ICISDM provides a scientific platform for both local and international scientists, engineers and technologists who work in all aspects of Information System and Data Mining. In addition to the contributed papers, internationally known experts from several countries are also invited to deliver keynote and plenary speeches at ICISDM 2018.
Proceeding Downloads
A new text representation method for clustering based on higher order Markov model
The ordinal relations in word sequence and character sequence can reflect the latent information about writing style, genre features and topic. Thus, the ordinal relations are important information and should be considered for text clustering. However, ...
PAWE: Polysemy Aware Word Embeddings
Word embedding models learn a distributed vectorial representation for words, which can be used as the basis for (deep) learning models to solve a variety of natural language processing tasks. One of the main disadvantages of current word embedding ...
Semantic Oriented Document Clustering Using Distribution Semantics
The exponential growth of electronic form of textual documents in both public and proprietary storage force researchers to find way to efficiently extract meaningful, actionable information from these documents. Document clustering has find its niche in ...
RMDL: Random Multimodel Deep Learning for Classification
The continually increasing number of complex datasets each year necessitates ever improving machine learning methods for robust and accurate categorization of these data. This paper introduces Random Multimodel Deep Learning (RMDL): a new ensemble, deep ...
Snow Leopard Recognition Using Deep Convolution Neural Network
The paper describes the use of Deep Convolution Neural Networks (DCNN) for the recognition of Snow Leopards, from a data set of photos taken in the wild. The data set comprises of 1500 images, captured in the Himalayas using motion sensing cameras. The ...
Machine Learning-based Prediction of ICU Patient Mortality at Time of Admission
In this paper we describe the application of machine learning techniques to the prediction of hospital Intensive Care Unit (ICU) patient mortality. A large dataset of over 58,000 ICU admissions from the MIMIC III database was used in the development, ...
Full Disk Encryption: A Comparison on Data Management Attributes
It is important to secure personally identifiable and confidential information stored on portable devices such as laptops, and smartphones. Data is more appealing for thieves than the hardware itself. Encryption is the paramount protection measure to ...
Complex Adaptive Systems: A Data Modelling and Engineering Perspective
Complex and Adaptive Systems (CAS) consists of large number of elements that are connected with each other and interact in distributed manner. CAS exhibits random behavior which cannot be pre determined and is a result of non-linear interaction of large ...
Master Data Management Maturity Model for the Microfinance Sector in Peru
- Daniel Vásquez Zúñiga,
- Romina Kukurelo Cruz,
- Carlos Raymundo Ibañez,
- Francisco Dominguez,
- Javier M. Moguerza
The microfinance sector has a strategic role since they facilitate integration and development of all social classes to sustained economic growth. In this way the actual point is the exponential growth of data, resulting from transactions and operations ...
Application of Near-Infra-Red Spectroscopy for the Analysis of the Impact of Black Color on Neural Response
In a traditional survey [1] of 75 respondents, black was either the first color of choice or the second. This raises the question, is the choice of black color by chance or the choice of the respondents is cognitively influenced? To address this ...
Quality data extraction methodology based on the labeling of coffee leaves with nutritional deficiencies
Nutritional deficiencies detection for coffee leaves is a task which is often undertaken manually by experts on the field known as agronomists. The process they follow to carry this task is based on observation of the different characteristics of the ...
Towards investigation of iterative strategy for data mining of short-term traffic flow with Recurrent Neural Networks
The smart cities of modern nations rely on the smooth flow of transportation that depends on the predictions of the traffic flow patterns. Since last few years, deep learning based methods have emerged to show better results for short-term traffic ow ...
The issues affecting employees' adoption of online banking in Mahikeng
Online banking is a fast-growing trend in developing countries. It enables people to make banking transactions without going to the bank. Online banking can be performed on any device that is connected to the Internet such as laptop, desktop and mobile ...
A Comprehensive Comparative Analysis on Energy Efficient Approaches in SDN
Software Defined Networking paradigm is being attracted worldwide to carry out the research. SDN presents empowering programmable system segments to isolate control plane and forwarding plane. The advantages of SDN paradigm are energy reduction, high ...
Designing a decision tree for Cross-device communication technology aimed at iOS and Android developers
This analysis proposes a decision tree for selecting cross-device communication technologies for iOS and Android mobile devices. This tree accelerates the selection of cross-device technologies by taking into account known use cases of interaction. Five ...
An Architecture for Translating Sequential Code to Parallel
With the increasing progress of high performance computing infrastructure, it has become necessary to design and implement easy to use tools that are able to translate any legacy software application to parallel. A deep observation of the existing tools ...
In-Vehicle Software Defined Networking: An Enabler for Data Interoperability
As future transportation systems evolve, new in-vehicle network designs are required to handle the heterogeneous data generated by different Electronic Control Modules (ECUs). Enabling interaction between these data sources can trigger innovation and ...
Machine Learning Approach for Malware Detection Using Random Forest Classifier on Process List Data Structure
As computer systems have become an integral part of every organization, it is a big challenge to safeguard the computer systems from malicious activities which compromise not only the systems but also the data stored within. Traditional malware and ...
An Interactive Web System for Group Project Management and Peer Evaluation
In this paper, we describe the design and development of a web-based project management and evaluation system for group work and peer learning. Using this system, the instructor can dynamically manage projects submitted from students and form student ...
An Ontology Framework of Software Requirements Change Management Process Based on Causality
Requirements change has a remarkable influence on the success of software development. Managing software requirements change needs get more clues from the view of knowledge management. The methodology of this research is driven by knowledge management, ...
Automation Managed Inventory System (AMI) Creation for OTOP Distribution Center
The purpose of this research paper is to develop a management system of community enterprise's distribution center in the form of Automation Managed Inventory System (AMI) and base on the concept of Vendor-managed inventory (VMI) system, which is ...
Research on Military Human Capital Reward Basic Model
A certain degree of private ownership of military human capital determines the uncertainty of its supply. simply by the efforts of monitoring that can not completely solve the problem of the owners of military human capital, as well as really solve the ...
Challenge of Chinese Knowledge Capital on the Context of Globalization
Encounter the enhancing challenge of globalization and knowledge economy, Chinese knowledge capital owners adapting to the new environment accordingly. The purpose of this paper is to boost the theoretical understanding of the return pressure of the ...
In Search of The Holy Grail: An Exploration of Value Co-Creation in Service Ecosystems Using Knowledge Network Analysis
The intention of this article is to simplify the study of value co-creation both from a deeper theoretical discourse, including knowledge networks approach. The study's approach is from the perspective of knowledge sharing, in form of interaction and ...
Application of GA-SVM for County Ecological Security Prediction of Land Resources: Taking Guanzhong Urban Agglomeration as a Case
Ecological security prediction of land resources play an important role in sustainable utilization of land resources and improve benefit of healthy development of urbanization in China. So far, many methods for regional ecological security prediction ...
Improving Creativity of Graphic Design for Deaf Students Using Contextual Teaching Learning Method (CTL)
This study is addressed to the issues of improving the creativity of deaf Students in graphic design using contextual teaching learning (CTL). Various researches have highlighted the ability of the deaf students in graphic design skill and also provided ...
Phone based Video Processing Aimed at Outdoor Guidance for the Visually Impaired
This paper discusses an outdoor guidance system that can be implemented on a smartphone. The purpose of such a system would be to assist the blind or visually impaired. The system will be able to detect the ground, find obstacles, and notify the user ...
Study on Transit-Time Ultrasonic Flow Meter with Waveform Analysis
Aiming at the problem that the transit-time ultrasonic flow meter is unstable when the flow field is not uniform, a method of combining the judgment of AD (Analog-to-Digital) sampling with the TDC (Time-to-Digital Converter) high-precision timing is ...
Survey of Locomotion Systems in Virtual Reality
This is a survey paper on various types of virtual reality locomotion systems. This paper will be examining results and making comments on their implementations and techniques in an attempt to see where the virtual reality industry is heading in the ...
Do Words with Certain Part of Speech Tags Improve the Performance of Arabic Text Classification?
Feature extraction - the process of choosing feature types that can represent and discriminate between dataset topics - is one of the critical steps in text classification and varies with the language of the texts. Different feature types have been ...
- Proceedings of the 2nd International Conference on Information System and Data Mining