default search action
SAI 2022: Virtual Event
- Kohei Arai:
Intelligent Computing - Proceedings of the 2022 Computing Conference, Volume 3, SAI 2022, Virtual Event, 14-15 July 2022. Lecture Notes in Networks and Systems 508, Springer 2022, ISBN 978-3-031-10466-4 - Ricardo Álvarez-González, Edgar R. González-Campos, Nicolás Quiroz-Hernández, Alba Maribel Sánchez Gálvez:
Wearable Internet of Things (IoT) Device Model Design Based on Low-Cost Healthcare Monitoring System for Current Covid-19 Disease. 1-19 - Julius Ceasar Aguma:
A Matching Mechanism for Provision of Housing to the Marginalized. 20-33 - Ekene Frank Ozioko, Julian M. Kunkel, Frederic T. Stahl:
Speed Harmonisation Strategy for Human-Driven and Autonomous Vehicles Co-existence. 34-66 - Ekene Frank Ozioko, Julian M. Kunkel, Frederic T. Stahl:
Road Intersection Coordination Scheme for Mixed Traffic (Human Driven and Driver-Less Vehicles): A Systematic Review. 67-94 - Mahmoud Zaki Iskandarani:
Selection of Driving Mode in Autonomous Vehicles Based on Road Profile and Vehicle Speed. 95-120 - David S. Bowers:
Compass Errors in Mobile Augmented Reality Navigation Apps: Consequences and Implications. 121-142 - Sara Alami, Mostafa Hanoune:
Virtual Reality as a Powerful Persuasive Technology to Change Attitude During the Spread of COVID-19. 143-158 - Georgi Yosifov, Milen Petrov:
Predicting Traffic Indexes on Urban Roads Based on Public Transportation Vehicle Data in Experimental Environment. 159-168 - Huber Nieto-Chaupis:
Corona Virus and Entropy of Shannon at the Cardiac Cycle: A Mathematical Model. 169-178 - Joanna Sorysz, Danuta Sorysz:
Efficiency of Local Binarization Methods in Segmentation of Selected Objects in Echocardiographic Images. 179-192 - Zhizhong Ma, Satwinder Singh, Yuanhang Qiu, Feng Hou, Ruili Wang, Christopher Bullen, Joanna Ting Wai Chu:
Automatic Speech-Based Smoking Status Identification. 193-203 - Mohammad Hamed Mozaffari, Li-Lin Tay:
Independent Component Analysis for Spectral Unmixing of Raman Microscopic Images of Single Human Cells. 204-213 - Kuba Chrobocinski, Wojciech Witarski, Katarzyna Piórkowska:
A Method of Hepatocytes Segmentation in Microscopic Images of Trypan Blue Stained Cellular Suspension. 214-224 - Ronny Broekx, J. Artur Serrano, Ileana Ciobanu, Alina Iliescu, Andreea Marin, Mihai Berteanu:
Using Technology to Create Personalised Environments for Dementia Care: Results of an Empathy Map Study. 225-237 - Mikko-Ville Apiola, Sofia Lipponen, Aino Seitamaa, Tiina S. Korhonen, Kai Hakkarainen:
Learning Analytics for Knowledge Creation and Inventing in K-12: A Systematic Review. 238-257 - Rob van der Merwe, Judy van Biljon, Colin Pilkington:
A Conceptual Framework for the Development of Argumentation Skills Using CSCL in a Graduate Students' Research Course. 258-278 - José Luis Cendejas Valdéz, Heberto Ferreira Medina, María E. Benítez Ramírez, Gustavo Abraham Vanegas-Contreras, Miguel A. Acuña López, Jesús Leonardo Soto-Sumuano:
Single Access for the Use of Information Technology in University Education During the SARS-CoV-2 Pandemic. 279-293 - Oksana Isaeva, Yurii Boronenko, Boronenko Marina:
Camcorder as an e-Learning Tool. 294-304 - Igor Val Danilov:
Smartphone in Detecting Developmental Disability in Infancy: A Theoretical Approach to Shared Intentionality for Assessment Tool of Cognitive Decline and e-Learning. 305-315 - Fatema Tuj Johora, Aurpa Anindita, Noushin Islam, Mahmudul Islam, Mahady Hasan:
Centralized Data Driven Decision Making System for Bangladeshi University Admission. 316-330 - Javier Apaza Humpire, Maria Guerra Vidal, Miguel Tupayachi Moina, Milagros Vega Colque, José Sulla-Torres:
Battle Card, Card Game for Teaching the History of the Incas Through Intelligent Techniques. 331-346 - Paul Greiff, Carla Reinken, Uwe Hoppe:
Barriers for Lecturers to Use Open Educational Resources and Participate in Inter-university Teaching Exchange Networks. 347-358 - Adam L. Miller:
Lessons Learnt During the COVID-19 Pandemic: Preparing Tertiary Education in Japan for 4IR. 359-378 - Ilan Daniels Rahimi:
