Mariam Khader

According to our database1, Mariam Khader authored at least 14 papers between 2016 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
MR-VDENCLUE: Varying Density Clustering Using MapReduce.
Proceedings of the Intelligent Systems and Applications, 2022

2021
Density-based Algorithms for Big Data Clustering Using MapReduce Framework: A Comprehensive Study.
ACM Comput. Surv., 2021

2020
Discovery of arbitrary-shapes clusters using DENCLUE algorithm.
Int. Arab J. Inf. Technol., 2020

Big Data Clustering Using MapReduce Framework: A Review.
Proceedings of the Intelligent Systems and Applications, 2020

VDENCLUE: An Enhanced Variant of DENCLUE Algorithm.
Proceedings of the Intelligent Systems and Applications, 2020

2019
A Multi-Stage Fuzzy Model for Assessing Applicants for Faculty Positions in Universities.
Int. J. Intell. Inf. Technol., 2019

The impact of natural language preprocessing on big data sentiment analysis.
Int. Arab J. Inf. Technol., 2019

An overview of various enhancements of DENCLUE algorithm.
Proceedings of the Second International Conference on Data Science, 2019

Performance Comparison of Two Algorithms for Arbitrary Shapes Clustering.
Proceedings of the International Arab Conference on Information Technology, 2019

2018
HDFS file operation fingerprints for forensic investigations.
Digit. Investig., 2018

Sentiment Analysis Based on MapReduce: A survey.
Proceedings of the 10th International Conference on Advances in Information Technology, 2018

The Effects of Natural Language Processing on Big Data Analysis: Sentiment Analysis Case Study.
Proceedings of the International Arab Conference on Information Technology, 2018

2016
Covert Communication Using Port Knocking.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016

A Preliminary Analysis of Drive-by Email Attacks in Educational Institutes.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016


  Loading...