Abstract is missing.
- Wearable Internet of Things (IoT) Device Model Design Based on Low-Cost Healthcare Monitoring System for Current Covid-19 DiseaseRicardo Álvarez González, Edgar R. González-Campos, Nicolás Quiroz-Hernández, Alba Maribel Sánchez Gálvez. 1-19 [doi]
- A Matching Mechanism for Provision of Housing to the MarginalizedJ. Ceasar Aguma. 20-33 [doi]
- Speed Harmonisation Strategy for Human-Driven and Autonomous Vehicles Co-existenceEkene Frank Ozioko, Julian Kunkel, Fredric Stahl. 34-66 [doi]
- Road Intersection Coordination Scheme for Mixed Traffic (Human Driven and Driver-Less Vehicles): A Systematic ReviewEkene F. Ozioko, Julian Kunkel, Fredric Stahl. 67-94 [doi]
- Selection of Driving Mode in Autonomous Vehicles Based on Road Profile and Vehicle SpeedMahmoud Zaki Iskandarani. 95-120 [doi]
- Compass Errors in Mobile Augmented Reality Navigation Apps: Consequences and ImplicationsDavid S. Bowers. 121-142 [doi]
- Virtual Reality as a Powerful Persuasive Technology to Change Attitude During the Spread of COVID-19Sara Alami, Mostafa Hanoune. 143-158 [doi]
- Predicting Traffic Indexes on Urban Roads Based on Public Transportation Vehicle Data in Experimental EnvironmentGeorgi Yosifov, Milen Petrov. 159-168 [doi]
- Corona Virus and Entropy of Shannon at the Cardiac Cycle: A Mathematical ModelHuber Nieto-Chaupis. 169-178 [doi]
- Efficiency of Local Binarization Methods in Segmentation of Selected Objects in Echocardiographic ImagesJoanna Sorysz, Danuta Sorysz. 179-192 [doi]
- Automatic Speech-Based Smoking Status IdentificationZhizhong Ma, Satwinder Singh, Yuanhang Qiu, Feng Hou, Ruili Wang, Christopher Bullen, Joanna Ting Wai Chu. 193-203 [doi]
- Independent Component Analysis for Spectral Unmixing of Raman Microscopic Images of Single Human CellsMohammad Hamed Mozaffari, Li-Lin Tay. 204-213 [doi]
- A Method of Hepatocytes Segmentation in Microscopic Images of Trypan Blue Stained Cellular SuspensionKuba Chrobocinski, Wojciech Witarski, Katarzyna Piórkowska. 214-224 [doi]
- Using Technology to Create Personalised Environments for Dementia Care: Results of an Empathy Map StudyRonny Broekx, J. Artur Serrano, Ileana Ciobanu, Alina Iliescu, Andreea Marin, Mihai Berteanu. 225-237 [doi]
- Learning Analytics for Knowledge Creation and Inventing in K-12: A Systematic ReviewMikko-Ville Apiola, Sofia Lipponen, Aino Seitamaa, Tiina S. Korhonen, Kai Hakkarainen. 238-257 [doi]
- A Conceptual Framework for the Development of Argumentation Skills Using CSCL in a Graduate Students' Research CourseRob van der Merwe, Judy van Biljon, Colin Pilkington. 258-278 [doi]
- Single Access for the Use of Information Technology in University Education During the SARS-CoV-2 PandemicJosé Luis Cendejas Valdéz, Heberto Ferreira Medina, María E. Benítez Ramírez, Gustavo Abraham Vanegas-Contreras, Miguel A. Acuña López, Jesús Leonardo Soto-Sumuano. 279-293 [doi]
- Camcorder as an e-Learning ToolIsaeva Oksana, Boronenko Yuri, Boronenko Marina. 294-304 [doi]
- Smartphone in Detecting Developmental Disability in Infancy: A Theoretical Approach to Shared Intentionality for Assessment Tool of Cognitive Decline and e-LearningIgor Val Danilov. 305-315 [doi]
- Centralized Data Driven Decision Making System for Bangladeshi University AdmissionFatema-Tuj-Johora, Aurpa Anindita, Noushin Islam, Mahmudul Islam, Mahady Hasan. 316-330 [doi]
- Battle Card, Card Game for Teaching the History of the Incas Through Intelligent TechniquesJavier Apaza Humpire, Maria Guerra Vidal, Miguel Tupayachi Moina, Milagros Vega Colque, José Sulla-Torres. 331-346 [doi]
- Barriers for Lecturers to Use Open Educational Resources and Participate in Inter-university Teaching Exchange NetworksPaul Greiff, Carla Reinken, Uwe Hoppe. 347-358 [doi]
- Lessons Learnt During the COVID-19 Pandemic: Preparing Tertiary Education in Japan for 4IRAdam L. Miller. 359-378 [doi]
- Ambient Intelligence in Learning Management System (LMS)Ilan Daniels Rahimi. 379-387 [doi]
- eMudra: A Leftover Foreign Currency Exchange System Utilizing the Blockchain TechnologyRituparna Bhattacharya, Martin White, Natalia Beloff. 388-408 [doi]
- A Multi-layered Ontological Approach to Blockchain TechnologyRituparna Bhattacharya, Martin White, Natalia Beloff. 409-428 [doi]
- A Two-Way Atomic Exchange Protocol for Peer-to-Peer Data TradingZan-Jun Wang, Ching-Chun Jim Huang, Shih-Wei Liao, Zih-shiuan Spin Yuan. 429-447 [doi]
- Blockchain Industry Implementation and Use Case Framework: A SurveyGabriela Ziegler. 448-469 [doi]
- A Blockchain Approach for Exchanging Machine Learning Solutions Over Smart ContractsAditya Ajgaonkar, Anuj Raghani, Bhavya Sheth, Dyuwan Shukla, Dhiren Patel, Sanket Shanbhag. 470-482 [doi]
- Untangling the Overlap Between Blockchain and DLTsBadr Bellaj, Aafaf Ouaddah, Emmanuel Bertin, Noël Crespi, Abdellatif Mezrioui. 483-505 [doi]
- A Secure Data Controller System Based on IPFS and BlockchainSaad Alshihri, Sooyong Park. 506-510 [doi]
- Key Exchange Protocol Based on the Matrix Power Function Defined Over [inline-graphic not available: see fulltext]Aleksejus Mihalkovich, Eligijus Sakalauskas, Matas Levinskas. 511-531 [doi]
- Design and Analysis of Pre-formed ReRAM-Based PUFTaylor Wilson, Bertrand Cambou, Brit Riggs, Ian Burke, Julie Heynssens, Sung Hyun Jo. 532-549 [doi]
- A Graph Theoretical Methodology for Network Intrusion Fingerprinting and Attack AttributionChuck Easttom. 550-580 [doi]
- Using Memory Forensics to Investigate Security and Privacy of FacebookAhmad Ghafarian, Deniz Keskin. 581-601 [doi]
- Hash Based Encryption Schemes Using Physically Unclonable FunctionsDina Ghanai Miandaob, Duane Booher, Bertrand Cambou, Sareh Assiri. 602-616 [doi]
- Cyber-Safety Awareness: Assisting Schools in Implementation GuidelinesElmarie Kritzinger, Geoffrey Lautenbach. 617-629 [doi]
- Reducing Exposure to Hateful Speech OnlineJack Bowker, Jacques Ophoff. 630-645 [doi]
- Hybrid-AI Blockchain Supported Protection Framework for Smart GridsS. Sai Ganesh, S. Surya Siddharthan, Balaji Rajaguru Rajakumar, S. Neelavathy Pari, Jayashree Padmanabhan, Vishnu Priya. 646-659 [doi]
- Noise-Augmented Privacy-Preserving Empirical Risk Minimization with Dual-Purpose Regularizer and Privacy Budget Retrieval and RecyclingYinan Li, Fang Liu. 660-681 [doi]
- Data Security Awareness and Proper Handling of ICT Equipment of Employees: An AssessmentDorothy M. Ayuyang. 682-692 [doi]
- Developing a Webpage Phishing Attack Detection ToolAbdulrahman Almutairi, Abdullah I. Alshoshan. 693-709 [doi]
- An Evaluation Model Supporting IT Outsourcing Decision for OrganizationsAlessandro Annarelli, Lavinia Foscolo Fonticoli, Fabio Nonino, Giulia Palombi. 710-734 [doi]
- Immunizing Files Against Ransomware with Koalafied ImmunityWilliam Hutton. 735-741 [doi]
- Measuring the Resolution Resiliency of Second-Level Domain NameLanlan Pan, Ruonan Qiu, Anyu Wang, Minghui Yang, Yong Chen, Anlei Hu. 742-755 [doi]
- An Advanced Algorithm for Email Classification by Using SMTP CodeWoo Young Park, Sang Hyun Kim, Duy-Son Vu, Chang Han Song, Hee Soo Jung, Hyeon Jo. 756-775 [doi]
- Protecting Privacy Using Low-Cost Data Diodes and Strong CryptographyAndré Frank Krause, Kai Essig. 776-788 [doi]
- A Security System for National NetworkWoo Young Park, Sang Hyun Kim, Duy-Son Vu, Chang Han Song, Hee Soo Jung, Hyeon Jo. 789-803 [doi]
- Secured Digital Oblivious Pseudorandom and Linear Regression Privacy for Connected Health ServicesRenuka Mohanraj. 804-824 [doi]
- Hardware Implementation for Analog Key Encapsulation Based on ReRAM PUFManuel Aguilar Rios, Sareh Assiri, Bertrand Cambou. 825-836 [doi]
- Questions of Trust in Norms of Zero TrustAllison Wylde. 837-846 [doi]
- Leveraging Zero Trust Security Strategy to Facilitate Compliance to Data Protection RegulationsJean-Hugues Migeon, Yuri Bobbert. 847-863 [doi]
- Perspectives from 50+ Years' Practical Zero Trust Experience and Learnings on Buyer Expectations and Industry PromisesYuri Bobbert, Jeroen Scheerder, Tim Timmermans. 864-881 [doi]
- Bit Error Rate Analysis of Pre-formed ReRAM-based PUFSaloni Jain, Taylor Wilson, Sareh Assiri, Bertrand Cambou. 882-901 [doi]