Ambient Intelligence in Learning Management System (LMS). 379-387 - Rituparna Bhattacharya, Martin White, Natalia Beloff:
eMudra: A Leftover Foreign Currency Exchange System Utilizing the Blockchain Technology. 388-408 - Rituparna Bhattacharya, Martin White, Natalia Beloff:
A Multi-layered Ontological Approach to Blockchain Technology. 409-428 - Zan-Jun Wang, Ching-Chun Jim Huang, Shih-Wei Liao, Zih-shiuan Spin Yuan:
A Two-Way Atomic Exchange Protocol for Peer-to-Peer Data Trading. 429-447 - Gabriela Ziegler:
Blockchain Industry Implementation and Use Case Framework: A Survey. 448-469 - Aditya Ajgaonkar, Anuj Raghani, Bhavya Sheth, Dyuwan Shukla, Dhiren Patel, Sanket Shanbhag:
A Blockchain Approach for Exchanging Machine Learning Solutions Over Smart Contracts. 470-482 - Badr Bellaj, Aafaf Ouaddah, Emmanuel Bertin, Noël Crespi, Abdellatif Mezrioui:
Untangling the Overlap Between Blockchain and DLTs. 483-505 - Saad Alshihri, Sooyong Park:
A Secure Data Controller System Based on IPFS and Blockchain. 506-510 - Aleksejus Mihalkovich, Eligijus Sakalauskas, Matas Levinskas:
Key Exchange Protocol Based on the Matrix Power Function Defined Over [inline-graphic not available: see fulltext]. 511-531 - Taylor Wilson, Bertrand Cambou, Brit Riggs, Ian Burke, Julie Heynssens, Sung Hyun Jo:
Design and Analysis of Pre-formed ReRAM-Based PUF. 532-549 - Chuck Easttom:
A Graph Theoretical Methodology for Network Intrusion Fingerprinting and Attack Attribution. 550-580 - Ahmad Ghafarian, Deniz Keskin:
Using Memory Forensics to Investigate Security and Privacy of Facebook. 581-601 - Dina Ghanai Miandaob, Duane Booher, Bertrand Cambou, Sareh Assiri:
Hash Based Encryption Schemes Using Physically Unclonable Functions. 602-616 - Elmarie Kritzinger, Geoffrey Lautenbach:
Cyber-Safety Awareness: Assisting Schools in Implementation Guidelines. 617-629 - Jack Bowker, Jacques Ophoff:
Reducing Exposure to Hateful Speech Online. 630-645 - S. Sai Ganesh, S. Surya Siddharthan, Balaji Rajaguru Rajakumar, S. Neelavathy Pari, Jayashree Padmanabhan, Vishnu Priya:
Hybrid-AI Blockchain Supported Protection Framework for Smart Grids. 646-659 - Yinan Li, Fang Liu:
Noise-Augmented Privacy-Preserving Empirical Risk Minimization with Dual-Purpose Regularizer and Privacy Budget Retrieval and Recycling. 660-681 - Dorothy M. Ayuyang:
Data Security Awareness and Proper Handling of ICT Equipment of Employees: An Assessment. 682-692 - Abdulrahman Almutairi, Abdullah I. Alshoshan:
Developing a Webpage Phishing Attack Detection Tool. 693-709 - Alessandro Annarelli, Lavinia Foscolo Fonticoli, Fabio Nonino, Giulia Palombi:
An Evaluation Model Supporting IT Outsourcing Decision for Organizations. 710-734 - William Hutton:
Immunizing Files Against Ransomware with Koalafied Immunity. 735-741 - Lanlan Pan, Ruonan Qiu, Anyu Wang, Minghui Yang, Yong Chen, Anlei Hu:
Measuring the Resolution Resiliency of Second-Level Domain Name. 742-755 - Woo Young Park, Sang Hyun Kim, Duy-Son Vu, Chang Han Song, Hee Soo Jung, Hyeon Jo:
An Advanced Algorithm for Email Classification by Using SMTP Code. 756-775 - André Frank Krause, Kai Essig:
Protecting Privacy Using Low-Cost Data Diodes and Strong Cryptography. 776-788 - Woo Young Park, Sang Hyun Kim, Duy-Son Vu, Chang Han Song, Hee Soo Jung, Hyeon Jo:
A Security System for National Network. 789-803 - Renuka Mohanraj:
Secured Digital Oblivious Pseudorandom and Linear Regression Privacy for Connected Health Services. 804-824 - Manuel Aguilar Rios, Sareh Assiri, Bertrand Cambou:
Hardware Implementation for Analog Key Encapsulation Based on ReRAM PUF. 825-836 - Allison Wylde:
Questions of Trust in Norms of Zero Trust. 837-846 - Jean-Hugues Migeon, Yuri Bobbert:
Leveraging Zero Trust Security Strategy to Facilitate Compliance to Data Protection Regulations. 847-863 - Yuri Bobbert, Jeroen Scheerder, Tim Timmermans:
Perspectives from 50+ Years' Practical Zero Trust Experience and Learnings on Buyer Expectations and Industry Promises. 864-881 - Saloni Jain, Taylor Wilson, Sareh Assiri, Bertrand Cambou:
Bit Error Rate Analysis of Pre-formed ReRAM-based PUF. 882-901
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.