The conference has attracted papers from international researchers and scholars in this field with burgeoning applications touching upon various sectors of Information Systems. Through our efforts, we tried to spread the news about ICISDM2020 to as many relevant researchers in the world as possible. Towards that we were blessed with an energetic team, the members of which worked side-by-side which resulted in optimization of coordination among all. For now we are optimistic getting the proceedings of ICISDM2020 archived in the ACM Digital Library. We appreciate that every author of ICISDM2020 wants to maximize the attraction of his/her manuscripts and we will try our best to support them in our endeavors.
Proceeding Downloads
Research on Artificial Intelligence for the Development of Fashion Industry
Although artificial intelligence has just started, it has accumulated some industrial integration cases. Based on the internal demand of fashion industry development, this study focuses on the absorption of intelligent technology by fashion culture ...
Uncooperative RF Direction Finding with I/Q Data
This paper studies the possibility of implicitly exploiting the characteristics of the In-phase and Quadrature components (I/Q components) of a transmitter using deep learning techniques for the problem of uncooperative direction finding using a single ...
Analysis of appropriate standards to solve cybersecurity problems in public organizations
The development of ICTs in the globalized world has forced countries to develop problems or implement affected problems because new vulnerabilities have always been presented every day, so not having implemented a standard security standard brings ...
Betweenness Centrality of Sets of Vertices in Graphs: which Vertices to Associate
Betweenness centrality of a set of vertices can be seen as a measure of the control of flow of information that the set has within a network. We introduce the notion of saturated betweenness centrality set, which is defined as a set whose betweenness ...
Local Stability of Influenza Virus with Vaccination
Influenza virus is an infectious disease. This caused by influenza virus. The symptoms consist of high fever, runny nose, sore throat, muscle and joint pain. In this paper, we construct the mathematical model for the transmission of influenza virus.We ...
Definition of a Prototype for Performing Computer Audits in a Public Organization of Ecuador
The development of a prototype of computer audits has become more important for the administration and auditors of public companies. In this study, crucial control elements were explored to meet the safety conditions that a public company must have; In ...
Customer Expertise, Involvement and Perceived Online Review Trustworthiness
With the rapid development of e-commerce, online reviews became an important source of information which can contribute to customers' decision making, reducing the uncertainty and risk of online shopping. However, not all online reviews can affect ...
Security Model for the Integration of the Ministry of Telecommunications and the Information Society with a Public Organization of Ecuador
Information security is one of the most important aspects in organizations that has been constantly developing, driven by advances in Information and Communication Technologies. It should be noted that such development also entails the constant ...
An Approach of Security Model to Mitigate Risk of Cyberattacks on Public Institutions in Ecuador
- Segundo Moisés T. Toapanta,
- Peter S. Muñoz Campuzano,
- Dario Fernando Huilcapi S.,
- Luis Enrique Mafla Gallegos
Security problems due to cyberattacks were analyzed, checked security models designed to protect and preserve databases of information from these institutions, using all the parameters of information security. It is planted propose a prototype of a ...
Prototype of an alignment model of the Ministry of Telecommunications and the Information Society to a public organization in Ecuador
- Segundo Moisés T. Toapanta,
- Mauricio Jeanpierre Méndez Canales,
- Javier Gonzalo Ortiz Rojas,
- Luis Enrique Mafla Gallegos
This work contains information on technological advances in various public institutions in Ecuador, to improve the quality of services to users from government management. The objective was to design a prototype that is an alignment model for the ...
Effect of Fear on Behavioral Intention to Comply
Compliance with the information system (IS) security policy is an established theme in IS research for protecting the IS from user actions. The unified model of information security policy compliance (UMISPC) is a recent development within the research ...
Twitter Data Collection and Extraction: A Method and a New Dataset, the UTD-MI
This paper proposes a Twitter Data collection method using some Python libraries to automatically read and process the raw collected data "Tweets" from the Twitter streaming API, where the returned Tweets are encoded in the lightweight JSON data-format. ...
An Inventory of Existing Neuroprivacy Controls
Brain-Computer Interfaces (BCIs) facilitate communication between brains and computers. As these devices become increasingly popular outside of the medical context, research interest in brain privacy risks and countermeasures has bloomed. Several ...
