skip to main content
10.1145/3239283acmotherconferencesBook PagePublication PagesdsitConference Proceedingsconference-collections
DSIT '18: Proceedings of the 2018 International Conference on Data Science and Information Technology
ACM2018 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
DSIT2018: 2018 International Conference on Data Science and Information Technology Singapore Singapore July 20 - 22, 2018
ISBN:
978-1-4503-6521-5
Published:
20 July 2018

Bibliometrics
Abstract

No abstract available.

Proceeding Downloads

research-article
A new deep learning model based on improved alexnet for radiation source target recognition

For the need of accurate radiation source target recognition, incorporating machine learning technology represented by deep learning, this paper explores a new mechanism and methods of intelligent learning which considering the characteristics of ...

research-article
Kernelized eigenspace based fuzzy C-means for sensing trending topics on Twitter

One of the automated methods for textual data analysis is topic detection. Eigenspace-based fuzzy c-means (EFCM) is a soft clustering-based method for topic detection. Firstly, EFCM uses truncated singular value decomposition to transform high ...

research-article
Basketview: interactive visualization of NBA games

Big data analysis is revolutionizing professional basketball, influencing everything from game strategy to player conditioning. To help understand the underlying information, data visualization techniques are used to display data in a straight forward ...

research-article
Analysis of convolution neural network for transfer learning of sentiment analysis in Indonesian tweets

Sentiment analysis is an activity to classify public opinion about entities in textual data into positive or negative. One of the automatic methods for sentiment analysis is convolution neural network (CNN). CNN consists of many layers with many ...

research-article
Comment on "cryptanalysis of a novel ultralightweight mutual authentication protocol for IoT devices using RFID tags"

To protect the security of IoT devices, Tewari and Gupta proposed an ultralightweight mutual-authentication protocol for an RFID system. In the protocol, only two simple bitwise operations (XOR and rotation) are used to achieve two-pass mutual ...

research-article
e-government concept from cabal to community: a demand side perspective in the philippines utilizing information technology systems

E-government in the Philippines is a recent development that aims to utilize the benefits of technology to provide improved and quality service to the citizens. The researcher tends to respond to produce demand-side oriented assessment of e-government ...

research-article
A preprocessing matrix factorization on collaborative filtering based library book recommendation system

Nowadays, recommendation systems are widely used to recommend items to the users that are specific to their individual preferences and most appropriate. For this reason, many academic libraries try to establish an effectiveness and efficiency book ...

research-article
An ensemble outlier detection method for multiclass classification problem in data mining

We proposed to develop a heterogeneous ensemble method that boost the performance of random forest classifier. The proposed method utilized the boosting capability of adaboost algorithm and the feature selection and bagging capability of random subspace ...

research-article
The guidelines to support the development of enterprise architecture of state enterprise

The challenge of developing internal processes of the state enterprises is to apply Information and communication technology to develop enterprise architecture, to improve more performance, and to archive the business objectives of the organization [1]. ...

research-article
Towards academic affect modeling through experimental hybrid gesture recognition algorithm

The identification of learner engagement is an important aspect of assessment. Aside from facial expressions, gesture is a key feature in the identification of student engagement. The costly video invigilation during assessment shows the need to find ...

research-article
A hybrid approach towards improved artificial neural network training for short-term load forecasting

The power of artificial neural networks to form predictive models for phenomenon that exhibit non-linear relationships is a given fact. Despite this advantage, artificial neural networks are known to suffer drawbacks such as long training times and ...

research-article
Modelling carbon footprint on smartphone usage for social networking

The smartphone usage seems to be an important thing in a present day. The social network is also one of the crucial application (apps) used on smartphone. This usage increasingly impacts on the environmental quality. The more social network usage over ...

research-article
Enhanced RC6 permutation-diffusion operation for image encryption

RC6 is considered one of the encryption strategies being utilized and modified to be suited for image protection. However, the RC6 encryption algorithm is still prone to statistical and differential attack which is one of the major concerns whenever ...

research-article
Data intensive parallel tree algorithm patterns based on GPUs

Technology improvements as well as demographic expansion implies an increase on the amount of information that needs processing. With this necessity, it becomes apparent that the use of algorithms capable of handle such amount of information is a must ...

research-article
Application of enhanced expectation maximization (EnEM) algorithm for image segmentation

