ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: IDS
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Medical Image Registration and Fusion Using Principal Component Analysis
Meisen Pan,Jianjun Jiang,Fen Zhang,Qiusheng Rong
#Centroids
#image registration
#principal component analysis
#image fusion
Human Facial Emotion Recognition using Deep Neural Networks
Benisha S,Mirnalinee TT
#Neural Network
#deep neural networks
#facial expression
#emotion recognition system
A Hybrid Grey Wolf-Whale Optimization Algorithm for Classification of Corona Virus Genome Sequences using Deep Learning
Muthulakshmi Murugaiah,Murugeswari Ganesan
#Corona virus genome
#deep learning
#feature selection
#GWO
#hybrid optimization
#WOA
Privacy-Preserving Data Mining in Homogeneous
Department of Communication Electronics and Compute r Engineering, Helwan University, Egypt
#
253
Preecha Somwang1, 2 and Woraphon Lilakiatsakun2 1Office of Academic Resources and Information Techno logy, Rajamangala University
# IDS
# network security
# PCA
# SFAM
Faculty of Mathematics and Computer, Shahid Bahonar University of Kerman, Iran
# CGA
# optimization problem
# chaos evolutionary algor ithm
RPLB:A Replica Placement Algorithm inData Grid with Load Balancing
Abstract:Data gridisaninfrastructurebuilt based on internetwhichfacilitates sharing and management ofgeographically
#Replicaplacement
# load balancing
#ENU
# data grid
# data replication
An Anti-Spam Filter Based on One-Class IB Method in Small Training Sets
Abstract:We present an approach to email filtering based on one-class Information Bottleneck (IB) method in small training
#IB method
# one-class IB
# anti-spam filter
# Small training sets
Test Case PrioritizationforRegression Testing Using Immune Operator
Abstract:Regressiontesting is a time consuming, costly process of re-running existing test cases.Assoftware evolves, the
#Immuneoperator
# vaccine
# test case prioritization
# regression testing
#GA
#IPA
An Efficient Approach for Mining Frequent Item
1Division of Data Science, Ton Duc Thang University, Vietnam 2Faculty of Information Technology, Ton Duc Thang University, Vietnam 3Faculty of Technology, Pacific Ocean University, Vietnam 4Department of Computer Science and Information Engineering,
#Data mining
# frequent item sets
# incremental mining
# pre-large item sets
# item set-tidset tree
Arabic/Farsi Handwritten Digit Recognition using
Department of Electrical and Computer Engineering, Yazd University, Iran
#
An Innovative Two-Stage Fuzzy kNN-DST
1
#
A Group based Fault Tolerant Scheduling
Abstract: Desktop grid is an exciting discipline for high thr oughput applications but due to inherent resource v olatility,
#
An Effective Data Warehousing System for RFID Using Novel Data Cleaning, Data Transformation and Loading Techniques
Abstract: Nowadays, the vital parts of the business programs are the data warehouses and the data mining techni ques.
# Data warehousing system
# data cleaning
# data transf ormation
# data loading
# dirty data
# RFID
# suspicious tags
# Clustering
# FCM
# Modified FCM
# k)mean clustering
# a ccuracy
# memory usage
# computation time
A Decision Support System Using Demographic Issues: A Case Study in Turkey
Abstract: The demographic distribution of people by cities is an important parameter to address the people’s behaviour. To
#Agglomerative clustering
# customer behaviour
# data mining
# decision support
A Network Performance Aware QoS Based Workflow Scheduling for Grid Services
Abstract: Grids enable sharing, selection and aggregation of geographically distributed resources among various
#Grid scheduling
# QoS
# DAG
# execution time
# deadline
# trust rate
Design and Development of Suginer Filter for Intrusion Detection Using Real Time Network Data
Abstract: By rapid use of the Internet and computer network all over the world makes security a major issues, so using the
#Intrusion detection
# wiener filter
# artificial neural network
# knowledge discovery dataset
# network socket layer
# defense advanced research projects agency
# support vector machine
1
2
3
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint