skip to main content
10.1145/3460620acmotherconferencesBook PagePublication PagessensysConference Proceedingsconference-collections
DATA'21: International Conference on Data Science, E-learning and Information Systems 2021
ACM2021 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
DATA'21: International Conference on Data Science, E-learning and Information Systems 2021 Ma'an Jordan April 5 - 7, 2021
ISBN:
978-1-4503-8838-2
Published:
04 June 2021
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 03 Feb 2025Bibliometrics
Skip Abstract Section
Abstract

NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the DATA 2021 Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM?s investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.

research-article
Data Preprocessing for Learning, Analyzing and Detecting Scene Text Video based on Rotational Gradient

Challenging annotated video datasets are in huge demand for the researchers and embedded industrials to learn and build an artificial intelligence for detecting, localizing and classifying the objects of interest aimed at various applications under ...

research-article
Meteorological forecasting based on big data analysis

In this paper, we present the main ideas behind the development of a system that can be used to deal with meteorological big data. In particular, the system captures data online and downloads it locally onto a MongoDB database. After that, the user can ...

Article
Detection of Text from Video with Customized Trained Anatomy

With the influence of diverse architectures like ImageNet, VGGNet, ResNet for detection of objects in images, we are proposing a novel architecture for detection of text in video. It is challenging to detect text candidates due to its nature of ...

research-article
MACHINE LEARNING FRAMEWORK FOR COVID-19 DIAGNOSIS

With the alarming global health crisis and pandemic, the entire medical industry and every human in this world are desperately looking for new technologies and solutions to monitor and contain the spread of this COVID-19 virus through early detection ...

short-paper
Intelligent learning systems for LLL courses: Intelligent learning systems for LLL courses

The proposed model for organizing blended and distance learning involves the creation of an individual learning path, which makes it flexible. The learning model is represented using an ontological model, and the decision rules for the model are logical ...

research-article
Fuzzy Cross Recurrence Analysis and Tensor Decomposition of Major-Depression Time-Series Data

The mechanism underlying the complex behavior of major or clinical depression has been hypothesized as a dynamical system. This study presents an analysis of mood self-assessment in major depression using the method of fuzzy cross recurrence plots and ...

research-article
Health Care Workers' Use of Electronic Medical Information Systems: Benefits and Challenges

Although Medical (or patient) records are important as they constitute the documentation of patients' health status. The advances in information technologies are reflected in electronic patient records so that patient data can be stored in databases, ...

research-article
Application of Electronic Health Records in Polyclinics: Barriers & Benefits

Electronic Health Records (EHRs) is one of many enlargements in health informatics. It is a computerized system to collect, store, and display patient information. Although with the many benefits, many barriers affect the implementation of these ...

research-article
Physicians' Attitudes towards Electronic Prescribing Software: Perceived Benefits and Barriers

The use of health information technology has become highly effective in healthcare quality as it enhances personal and public care, broadens diagnostic accuracy, reduces medical costs and errors, and improves the effectiveness of both organizational and ...

research-article
Essay Scoring Tool by Employing RoBERTa Architecture

The automated essay scoring (AES) has significant importance in machine grading of student essays particularly in standardized exams like the Graduate Record Examination (GRE). However, some issues in AES have remained unsolved over the past several ...

short-paper
Ontology-Based Extraction of Kazakh Language Word Combinations in Natural Language Processing

This article provides an ontological model of nominative word combinations in the Kazakh language. It is necessary for creation of the automated templates for search of nominative word combinations of the Kazakh language in text corpora. The presented ...

research-article
Detecting Overlapping Communities in Social Networks Using A Modified Segmentation by Weighted Aggregation Approach

Detecting communities of common behaviors, interests, and interactions in social networks is essential to model a network's structure. Overlapping community detection is an NP-Hard problem. Several solutions have been proposed; however, most of these ...

research-article
Open Access
Public Datasets: Access, Download and Cleaning (AWS)

In this paper, we describe the steps we took to access and use one of the data sets available via Amazon Web Services (AWS).

research-article
An Effective Algorithm for Extracting Maximal Bipartite Cliques

The reduction of bipartite clique enumeration problem into a clique enumeration problem is a well-known approach for extracting maximal bipartite cliques. In this approach, the graph inflation is used to transform a bipartite graph to a general graph, ...

