default search action
DSIT 2019: Seoul, South Korea
- Proceedings of the 2nd International Conference on Data Science and Information Technology, DSIT 2019, Seoul, South Korea, July 19-21, 2019. ACM 2019, ISBN 978-1-4503-7141-4
- Ran Li, Lijuan Zhou, Shudong Zhang, Hui Liu, Xiangyang Huang, Zhong Sun:
Software Defect Prediction Based on Ensemble Learning. 1-6 - Ching-Seh Mike Wu, Mustafa Badshah, Vishwa Bhagwat:
Heart Disease Prediction Using Data Mining Techniques. 7-11 - Miguel Oliveira, Daniel Afonso:
Industry Focused in Data Collection: How Industry 4.0 is Handled by Big Data. 12-18 - Mengqi Gao, Zhong Sun:
Analysis of the Demand for Teaching Design of Rural Teachers in the WeChat group. 19-24 - Chung Min Tae, Phan Duy Hung:
Comparing ML Algorithms on Financial Fraud Detection. 25-29 - Farashazillah Yahya, Bashirah Mohd Fazli, Mohd Fikri Abdullah, Harlisa Zulkifli:
Extending the National Lake Database of Malaysia (MyLake) as a Central Data Exchange using Big Data Integration. 30-35 - Xuefeng Liang, Song Tong, Takatsune Kumada, Yuen Peng Loh:
Understanding the Photo-shooting Patterns of Sightseeing. 36-41 - Norma J. Apao, Larmie S. Feliscuzo, Cherry Lyn Cando Sta. Romana:
Developing a Patient Information and Descriptive Analytics System for Data Actors of University of Bohol Medical and Rehabilitation Center: Towards Policy Making. 42-48 - Yi-Qi Gui, Shuang-shuang Ju:
Cache Replacement Strategy Based on Association Rules in P2P Streaming Media System. 49-53 - Naisong Zheng, Xiaowei Jiang, Yibo Ao, Xi Zhao:
Prediction of Tariff Package Model Using ROF-LGB Algorithm. 54-58 - Jiazhao Li, Jiuxia Zhao, Minjia Mao, Xi Zhao, Jianhua Zou:
Exploring the Prediction of Variety-seeking Behavior. 59-63 - Kus Andriadi, Widia Resti Fitriani, Achmad Nizar Hidayanto, Puspa Indahati Sandhyaduhita, Rahmat M. Samik-Ibrahim:
Analysis of Factors Influencing Consumer Intention to Buy in S-Commerce Business. 64-70 - Shuoqiu Yang, Chaojun Xu:
Research on Constructing Sentiment Dictionary of Online Course Reviews based on Multi-source Combination. 71-76 - Chengtao Wang, Wei Li:
Improved PSO-NN Prediction Model for Corrosion Current Density Under the Stray Current Excitation Based on Data Mining Technique. 77-84 - Silumpa Arnupapsanyakorn, Chotirat Ann Ratanamahatana:
An Enhanced Time Series Classification Using Linear-Regression Based Shape Descriptor. 85-91 - Harwin Prahara, Achmad Nizar Hidayanto, Ika Chandra Hapsari:
What Makes User Switch Technology?: Enabler and Inhibitor Factors of Converting to Mobile Application. 92-97 - Yuming Chen, Wei Li, Zhuoyin Si:
An Improved Pedestrian Motion Tracking System Assisted by Machine Learning? 98-103 - Ligar Patra Yuniar, Achmad Nizar Hidayanto, Yova Ruldeviyani, Nur Fitriah Ayuning Budi:
The Determinants of Consumer Purchase Intention of Online Game Voucher: A Case Study of UPoint Online Store. 104-110 - Betty Purwandari, Briant Otmen, Larastri Kumaralalita:
Adoption Factors of E-Marketplace and Instagram for Micro, Small, and Medium Enterprises (MSMEs) in Indonesia. 111-116 - Ronielle B. Antonio, Ariel M. Sison, Ruji P. Medina:
Performance Analysis of the Modified Generated S-Box for Advanced Encryption Standards. 117-121 - Bintang Glenn Julian, Indra Budi, Dipta Tanaya:
Performance of DKI Jakarta Governor and Vice Governor on 2017-2018 based on Sentiment Analysis using Twitter and Instagram Data. 122-127 - Nur Indah Pratiwi, Indra Budi, Meganingrum Arista Jiwanggi:
Hate Speech Identification using the Hate Codes for Indonesian Tweets. 128-133 - Qi Li, Yu Xie:
A Behavior-cluster Based Imbalanced Classification Method for Credit Card Fraud Detection. 134-139 - Yunfei Liu, Jing Li, Zhao Li, Lin Qiao, Shuo Chen, Xuming Lv:
Transformer Fault Diagnosis Model Based on Iterative Nearest Neighbor Interpolation and Ensemble Learning. 140-146 - Mansi Sharma, Jongtae Lim:
A Survey of Methods Guaranteeing User Privacy based on Blockchain in Internet-of -Things. 147-153 - Manocher C. Alipour, Bobby D. Gerardo, Ruji P. Medina:
A Secure Image Encryption Architecture Based on Pseudorandom Number Generator and Chaotic Logistic Map. 154-159 - Dechang Wang, Buyang Cao, Zhenfang Chu:
Individual Characteristics Analytical Models based on Deep Learning, Trajectory and Social Network Data. 160-167 - Zhihong Wang, Buyang Cao:
Prediction of Office Building Rental upon Spatiotemporal Data. 168-174 - Marzieh Zare, Ari Visa, Sirpa Launis, Mikko Huova:
Real-time Online Drilling Vibration Analysis Using Data Mining. 175-180 - Tingxuan Su, Raymond Yiu-Keung Lau:
Collective Classification for Social Opinion Spam Detection. 181-186 - Xiyue Chen, Jianmin Pang:
A Novelty Network Attack Detection Model based on Immunology. 187-196 - Biao Wang, Xin Yuan, Jinwei Li, Shun Li:
An Improved Clustering Algorithm based on Single-pass. 197-203 - Qing Li, Xiangtao Chen, Ronghui Wu:
Mining Contrast Sequential Patterns based on Subsequence Location Distribution from Biological Sequences. 204-209 - Kun Yu, Peng Xu, Shuaifei Song, Huabin Feng, Shiyang Qiu, Hengchang Liu:
Location Traceability of Social Media Analysis in Urban Complex. 210-218 - Haoze Wang, Yutong Si:
Detection of Traffic Abnormity Based on Clustering Analysis of Taxi GPS Data. 219-224 - Hui Liu, Xiaobo Ye, Zhijun Meng, Lijuan Zhou, Zhong Sun:
An Agricultural Machinery Operation Monitoring System Based on IoT. 225-229 - Jovy Jay D. Cabrera, Ariel M. Sison, Ruji P. Medina:
Centroid 360: An Enhanced Centroid Initialization Method for K Means Algorithm. 230-235 - Jun He, Jingyuan Wang, Yizhi Luo:
Deep Architectures for Crowd Flow Prediction. 236-241 - Sheng Zhang, Xueliang Tan, Jiawen Wang, Jianghang Chen, Xinjun Lai:
Modeling Customers' Loyalty Using Ten Years' Automobile Repair and Maintenance Data: Machine Learning Approaches. 242-248 - Heng Li, Longfu Zhou, Qian Yang:
Research on Safety Control of Refined Oil Depot based on Big Data Technology. 249-254 - Yongzhong Wu, Xiangying Chen, Xiaoli Wu:
Personalized Recommendation with User Categories of Different Behavior Modes: A Case in an E-Commerce Platform in China. 255-259 - Hao Wang, Jiamin Liu, Erbao Wang, Jiting Li, Tao Wang, Yingwu Chen:
Predicting Employee Career Development based on Employee Personal Background and Education Status. 260-266 - Yao Tong, Shigeo Akashi:
A Feasible Method for Realizing Leakage of DHCP Transactions under the Implementation of DHCP Snooping: To what extent can DHCP snooping protect clients from the cyberattack based on DHCP spoofing. 267-272
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.