ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: GRI
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Submitted before 1st, April 2023
Submitted after 1st, April 2023
Review Paper
Instructions to Reviewers
Statistics
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Usage of Statistical Techniques to Monitor the Performance of Wind Turbines
Aditya Dubey,Pradeep Yadav,Subhash Chandra Patel
#AEP
#sigmoid
#RELU
#softmax
#TANH
#wind power curve model
#statistical model
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Usage of Statistical Techniques to Monitor the Performance of Wind Turbines
Aditya Dubey,Pradeep Yadav,Subhash Chandra Patel
#AEP
#sigmoid
#RELU
#softmax
#TANH
#wind power curve model
#statistical model
Fuzzy Heuristics for Detecting and Preventing Black Hole Attack
Elamparithi Pandian,Ruba Soundar,Shenbagalakshmi Gunasekaran,Shenbagarajan Anantharajan
#Mobile Ad-hoc networks
#fuzzy inference system
#trust value
#black hole attack
#node authentication
#certificate authority
Additive Metric Composition-Based Load Aware Reliable Routing Protocol for Improving the Quality of Service in Industrial Internet of Things
Anitha Dharmalingaswamy,Latha Pitchai
#Neighbor index
#objective function
#reliability
#residual energy
#RSSI
Navigating the Complex Landscape of IoT Forensics: Challenges and Emerging Solutions
Nura Shifa Musa,Nada Masood Mirza,Adnan Ali
#Digital forensic
#internet of things
#internet of things forensics
#forensic investigation process
#challenges
#emerging solutions
# Job scheduling
# data replication
# RC
# replica manag er
# resource discovery
# counting bloom filter
Medhat Tawfeek, Ashraf ElSisi, Arabi Keshk and Faw zy Torkey
#Cloud computing
# task scheduling
# makespan
# ACO
# cl oudsim
An Intelligent Water Drop Algorithm for Optimizing Task Scheduling in Grid Environment
Abstract:The goal of grid computing is to provide powerful computing for complex scientific problems by utilizing and
#grid computing
#IWD
# task scheduling
#ACO
RPLB:A Replica Placement Algorithm inData Grid with Load Balancing
Abstract:Data gridisaninfrastructurebuilt based on internetwhichfacilitates sharing and management ofgeographically
#Replicaplacement
# load balancing
#ENU
# data grid
# data replication
A Region Adaptive Robust Watermarking Scheme
Motilal Nehru National Institute of Technology, Ind ia
#
Arabic/Farsi Handwritten Digit Recognition using
Department of Electrical and Computer Engineering, Yazd University, Iran
#
A Group based Fault Tolerant Scheduling
Abstract: Desktop grid is an exciting discipline for high thr oughput applications but due to inherent resource v olatility,
#
Design and Implementation of a Two-Phase Commit Protocol Simulator Toufik Taibi1, Abdelouahab Abid2, Wei Jiann Lim2, Yeong Fei Chiam2, and Chong Ting Ng2
Abstract: The Two-Phase Commit Protocol (2PC) is a set of rules, which guarantee that every single transaction in a
#2PC
# transaction coordinator
# transaction manager
# data manager
# locking manager
# failure recovery
# RMI
Enforcing User-Defined Constraints During the Run-Time in OODB
, Ali Mamat 2
#Object-oriented databases
# integrity constraints
# constraints violation
VI-SDB: A Convivial Approach for Description and Manipulation of
Faculty of Sciences of Tunis, Tunisia University, T unisia
# Deductive database
# stratified database
# EPN formal ism
# GUI
Khaled Omer1 and Daya Lobiyal2 1Faculty of Engineering, School of Computer and Syst ems Sciences, University of Aden, Yemen 2Faculty of Computer and System Science, Nehru Unive rsity, India
#Markov chain
# location update
# home agent
# quorum
# grid location service
Towards A Distributed Arabic OCR Based on the DTW Algorithm: Performance Analysis
Abstract: In spite of the diversity ofprintedArabicoptical characterrecognitionproductsandproposals,the problemseems
#ArabicOCR
#DTWalgorithm
#looselycoupledarchitec tures
#grapes
#gridcomputing
#performanceanalysis
A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes
Abstract: Hash functions are the most widespread among all cr yptographic primitives, and are currently used in multiple
#Data integrity
# hash algorithm
# digital signature
# pre(image
# message digest
# message authentication
1
2
3
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint