


default search action
SAI 2022: Virtual Event
- Kohei Arai:

Intelligent Computing - Proceedings of the 2022 Computing Conference, Volume 3, SAI 2022, Virtual Event, 14-15 July 2022. Lecture Notes in Networks and Systems 508, Springer 2022, ISBN 978-3-031-10466-4 - Ricardo Álvarez-González, Edgar R. González-Campos, Nicolás Quiroz-Hernández, Alba Maribel Sánchez Gálvez:

Wearable Internet of Things (IoT) Device Model Design Based on Low-Cost Healthcare Monitoring System for Current Covid-19 Disease. 1-19 - Julius Ceasar Aguma:

A Matching Mechanism for Provision of Housing to the Marginalized. 20-33 - Ekene Frank Ozioko

, Julian M. Kunkel
, Frederic T. Stahl
:
Speed Harmonisation Strategy for Human-Driven and Autonomous Vehicles Co-existence. 34-66 - Ekene Frank Ozioko

, Julian M. Kunkel
, Frederic T. Stahl
:
Road Intersection Coordination Scheme for Mixed Traffic (Human Driven and Driver-Less Vehicles): A Systematic Review. 67-94 - Mahmoud Zaki Iskandarani

:
Selection of Driving Mode in Autonomous Vehicles Based on Road Profile and Vehicle Speed. 95-120 - David S. Bowers

:
Compass Errors in Mobile Augmented Reality Navigation Apps: Consequences and Implications. 121-142 - Sara Alami, Mostafa Hanoune:

Virtual Reality as a Powerful Persuasive Technology to Change Attitude During the Spread of COVID-19. 143-158 - Georgi Yosifov

, Milen Petrov
:
Predicting Traffic Indexes on Urban Roads Based on Public Transportation Vehicle Data in Experimental Environment. 159-168 - Huber Nieto-Chaupis:

Corona Virus and Entropy of Shannon at the Cardiac Cycle: A Mathematical Model. 169-178 - Joanna Sorysz

, Danuta Sorysz:
Efficiency of Local Binarization Methods in Segmentation of Selected Objects in Echocardiographic Images. 179-192 - Zhizhong Ma, Satwinder Singh, Yuanhang Qiu, Feng Hou, Ruili Wang, Christopher Bullen, Joanna Ting Wai Chu:

Automatic Speech-Based Smoking Status Identification. 193-203 - Mohammad Hamed Mozaffari

, Li-Lin Tay:
Independent Component Analysis for Spectral Unmixing of Raman Microscopic Images of Single Human Cells. 204-213 - Kuba Chrobocinski, Wojciech Witarski

, Katarzyna Piórkowska:
A Method of Hepatocytes Segmentation in Microscopic Images of Trypan Blue Stained Cellular Suspension. 214-224 - Ronny Broekx, J. Artur Serrano, Ileana Ciobanu

, Alina Iliescu, Andreea Marin, Mihai Berteanu:
Using Technology to Create Personalised Environments for Dementia Care: Results of an Empathy Map Study. 225-237 - Mikko-Ville Apiola, Sofia Lipponen, Aino Seitamaa

, Tiina S. Korhonen
, Kai Hakkarainen
:
Learning Analytics for Knowledge Creation and Inventing in K-12: A Systematic Review. 238-257 - Rob van der Merwe, Judy van Biljon

, Colin Pilkington:
A Conceptual Framework for the Development of Argumentation Skills Using CSCL in a Graduate Students' Research Course. 258-278 - José Luis Cendejas Valdéz, Heberto Ferreira Medina, María E. Benítez Ramírez, Gustavo Abraham Vanegas-Contreras, Miguel A. Acuña López, Jesús Leonardo Soto-Sumuano:

Single Access for the Use of Information Technology in University Education During the SARS-CoV-2 Pandemic. 279-293 - Oksana Isaeva, Yurii Boronenko, Boronenko Marina:

Camcorder as an e-Learning Tool. 294-304 - Igor Val Danilov

:
Smartphone in Detecting Developmental Disability in Infancy: A Theoretical Approach to Shared Intentionality for Assessment Tool of Cognitive Decline and e-Learning. 305-315 - Fatema Tuj Johora, Aurpa Anindita, Noushin Islam, Mahmudul Islam, Mahady Hasan

:
Centralized Data Driven Decision Making System for Bangladeshi University Admission. 316-330 - Javier Apaza Humpire, Maria Guerra Vidal, Miguel Tupayachi Moina, Milagros Vega Colque, José Sulla-Torres:

Battle Card, Card Game for Teaching the History of the Incas Through Intelligent Techniques. 331-346 - Paul Greiff, Carla Reinken, Uwe Hoppe:

Barriers for Lecturers to Use Open Educational Resources and Participate in Inter-university Teaching Exchange Networks. 347-358 - Adam L. Miller:

Lessons Learnt During the COVID-19 Pandemic: Preparing Tertiary Education in Japan for 4IR. 359-378 - Ilan Daniels Rahimi:

Ambient Intelligence in Learning Management System (LMS). 379-387 - Rituparna Bhattacharya

