


default search action
ICCDA 2020: Silicon Valley, CA, USA
- ICCDA 2020: The 4th International Conference on Compute and Data Analysis, Silicon Valley, CA, USA, March 9-12, 2020. ACM 2020, ISBN 978-1-4503-7644-0
Data Analysis and Processing
- Shang Cheong Wong, Phoey Lee Teh
, Chi-Bin Cheng:
How Different Genders Use Profanity on Twitter? 1-9 - Khudran Alzhrani
:
Ideology Detection of Personalized Political News Coverage: A New Dataset. 10-15 - Wirasak Chomphu
, Boonserm Kijsirikul:
Wellhead Compressor Failure Prediction Using Attention-based Bidirectional LSTMs with Data Reduction Techniques. 16-22 - Chinasa Sueyoshi, Hideya Takagi, Kentaro Inenaga:
Developing Practical Management Support System for Regional Public Transportation Service Provided by Municipalities. 23-28 - Muthoni Masinde
:
Africa's Malaria Epidemic Predictor: Application of Machine Learning on Malaria Incidence and Climate Data. 29-37 - Omar Alghushairy, Raed Alsini
, Xiaogang Ma, Terence Soule:
A Genetic-Based Incremental Local Outlier Factor Algorithm for Efficient Data Stream Processing. 38-49 - Zohreh Safari, Khalid T. Mursi, Yu Zhuang:
Fast Automatic Determination of Cluster Numbers for High Dimensional Big Data. 50-57 - Akalanka Mailewa Dissanayaka, Susan A. Mengel, Lisa Gittner
, Hafiz Khan:
Vulnerability Prioritization, Root Cause Analysis, and Mitigation of Secure Data Analytic Framework Implemented with MongoDB on Singularity Linux Containers. 58-66
Data Model and Intelligent Computing
- Vimala Balakrishnan
, Pravin Kumar Selvanayagam, Lok Pik Yin:
Sentiment and Emotion Analyses for Malaysian Mobile Digital Payment Applications. 67-71 - Yann Busnel
, Yves Tillé:
Attack-tolerant Unequal Probability Sampling Methods over Sliding Window for Distributed Streams. 72-78 - Samer A. Barakat
:
Design of the base isolation system with artificial neural network models. 79-83 - Lu Xiong
, Don Hong
:
Using Monte Carlo Simulation to Predict Captive Insurance Solvency. 84-88 - Bishnu Nepal, Motoi Yamaha:
A Hybrid Model of Clustering and Neural Network Using Weather Conditions for Energy Management in Buildings. 89-96 - Md. Rakibul Hoque, Mohammed Sajedur Rahman:
Predictive Modelling for Chronic Disease: Machine Learning Approach. 97-101 - Surya Srikar Sirigineedi, Jayesh Soni
, Himanshu Upadhyay:
Learning-based models to detect runtime phishing activities using URLs. 102-106
Image Processing Technology and Intelligent Algorithms
- Jaishree Ranganathan, Sagar Sharma, Angelina A. Tzacheva:
Hybrid Scalable Action Rule: Rule Based and Object Based. 107-112 - Islam Elkabani, Layal Abu Daher, Rached N. Zantout
:
Use of FP-Growth Algorithm in Identifying Influential Users on Twitter Hashtags. 113-117 - Yu Kou, Zhi Hong, Yun Tian, Shawn X. Wang:
Adaptation of RF and CNN on Spark. 118-122 - Hanan Alshaher, Jinsheng Xu:
A New Term Weight Scheme and Ensemble Technique for Authorship Identification. 123-130 - Amal Almansour, Ghada Alsaeedi, Haifaa Almazroui, Huda Almuflehi:
I-Privacy Photo: Face Recognition and Filtering. 131-141 - Debarshi Nath
, Anubhav, Mrigank Singh, Divyashikha Sethia
, Diksha Kalra, S. Indu:
A Comparative Study of Subject-Dependent and Subject-Independent Strategies for EEG-Based Emotion Recognition using LSTM Network. 142-147 - Jose G. Garcia, Elizabeth R. Villota
, César Beltrán Castañón:
An Approach to Temporal Phase Classification on Videos of the Volleyball's Basic Reception Technique. 148-151 - Evalds Urtans
, Agris Nikitenko
, Valters Vecins:
Exponential triplet loss. 152-158 - Zhang Lu, Zhibin Du, Xianglei Zhu:
Research on Automatic Generation Method of Scenario Based on Panosim. 159-163
Information System Development and Management
- James F. Brady:
Computing System Congestion Management Using Exponential Smoothing Forecasting. 164-169 - Thor Aleksander Buan, Raghavendra Ramachandra:
Automated Cyberbullying Detection in Social Media Using an SVM Activated Stacked Convolution LSTM Network. 170-174 - Jimmy Li, Shawn X. Wang:
Detecting Active Sites in Protein 3D Structures. 175-178 - Orawit Thinnukool, Phasit Charoenkwan, Pattaraporn Khuwuthyakorn, Pachara Tinamat:
Word Cloud Analysis of Customer Satisfaction in Cosmetic Products in Thailand. 179-182 - Yasser Ali Alshehri
:
Text mining for incoming tasks based on the urgency/importance factors and task classification using machine learning tools. 183-189 - Peter Akioyamen, Levi C. Nicklas, Reinaldo Sanchez-Arias
:
A Framework for Intelligent Navigation Using Latent Dirichlet Allocation on Reddit Posts About Opiates. 190-196 - Juan Manuel Rodríguez, Hernán D. Merlino, Patricia Pesado:
ATP-OIE: An Autonomous Open Information Extraction Method. 197-202 - Jacob Stec, Selvanayaki Kolandapalayam Shanmugam
:
A Study and Implementation of Virtual Reality and its Capabilities. 203-207 - Emanuel S. Grant, Smruti Priyambada Nanda:
A Review of Applications of Formal Specification in Safety-Critical System Development. 208-215

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.