Vol. 23
No. 6, December
No. 5, October
No. 3-4, August
No. 2, April
No. 1, February
2017: Vol. 22
No. 6, December
No. 5, November
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2016: Vol. 21
No. 5-6, December
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2015: Vol. 20
No. 5, September
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2014: Vol. 19
No. 6, December
No. 5, September
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2013: Vol. 18
No. 1, February
2012: Vol. 17
No. 1, February
2011: Vol. 16
No. 1, February
2010: Vol. 15
No. 1, February
An Effective Method Based on Bi-Clustering and Association Rules for User Activity Analysis in Location-Based Social Network
Yahia Belayadi, Abdallah Khababa, Abdelouahab Attia, Sofiane Maza
https://doi.org/10.18280/isi.270601
Page
855-864
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Contributions of Leadership Styles to Digital Transformation-An Exploratory Study of the Opinions of a Sample of Administrative Leaders at the Northern Technical University
Niebal Younis Mohammed, Harbiya Abdo Omar, Adel Abdullah Aziz
https://doi.org/10.18280/isi.270602
Page
865-873
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Fairness Oriented H-NOMA Devices Association and Pairing in HCN Slicing Using Cooperation Games
Mai A. Riad, Osama M. El-Ghandour, Ahmed M. Abd El-Haleem
https://doi.org/10.18280/isi.270603
Page
875-885
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Decision Making Using the MABAC Method to Determine the Leading Small and Medium Industry Centers in Yogyakarta
Anton Yudhana, Rusydi Umar, Aldi Bastiatul Fawait
https://doi.org/10.18280/isi.270604
Page
887-893
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Systematic Literature Review on Recommender Systems for MOOCs
Kawtar Najmani, El Habib Benlahmar, Nawal Sael, Ahmed Zellou
https://doi.org/10.18280/isi.270605
Page
895-902
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Mobile Forensic Analysis of Signal Messenger Application on Android using Digital Forensic Research Workshop (DFRWS) Framework
Imam Riadi, Herman, Nur Hamida Siregar
https://doi.org/10.18280/isi.270606
Page
903-913
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Brute Force Attack on Distributed data Hiding in the Multi-Cloud Storage Environment More Diminutive than the Exponential Computations
Arif Mohammad Abdul, Arshad Ahmad Khan Mohammad, Matti Kiran Sastry, Jyothi Bankapalli
https://doi.org/10.18280/isi.270607
Page
915-921
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Finger Veins Verification by Exploiting the Deep Learning Technique
Nawar Ali Ibrahime Al-Obaidy, Basil Shukr Mahmood, Ahmed Mamoon Fadhil Alkababji
https://doi.org/10.18280/isi.270608
Page
923-931
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Android Based Material to Teach Early Reading for Primary Students using Construct 2 Apps
Cahyo Hasanudin, Ayu Fitrianingsih, Dicky Nuri Prasetyo Utomo, Nofia Fitriyana
https://doi.org/10.18280/isi.270609
Page
933-940
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Feature Extraction and Classification of Email Spam Detection Using IMTF-IDF+Skip-Thought Vectors
Deepika Mallampati, Nagaratna P. Hegde
https://doi.org/10.18280/isi.270610
Page
941-948
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Big Data Enabling Fish Farming Data-Driven Strategy
Mohamed El Mehdi El Aissi, Sarah Benjelloun, Younes Lakhrissi, Safae El Haj Ben Ali
https://doi.org/10.18280/isi.270611
Page
949-956
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Detecting Hand Gestures Using Machine Learning Techniques
Noor Fadel, Emad I. Abdul Kareem
https://doi.org/10.18280/isi.270612
Page
957-965
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Classification of Colon and Lung Cancer Through Analysis of Histopathology Images Using Deep Learning Models
Mallela Siva Naga Raju, Battula Srinivasa Rao
https://doi.org/10.18280/isi.270613
Page
967-971
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Indonesian Automatic Speech Recognition with XLSR-53
Panji Arisaputra, Amalia Zahra
https://doi.org/10.18280/isi.270614
Page
973-982
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Evaluation Model and Influencing Factors of Consumer Satisfaction with E-Commerce Platform
Xiaoran Pang, Yu Pang
https://doi.org/10.18280/isi.270615
Page
983-990
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Detection of Parkinson’s Disease Using the Spiral Diagram and Convolutional Neural Network
Manju Singh, Vijay Khare
https://doi.org/10.18280/isi.270616
Page
991-997
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Automatic Modulation Classification Using a Support Vector Machine-Based Pattern Recognition Algorithm
Varna Kumar Reddy P. G., Meena M.
https://doi.org/10.18280/isi.270617
Page
999-1007
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Predictive Maintenance of Electromechanical Systems Using Deep Learning Algorithms: Review
Azhar M. Abood, Ahmed R. Nasser, Huthaifa Al-Khazraji
https://doi.org/10.18280/isi.270618
Page
1009-1017
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
GrFrauder: A Novel Unsupervised Clustering Algorithm for Identification Group Spam Reviewers
Rathan Kumar Chenoori, Radhika Kavuri
https://doi.org/10.18280/isi.270619
Page
1019-1027
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Implementation of Blockchain with Machine Learning Intrusion Detection System for Defending IoT Botnet and Cloud Networks
Swapna Siddamsetti, Muktevi Srivenkatesh
https://doi.org/10.18280/isi.270620
Page
1029-1038
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS