skip to main content
10.1145/3279996acmotherconferencesBook PagePublication PagesdatasConference Proceedingsconference-collections
DATA '18: Proceedings of the First International Conference on Data Science, E-learning and Information Systems
ACM2018 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
DATA '18: International Conference on Data Science, E-learning and Information Systems 2018 Madrid Spain October 1 - 2, 2018
ISBN:
978-1-4503-6536-9
Published:
01 October 2018
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 20 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the DATA 2018 Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM?s investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.

research-article
Robust face recognition algorithm based on linear operators discrete wavelet transformation and simple linear regression
Article No.: 1, Pages 1–7https://doi.org/10.1145/3279996.3279997

Face recognition system performance would sharply decrease if there were noticeable issues in the face images conditions such as light variation, contrast, and brightness issues that can deeply affect the system performance directly. The process of face ...

research-article
New GRU from convolutional neural network and gated recurrent unit
Article No.: 2, Pages 1–2https://doi.org/10.1145/3279996.3279998

This paper describes our comparison between two deep learning systems. Initially we start with the first system which is used Convolutional Neural Network CNN which we will compare with the second system which is used Gated Recurrent Unit GRU. And ...

research-article
Data distribution method for scalable actionable pattern mining
Article No.: 3, Pages 1–7https://doi.org/10.1145/3279996.3279999

Action Rules are rule based systems for discovering actionable patterns hidden in a large dataset. Action Rules recommend actions that a user or a system can undertake to their advantage, or to accomplish their goal. Current Action Rules extraction ...

research-article
Application of simulators for teaching engineering subject
Article No.: 4, Pages 1–5https://doi.org/10.1145/3279996.3280000

The adoption of new technologies in the teaching of Engineering subjects is really important in our days. Mobile devices (mainly smartphones and tablets) having become widespread, together with the high data transference capacities make this digital ...

research-article
Hardware implementation of a fingerprint recognition algorithm on FPGA cyclone II
Article No.: 5, Pages 1–7https://doi.org/10.1145/3279996.3280001

Securing property and people becomes more and more important as more technology is developed. Although there are several ways to recognize and identify people, biometrics is one of the most reliable ways that is being used more and more thanks to the ...

research-article
Developing a questionnaire to assess prior knowledge of basic statistical concepts in students following a statistics course as part of an engineering degree at an online university
Article No.: 6, Pages 1–6https://doi.org/10.1145/3279996.3280002

This study aims to build a questionnaire to assess initial statistical competence in university students doing Engineering degrees at an online University (Degrees in Industrial Organization Engineering, Computer Engineering and Engineering of ...

research-article
A new approach to computing using informons and holons: towards a theory of computing science
Article No.: 7, Pages 1–7https://doi.org/10.1145/3279996.3280003

The state of computing science and, particularly, software engineering and knowledge engineering is generally considered immature. The best starting point for achieving a mature engineering discipline is a solid scientific theory, and the primary reason ...

research-article
A literature review about sequencing ITIL processes
Article No.: 8, Pages 1–7https://doi.org/10.1145/3279996.3280004

In this paper, we present a review of different approaches for implementing Information Technology Infrastructure Library (ITIL) practices. One of the main issues when implementing ITIL processes is the order of the processes to be implemented. ...

research-article
Assessing conceptual knowledge in three online engineering courses: theory of computation and compiler construction, operating systems, and signal and systems
Article No.: 9, Pages 1–6https://doi.org/10.1145/3279996.3280005

In the current decade understanding conceptual knowledge should be an important area of engineering science. However, it is not as widespread in this field as it is in the areas of education and psychology. Learning conceptual knowledge in engineering ...

research-article
Text steganography in font color of MS excel sheet
Article No.: 10, Pages 1–7https://doi.org/10.1145/3279996.3280006

One of the ways to maintain the security of data transfer over the network is to encrypt the data before sending it, for the purpose of increasing data privacy and its importance. Steganography, is used to hide encrypted data in various documents, the ...

research-article
Comparison of neural network and hausdorff distance methods in American, British and Turkish sign languages recognition
Article No.: 11, Pages 1–6https://doi.org/10.1145/3279996.3280007

This paper demonstrates a comparison between two approaches for developing a universal sign language recognition system. Both proposed approaches were verified for three different sign languages (American Sign Language, British Sign Language and Turkish ...

research-article
Application-based power saving approach for IoT CoAP protocol
Article No.: 12, Pages 1–5https://doi.org/10.1145/3279996.3280008

IoT devices are gaining more importance as they are involved in solving modern world problems in many industries like health, agriculture, manufacturing and many others. The limited power capability of IoT devices drives the research to find new methods ...

research-article
Aspect-oriented requirements engineering: approaches and techniques
Article No.: 13, Pages 1–7https://doi.org/10.1145/3279996.3280009

Aspect Oriented Software Development (AOSD) builds on the concept of Separation of Concerns (SoC). It improves software modularity by encapsulating crosscutting concerns into new units called aspects. Aspect Oriented Requirements Engineering (AORE) is ...

research-article
Thriving social network for communication on elearning: exploring gender differences in attitudes
Article No.: 14, Pages 1–6https://doi.org/10.1145/3279996.3280010

The main objective of this study was to survey online students' attitudes towards communication for eLearning on social network sites. This online survey resulted in 896 valid responses. The statistics for interpreting were percentage, mean, standard ...

research-article
Neural network behavior analysis based on transfer functions MLP & RB in face recognition
Article No.: 15, Pages 1–6https://doi.org/10.1145/3279996.3280011

