No abstract available.
Proceeding Downloads
A new deep learning model based on improved alexnet for radiation source target recognition
For the need of accurate radiation source target recognition, incorporating machine learning technology represented by deep learning, this paper explores a new mechanism and methods of intelligent learning which considering the characteristics of ...
Kernelized eigenspace based fuzzy C-means for sensing trending topics on Twitter
One of the automated methods for textual data analysis is topic detection. Eigenspace-based fuzzy c-means (EFCM) is a soft clustering-based method for topic detection. Firstly, EFCM uses truncated singular value decomposition to transform high ...
Basketview: interactive visualization of NBA games
Big data analysis is revolutionizing professional basketball, influencing everything from game strategy to player conditioning. To help understand the underlying information, data visualization techniques are used to display data in a straight forward ...
Analysis of convolution neural network for transfer learning of sentiment analysis in Indonesian tweets
Sentiment analysis is an activity to classify public opinion about entities in textual data into positive or negative. One of the automatic methods for sentiment analysis is convolution neural network (CNN). CNN consists of many layers with many ...
Comment on "cryptanalysis of a novel ultralightweight mutual authentication protocol for IoT devices using RFID tags"
To protect the security of IoT devices, Tewari and Gupta proposed an ultralightweight mutual-authentication protocol for an RFID system. In the protocol, only two simple bitwise operations (XOR and rotation) are used to achieve two-pass mutual ...
e-government concept from cabal to community: a demand side perspective in the philippines utilizing information technology systems
E-government in the Philippines is a recent development that aims to utilize the benefits of technology to provide improved and quality service to the citizens. The researcher tends to respond to produce demand-side oriented assessment of e-government ...
A preprocessing matrix factorization on collaborative filtering based library book recommendation system
Nowadays, recommendation systems are widely used to recommend items to the users that are specific to their individual preferences and most appropriate. For this reason, many academic libraries try to establish an effectiveness and efficiency book ...
An ensemble outlier detection method for multiclass classification problem in data mining
We proposed to develop a heterogeneous ensemble method that boost the performance of random forest classifier. The proposed method utilized the boosting capability of adaboost algorithm and the feature selection and bagging capability of random subspace ...
The guidelines to support the development of enterprise architecture of state enterprise
The challenge of developing internal processes of the state enterprises is to apply Information and communication technology to develop enterprise architecture, to improve more performance, and to archive the business objectives of the organization [1]. ...
Towards academic affect modeling through experimental hybrid gesture recognition algorithm
The identification of learner engagement is an important aspect of assessment. Aside from facial expressions, gesture is a key feature in the identification of student engagement. The costly video invigilation during assessment shows the need to find ...
A hybrid approach towards improved artificial neural network training for short-term load forecasting
The power of artificial neural networks to form predictive models for phenomenon that exhibit non-linear relationships is a given fact. Despite this advantage, artificial neural networks are known to suffer drawbacks such as long training times and ...
Modelling carbon footprint on smartphone usage for social networking
The smartphone usage seems to be an important thing in a present day. The social network is also one of the crucial application (apps) used on smartphone. This usage increasingly impacts on the environmental quality. The more social network usage over ...
Enhanced RC6 permutation-diffusion operation for image encryption
RC6 is considered one of the encryption strategies being utilized and modified to be suited for image protection. However, the RC6 encryption algorithm is still prone to statistical and differential attack which is one of the major concerns whenever ...
Data intensive parallel tree algorithm patterns based on GPUs
Technology improvements as well as demographic expansion implies an increase on the amount of information that needs processing. With this necessity, it becomes apparent that the use of algorithms capable of handle such amount of information is a must ...
Application of enhanced expectation maximization (EnEM) algorithm for image segmentation
An Enhanced EM (EnEM) algorithm was developed through the integration of the concept of firefly movement and light intensity of Firefly Algorithm in its initialization stage. The improved initial parameter selection technique of EnEM algorithm leads to ...
An implementation of graph mining to find the group evolution in communication data record
In this paper, we show how to utilize communication transaction data to generate useful knowledge using graph mining. Knowledge in question is a model that can be used to know the group contained in an organization and the evolution of the group from ...
Prediction of student learning style using modified decision tree algorithm in e-learning system
Learning style is an important factor that accounts for the individual student learning in any learning environment. Every student has a different learning style and different ways to percept, process, retain and understand new information. In this ...
Adaptive steplength memory firefly algorithm for solving reaction process dynamic control system problems
Chemical reaction system, dynamic operation can significantly increase the average rate of reaction, improve the time-average selectivity of complex reactions and enhance the molecular weight distribution of certain free-radical polymerization reactions,...
Application of data mining for young children education using emotion information
The current preschool education is still facing many difficulties. First, unlike primary and secondary schools which have test scores, there are few good ways to assess the learning situation of young children. Second, it is hard for teachers and ...
Study on big data framework for product design
With the arrival of the intelligent era, Big Data will play an increasingly important role in all aspects of product design. In the product design stage, comprehensive evaluations such as product quality assessment and social demand exploration are ...
The establishment of diabetes diet classification model based on BL_WSmote
This paper analyzes the daily diet recipe of diabetes from traditional Chinese medicine diet, and establishes a model to determine the type of diabetes. The process of building a model is as follows. Firstly, use improved Smote algorithm to do data ...
A new dual network generating algorithm for epidemic
Dual networks have been used to describe the interplay between different diffusion processes. In order to study the interaction between the propagation processes, research efforts have been paid on the study of its topological and dynamical properties. ...
Privacy preserving through aggregating wave equation as noise in differential privacy
The Differential Privacy (DP) is the well-known definition of privacy preserving in data mining. To preserve the privacy of the private or sensitive data, DP aggregates negligible noise to original data. The existing differential privacy uses Laplace ...
The design of the intelligent-agriculture control system based on the ecological-data analysis
The intelligent-agriculture control system is implemented under the precondition of ecological data analysis. The control system of the intelligent agriculture is composed of five parts, including the hardware parts, the local control terminal, the ...
The research and implementation of remote-monitoring intelligent vehicle system based on internet of things
The remote-monitoring intelligent vehicle system based on the IOT can focus on the technologies of environment monitoring, auxiliary driving, and wireless network. It can realize the real-time data transmission and man-machine interaction in real time. ...
Topic-graph based recommendation on social tagging systems: a study on research gate
Social Tagging Systems (STSs), allowing users to annotate online resources with freely chosen key words, are an essential type of application in Web 2.0. Recommendation in STSs can prevent information overload and support users to locate relevant items ...
A data reduction approach using hyperspherical sectors for support vector machine
In this paper, a new geometrical approach is proposed for data reduction to speed up the training of support vector machine (SVM) for large data sets. In this approach, the largest possible hyperspherical sector centered at each pattern and containing ...
Valid context detection based on context filter in context-aware recommendation system
Context as a kind of quite important information plays a significant role in context-aware recommendation system (CARS). Many studies have been proved that context help promote to improve the effectiveness of recommendations. But a serious challenge has ...
The research and application of oil and gas production safety early-warning based on large data analysis technology
Since the abnormal state of the oil and gas production process or equipment may lead to major accidents, this paper proposes oil and gas production operation safety early warning strategy based on big data analysis technology. Firstly, analyzing ...
Data analysis of expressway under single point accident based on dynamic speed control
Expressways serve continuous traffic flow, while single-point traffic accidents have a greater impact on traffic efficiency and safety. The vehicle in single-point incident occupies a certain lane, and the accident road forms a traffic bottleneck, which ...
Index Terms
- Proceedings of the 2018 International Conference on Data Science and Information Technology