S.No. | Image Representation | Title | Author | Pages | View | Google Scholar |
---|---|---|---|---|---|---|
1 |
![]() |
A survey of IoT security threats and defenses DOI:10.19101/IJACR.2019.940088 |
Hassan I. Ahmed, Abdurrahman A. Nasr, Salah Abdel-Mageid and Heba K. Aslan |
325 -350 |
15500 |
View |
2 |
![]() |
E-Learning resource reuse, based on bilingual ontology annotation and ontology mapping DOI:10.19101/IJACR.2019.940101 |
Tatyana Ivanova |
351 -364 |
9741 |
View |
3 |
![]() |
DOI:10.19101/IJACR.2019.940074 |
John Joel Kyaruzi, Zaipuna Obedi Yonah and Hulda Shaidi Swai |
365 -378 |
9509 |
View |
4 |
![]() |
IoT based rear-end collision avoidance system in highways DOI:10.19101/IJACR.2019.940067 |
Sandra Johnson, Mohammed Fayaz A and Hari Krishnan S |
379 -385 |
9444 |
View |
5 |
![]() |
The implementation of a probabilistic learner model in LMS-LD course creation application COPROLINE DOI:10.19101/IJACR.2019.940039 |
Mouenis Anouar Tadlaoui, Fauzi El Moudden and Mohamed Khaldi |
386 -396 |
9590 |
View |