View / Download : 47186
S.No. Paper Image Title Author Pages View Google Scholar
1 No Image A survey of IoT security threats and defenses

DOI:10.19101/IJACR.2019.940088
Hassan I. Ahmed, Abdurrahman A. Nasr, Salah Abdel-Mageid and Heba K. Aslan 325-350 12747 View
2 No Image E-Learning resource reuse, based on bilingual ontology annotation and ontology mapping

DOI:10.19101/IJACR.2019.940101
Tatyana Ivanova 351-364 8777 View
3 No Image Mobile application development framework to support farming as a business via benchmarking: the case of Tanzania

DOI:10.19101/IJACR.2019.940074
John Joel Kyaruzi, Zaipuna Obedi Yonah and Hulda Shaidi Swai 365-378 8582 View
4 No Image IoT based rear-end collision avoidance system in highways

DOI:10.19101/IJACR.2019.940067
Sandra Johnson, Mohammed Fayaz A and Hari Krishnan S 379-385 8492 View
5 No Image The implementation of a probabilistic learner model in LMS-LD course creation application COPROLINE

DOI:10.19101/IJACR.2019.940039
Mouenis Anouar Tadlaoui, Fauzi El Moudden and Mohamed Khaldi 386-396 8588 View