, Martin White
, Natalia Beloff
:
eMudra: A Leftover Foreign Currency Exchange System Utilizing the Blockchain Technology. 388-408 - Rituparna Bhattacharya

, Martin White
, Natalia Beloff
:
A Multi-layered Ontological Approach to Blockchain Technology. 409-428 - Zan-Jun Wang, Ching-Chun Jim Huang, Shih-Wei Liao, Zih-shiuan Spin Yuan:

A Two-Way Atomic Exchange Protocol for Peer-to-Peer Data Trading. 429-447 - Gabriela Ziegler:

Blockchain Industry Implementation and Use Case Framework: A Survey. 448-469 - Aditya Ajgaonkar, Anuj Raghani, Bhavya Sheth, Dyuwan Shukla, Dhiren Patel, Sanket Shanbhag:

A Blockchain Approach for Exchanging Machine Learning Solutions Over Smart Contracts. 470-482 - Badr Bellaj, Aafaf Ouaddah, Emmanuel Bertin, Noël Crespi, Abdellatif Mezrioui:

Untangling the Overlap Between Blockchain and DLTs. 483-505 - Saad Alshihri, Sooyong Park:

A Secure Data Controller System Based on IPFS and Blockchain. 506-510 - Aleksejus Mihalkovich, Eligijus Sakalauskas, Matas Levinskas:

Key Exchange Protocol Based on the Matrix Power Function Defined Over [inline-graphic not available: see fulltext]. 511-531 - Taylor Wilson, Bertrand Cambou, Brit Riggs, Ian Burke, Julie Heynssens, Sung Hyun Jo:

Design and Analysis of Pre-formed ReRAM-Based PUF. 532-549 - Chuck Easttom:

A Graph Theoretical Methodology for Network Intrusion Fingerprinting and Attack Attribution. 550-580 - Ahmad Ghafarian, Deniz Keskin:

Using Memory Forensics to Investigate Security and Privacy of Facebook. 581-601 - Dina Ghanai Miandaob, Duane Booher, Bertrand Cambou, Sareh Assiri:

Hash Based Encryption Schemes Using Physically Unclonable Functions. 602-616 - Elmarie Kritzinger, Geoffrey Lautenbach

:
Cyber-Safety Awareness: Assisting Schools in Implementation Guidelines. 617-629 - Jack Bowker, Jacques Ophoff

:
Reducing Exposure to Hateful Speech Online. 630-645 - S. Sai Ganesh

, S. Surya Siddharthan, Balaji Rajaguru Rajakumar, S. Neelavathy Pari, Jayashree Padmanabhan, Vishnu Priya:
Hybrid-AI Blockchain Supported Protection Framework for Smart Grids. 646-659 - Yinan Li, Fang Liu

:
Noise-Augmented Privacy-Preserving Empirical Risk Minimization with Dual-Purpose Regularizer and Privacy Budget Retrieval and Recycling. 660-681 - Dorothy M. Ayuyang:

Data Security Awareness and Proper Handling of ICT Equipment of Employees: An Assessment. 682-692 - Abdulrahman Almutairi, Abdullah I. Alshoshan:

Developing a Webpage Phishing Attack Detection Tool. 693-709 - Alessandro Annarelli, Lavinia Foscolo Fonticoli, Fabio Nonino

, Giulia Palombi:
An Evaluation Model Supporting IT Outsourcing Decision for Organizations. 710-734 - William J. Hutton III

:
Immunizing Files Against Ransomware with Koalafied Immunity. 735-741 - Lanlan Pan

, Ruonan Qiu, Anyu Wang
, Minghui Yang, Yong Chen, Anlei Hu:
Measuring the Resolution Resiliency of Second-Level Domain Name. 742-755 - Woo Young Park, Sang Hyun Kim, Duy-Son Vu, Chang Han Song, Hee Soo Jung, Hyeon Jo

:
An Advanced Algorithm for Email Classification by Using SMTP Code. 756-775 - André Frank Krause, Kai Essig:

Protecting Privacy Using Low-Cost Data Diodes and Strong Cryptography. 776-788 - Woo Young Park, Sang Hyun Kim, Duy-Son Vu, Chang Han Song, Hee Soo Jung, Hyeon Jo

:
A Security System for National Network. 789-803 - Renuka Mohanraj:

Secured Digital Oblivious Pseudorandom and Linear Regression Privacy for Connected Health Services. 804-824 - Manuel Aguilar Rios, Sareh Assiri, Bertrand Cambou:

Hardware Implementation for Analog Key Encapsulation Based on ReRAM PUF. 825-836 - Allison Wylde

:
Questions of Trust in Norms of Zero Trust. 837-846 - Jean-Hugues Migeon, Yuri Bobbert:

Leveraging Zero Trust Security Strategy to Facilitate Compliance to Data Protection Regulations. 847-863 - Yuri Bobbert, Jeroen Scheerder, Tim Timmermans:

Perspectives from 50+ Years' Practical Zero Trust Experience and Learnings on Buyer Expectations and Industry Promises. 864-881 - Saloni Jain

, Taylor Wilson, Sareh Assiri, Bertrand Cambou:
Bit Error Rate Analysis of Pre-formed ReRAM-based PUF. 882-901

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














