NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the DATA 2018 Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM?s investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.
Proceeding Downloads
Robust face recognition algorithm based on linear operators discrete wavelet transformation and simple linear regression
Face recognition system performance would sharply decrease if there were noticeable issues in the face images conditions such as light variation, contrast, and brightness issues that can deeply affect the system performance directly. The process of face ...
New GRU from convolutional neural network and gated recurrent unit
This paper describes our comparison between two deep learning systems. Initially we start with the first system which is used Convolutional Neural Network CNN which we will compare with the second system which is used Gated Recurrent Unit GRU. And ...
Data distribution method for scalable actionable pattern mining
Action Rules are rule based systems for discovering actionable patterns hidden in a large dataset. Action Rules recommend actions that a user or a system can undertake to their advantage, or to accomplish their goal. Current Action Rules extraction ...
Application of simulators for teaching engineering subject
The adoption of new technologies in the teaching of Engineering subjects is really important in our days. Mobile devices (mainly smartphones and tablets) having become widespread, together with the high data transference capacities make this digital ...
Hardware implementation of a fingerprint recognition algorithm on FPGA cyclone II
Securing property and people becomes more and more important as more technology is developed. Although there are several ways to recognize and identify people, biometrics is one of the most reliable ways that is being used more and more thanks to the ...
Developing a questionnaire to assess prior knowledge of basic statistical concepts in students following a statistics course as part of an engineering degree at an online university
This study aims to build a questionnaire to assess initial statistical competence in university students doing Engineering degrees at an online University (Degrees in Industrial Organization Engineering, Computer Engineering and Engineering of ...
A new approach to computing using informons and holons: towards a theory of computing science
- F. David de la Peña Esteban,
- Juan A. Lara Torralbo,
- David Lizcano Casas,
- M. Aurora Martínez Rey,
- Juan Pazos Sierra
The state of computing science and, particularly, software engineering and knowledge engineering is generally considered immature. The best starting point for achieving a mature engineering discipline is a solid scientific theory, and the primary reason ...
A literature review about sequencing ITIL processes
In this paper, we present a review of different approaches for implementing Information Technology Infrastructure Library (ITIL) practices. One of the main issues when implementing ITIL processes is the order of the processes to be implemented. ...
Assessing conceptual knowledge in three online engineering courses: theory of computation and compiler construction, operating systems, and signal and systems
In the current decade understanding conceptual knowledge should be an important area of engineering science. However, it is not as widespread in this field as it is in the areas of education and psychology. Learning conceptual knowledge in engineering ...
Text steganography in font color of MS excel sheet
One of the ways to maintain the security of data transfer over the network is to encrypt the data before sending it, for the purpose of increasing data privacy and its importance. Steganography, is used to hide encrypted data in various documents, the ...
Comparison of neural network and hausdorff distance methods in American, British and Turkish sign languages recognition
This paper demonstrates a comparison between two approaches for developing a universal sign language recognition system. Both proposed approaches were verified for three different sign languages (American Sign Language, British Sign Language and Turkish ...
Application-based power saving approach for IoT CoAP protocol
IoT devices are gaining more importance as they are involved in solving modern world problems in many industries like health, agriculture, manufacturing and many others. The limited power capability of IoT devices drives the research to find new methods ...
Aspect-oriented requirements engineering: approaches and techniques
Aspect Oriented Software Development (AOSD) builds on the concept of Separation of Concerns (SoC). It improves software modularity by encapsulating crosscutting concerns into new units called aspects. Aspect Oriented Requirements Engineering (AORE) is ...
Thriving social network for communication on elearning: exploring gender differences in attitudes
The main objective of this study was to survey online students' attitudes towards communication for eLearning on social network sites. This online survey resulted in 896 valid responses. The statistics for interpreting were percentage, mean, standard ...
Neural network behavior analysis based on transfer functions MLP & RB in face recognition
We performed multi-layer perceptron neural networks MLPNN and Radial Basis neural networks RBNN. In the MLPNN, we applied three layers (input, Hidden, and output) with sigmoid transfer function. Similarly, we used RBNN. Both classifiers are used after ...
A novel cloudlet-based communication framework for resource-constrained devices
In this paper, we present a new emerging technology for building mobility-enhanced and small-scaled mobile to cloud applications called Cloudlet. We address the reliability challenges in affording a powerful computing resources to the mobile ...
Network intrusion detection through online transformation of eigenvector reflecting concept drift
Recently, large amount data streams are increasing. It is difficult to continuously store data and perform the principal component analysis in periodical offline (batch) mode. To solve this problem, there is a need to reflect the concept drift through ...
A supervised learning framework for learning management systems
Educational Data Mining (EDM) and Learning Analytics (LA) focus on data analysis of learners in the context of educational settings like Moodle, a Learning Management System (LMS). Both EDM and LA aim to understand learners and optimise learning ...
Statistics of the product of three rician random processes with application
In this paper, we investigated the statistics of the product of three independent and non-identically distributed Rician random variables (RVs). Although computer simulation can be employed to determine the performance of the product of RVs for ...
How user perceptions of SAP ERP system change with system experience
This study examines how user perceptions of SAP ERP system change as they gain more experience with the system. The study focuses on two perceptual factors: system playfulness as a positive factor and system anxiety as a negative factor. The study uses ...
Smartphone as data collector in health monitoring
Sensing health and well-being parameters from citizens and patients has been an increasing concern in our society. However, since the traditional data collection methods rely mostly on dedicated and expensive equipments, in the recent years, the ...
A tool for generating synthetic data
It is popular to use real-world data to evaluate data mining techniques. However, there are some disadvantages to use real-world data for such purposes. Firstly, real-world data in most domains is difficult to obtain for several reasons, such as budget, ...
Automated ICD-9-CM medical coding of diabetic patient's clinical reports
The assignment of ICD-9-CM codes to patient's clinical reports is a costly and wearing process manually done by medical personnel, estimated to cost about $25 billion per year in the United States. To develop a system that automates this process has ...
Recognition of genetic mutations in text using deep learning
Knowledge about genetic mutations and their impact on the organism is continuously being produced and communicated through scientific publications. This information is then collected by curated databases and integrated in structured knowledge resources, ...
Mantra: a novel imputation measure for disease classification and prediction
Medical record instances can have missing values which makes them unsuitable for learning process. Data Imputation is normally done to fill one or more missing data attribute values. Imputation helps to perform supervised or un-supervised learning after ...
An efficient cold start solution based on group interests for recommender systems
This paper proposes an efficient solution for the cold start problem in recommender systems. This problem occurs with new users who do not have sufficient information in their records. This would cause the recommender system to fail in providing ...
Fuzzy rule based web service composition in cloud
Cloud Computing has drawn much attention in industry due its efficient cost schema along with more prospects such as elasticity and scalability nature of Cloud Computing. One of the main service model of Cloud is Software as Service, where many Web ...
A comprehensive study on sign languages recognition systems using (SVM, KNN, CNN and ANN)
The needs of communities and the new emerging technologies aspire researchers to come up with new and innovative ways to fulfil these needs. Sign languages are said to be a visual language that is used by the deaf community. Undoubtedly, there is a ...
Ultimate: unearthing latent time profiled temporal associations
Discovery of temporal association patterns from temporal databases is extensively studied by academic research community and applied in various industrial applications. Temporal association pattern discovery is extended to similarity based temporal ...
Kaala vrksha: extending vrksha for time profiled temporal association mining
Discovery of frequent itemsets from snapshot databases is most addressed widely in the literature. The support value of itemsets for frequent itemset mining is a numeric value of one dimension. In contrast to traditional frequent pattern mining the ...