
3rd ICISDM 2019: Houston, TX, USA
- Proceedings of the 3rd International Conference on Information System and Data Mining, ICISDM 2019, Houston, TX, USA, April 6-8, 2019. ACM 2019, ISBN 978-1-4503-6635-9
Big Data and Artificial Intelligence
- Ruey-Shun Chen, Yeh-Cheng Chen, Jyh-haw Yeh, Yu-Xi Hu, Naixue Xiong, C.-P. Lee:
Using Intelligent Algorithms to Construct a Wafer Foundry System in Manufacturing Industry. 1-5 - Zhong Zhang, Borui Zhang, Takuma Akiduki:
Specular reflection Surface Defects Detection by using Deep Learning. 6-10 - Xianglin Lu, Pengju Liu, Jiayi Lin:
Network Traffic Anomaly Detection Based on Information Gain and Deep Learning. 11-15 - Yu Zeng, Kebei Jiang, Jie Chen:
Automatic Seismic Salt Interpretation with Deep Convolutional Neural Networks. 16-20 - Charles T. Soini, Sofiane Fellah, Muhammad Rizwan Abid:
Citrus Greening Infection Detection (CiGID) by Computer Vision and Deep Learning. 21-26 - Sulaiman Alhaidari, Mohamed A. Zohdy:
Hybrid Learning Approach of Combining Cluster-Based Partitioning and Hidden Markov Model for IoT Intrusion Detection. 27-31 - Sterling Ramroach, Andrew Dhanoo, Brian Cockburn, Ajay Joshi:
CUDA Optimized Neural Network Predicts Blood Glucose Control from Quantified Joint Mobility and Anthropometrics. 32-36 - Eduard Plett, Sanjoy Das
:
A Multi-Agent Model of Energy Transactions in Microgrid under Equilibrium. 37-46 - Hong Miao, Xin Guo, Feifei Wu:
Identification of the Technology Convergence in the Field of Elderly Smart Home Based on Louvain Community Discovery Algorithm. 47-53
Data Analysis and Data Mining
- Lu Ge, Chenggang Li:
Analysis of competitive Power of Chinese Sports Apparel Brand based on Porter's five Force Model. 54-58 - Saud Altaf, Waseem Soomro, Mohd Izani Mohamed Rawi:
Student Performance Prediction using Multi-Layers Artificial Neural Networks: A Case Study on Educational Data Mining. 59-64 - Lin Li, Chun-Kit Ngan:
A Weight-adjusting Approach on an Ensemble of Classifiers for Time Series Forecasting. 65-69 - Gerald Onwujekwe, Manoj A. Thomas, Kweku-Muata Osei-Bryson:
Using Robust Data Governance to Mitigate the Impact of Cybercrime. 70-79 - Yasmina Vizuete-Salazar, Marco Segura-Morales, Edison Loza Aguirre
:
Estimating poverty: A state-of-the-art of methods. 80-86 - Fei Gao, Ashutosh Khandelwal, Jiangjiang Liu:
Mining Frequent Itemsets Using Improved Apriori on Spark. 87-91 - Sulaiman Alhaidari, Ali Alharbi, Mansour Alshaikhsaleh, Mohamed A. Zohdy, Debatosh Debnath:
Network Traffic Anomaly Detection based on Viterbi Algorithm Using SNMP MIB Data. 92-97 - Mohammed Awad
, Khouloud Salameh
, Ernst L. Leiss:
Evaluating Learning Management System Usage at a Small University. 98-102 - Haddy Jallow, Suresh Renukappa, Subashini Suresh, Ahmed Alneyadi:
Implementing a BIM Collaborative Workflow In The UK Infrastructure Sector. 103-108 - Hani Alamil, Suresh Renukappa, Hanouf Alosaimi, Saeed Al Nabt:
Drivers for Sharing Knowledge in the Kingdom of Saudi Arabia Construction Industry: An Empirical Study. 109-113
Pattern Recognition and Classification
- Carly L. Clayman
, Scott N. Clayman, Partha Mukherjee:
Clustering Analysis of Brain Protein Expression Levels in Trisomic and Control Mice. 114-118 - Fatemah Alghamedy, Jun Zhang:
Imputation Strategies for Cold-Start Users in NMF-Based Recommendation Systems. 119-128 - Nibha Manandhar, John W. Burris:
An Application of Image Classification to Saltwater Fish Identification in Louisiana Fisheries. 129-132 - Shriya T. P. Gupta, Jajati Keshari Sahoo, Rajendra Kumar Roul:
Authorship Identification using Recurrent Neural Networks. 133-137 - Edgars Rencis
:
Natural Language-Based Knowledge Extraction in Healthcare Domain. 138-142 - Muhammad Abu ul Fazal, Sam Ferguson, M. Shuaib Karim, Andrew Johnston:
Vinfomize: A Framework for Multiple Voice-based Information Communication. 143-147
Multimedia Service
- Mehr-un-Nisa, Fasiha Ashraf, Ateeqa Naseer, Shaukat Iqbal:
Comparative Analysis of Unstructured P2P File Sharing Networks. 148-153 - Thuy Lam, Houssain Kettani:
PhAttApp: A Phishing Attack Detection Application. 154-158 - Suliman K. Almasoud, Hassan I. Mathkour:
Instant Adaptation Enrichment Technique to Improve Web Accessibility for Blind Users. 159-164 - Ali Alqazzaz
, Raed Alharthi
, Ibrahim Alrashdi, Esam Aloufi, Mohamed A. Zohdy, Hua Ming:
A Practical Evaluation of a Secure and Energy-Efficient Smart Parking System Using the MQTT Protocol. 165-170 - Malik Almaliki:
Online Misinformation Spread: A Systematic Literature Map. 171-178 - Ali Alshehri, Pawel Marcinek, Abdulrahman Alzahrani, Hani Alshahrani, Huirong Fu:
PUREDroid: Permission Usage and Risk Estimation for Android Applications. 179-184 - Mahdi H. Miraz, David C. Donald:
LApps: Technological, Legal and Market Potentials of Blockchain Lightning Network Applications. 185-189 - Günther Schuh, Christoph Kelzenberg, Johan de Lange, Julian Boshof:
Development and Application of a Systematic Knowledge Management Process Model for the Tooling Industry. 190-195
Information Processing
- Emad A. Awada:
The Algorithm of Testing ADC Effective, Number of Bits Based on Hilbert and Wavelet Transform. 196-200 - Yuqing Yan, Zhenhua Zhang:
Knowledge Transfer, Sharing, and Management System Based on Causality for Requirements Change Management. 201-207 - Shabahat Husain, Rumman Gul:
Research Trends in Knowledge Management: Past, Present and Future. 208-217 - Chenggang Li, Lu Ge:
Study on Polymorphic Equilibrium of Internet Economy. 218-222 - Vita Mayastinasari, Benyamin Lufpi, Novi Indah Earlyanti:
Knowledge Management System Approach of Police Performance Management in Regional Police of Yogyakarta Special Region, Indonesia. 223-227 - Yiwei Li, Feifei Wu, Hong Miao:
Analysis of Research Status and Development Trend of Hydrogen Storage Technology. 228-233 - Subashini Suresh, Suresh Renukappa, Andrew Kamunda:
Building Information Modelling in the Framework of Knowledge Management: A Water Industry Case Study. 234-240

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.