


default search action
3rd ICISDM 2019: Houston, TX, USA
- Proceedings of the 3rd International Conference on Information System and Data Mining, ICISDM 2019, Houston, TX, USA, April 6-8, 2019. ACM 2019, ISBN 978-1-4503-6635-9

Big Data and Artificial Intelligence
- Ruey-Shun Chen, Yeh-Cheng Chen, Jyh-haw Yeh, Yu-Xi Hu, Naixue Xiong

, C.-P. Lee:
Using Intelligent Algorithms to Construct a Wafer Foundry System in Manufacturing Industry. 1-5 - Zhong Zhang, Borui Zhang, Takuma Akiduki

:
Specular reflection Surface Defects Detection by using Deep Learning. 6-10 - Xianglin Lu, Pengju Liu, Jiayi Lin:

Network Traffic Anomaly Detection Based on Information Gain and Deep Learning. 11-15 - Yu Zeng, Kebei Jiang, Jie Chen:

Automatic Seismic Salt Interpretation with Deep Convolutional Neural Networks. 16-20 - Charles T. Soini, Sofiane Fellah, Muhammad Rizwan Abid

:
Citrus Greening Infection Detection (CiGID) by Computer Vision and Deep Learning. 21-26 - Sulaiman Alhaidari, Mohamed A. Zohdy:

Hybrid Learning Approach of Combining Cluster-Based Partitioning and Hidden Markov Model for IoT Intrusion Detection. 27-31 - Sterling Ramroach, Andrew Dhanoo

, Brian Cockburn
, Ajay Joshi:
CUDA Optimized Neural Network Predicts Blood Glucose Control from Quantified Joint Mobility and Anthropometrics. 32-36 - Eduard Plett, Sanjoy Das

:
A Multi-Agent Model of Energy Transactions in Microgrid under Equilibrium. 37-46 - Hong Miao, Xin Guo

, Feifei Wu:
Identification of the Technology Convergence in the Field of Elderly Smart Home Based on Louvain Community Discovery Algorithm. 47-53
Data Analysis and Data Mining
- Lu Ge, Chenggang Li:

Analysis of competitive Power of Chinese Sports Apparel Brand based on Porter's five Force Model. 54-58 - Saud Altaf, Waseem Soomro, Mohd Izani Mohamed Rawi:

Student Performance Prediction using Multi-Layers Artificial Neural Networks: A Case Study on Educational Data Mining. 59-64 - Lin Li, Chun-Kit Ngan:

A Weight-adjusting Approach on an Ensemble of Classifiers for Time Series Forecasting. 65-69 - Gerald Onwujekwe, Manoj A. Thomas

, Kweku-Muata Osei-Bryson:
Using Robust Data Governance to Mitigate the Impact of Cybercrime. 70-79 - Yasmina Vizuete-Salazar

, Marco Segura-Morales, Edison Loza Aguirre
:
Estimating poverty: A state-of-the-art of methods. 80-86 - Fei Gao, Ashutosh Khandelwal, Jiangjiang Liu:

Mining Frequent Itemsets Using Improved Apriori on Spark. 87-91 - Sulaiman Alhaidari, Ali Alharbi, Mansour Alshaikhsaleh, Mohamed A. Zohdy, Debatosh Debnath:

Network Traffic Anomaly Detection based on Viterbi Algorithm Using SNMP MIB Data. 92-97 - Mohammed Awad

, Khouloud Salameh
, Ernst L. Leiss:
Evaluating Learning Management System Usage at a Small University. 98-102 - Haddy Jallow, Suresh Renukappa, Subashini Suresh, Ahmed Alneyadi:

Implementing a BIM Collaborative Workflow In The UK Infrastructure Sector. 103-108 - Hani Alamil, Suresh Renukappa, Hanouf Alosaimi, Saeed Al Nabt:

Drivers for Sharing Knowledge in the Kingdom of Saudi Arabia Construction Industry: An Empirical Study. 109-113
Pattern Recognition and Classification
- Carly L. Clayman

, Scott N. Clayman, Partha Mukherjee:
Clustering Analysis of Brain Protein Expression Levels in Trisomic and Control Mice. 114-118 - Fatemah H. Alghamedy

, Jun Zhang:
Imputation Strategies for Cold-Start Users in NMF-Based Recommendation Systems. 119-128 - Nibha Manandhar, John W. Burris:

An Application of Image Classification to Saltwater Fish Identification in Louisiana Fisheries. 129-132 - Shriya T. P. Gupta, Jajati Keshari Sahoo

, Rajendra Kumar Roul:
Authorship Identification using Recurrent Neural Networks. 133-137 - Edgars Rencis

:
Natural Language-Based Knowledge Extraction in Healthcare Domain. 138-142 - Muhammad Abu ul Fazal, Sam Ferguson, M. Shuaib Karim, Andrew Johnston:

Vinfomize: A Framework for Multiple Voice-based Information Communication. 143-147
Multimedia Service
- Mehr-Un-Nisa

, Fasiha Ashraf, Ateeqa Naseer, Shaukat Iqbal
:
Comparative Analysis of Unstructured P2P File Sharing Networks. 148-153 - Thuy Lam, Houssain Kettani:

PhAttApp: A Phishing Attack Detection Application. 154-158 - Suliman K. Almasoud, Hassan I. Mathkour:

Instant Adaptation Enrichment Technique to Improve Web Accessibility for Blind Users. 159-164 - Ali Alqazzaz

, Raed Alharthi
, Ibrahim Alrashdi
, Esam Aloufi, Mohamed A. Zohdy, Ming Hua:
A Practical Evaluation of a Secure and Energy-Efficient Smart Parking System Using the MQTT Protocol. 165-170 - Malik Almaliki:

Online Misinformation Spread: A Systematic Literature Map. 171-178 - Ali Alshehri

, Pawel Marcinek, Abdulrahman Alzahrani, Hani Alshahrani, Huirong Fu:
PUREDroid: Permission Usage and Risk Estimation for Android Applications. 179-184 - Mahdi H. Miraz, David C. Donald:

LApps: Technological, Legal and Market Potentials of Blockchain Lightning Network Applications. 185-189 - Günther Schuh, Christoph Kelzenberg, Johan de Lange, Julian Boshof:

Development and Application of a Systematic Knowledge Management Process Model for the Tooling Industry. 190-195
Information Processing
- Emad A. Awada

:
The Algorithm of Testing ADC Effective, Number of Bits Based on Hilbert and Wavelet Transform. 196-200 - Yuqing Yan, Zhenhua Zhang:

Knowledge Transfer, Sharing, and Management System Based on Causality for Requirements Change Management. 201-207 - Shabahat Husain, Rumman Gul:

Research Trends in Knowledge Management: Past, Present and Future. 208-217 - Chenggang Li, Lu Ge:

Study on Polymorphic Equilibrium of Internet Economy. 218-222 - Vita Mayastinasari, Benyamin Lufpi, Novi Indah Earlyanti:

Knowledge Management System Approach of Police Performance Management in Regional Police of Yogyakarta Special Region, Indonesia. 223-227 - Yiwei Li, Feifei Wu, Hong Miao:

Analysis of Research Status and Development Trend of Hydrogen Storage Technology. 228-233 - Subashini Suresh, Suresh Renukappa, Andrew Kamunda:

Building Information Modelling in the Framework of Knowledge Management: A Water Industry Case Study. 234-240

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














