ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: Anomaly
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Based on Correlation Analysis and K-Means: An Anomaly Detection Algorithm for Seasonal Time-Series Data
Xin Wang,Yingxue Yang,Xueshuang Ding,Yantao Zhao
#Anomaly detection
#seasonal data
#time series
#DBSCAN
#K-means
Disease Prognosis of Fetal Heart’s Four-Chamber and Blood Vessels in Ultrasound Images Using CNN Incorporated VGG 16 and Enhanced DRNN
Someshwaran Gunasekaran,Sarada Vivekasaran
#Fetal heart disease
#ultrasound images
#augmented wiener filter
#median modified wiener filter
#region of interest
#convolutional neural network
#visual geometry group 16
#deep recurrent neural network
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
An Anomaly Detection Method for Weighted Data Based on Feature Association Analysis
Jiayao Li,Rui Wang
#Anomaly detection
#feature association analysis
#weighted data
253
Preecha Somwang1, 2 and Woraphon Lilakiatsakun2 1Office of Academic Resources and Information Techno logy, Rajamangala University
# IDS
# network security
# PCA
# SFAM
Immunity inspired Cooperative Agent based
Department of Computer Science and Engineering, Technocrats Institute of Technology, India
#Anomaly
# human immune system
# artificial immune system
# agent
FAAD: A Self-Optimizing Algorithm for Anomaly Detection
Adeel Hashmi and Tanvir Ahmad
#Anomaly detection
# outliers
# firefly algorithm
# big data
# parallel algorithms and apache spark
Ensemble Voting based Intrusion Detection Technique using Negative Selection Algorithm
Kuldeep Singh,Lakhwinder Kaur,Raman Maini
#Artificial immune system
#security
#negative selection algorithm
#anomaly detection
A Lightweight Hybrid Intrusion Detection Framework using Machine Learning for Edge-
Based IIoT Security, Mourade Azrour, Said Benkirane, Mouaad Mohy-Eddine, Hanaa Attou, Maryam Douiba
#IoT security
# edge-based IIoT
# intrusion detection
# ML
# K-NN
# PCA
A Modified DBSCAN Algorithm for Anomaly Detection in Time-series Data with Seasonality
Praphula Jain,Mani Shankar Bajpai,Rajendra Pamula
#Anomaly detection
#data mining
#DBSCAN
#modified DBSCAN
#seasonal data
#time series
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint