Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
A CNN-Based Framework for Enhancing Image Segmentation and Scene Interpretation in Fake Colorized Images: Addressing Challenges in Image Analysis and Understanding
https://www.iieta.org/sites/default/files/pdf/2025-02/isi_30.02_23.pdf
Implementation of an Intelligent Power Management System for Building Using Machine Learning Model
https://www.iieta.org/sites/default/files/pdf/2025-02/isi_30.02_05.pdf
Optimizing Feature Selection Based on the Black-Winged Kite Algorithm
https://www.iieta.org/sites/default/files/pdf/2025-02/isi_30.02_12.pdf
Implementation of K-Nearest Neighbors Algorithm for Red Onion Crop Suitability Land Assessment in Selaawi, Indonesia
https://www.iieta.org/sites/default/files/pdf/2025-02/isi_30.02_01.pdf
HWKPA: Optimized Ensemble Clustering with Hybrid Weighted K-Means Pollination with Major Voting Consensus Function for Enhancing Cluster Quality
https://www.iieta.org/sites/default/files/pdf/2025-02/isi_30.02_15.pdf
Harmonizing Respiratory Sound Insights: Unleashing the Potential of Machine Learning Classifiers Through Hyperparameter Elegance
https://www.iieta.org/sites/default/files/pdf/2025-02/isi_30.02_11.pdf
Enhancing Safety and Accessibility for Wheelchair Users in Traditional Tuna Fishing Boats
https://www.iieta.org/sites/default/files/pdf/2025-02/ijsse_15.01_17.pdf
Real-Time Deep Learning-Driven Surveillance with Spatiotemporal Feature Extraction for Detection of Anomalous Human Behavior Across Dynamic Environments
https://www.iieta.org/sites/default/files/pdf/2025-02/ijsse_15.01_12.pdf
Expansive Residual Soil Stability Behavior During Wetting and Drying Process
https://www.iieta.org/sites/default/files/pdf/2025-02/ijsse_15.01_14.pdf
A Comparative Study of Incremental and Batch Machine Learning Methodologies for Network Intrusion Detection
https://www.iieta.org/sites/default/files/pdf/2025-02/ijsse_15.01_18.pdf
Pages
« first
‹ previous
…
329
330
331
332
333
334
335
336
337
…
next ›
last »