No abstract available.
Data Mining Methods for Optimizing Feature Extraction and Model Selection
- Masha Rouzbahman,
- Alexandra Jovicic,
- Lu Wang,
- Leon Zucherman,
- Zahid Abul-Basher,
- Nipon Charoenkitkarn,
- Mark Chignell
How can we carry out on-the-fly data mining on massive amounts of data, to make relevant predictions, based on data for similar observations to the one currently under consideration? In this paper we show the benefit of using large numbers of ...
Gamifying MOOC's a Step in The Right Direction?: A Systematic Literature Review
Massive Open Online Courses (MOOC) are gaining in popularity in recent years. However, there are certain well-known drawbacks of MOOCs like lack of student motivation, student engagement, and high dropout rates, which cast doubt on the success of MOOCs. ...
Exploration of Hardware Architectures for String Matching Algorithms in Network Intrusion Detection Systems
An intrusion detection system monitors and analyzes all the incoming packets, on a given network, to detect any corresponding vulnerabilities and intrusions. It consists of four major modules: packet capturing, packet decoding, packet preprocessing and ...
Robust LCSS Beamformer against DOA Mismatch
To cancel interference signals that have fluctuated orientation of directions, the LCSS (Linear Constrained Sector Suppressed) approach is a null broadening beamforming based on the correlation matrix of the steering vectors on the predefined sector of ...
User Behavior Analytics for Anomaly Detection Using LSTM Autoencoder - Insider Threat Detection
Identifying anomalies from log data for insider threat detection is practically a very challenging task for security analysts. User behavior modeling is very important for the identification of these anomalies. This paper presents unsupervised user ...
Automated Scheduling of Undergraduate Student Advising Reservation using Extended Flower Pollination Algorithm
Academic advising is an important process to assist undergraduate students in their academic life because it provides students the direction about personal, social, and educational concerns. However, the traditional process that an advisor manually ...
Enhancement of Fault Tolerance in Kafka Pipeline Architecture
Fault tolerance act as the most important factor to improve the reliability of the real-time messaging system. Checkpointing and replication are the main factors to promote the performance of fault tolerance. The paper emphasizes the message recovery ...
A System to Estimate the Amount and Calories of Food that Elderly People in the Hospital Consume
Malnutrition in the elderly is an important issue, especially for the elderly in hospitals. In general, nutritionists calculate energy from foods that the elderly need each day. If the elderly eat less food and do not receive enough energy, ...
AcaChain: Academic Credential Attestation System using Blockchain
Blockchain has been a part of people's interest in the development of various areas such as digital currencies (e.g., Bitcoin), securities, healthcare, record-keeping and much more. Some of the key features of blockchain technology are immutability, ...
ThaiFlick: Flicked Keyboard on Mobile Devices for Thai using Phoneme Matching
Composing messages with virtual keyboard is a challenging task especially for Thai messages. There are too many Thai characters to fit a mobile keyboard. Moreover, screens of smartphones are so small that those having big fingers frequently tap on ...
Reversible Data Hiding Using Multi-Layer Perceptron Based Pixel Prediction
Reversible data hiding is a branch of data hiding in which cover image can additionally be restored along with the extraction of hidden data. In prediction error expansion based reversible data hiding techniques, pixel values are predicted using the ...
ARMA Model for Revenue Prediction
For every country in over the world, tax revenues appear to be the main engines contributing to the growth momentum. The prediction of tax revenues is one of the main challenges of the Myanmar Internal Revenue Department. It is not easy to get an ...
A data augmentation technique based on text for Vietnamese sentiment analysis
Online opinions are used as a data source that contains relevant information about customer sentiments toward a product or service. This can be used to make a specific decision for customers and management. In order to achieve the good models for ...
Comparative Performance of Various Deep Learning based Models in Fruit Image Classification
Fruit type classification based on computer vision remains challenging because of shape, color and texture similarity among numerous species of fruits. Recent research results indicate that the Convolutional Neural Network based models have demonstrated ...
Privacy Protection in Smart Health
Smart health exploits smart health devices (e.g., fitness trackers, heart rate or glucose monitoring units) and Internet of Things technologies to improve users' health and wellness. By enabling self-monitoring and data sharing among users and ...
Visual Features for Multivariate Time Series
Visual analytics combines the capabilities of computers and humans to explore the insight of data. It provides coupling interactive visual representations with underlying analytical processes (e.g., visual feature extraction) so that users can utilize ...
Articulated Trajectory Mapping Using Mobile Environments for Location-Based Learning
This paper addresses how to enhance post-tour activities with digital mobile devices. Walkers sometimes use GPS loggers to record, review, and share their walking stories. However, the raw trajectory data recorded can be difficult to browse through on a ...
Predicting Application Performance in LoRa IoT Networks
Network planning is critical to satisfactory application performance and efficient network resource utilization especially in an outdoor IoT network such as LoRa. As IoT devices may locate at different distances from the gateway and use different ...
Using LSTM for Context Based Approach of Sarcasm Detection in Twitter
In this research, we propose a sarcasm detection by taking into consideration its many varying contexts, related to the word or phrase in a tweet. To get the related context, we extract the information with paragraph2vec to simplify the process of ...
The Impact of Data Imputation and Feature Extraction on PM2.5 Forecasting Performance in Bangkok Using Long Short-Term Memory Neural Networks
The last few years have seen a dramatic increase in PM2.5 air pollution in Thailand's major cities. Various works have tried to develop efficient Long Short-Term Memory (LSTM) deep neural network models for PM2.5 concentration forecasting. However, ...
Network Anomaly Detection using Threshold-based Sparse
Nowadays, cyber-attacks have been dramatically increased due to the rapid development of Internet-based services. The current network anomaly detection solutions such as Firewall, Snort, honeypots are useful, but they are insufficient to deal with zero-...
A Data Masking Guideline for Optimizing Insights and Privacy Under GDPR Compliance
The General Data Protection Regulation (GDPR) has been enforced since May 2019 and became a disruptive issue to every organization due to its severe penalties in the data breaches or use of personal data for illegal purposes, e.g., lack of the consent ...
Health Data Analytics with an Opportunistic Big Data Algorithm
In data-driven society, health data can lead to profound impacts on public safety policies, epidemic modeling, and advancement of health science and medicine. This paper presents an approach to automatically elucidating useful information from "Big" ...
Provenance Location-based Authentication in Cloud Computing
Cloud computing will continue flourishing. Like any technology that is widely used and advancing with many benefits, it also comes with issues, some of which are unavoidable. Security is one of the major concerns for cloud computing. To protect user ...
Digital Rock Core Image Super-Resolution via Deep Convolutional Neural Networks
Digital Rock is a research hotspot in the field of oil and gas. In practice, oil and gas departments hope to get clearer images of rock core which are helpful for them to understand characteristics of reservoir rock better. And based on that they can ...
Social Engineering Intrusion: A Case Study
Social engineering is a very old method to influence people in their daily actions. The same methods added with new techniques have been implemented to create effective penetration mechanisms against organizations. The goal in this study was to measure ...
Online Learning During COVID-19: Students' Perception of Multimedia Quality
The COVID-19 pandemic has forced educational institutes worldwide to resort to an "online only" mode of teaching delivery. As a consequence, throughout the globe there has been an increasing trend among the students to use different videoconferencing ...
Paying by Your Messaging Application?: A Trust Model
User adoption of mobile payments is low when compared to the traditional payment methods. At the same time, there has been a surge in the usage of second-generation mobile instant messaging (SMIM) services. Integrating these two services can be a game ...
A 3D-CNN Siamese Network for Motion Gesture Sign Language Alphabets Recognition
Sign language recognition is developed for assisting hearing- and speech-impaired people who communicate with others by using hand gestures as a nonverbal communication. The system aims to translate still images or video frames of sign gestures to a ...
Hybrid Classroom: Designing for the New Normal after COVID-19 Pandemic
In the end of December 2019, there was a reported of novel coronavirus in Wuhan, China. Later, this virus named COVID-19 became one of a major outbreak of the world. Since the virus can be spread through the air, the social distancing is essential. Many ...
Index Terms
- Proceedings of the 11th International Conference on Advances in Information Technology
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
IAIT '18 | 47 | 20 | 43% |
Overall | 47 | 20 | 43% |