We performed multi-layer perceptron neural networks MLPNN and Radial Basis neural networks RBNN. In the MLPNN, we applied three layers (input, Hidden, and output) with sigmoid transfer function. Similarly, we used RBNN. Both classifiers are used after ...

research-article
A novel cloudlet-based communication framework for resource-constrained devices
Article No.: 16, Pages 1–6https://doi.org/10.1145/3279996.3280012

In this paper, we present a new emerging technology for building mobility-enhanced and small-scaled mobile to cloud applications called Cloudlet. We address the reliability challenges in affording a powerful computing resources to the mobile ...

research-article
Network intrusion detection through online transformation of eigenvector reflecting concept drift
Article No.: 17, Pages 1–4https://doi.org/10.1145/3279996.3280013

Recently, large amount data streams are increasing. It is difficult to continuously store data and perform the principal component analysis in periodical offline (batch) mode. To solve this problem, there is a need to reflect the concept drift through ...

research-article
A supervised learning framework for learning management systems
Article No.: 18, Pages 1–8https://doi.org/10.1145/3279996.3280014

Educational Data Mining (EDM) and Learning Analytics (LA) focus on data analysis of learners in the context of educational settings like Moodle, a Learning Management System (LMS). Both EDM and LA aim to understand learners and optimise learning ...

research-article
Statistics of the product of three rician random processes with application
Article No.: 19, Pages 1–6https://doi.org/10.1145/3279996.3280015

In this paper, we investigated the statistics of the product of three independent and non-identically distributed Rician random variables (RVs). Although computer simulation can be employed to determine the performance of the product of RVs for ...

research-article
How user perceptions of SAP ERP system change with system experience
Article No.: 20, Pages 1–4https://doi.org/10.1145/3279996.3280016

This study examines how user perceptions of SAP ERP system change as they gain more experience with the system. The study focuses on two perceptual factors: system playfulness as a positive factor and system anxiety as a negative factor. The study uses ...

research-article
Smartphone as data collector in health monitoring
Article No.: 21, Pages 1–4https://doi.org/10.1145/3279996.3280017

Sensing health and well-being parameters from citizens and patients has been an increasing concern in our society. However, since the traditional data collection methods rely mostly on dedicated and expensive equipments, in the recent years, the ...

research-article
A tool for generating synthetic data
Article No.: 22, Pages 1–6https://doi.org/10.1145/3279996.3280018

It is popular to use real-world data to evaluate data mining techniques. However, there are some disadvantages to use real-world data for such purposes. Firstly, real-world data in most domains is difficult to obtain for several reasons, such as budget, ...

research-article
Automated ICD-9-CM medical coding of diabetic patient's clinical reports
Article No.: 23, Pages 1–6https://doi.org/10.1145/3279996.3280019

The assignment of ICD-9-CM codes to patient's clinical reports is a costly and wearing process manually done by medical personnel, estimated to cost about $25 billion per year in the United States. To develop a system that automates this process has ...

research-article
Recognition of genetic mutations in text using deep learning
Article No.: 24, Pages 1–4https://doi.org/10.1145/3279996.3280020

Knowledge about genetic mutations and their impact on the organism is continuously being produced and communicated through scientific publications. This information is then collected by curated databases and integrated in structured knowledge resources, ...

research-article
Mantra: a novel imputation measure for disease classification and prediction
Article No.: 25, Pages 1–5https://doi.org/10.1145/3279996.3280021

Medical record instances can have missing values which makes them unsuitable for learning process. Data Imputation is normally done to fill one or more missing data attribute values. Imputation helps to perform supervised or un-supervised learning after ...

research-article
An efficient cold start solution based on group interests for recommender systems
Article No.: 26, Pages 1–5https://doi.org/10.1145/3279996.3280022

This paper proposes an efficient solution for the cold start problem in recommender systems. This problem occurs with new users who do not have sufficient information in their records. This would cause the recommender system to fail in providing ...

research-article
Fuzzy rule based web service composition in cloud
Article No.: 27, Pages 1–4https://doi.org/10.1145/3279996.3280023

Cloud Computing has drawn much attention in industry due its efficient cost schema along with more prospects such as elasticity and scalability nature of Cloud Computing. One of the main service model of Cloud is Software as Service, where many Web ...

research-article
A comprehensive study on sign languages recognition systems using (SVM, KNN, CNN and ANN)
Article No.: 28, Pages 1–6https://doi.org/10.1145/3279996.3280024

The needs of communities and the new emerging technologies aspire researchers to come up with new and innovative ways to fulfil these needs. Sign languages are said to be a visual language that is used by the deaf community. Undoubtedly, there is a ...

research-article
Ultimate: unearthing latent time profiled temporal associations
Article No.: 29, Pages 1–8https://doi.org/10.1145/3279996.3280025

Discovery of temporal association patterns from temporal databases is extensively studied by academic research community and applied in various industrial applications. Temporal association pattern discovery is extended to similarity based temporal ...

research-article
Kaala vrksha: extending vrksha for time profiled temporal association mining
Article No.: 30, Pages 1–8https://doi.org/10.1145/3279996.3280026

Discovery of frequent itemsets from snapshot databases is most addressed widely in the literature. The support value of itemsets for frequent itemset mining is a numeric value of one dimension. In contrast to traditional frequent pattern mining the ...

Contributors
  • Universidad a distancia de Madrid
  • Jordan University of Science and Technology

Recommendations