An Enhanced EM (EnEM) algorithm was developed through the integration of the concept of firefly movement and light intensity of Firefly Algorithm in its initialization stage. The improved initial parameter selection technique of EnEM algorithm leads to ...

research-article
An implementation of graph mining to find the group evolution in communication data record

In this paper, we show how to utilize communication transaction data to generate useful knowledge using graph mining. Knowledge in question is a model that can be used to know the group contained in an organization and the evolution of the group from ...

research-article
Prediction of student learning style using modified decision tree algorithm in e-learning system

Learning style is an important factor that accounts for the individual student learning in any learning environment. Every student has a different learning style and different ways to percept, process, retain and understand new information. In this ...

research-article
Adaptive steplength memory firefly algorithm for solving reaction process dynamic control system problems

Chemical reaction system, dynamic operation can significantly increase the average rate of reaction, improve the time-average selectivity of complex reactions and enhance the molecular weight distribution of certain free-radical polymerization reactions,...

research-article
Application of data mining for young children education using emotion information

The current preschool education is still facing many difficulties. First, unlike primary and secondary schools which have test scores, there are few good ways to assess the learning situation of young children. Second, it is hard for teachers and ...

research-article
Study on big data framework for product design

With the arrival of the intelligent era, Big Data will play an increasingly important role in all aspects of product design. In the product design stage, comprehensive evaluations such as product quality assessment and social demand exploration are ...

research-article
The establishment of diabetes diet classification model based on BL_WSmote

This paper analyzes the daily diet recipe of diabetes from traditional Chinese medicine diet, and establishes a model to determine the type of diabetes. The process of building a model is as follows. Firstly, use improved Smote algorithm to do data ...

research-article
A new dual network generating algorithm for epidemic

Dual networks have been used to describe the interplay between different diffusion processes. In order to study the interaction between the propagation processes, research efforts have been paid on the study of its topological and dynamical properties. ...

research-article
Privacy preserving through aggregating wave equation as noise in differential privacy

The Differential Privacy (DP) is the well-known definition of privacy preserving in data mining. To preserve the privacy of the private or sensitive data, DP aggregates negligible noise to original data. The existing differential privacy uses Laplace ...

research-article
The design of the intelligent-agriculture control system based on the ecological-data analysis

The intelligent-agriculture control system is implemented under the precondition of ecological data analysis. The control system of the intelligent agriculture is composed of five parts, including the hardware parts, the local control terminal, the ...

research-article
The research and implementation of remote-monitoring intelligent vehicle system based on internet of things

The remote-monitoring intelligent vehicle system based on the IOT can focus on the technologies of environment monitoring, auxiliary driving, and wireless network. It can realize the real-time data transmission and man-machine interaction in real time. ...

research-article
Topic-graph based recommendation on social tagging systems: a study on research gate

Social Tagging Systems (STSs), allowing users to annotate online resources with freely chosen key words, are an essential type of application in Web 2.0. Recommendation in STSs can prevent information overload and support users to locate relevant items ...

research-article
A data reduction approach using hyperspherical sectors for support vector machine

In this paper, a new geometrical approach is proposed for data reduction to speed up the training of support vector machine (SVM) for large data sets. In this approach, the largest possible hyperspherical sector centered at each pattern and containing ...

research-article
Valid context detection based on context filter in context-aware recommendation system

Context as a kind of quite important information plays a significant role in context-aware recommendation system (CARS). Many studies have been proved that context help promote to improve the effectiveness of recommendations. But a serious challenge has ...

research-article
The research and application of oil and gas production safety early-warning based on large data analysis technology

Since the abnormal state of the oil and gas production process or equipment may lead to major accidents, this paper proposes oil and gas production operation safety early warning strategy based on big data analysis technology. Firstly, analyzing ...

research-article
Data analysis of expressway under single point accident based on dynamic speed control

Expressways serve continuous traffic flow, while single-point traffic accidents have a greater impact on traffic efficiency and safety. The vehicle in single-point incident occupies a certain lane, and the accident road forms a traffic bottleneck, which ...

Index Terms

  1. Proceedings of the 2018 International Conference on Data Science and Information Technology
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Acceptance Rates

    DSIT '18 Paper Acceptance Rate31of85submissions,36%Overall Acceptance Rate114of277submissions,41%
    YearSubmittedAcceptedRate
    DSIT 2020974041%
    DSIT 2019954345%
    DSIT '18853136%
    Overall27711441%