skip to main content
10.1145/3404663acmotherconferencesBook PagePublication PagesicisdmConference Proceedingsconference-collections
ICISDM '20: Proceedings of the 2020 the 4th International Conference on Information System and Data Mining
ACM2020 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ICISDM 2020: 2020 the 4th International Conference on Information System and Data Mining Hawaii HI USA May 15 - 17, 2020
ISBN:
978-1-4503-7765-2
Published:
10 July 2020

Bibliometrics
Skip Abstract Section
Abstract

The conference has attracted papers from international researchers and scholars in this field with burgeoning applications touching upon various sectors of Information Systems. Through our efforts, we tried to spread the news about ICISDM2020 to as many relevant researchers in the world as possible. Towards that we were blessed with an energetic team, the members of which worked side-by-side which resulted in optimization of coordination among all. For now we are optimistic getting the proceedings of ICISDM2020 archived in the ACM Digital Library. We appreciate that every author of ICISDM2020 wants to maximize the attraction of his/her manuscripts and we will try our best to support them in our endeavors.

Skip Table Of Content Section
SESSION: Modern Information Theory and System
research-article
Research on Artificial Intelligence for the Development of Fashion Industry

Although artificial intelligence has just started, it has accumulated some industrial integration cases. Based on the internal demand of fashion industry development, this study focuses on the absorption of intelligent technology by fashion culture ...

research-article
Uncooperative RF Direction Finding with I/Q Data

This paper studies the possibility of implicitly exploiting the characteristics of the In-phase and Quadrature components (I/Q components) of a transmitter using deep learning techniques for the problem of uncooperative direction finding using a single ...

research-article
Analysis of appropriate standards to solve cybersecurity problems in public organizations

The development of ICTs in the globalized world has forced countries to develop problems or implement affected problems because new vulnerabilities have always been presented every day, so not having implemented a standard security standard brings ...

research-article
Betweenness Centrality of Sets of Vertices in Graphs: which Vertices to Associate

Betweenness centrality of a set of vertices can be seen as a measure of the control of flow of information that the set has within a network. We introduce the notion of saturated betweenness centrality set, which is defined as a set whose betweenness ...

research-article
Local Stability of Influenza Virus with Vaccination

Influenza virus is an infectious disease. This caused by influenza virus. The symptoms consist of high fever, runny nose, sore throat, muscle and joint pain. In this paper, we construct the mathematical model for the transmission of influenza virus.We ...

research-article
Definition of a Prototype for Performing Computer Audits in a Public Organization of Ecuador

The development of a prototype of computer audits has become more important for the administration and auditors of public companies. In this study, crucial control elements were explored to meet the safety conditions that a public company must have; In ...

SESSION: Image analysis and processing
research-article
Customer Expertise, Involvement and Perceived Online Review Trustworthiness

With the rapid development of e-commerce, online reviews became an important source of information which can contribute to customers' decision making, reducing the uncertainty and risk of online shopping. However, not all online reviews can affect ...

research-article
Security Model for the Integration of the Ministry of Telecommunications and the Information Society with a Public Organization of Ecuador

Information security is one of the most important aspects in organizations that has been constantly developing, driven by advances in Information and Communication Technologies. It should be noted that such development also entails the constant ...

research-article
An Approach of Security Model to Mitigate Risk of Cyberattacks on Public Institutions in Ecuador

Security problems due to cyberattacks were analyzed, checked security models designed to protect and preserve databases of information from these institutions, using all the parameters of information security. It is planted propose a prototype of a ...

research-article
Prototype of an alignment model of the Ministry of Telecommunications and the Information Society to a public organization in Ecuador

This work contains information on technological advances in various public institutions in Ecuador, to improve the quality of services to users from government management. The objective was to design a prototype that is an alignment model for the ...

research-article
Effect of Fear on Behavioral Intention to Comply

Compliance with the information system (IS) security policy is an established theme in IS research for protecting the IS from user actions. The unified model of information security policy compliance (UMISPC) is a recent development within the research ...

research-article
Twitter Data Collection and Extraction: A Method and a New Dataset, the UTD-MI

This paper proposes a Twitter Data collection method using some Python libraries to automatically read and process the raw collected data "Tweets" from the Twitter streaming API, where the returned Tweets are encoded in the lightweight JSON data-format. ...

research-article
An Inventory of Existing Neuroprivacy Controls

Brain-Computer Interfaces (BCIs) facilitate communication between brains and computers. As these devices become increasingly popular outside of the medical context, research interest in brain privacy risks and countermeasures has bloomed. Several ...

SESSION: Computer and Information Science
research-article
Comparison Study of Deep Learning Models for Colorectal Lesions Classification

In this paper, we performed a comparison study between GoogLeNet, AlexNet, and InceptionV3 deep learning models to recognize and classify colorectal cancer tumors. Colorectal tumors are one of the very common cancer types and early detection could ...

research-article
Appropriate Security Algorithms to Mitigate the Risks in a Database of the National Customs Service of Ecuador

Currently, the use of technological resources, within public and private institutions, has become essential, due to the need to modernize processes, high commercial needs and mandatory continuous improvement. A problem has been observed at the national ...

research-article
Arthroscopic Tool Classification using Deep Learning

Shoulder arthroscopy is a common surgery to diagnose and treat tears to improve patient's quality of life. Quality of cleaning the tear during shoulder arthroscopy significantly affects the outcome of the surgery. Appropriate cleaning is necessary to ...

research-article
Hybrid Unsupervised Scale-invariant Slide Detection (HUSSD) for Video Presentation

This paper addresses the task of unsupervised scale-invariant slide detection for video presentations, which aims to detect slides and index them with an appropriate location in the presentation video. We propose two new methods that improve on Scale-...

research-article
Evaluating Extreme Learning Machine Models in the Presence of Concept Drift in Streaming Data

This paper discusses concept drift in online streaming data and evaluates the performance of different Extreme Learning Machine (ELM) based techniques on classifying online streaming data in the presence of concept drift. It also compares the ...

research-article
Current Shipment Tracking Technologies and Trends in Research

Shipping services are essential for transporting products, especially with the increasing demand for online shopping. There are two common types of shipping services, which are postal services and package delivery. Both are using a vehicle -- with the ...

SESSION: Knowledge Engineering and Management
research-article
Assessing Employee Attrition Using Classifications Algorithms

Employees leave an organization when other organizations offer better opportunities than their current organizations. Continuity and sustenance and even completion of jobs are crucial issues for the companies not to suffer financial losses. Especially ...

research-article
Construction and perfection of Internet Brand ecosystem

The rise of Internet and the development of platform economy lead the brand construction to enter the stage of ecological development. Based on the development of Internet and platform economy, this study analyzes the elements and influencing factors of ...

research-article
Knowledge Extraction from Healthcare Data Using User-Adaptable Keywords-Based Query Language

Nowadays, the volume of the information gathered by any organization increases more and more rapidly. It is essential to be able to use this information efficiently for it to benefit the operation of the organization. There is no point of gathering the ...

SESSION: Advanced Electronic Technology and Application
research-article
Drift and Erosion in Software Architecture: Summary and Prevention Strategies

Disciplined practice of software architecture, and the broader encompassing discipline of software design, is fundamental to a project's success in every stage of the software life cycle. Choosing and implementing an appropriate architecture maximizes ...

research-article
Virtual Rotator Cuff Arthroscopic Skill Trainer: Results and Analysis of a Preliminary Subject Study

This works presents a design and development of Virtual Rotator Cuff Arthroscopic Skill Trainer (ViRCAST) and its preliminary subject study analysis using machine learning approach. Arthroscopy is a minimally invasive surgical intervention regarded as a ...

research-article
Parameters to Determine Cyberbullying in Social Networks in the Ecuador

It was analyzed to different proposals about cyberbullying to identify online parameters through approaches, models, architecture, algorithm and assessments. The problem is the lack of a security algorithm when sharing information to a social network in ...

research-article
Semi-Supervised Graph Neural Network with Probabilistic Modeling to Mitigate Uncertainty

Probabilistic Graph Neural Network (PGNN) introduced here proposes a machine learning application that combines deep learning on graphs with probabilistic modeling, to account for uncertainty in both inputs and outputs. Graph neural network models (GNNs)...

research-article
Analysis of Fuel Pump Skimming Devices

Payment card fraud is a growing problem in the United States. Credit and debit card numbers are harvested from automated devices such as fuel dispensers, Point of Sale (POS) terminals, and Automated Teller Machines (ATMs) in a process known as "skimming"...

Index terms have been assigned to the content through auto-classification.

Recommendations