research-article
OSINT Techniques Integration with Risk Assessment ISO/IEC 27001

Over the last few years, the amount of information that resides on the internet is quickly increasing especially due to the digital transformation era. Social media platforms, moving to the cloud, using the internet of things (IoT) are reasons for this ...

research-article
Risk Assessment in Smartphones: Comprehensive Analysis

Smartphones are multi-purpose and widely used devices in various fields, in terms of personal use, and companies and governments. Increasing dependence on them opened the way for increased violations on its users, as it became a fat substance for ...

research-article
Assessment of Machine Learning Security: The Case of Healthcare Data

With technological advances and the use of the Internet everywhere, And the widespread use of machine learning has become important to pay attention to security in all areas of life, especially in the healthcare field, many concerns have arisen ...

research-article
Exposing Bot Attacks Using Machine Learning and Flow Level Analysis

Botnets represent a major threat to Internet security that have continuously developed in scale and complexity. Command-and-control servers (C&C) send commands to bots that execute and perform these commands, thereby implementing attacks such as ...

research-article
Healthcare Training Application: 3D First Aid Virtual Reality

Medical simulations in virtual reality (VR) offer a personalized learning environment that can be structured and adapted to various modes of learning in ways that conventional teaching can not offer. There is an increasing interest in using VR for ...

research-article
IoT Cyber-Attack Detection: A Comparative Analysis

A cyber-attack is precautious manipulation of computer systems and networks using malware to conciliate data or restrict processes or operations. These types of attacks are vastly growing over the years. This increase in structure and complexity calls ...

research-article
Energy Saving Techniques in CoAP of Internet of Things

Internet of Things is a connection of associated objects wherein theseobjects can gather information and interchange them utilizing sensors. IoT allowsconnecting objects and property as one unit, enables us to control everything we want,and tells us of ...

research-article
A Book Recommender System Using Collaborative Filtering Method

Recommender systems are used to generate meaningful recommendations to users based on their preferences, which will be determined following several approaches. This work targets Arab readers by providing accurate and reliable results that match their ...

research-article
SECA: A Feedback Rules Model in a Ubiquitous Microlearning Context

Understanding learner behavior is the key to the success of any learning process. The more we know about learners, the more likely we are to personalize learning experiences and provide successful feedback. This paper presents a feedback rules model ...

research-article
An Internet Of Things (IoT) Forensics Model Using Third-Party Logs-Vault

Since the last decade, the number of Internet of Things (IoT) devices has increased dramatically. Consequently, the number of effected users and persons has also grown. By 2025 the number of connected IoT devices will reach 75.44 billion. This ...

research-article
SIEM Architecture for the Internet of Things and Smart City

The Internet of things (IoT) is a new technology that shapes the future of a world that is rapidly being invaded by smart devices connected to the Internet. Such technology has a great role in developing the idea of a smart city. A smart city is a city ...

research-article
Trust Models in IoT-enabled WSN: A review

Wireless Sensor Network (WSN) enables the digital world to hear, see, and smell the physical world without the interaction of human beings. It is an essential enabler of the Internet of Things (IoT) in many domains. A WSN is a group of a large number ...

research-article
Graffiti and government in smart cities: a Deep Learning approach applied to Medellín City, Colombia

Graffiti is an element of graphic expression that manifests different states of the human being. However, for many governments worldwide, it has been an element of discord between them and the communities that express themselves through graffitis. This ...

research-article
Study of Detection of DDoS attacks in cloud environment Using Regression Analysis

Distributed Denial of Service (DDoS) attacks in the cloud environment are not as simple as the same attacks which occur in the traditional physical network environment. Not only one single attack is affecting the cloud environment, where as there are ...

research-article
Regression analysis for network intrusion detection

Machine learning and statistics are categorized as part of data science. Regression is one of the techniques of machine learning. Most of the contributions in the literature in respect to intrusion detection are mainly based on dimensionality reduction ...

research-article
Similarity Association Pattern Mining in Transaction Databases

Association pattern mining is a method of finding interesting relationships or patterns between item sets present in each of the transactions of the transactional databases. Current researchers in this area are focusing on the data mining task of ...

Contributors
  • Universidad a distancia de Madrid
  • Jordan University of Science and Technology
  • Vallurupalli Nageswara Rao Vignana Jyothi Institute of Engineering & Technology
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

Overall Acceptance Rate 74 of 167 submissions, 44%
YearSubmittedAcceptedRate
DATA '191465840%
DATA'19211676%
Overall1677444%