![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
2nd ICMLSC 2018: Phu Quoc Island, Vietnam
- Pham The Bao, Genci Capi:
Proceedings of the 2nd International Conference on Machine Learning and Soft Computing, ICMLSC 2018, Phu Quoc Island, Vietnam, February 2-4, 2018. ACM 2018
Machine learning
- Due Minh Tran, Minh Tuan Nguyen, Sang-Wook Lee:
Machine learning based evaluation of functional index for coronary lesion severity. 1-4 - Abien Fred M. Agarap
:
On breast cancer detection: an application of machine learning algorithms on the Wisconsin diagnostic dataset. 5-9 - Triet Huynh Minh Le
, Tung Thanh Tran, Lam Kim Huynh:
Linear support vector machine to classify the vibrational modes for complex chemical systems. 10-14 - Qi Wang, Liping Shen:
Student proficiency prediction on CNMOOC data. 15-18 - Yusuke Nozaki, Masaya Yoshikawa:
EM based machine learning attack for XOR arbiter PUF. 19-23 - André Valdivia
, José Alfredo Quispe-Herrera
, Dennis Barrios-Aranibar:
A new approach for supervised learning based influence value reinforcement learning. 24-28
Neural network and recommendation system
- Nhu-Tai Do
, Soo-Hyung Kim, Hyung Jeong Yang, Gueesang Lee, In Seop Na
:
Face tracking with convolutional neural network heat-map. 29-33 - Sinh-Ngoc Nguyen, Van-Quyet Nguyen, Jintae Choi, Kyungbaek Kim
:
Design and implementation of intrusion detection system using convolutional neural network for DoS detection. 34-38 - Hoang Tan Nguyen, Huu-Hung Huynh, Hiep Xuan Huynh:
Collaborative filtering recommendation with threshold value of the equipotential plane in implication field. 39-44 - Tri Minh Huynh, Huu-Hung Huynh, Vu The Tran, Hiep Xuan Huynh:
Collaborative filtering recommender system base on the interaction multi-criteria decision with ordered weighted averaging operator. 45-49 - Lan Phuong Phan, Huu-Hung Huynh, Hiep Xuan Huynh:
Hybrid recommendation based on implicative rating measures. 50-56
Design and analysis of algorithms
- Peng Chen
, Yongmei Chen, Beibei Jin:
A new soft assignment K-means algorithm. 57-61 - Demison Rolins de Souza Alves, Mario Tasso Ribeiro Serra Neto, Fabio dos Santos Ferreira, Otávio Noura Teixeira
:
SIACO: a novel algorithm based on ant colony optimization and game theory for travelling salesman problem. 62-66 - Trung Phan, Phuc Do:
Improving the shortest path finding algorithm in apache spark graphX. 67-71 - Xiao Fang, Maomao Bao, Yuting Chen, Ting Mao:
Research on hyper parameter tuning for distributed optimization when data is sparse. 72-76 - Muhammad Rafi, Bilal Aamer, Mubashir Naseem, Muhammad Osama:
Solving document clustering problem through meta heuristic algorithm: black hole. 77-81
Data theory and applications
- Tham Vo Thi Hong, Phuc Do:
Developing a graph-based system for storing, exploiting and visualizing text stream. 82-86 - Juan Manuel Rodríguez, Hernán D. Merlino, Patricia Pesado, Ramón García-Martínez:
Evaluation of open information extraction methods using Reuters-21578 database. 87-92 - Dhanasekar Sundararaman, Priya Arora, Vishwanath Seshagiri:
TweetIT: analyzing topics for Twitter users to garner maximum attention. 93-97 - Yuzheng Tao, Gang Wu, Yi Kang:
Stargate: a data source connector based on spark SQL. 98-103 - Ayuba Peter, Sa'adatu Abdulkadir:
Application of image processing and neural networks in determining the readiness of maize. 104-108 - Yurika Sagawa, Masafumi Hagiwara:
Face image generation system using attribute information with DCGANs. 109-113 - P. M. Siva Raja, E. Baburaj:
QR code based image steganography via variable step size firefly algorithm and lifting wavelet transform. 114-121 - Nguyen Anh Vu, Pham Truong Duy, Le Thi Ly:
Agraph convolution-based classification model for identifying anticancer metabolites from traditional vietnamese herbal medicine database. 122-126
Network engineering and security
- Chia-Min Lai, Chia-Yu Lu, Hahn-Ming Lee:
Implementation of adversarial scenario to malware analytic. 127-132 - Majed Rajab:
An anti-phishing method based on feature analysis. 133-139 - Tran Trung Khuong, Pham Yen Nhi, Dinh Thanh Nhan, Nguyen Hoang Thuan
:
Colour, trust, satisfaction, and E-loyalty: the vietnamese experience of website design. 140-144
Information technology and intelligent computing
- H. M. Keerthi Kumar, B. S. Harish
, S. V. Aruna Kumar
, V. N. Manjunath Aradhya:
Classification of sentiments in short-text: an approach using mSMTP measure. 145-150 - Thong Huynh-Van
, Khuong Nguyen-An
, Trinh Le Ba Khanh, Hyung-Jeong Yang, Tuan Anh Tran
, Soo-Hyung Kim:
Learning to detect tables in document images using line and text information. 151-155 - Hoang Nguyen:
A new generalized knowledge measure in multi-attribute group decision making under interval-valued intuitionistic fuzzy environment. 156-163 - Yoshitaka Mikami, Masafumi Hagiwara:
Automatic template feature extraction and the application to utterance in a dialogue system. 164-168 - Dinh-Son Tran
, Hyung-Jeong Yang, Soo-Hyung Kim, Gueesang Lee, Luu Ngoc Do, Ngoc-Huynh Ho, Van Quan Nguyen:
Audio-based emotion recognition using GMM supervector an SVM linear kernel. 169-173 - Chang Gyoon Lim, Chang Young Lee, Yongmin Kim:
A performance analysis of user's intention classification from EEG signal by a computational intelligence in BCI. 174-179 - Misbah Aiad
, Peng Hin Lee:
Modelling and power estimation of continuously varying residential loads using a quantized continuous-state hidden markov model. 180-184 - Ngoc-Tu Chau, Hojin Chun, Souhwan Jung:
Optimizing native analysis with android container. 185-189
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.