View / Download : 471
S.No. Image Representation Title Author Pages View Google Scholar
1 No Image A survey of IoT security threats and defenses
DOI:10.19101/IJACR.2019.940088
Hassan I. Ahmed, Abdurrahman A. Nasr, Salah Abdel-Mageid and Heba K. Aslan 325-350 152 View
2 No Image E-Learning resource reuse, based on bilingual ontology annotation and ontology mapping
DOI:10.19101/IJACR.2019.940101
Tatyana Ivanova 351-364 85 View
3 No Image Mobile application development framework to support farming as a business via benchmarking: the case of Tanzania
DOI:10.19101/IJACR.2019.940074
John Joel Kyaruzi, Zaipuna Obedi Yonah and Hulda Shaidi Swai 365-378 76 View
4 No Image IoT based rear-end collision avoidance system in highways
DOI:10.19101/IJACR.2019.940067
Sandra Johnson, Mohammed Fayaz A and Hari Krishnan S 379-385 78 View
5 No Image The implementation of a probabilistic learner model in LMS-LD course creation application COPROLINE
DOI:10.19101/IJACR.2019.940039
Mouenis Anouar Tadlaoui, Fauzi El Moudden and Mohamed Khaldi 386-396 80 View