Abstract is missing.
- Software Defect Prediction Based on Ensemble LearningRan Li, Lijuan Zhou, Shudong Zhang, Hui Liu, Xiangyang Huang, Zhong Sun. 1-6 [doi]
- Heart Disease Prediction Using Data Mining TechniquesChing-Seh Mike Wu, Mustafa Badshah, Vishwa Bhagwat. 7-11 [doi]
- Industry Focused in Data Collection: How Industry 4.0 is Handled by Big DataMiguel Oliveira, Daniel Afonso. 12-18 [doi]
- Analysis of the Demand for Teaching Design of Rural Teachers in the WeChat groupMengqi Gao, Zhong Sun. 19-24 [doi]
- Comparing ML Algorithms on Financial Fraud DetectionChung Min Tae, Phan Duy Hung. 25-29 [doi]
- Extending the National Lake Database of Malaysia (MyLake) as a Central Data Exchange using Big Data IntegrationFarashazillah Yahya, Bashirah Mohd Fazli, Mohd Fikri Abdullah, Harlisa Zulkifli. 30-35 [doi]
- Understanding the Photo-shooting Patterns of SightseeingXuefeng Liang, Song Tong, Takatsune Kumada, Yuen Peng Loh. 36-41 [doi]
- Developing a Patient Information and Descriptive Analytics System for Data Actors of University of Bohol Medical and Rehabilitation Center: Towards Policy MakingNorma J. Apao, Larmie S. Feliscuzo, Cherry Lyn C. Sta. Romana. 42-48 [doi]
- Cache Replacement Strategy Based on Association Rules in P2P Streaming Media SystemYi Qi Gui, Shuang-shuang Ju. 49-53 [doi]
- Prediction of Tariff Package Model Using ROF-LGB AlgorithmNaisong Zheng, Xiaowei Jiang, Yibo Ao, Xi Zhao. 54-58 [doi]
- Exploring the Prediction of Variety-seeking BehaviorJiazhao Li, Jiuxia Zhao, Minjia Mao, Xi Zhao 0001, Jianhua Zou. 59-63 [doi]
- Analysis of Factors Influencing Consumer Intention to Buy in S-Commerce BusinessKus Andriadi, Widia Resti Fitriani, Achmad Nizar Hidayanto, Puspa Indahati Sandhyaduhita, Rahmat M. Samik-Ibrahim. 64-70 [doi]
- Research on Constructing Sentiment Dictionary of Online Course Reviews based on Multi-source CombinationShuoqiu Yang, Chaojun Xu. 71-76 [doi]
- Improved PSO-NN Prediction Model for Corrosion Current Density Under the Stray Current Excitation Based on Data Mining TechniqueChengtao Wang, Wei Li. 77-84 [doi]
- An Enhanced Time Series Classification Using Linear-Regression Based Shape DescriptorSilumpa Arnupapsanyakorn, Chotirat Ann Ratanamahatana. 85-91 [doi]
- What Makes User Switch Technology?: Enabler and Inhibitor Factors of Converting to Mobile ApplicationHarwin Prahara, Achmad Nizar Hidayanto, Ika Chandra Hapsari. 92-97 [doi]
- An Improved Pedestrian Motion Tracking System Assisted by Machine Learning?Yuming Chen, Wei Li 0019, Zhuoyin Si. 98-103 [doi]
- The Determinants of Consumer Purchase Intention of Online Game Voucher: A Case Study of UPoint Online StoreLigar Patra Yuniar, Achmad Nizar Hidayanto, Yova Ruldeviyani, Nur Fitriah Ayuning Budi. 104-110 [doi]
- Adoption Factors of E-Marketplace and Instagram for Micro, Small, and Medium Enterprises (MSMEs) in IndonesiaBetty Purwandari, Briant Otmen, Larastri Kumaralalita. 111-116 [doi]
- Performance Analysis of the Modified Generated S-Box for Advanced Encryption StandardsRonielle B. Antonio, Ariel M. Sison, Ruji P. Medina. 117-121 [doi]
- Performance of DKI Jakarta Governor and Vice Governor on 2017-2018 based on Sentiment Analysis using Twitter and Instagram DataBintang Glenn Julian, Indra Budi, Dipta Tanaya. 122-127 [doi]
- Hate Speech Identification using the Hate Codes for Indonesian TweetsNur Indah Pratiwi, Indra Budi, Meganingrum Arista Jiwanggi. 128-133 [doi]
- A Behavior-cluster Based Imbalanced Classification Method for Credit Card Fraud DetectionQi Li, Yu Xie. 134-139 [doi]
- Transformer Fault Diagnosis Model Based on Iterative Nearest Neighbor Interpolation and Ensemble LearningYunfei Liu, Jing Li, Zhao Li, Lin Qiao, Shuo Chen, Xuming Lv. 140-146 [doi]
- A Survey of Methods Guaranteeing User Privacy based on Blockchain in Internet-of -ThingsMansi Sharma, Jongtae Lim. 147-153 [doi]
- A Secure Image Encryption Architecture Based on Pseudorandom Number Generator and Chaotic Logistic MapManocher C. Alipour, Bobby D. Gerardo, Ruji P. Medina. 154-159 [doi]
- Individual Characteristics Analytical Models based on Deep Learning, Trajectory and Social Network DataDechang Wang, Buyang Cao, Zhenfang Chu. 160-167 [doi]
- Prediction of Office Building Rental upon Spatiotemporal DataZhihong Wang, Buyang Cao. 168-174 [doi]
- Real-time Online Drilling Vibration Analysis Using Data MiningMarzieh Zare, Ari Visa, Sirpa Launis, Mikko Huova. 175-180 [doi]
- Collective Classification for Social Opinion Spam DetectionTingxuan Su, Raymond Yiu-Keung Lau. 181-186 [doi]
- A Novelty Network Attack Detection Model based on ImmunologyXiyue Chen, Jianmin Pang. 187-196 [doi]
- An Improved Clustering Algorithm based on Single-passBiao Wang, Xin Yuan, Jinwei Li, Shun Li. 197-203 [doi]
- Mining Contrast Sequential Patterns based on Subsequence Location Distribution from Biological SequencesQing Li, Xiangtao Chen, Ronghui Wu. 204-209 [doi]
- Location Traceability of Social Media Analysis in Urban ComplexKun Yu, Peng Xu, Shuaifei Song, Huabin Feng, Shiyang Qiu, Hengchang Liu. 210-218 [doi]
- Detection of Traffic Abnormity Based on Clustering Analysis of Taxi GPS DataHaoze Wang, Yutong Si. 219-224 [doi]
- An Agricultural Machinery Operation Monitoring System Based on IoTHui Liu, Xiaobo Ye, Zhijun Meng, Lijuan Zhou, Zhong Sun. 225-229 [doi]
- Centroid 360: An Enhanced Centroid Initialization Method for K Means AlgorithmJovy Jay D. Cabrera, Ariel M. Sison, