ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: Big Data
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Zero Trust Architecture for Security and Protection System in 5G Intelligent Healthcare
Wenzhong Jin,Shanjun Wu,Yu Feng,Huijing Wang,Chunyu Fu
#Artificial intelligence
#intelligent healthcare system
#sustainable development
#big data
#healthcare
#5G communication
#information safety
#security
A Review of SDLCs for Big Data Analytics Systems in the Context of Very Small Entities Using the ISO/IEC 29110 Standard-Basic Profile
David Montoya-Murillo,Manuel Mora,Sergio Galvan-Cruz,Angel Munoz-Zavala,Francisco Alvarez-Rodriguez
#BDAS
#SDLC
#ISO/IEC-29110-standard for VSEs
#CRISP-DM
#BSPL
#TDSP and DDSL
Inventory Optimization Using Data Science Technologies for Supply Chain 4.0
Emna Bouazizi,Ayman Khedr,Sherin Elfaioumy,Mohamed Belal
#Supply chain 4.0
#inventory management
#regression algorithm
#optimization
Review of Agile SDLC for Big Data Analytics Systems in the Context of Small Organizations Using Scrum-XP
Gerardo Salazar-Salazar,Manuel Mora,Hector Duran-Limon,Francisco Alvarez-Rodriguez,Angel Munoz-Zavala
#Big data analytics systems
#agile system development life cycle
#Scrum-XP
#CRISP-DM
#TDSP and DDSL
#small business
Canine Disease Prediction using Multi-Directional Intensity Proportional Pattern with Correlated Textural Neural Network
Ayesha Taranum,Jyoti Metan,Prasad Yogegowda,Chandrashekar Krishnappa
#Data optimization
#pattern extraction in big data
#multi-directional intensity proportional pattern
#similarity measure system
#correlated textural neural network
#test prediction
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule
#Cyber intrusion
#intrusion detection system
#machine learning
#deep learning
#ensemble learning
#classifications
#big data analytics
A Hadoop Based Approach for Community Detection on Social Networks Using Leader Nodes
Mohamed Iqbal,Kesavarao Latha
#Social network
#big data
#map reduce
#community detection
#leader nodes
A Novel Resource Scheduler for Resource Allocation and Scheduling in Big Data Using Hybrid Optimization Algorithm at Cloud Environment
Aarthee Selvaraj,Prabakaran Rajendran,Kanimozhi Rajangam
#Resource management
#particle swarm optimization
#computer performance
#data analysis
#virtualization
An Experimental Based Study to Evaluate the Efficiency among Stream Processing Tools
Akshay Mudgal,Shaveta Bhatia
#Big data
#data streaming
#real time stream processing
A Proposed Model to Integrate Drone Technology in Accounting for Long Term Contracts: A Cash Flow Management Perspictive
Amer Qasim,Ghaleb A. El Refae,Shorouq Eletter
#Drones
#Real-Estate Accounting
#robotic process automation
#percentage of completion
#cash flow management
Implementation of Image Processing System using Handover Technique with Map Reduce Based on Big Data in the Cloud Environment
#
Analysis and Performance Evaluation of Cosine Neighbourhood Recommender System
Abstract: Growth of technology and innovation leads to large and complex data which is coined as Bigdata. As the quantity of
#Big Data
# Recommender System
# Cosine Neighbourhood Similarity
# Recommender Evaluator
Evaluating Social Context in Arabic Opinion Mining Mohammed Al-Kabi1, Izzat Alsmadi2, Rawan Khasawneh3, and Heider Wahsheh4 1Computer Science Department, Zarqa University, Jordan 2Computer Science Department, University of New Haven, USA 3Computer Information Systems Department, Jordan University of Science and Technology, Jordan 4Computer Science Department, King Khaled University, Saudi Arabia
balanced benchmark corpus. To accomplish this study ten Arabic lexicons were constructed manually, and a new tool called
#Big data
# social networks
# sentiment analysis
# Arabic text classification
# and analysis
# opinion mining
A New Approach to Improve Association Rules for Big Data in Cloud Environment
Djilali Dahmani, Sidi Ahmed Rahal, and Ghalem Belalem
#Big data
# association rules
# rule patterns
# ontology
# cloud computing
# NoSQL
A Proactive Caching Scheme Based on Content Concentration in Content-Centric Networks
Xi Luo1,2 and Ying An1 1Institute of Information Security and Big Data, Central South University, China 2Department of Information Technology, Hunan Police Academy, China
#Content-centric networking
# diffusion theory
# proactive caching
# content popularity
Predicting the Winner of Delhi Assembly Election, 2015 from Sentiment Analysis on Twitter Data-A
BigData Perspective
#Election winner prediction
# big data
# sentiment analysis
# tweet mining
# map reduce
The Impact of Natural Language Preprocessing on Big Data Sentiment Analysis
Mariam Khader, Arafat Awajan, and Ghazi Al-Naymat
#Big data
# natural language processing
# MapReduce framework
# Naïve Bayes and sentiment analysis
Collaborative Detection of Cyber Security Threats in Big Data
Jiange Zhang, Yuanbo Guo, and Yue Chen
#Big data
# cyber security
# threat
# collaborative detection
Advanced Analysis of the Integrity of Access Control Policies: the Specific Case of Databases
Faouzi Jaidi, Faten Ayachi, and Adel Bouhoula
#Access Control
# Databases Security
# Formal Validation
# Integrity Analysis
# Conformity Verification
1
2
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint