


default search action
DSIT 2019: Seoul, South Korea
- Proceedings of the 2nd International Conference on Data Science and Information Technology, DSIT 2019, Seoul, South Korea, July 19-21, 2019. ACM 2019, ISBN 978-1-4503-7141-4

- Ran Li, Lijuan Zhou, Shudong Zhang, Hui Liu, Xiangyang Huang, Zhong Sun:

Software Defect Prediction Based on Ensemble Learning. 1-6 - Ching-Seh Mike Wu, Mustafa Badshah, Vishwa Bhagwat:

Heart Disease Prediction Using Data Mining Techniques. 7-11 - Miguel Oliveira

, Daniel Afonso
:
Industry Focused in Data Collection: How Industry 4.0 is Handled by Big Data. 12-18 - Mengqi Gao, Zhong Sun:

Analysis of the Demand for Teaching Design of Rural Teachers in the WeChat group. 19-24 - Chung Min Tae, Phan Duy Hung

:
Comparing ML Algorithms on Financial Fraud Detection. 25-29 - Farashazillah Yahya

, Bashirah Mohd Fazli, Mohd Fikri Abdullah, Harlisa Zulkifli:
Extending the National Lake Database of Malaysia (MyLake) as a Central Data Exchange using Big Data Integration. 30-35 - Xuefeng Liang, Song Tong, Takatsune Kumada, Yuen Peng Loh

:
Understanding the Photo-shooting Patterns of Sightseeing. 36-41 - Norma J. Apao

, Larmie S. Feliscuzo
, Cherry Lyn Cando Sta. Romana:
Developing a Patient Information and Descriptive Analytics System for Data Actors of University of Bohol Medical and Rehabilitation Center: Towards Policy Making. 42-48 - Yi-Qi Gui, Shuang-shuang Ju:

Cache Replacement Strategy Based on Association Rules in P2P Streaming Media System. 49-53 - Naisong Zheng, Xiaowei Jiang, Yibo Ao, Xi Zhao:

Prediction of Tariff Package Model Using ROF-LGB Algorithm. 54-58 - Jiazhao Li, Jiuxia Zhao

, Minjia Mao, Xi Zhao, Jianhua Zou:
Exploring the Prediction of Variety-seeking Behavior. 59-63 - Kus Andriadi, Widia Resti Fitriani, Achmad Nizar Hidayanto, Puspa Indahati Sandhyaduhita, Rahmat M. Samik-Ibrahim:

Analysis of Factors Influencing Consumer Intention to Buy in S-Commerce Business. 64-70 - Shuoqiu Yang, Chaojun Xu:

Research on Constructing Sentiment Dictionary of Online Course Reviews based on Multi-source Combination. 71-76 - Chengtao Wang

, Wei Li:
Improved PSO-NN Prediction Model for Corrosion Current Density Under the Stray Current Excitation Based on Data Mining Technique. 77-84 - Silumpa Arnupapsanyakorn, Chotirat Ann Ratanamahatana:

An Enhanced Time Series Classification Using Linear-Regression Based Shape Descriptor. 85-91 - Harwin Prahara, Achmad Nizar Hidayanto, Ika Chandra Hapsari:

What Makes User Switch Technology?: Enabler and Inhibitor Factors of Converting to Mobile Application. 92-97 - Yuming Chen, Wei Li, Zhuoyin Si:

An Improved Pedestrian Motion Tracking System Assisted by Machine Learning? 98-103 - Ligar Patra Yuniar, Achmad Nizar Hidayanto, Yova Ruldeviyani, Nur Fitriah Ayuning Budi:

The Determinants of Consumer Purchase Intention of Online Game Voucher: A Case Study of UPoint Online Store. 104-110 - Betty Purwandari

, Briant Otmen, Larastri Kumaralalita
:
Adoption Factors of E-Marketplace and Instagram for Micro, Small, and Medium Enterprises (MSMEs) in Indonesia. 111-116 - Ronielle B. Antonio

, Ariel M. Sison, Ruji P. Medina
:
Performance Analysis of the Modified Generated S-Box for Advanced Encryption Standards. 117-121 - Bintang Glenn Julian, Indra Budi, Dipta Tanaya:

Performance of DKI Jakarta Governor and Vice Governor on 2017-2018 based on Sentiment Analysis using Twitter and Instagram Data. 122-127 - Nur Indah Pratiwi, Indra Budi, Meganingrum Arista Jiwanggi:

Hate Speech Identification using the Hate Codes for Indonesian Tweets. 128-133 - Qi Li, Yu Xie:

A Behavior-cluster Based Imbalanced Classification Method for Credit Card Fraud Detection. 134-139 - Yunfei Liu, Jing Li, Zhao Li, Lin Qiao, Shuo Chen, Xuming Lv:

Transformer Fault Diagnosis Model Based on Iterative Nearest Neighbor Interpolation and Ensemble Learning. 140-146 - Mansi Sharma

, Jongtae Lim:
A Survey of Methods Guaranteeing User Privacy based on Blockchain in Internet-of -Things. 147-153 - Manocher C. Alipour, Bobby D. Gerardo

, Ruji P. Medina
:
A Secure Image Encryption Architecture Based on Pseudorandom Number Generator and Chaotic Logistic Map. 154-159 - Dechang Wang, Buyang Cao, Zhenfang Chu:

Individual Characteristics Analytical Models based on Deep Learning, Trajectory and Social Network Data. 160-167 - Zhihong Wang, Buyang Cao:

Prediction of Office Building Rental upon Spatiotemporal Data. 168-174 - Marzieh Zare, Ari Visa

, Sirpa Launis, Mikko Huova
:
Real-time Online Drilling Vibration Analysis Using Data Mining. 175-180 - Tingxuan Su

, Raymond Yiu-Keung Lau:
Collective Classification for Social Opinion Spam Detection. 181-186 - Xiyue Chen, Jianmin Pang:

A Novelty Network Attack Detection Model based on Immunology. 187-196 - Biao Wang, Xin Yuan, Jinwei Li, Shun Li:

An Improved Clustering Algorithm based on Single-pass. 197-203 - Qing Li, Xiangtao Chen

, Ronghui Wu:
Mining Contrast Sequential Patterns based on Subsequence Location Distribution from Biological Sequences. 204-209 - Kun Yu, Peng Xu, Shuaifei Song, Huabin Feng, Shiyang Qiu, Hengchang Liu:

Location Traceability of Social Media Analysis in Urban Complex. 210-218 - Haoze Wang, Yutong Si:

Detection of Traffic Abnormity Based on Clustering Analysis of Taxi GPS Data. 219-224 - Hui Liu, Xiaobo Ye, Zhijun Meng, Lijuan Zhou, Zhong Sun:

An Agricultural Machinery Operation Monitoring System Based on IoT. 225-229 - Jovy Jay D. Cabrera, Ariel M. Sison, Ruji P. Medina

:
Centroid 360: An Enhanced Centroid Initialization Method for K Means Algorithm. 230-235 - Jun He, Jingyuan Wang, Yizhi Luo:

Deep Architectures for Crowd Flow Prediction. 236-241 - Sheng Zhang, Xueliang Tan, Jiawen Wang, Jianghang Chen, Xinjun Lai:

Modeling Customers' Loyalty Using Ten Years' Automobile Repair and Maintenance Data: Machine Learning Approaches. 242-248 - Heng Li, Longfu Zhou, Qian Yang:

Research on Safety Control of Refined Oil Depot based on Big Data Technology. 249-254 - Yongzhong Wu, Xiangying Chen, Xiaoli Wu:

Personalized Recommendation with User Categories of Different Behavior Modes: A Case in an E-Commerce Platform in China. 255-259 - Hao Wang, Jiamin Liu, Erbao Wang, Jiting Li, Tao Wang, Yingwu Chen:

Predicting Employee Career Development based on Employee Personal Background and Education Status. 260-266 - Yao Tong, Shigeo Akashi:

A Feasible Method for Realizing Leakage of DHCP Transactions under the Implementation of DHCP Snooping: To what extent can DHCP snooping protect clients from the cyberattack based on DHCP spoofing. 267-272

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














