A survey of IoT security threats and defenses Authors :Hassan I. Ahmed, Abdurrahman A. Nasr, Salah Abdel-Mageid and Heba K. Aslan DOI : http://dx.doi.org/10.19101/IJACR.2019.940088
E-Learning resource reuse, based on bilingual ontology annotation and ontology mapping Authors :Tatyana Ivanova DOI : http://dx.doi.org/10.19101/IJACR.2019.940101
Mobile application development framework to support farming as a business via benchmarking: the case of Tanzania Authors :John Joel Kyaruzi, Zaipuna Obedi Yonah and Hulda Shaidi Swai DOI : http://dx.doi.org/10.19101/IJACR.2019.940074
IoT based rear-end collision avoidance system in highways Authors :Sandra Johnson, Mohammed Fayaz A and Hari Krishnan S DOI : http://dx.doi.org/10.19101/IJACR.2019.940067
The implementation of a probabilistic learner model in LMS-LD course creation application COPROLINE Authors :Mouenis Anouar Tadlaoui, Fauzi El Moudden and Mohamed Khaldi DOI : http://dx.doi.org/10.19101/IJACR.2019.940039