NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the DATA 2021 Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM?s investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.
Proceeding Downloads
Data Preprocessing for Learning, Analyzing and Detecting Scene Text Video based on Rotational Gradient
Challenging annotated video datasets are in huge demand for the researchers and embedded industrials to learn and build an artificial intelligence for detecting, localizing and classifying the objects of interest aimed at various applications under ...
Meteorological forecasting based on big data analysis
In this paper, we present the main ideas behind the development of a system that can be used to deal with meteorological big data. In particular, the system captures data online and downloads it locally onto a MongoDB database. After that, the user can ...
Detection of Text from Video with Customized Trained Anatomy
With the influence of diverse architectures like ImageNet, VGGNet, ResNet for detection of objects in images, we are proposing a novel architecture for detection of text in video. It is challenging to detect text candidates due to its nature of ...
MACHINE LEARNING FRAMEWORK FOR COVID-19 DIAGNOSIS
With the alarming global health crisis and pandemic, the entire medical industry and every human in this world are desperately looking for new technologies and solutions to monitor and contain the spread of this COVID-19 virus through early detection ...
Intelligent learning systems for LLL courses: Intelligent learning systems for LLL courses
The proposed model for organizing blended and distance learning involves the creation of an individual learning path, which makes it flexible. The learning model is represented using an ontological model, and the decision rules for the model are logical ...
Fuzzy Cross Recurrence Analysis and Tensor Decomposition of Major-Depression Time-Series Data
The mechanism underlying the complex behavior of major or clinical depression has been hypothesized as a dynamical system. This study presents an analysis of mood self-assessment in major depression using the method of fuzzy cross recurrence plots and ...
Health Care Workers' Use of Electronic Medical Information Systems: Benefits and Challenges
Although Medical (or patient) records are important as they constitute the documentation of patients' health status. The advances in information technologies are reflected in electronic patient records so that patient data can be stored in databases, ...
Application of Electronic Health Records in Polyclinics: Barriers & Benefits
Electronic Health Records (EHRs) is one of many enlargements in health informatics. It is a computerized system to collect, store, and display patient information. Although with the many benefits, many barriers affect the implementation of these ...
Physicians' Attitudes towards Electronic Prescribing Software: Perceived Benefits and Barriers
The use of health information technology has become highly effective in healthcare quality as it enhances personal and public care, broadens diagnostic accuracy, reduces medical costs and errors, and improves the effectiveness of both organizational and ...
Essay Scoring Tool by Employing RoBERTa Architecture
The automated essay scoring (AES) has significant importance in machine grading of student essays particularly in standardized exams like the Graduate Record Examination (GRE). However, some issues in AES have remained unsolved over the past several ...
Ontology-Based Extraction of Kazakh Language Word Combinations in Natural Language Processing
This article provides an ontological model of nominative word combinations in the Kazakh language. It is necessary for creation of the automated templates for search of nominative word combinations of the Kazakh language in text corpora. The presented ...
Detecting Overlapping Communities in Social Networks Using A Modified Segmentation by Weighted Aggregation Approach
Detecting communities of common behaviors, interests, and interactions in social networks is essential to model a network's structure. Overlapping community detection is an NP-Hard problem. Several solutions have been proposed; however, most of these ...
Public Datasets: Access, Download and Cleaning (AWS)
In this paper, we describe the steps we took to access and use one of the data sets available via Amazon Web Services (AWS).
An Effective Algorithm for Extracting Maximal Bipartite Cliques
The reduction of bipartite clique enumeration problem into a clique enumeration problem is a well-known approach for extracting maximal bipartite cliques. In this approach, the graph inflation is used to transform a bipartite graph to a general graph, ...
OSINT Techniques Integration with Risk Assessment ISO/IEC 27001
Over the last few years, the amount of information that resides on the internet is quickly increasing especially due to the digital transformation era. Social media platforms, moving to the cloud, using the internet of things (IoT) are reasons for this ...
Risk Assessment in Smartphones: Comprehensive Analysis
Smartphones are multi-purpose and widely used devices in various fields, in terms of personal use, and companies and governments. Increasing dependence on them opened the way for increased violations on its users, as it became a fat substance for ...
Assessment of Machine Learning Security: The Case of Healthcare Data
With technological advances and the use of the Internet everywhere, And the widespread use of machine learning has become important to pay attention to security in all areas of life, especially in the healthcare field, many concerns have arisen ...
Exposing Bot Attacks Using Machine Learning and Flow Level Analysis
Botnets represent a major threat to Internet security that have continuously developed in scale and complexity. Command-and-control servers (C&C) send commands to bots that execute and perform these commands, thereby implementing attacks such as ...
Healthcare Training Application: 3D First Aid Virtual Reality
Medical simulations in virtual reality (VR) offer a personalized learning environment that can be structured and adapted to various modes of learning in ways that conventional teaching can not offer. There is an increasing interest in using VR for ...
IoT Cyber-Attack Detection: A Comparative Analysis
A cyber-attack is precautious manipulation of computer systems and networks using malware to conciliate data or restrict processes or operations. These types of attacks are vastly growing over the years. This increase in structure and complexity calls ...
Energy Saving Techniques in CoAP of Internet of Things
Internet of Things is a connection of associated objects wherein theseobjects can gather information and interchange them utilizing sensors. IoT allowsconnecting objects and property as one unit, enables us to control everything we want,and tells us of ...
A Book Recommender System Using Collaborative Filtering Method
Recommender systems are used to generate meaningful recommendations to users based on their preferences, which will be determined following several approaches. This work targets Arab readers by providing accurate and reliable results that match their ...
SECA: A Feedback Rules Model in a Ubiquitous Microlearning Context
Understanding learner behavior is the key to the success of any learning process. The more we know about learners, the more likely we are to personalize learning experiences and provide successful feedback. This paper presents a feedback rules model ...
An Internet Of Things (IoT) Forensics Model Using Third-Party Logs-Vault
Since the last decade, the number of Internet of Things (IoT) devices has increased dramatically. Consequently, the number of effected users and persons has also grown. By 2025 the number of connected IoT devices will reach 75.44 billion. This ...
SIEM Architecture for the Internet of Things and Smart City
The Internet of things (IoT) is a new technology that shapes the future of a world that is rapidly being invaded by smart devices connected to the Internet. Such technology has a great role in developing the idea of a smart city. A smart city is a city ...
Trust Models in IoT-enabled WSN: A review
Wireless Sensor Network (WSN) enables the digital world to hear, see, and smell the physical world without the interaction of human beings. It is an essential enabler of the Internet of Things (IoT) in many domains. A WSN is a group of a large number ...
Graffiti and government in smart cities: a Deep Learning approach applied to Medellín City, Colombia
Graffiti is an element of graphic expression that manifests different states of the human being. However, for many governments worldwide, it has been an element of discord between them and the communities that express themselves through graffitis. This ...
Study of Detection of DDoS attacks in cloud environment Using Regression Analysis
Distributed Denial of Service (DDoS) attacks in the cloud environment are not as simple as the same attacks which occur in the traditional physical network environment. Not only one single attack is affecting the cloud environment, where as there are ...
Regression analysis for network intrusion detection
Machine learning and statistics are categorized as part of data science. Regression is one of the techniques of machine learning. Most of the contributions in the literature in respect to intrusion detection are mainly based on dimensionality reduction ...
Similarity Association Pattern Mining in Transaction Databases
Association pattern mining is a method of finding interesting relationships or patterns between item sets present in each of the transactions of the transactional databases. Current researchers in this area are focusing on the data mining task of ...
Index Terms
- International Conference on Data Science, E-learning and Information Systems 2021