The International Arab Journal of Information Technology (IAJIT)

Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques

Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule

Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques

Muyideen Ayodeji Alaketu,Abiodun Oguntimilehin,Kehinde Adebola Olatunji,Oluwatoyin Bunmi Abiola,Bukola Badeji-Ajisafe,Christiana Olanike Akinduyite,Stephen Eyitayo Obamiyi,Gbemisola Olutosin Babalola,Toyin Okebule

Qaisar Abbas1, Irene Fondo´n2, and Emre Celebi3 1College of Computer and Information Sciences, Al Im am Mohammad Ibn Saud Islamic University,
#

Exploring the Potential of Schemes in Building NLP

LaTICE Laboratory, Faculty of Sciences of Monastir, Tunisia
#

Privacy-Preserving Data Mining in Homogeneous

Department of Communication Electronics and Compute r Engineering, Helwan University, Egypt
#

Adaptive Semantic Indexing of Documents for Locating Relevant Information in P2P Networks

Abstract: Locating relevant information in Peer#to#Peer (P2P) system is a challenging problem. Conventional approaches use
#

An Improved Iterative Segmentation Algorithm using Canny Edge Detector for Skin Lesion Border Detection

1 and Mohamed Sathik2 1National College of Engineering, India 2Department of Computer Science, Sadakathullah Appa  College, India  

Thomas Brindha and Ramaswamy Shaji
#

Unconstraint Assignment Problem: A Molecular Computing Approach Ibrahim Zuwairie1&2, Tsuboi Yusei2, Ono Osamu2, and Khalid Marzuki3

Abstract:Deoxyribonucleic Acid or DNA-based computing is an emerging field that bridging the gap between chemistry,