Comparison Study of Deep Learning Models for Colorectal Lesions Classification
In this paper, we performed a comparison study between GoogLeNet, AlexNet, and InceptionV3 deep learning models to recognize and classify colorectal cancer tumors. Colorectal tumors are one of the very common cancer types and early detection could ...
Appropriate Security Algorithms to Mitigate the Risks in a Database of the National Customs Service of Ecuador
Currently, the use of technological resources, within public and private institutions, has become essential, due to the need to modernize processes, high commercial needs and mandatory continuous improvement. A problem has been observed at the national ...
Arthroscopic Tool Classification using Deep Learning
- Bryce Palmer,
- Gunnar Sundberg,
- James Dials,
- Bayazit Karaman,
- Doga Demirel,
- Muhammad Abid,
- Tansel Halic,
- Shahryar Ahmadi
Shoulder arthroscopy is a common surgery to diagnose and treat tears to improve patient's quality of life. Quality of cleaning the tear during shoulder arthroscopy significantly affects the outcome of the surgery. Appropriate cleaning is necessary to ...
Hybrid Unsupervised Scale-invariant Slide Detection (HUSSD) for Video Presentation
This paper addresses the task of unsupervised scale-invariant slide detection for video presentations, which aims to detect slides and index them with an appropriate location in the presentation video. We propose two new methods that improve on Scale-...
Evaluating Extreme Learning Machine Models in the Presence of Concept Drift in Streaming Data
This paper discusses concept drift in online streaming data and evaluates the performance of different Extreme Learning Machine (ELM) based techniques on classifying online streaming data in the presence of concept drift. It also compares the ...
Current Shipment Tracking Technologies and Trends in Research
Shipping services are essential for transporting products, especially with the increasing demand for online shopping. There are two common types of shipping services, which are postal services and package delivery. Both are using a vehicle -- with the ...
Assessing Employee Attrition Using Classifications Algorithms
Employees leave an organization when other organizations offer better opportunities than their current organizations. Continuity and sustenance and even completion of jobs are crucial issues for the companies not to suffer financial losses. Especially ...
Construction and perfection of Internet Brand ecosystem
The rise of Internet and the development of platform economy lead the brand construction to enter the stage of ecological development. Based on the development of Internet and platform economy, this study analyzes the elements and influencing factors of ...
Knowledge Extraction from Healthcare Data Using User-Adaptable Keywords-Based Query Language
Nowadays, the volume of the information gathered by any organization increases more and more rapidly. It is essential to be able to use this information efficiently for it to benefit the operation of the organization. There is no point of gathering the ...
Drift and Erosion in Software Architecture: Summary and Prevention Strategies
Disciplined practice of software architecture, and the broader encompassing discipline of software design, is fundamental to a project's success in every stage of the software life cycle. Choosing and implementing an appropriate architecture maximizes ...
Virtual Rotator Cuff Arthroscopic Skill Trainer: Results and Analysis of a Preliminary Subject Study
- Jake Farmer,
- Mustafa Tunc,
- Daniel Ahmadi,
- Doga Demirel,
- Tansel Halic,
- Sreekanth Arikatla,
- Sinan Kockara,
- Shahryar Ahmadi
This works presents a design and development of Virtual Rotator Cuff Arthroscopic Skill Trainer (ViRCAST) and its preliminary subject study analysis using machine learning approach. Arthroscopy is a minimally invasive surgical intervention regarded as a ...
Parameters to Determine Cyberbullying in Social Networks in the Ecuador
It was analyzed to different proposals about cyberbullying to identify online parameters through approaches, models, architecture, algorithm and assessments. The problem is the lack of a security algorithm when sharing information to a social network in ...
Semi-Supervised Graph Neural Network with Probabilistic Modeling to Mitigate Uncertainty
Probabilistic Graph Neural Network (PGNN) introduced here proposes a machine learning application that combines deep learning on graphs with probabilistic modeling, to account for uncertainty in both inputs and outputs. Graph neural network models (GNNs)...
Analysis of Fuel Pump Skimming Devices
Payment card fraud is a growing problem in the United States. Credit and debit card numbers are harvested from automated devices such as fuel dispensers, Point of Sale (POS) terminals, and Automated Teller Machines (ATMs) in a process known as "skimming"...
Index Terms
- Proceedings of the 2020 the 4th International Conference on Information System and Data Mining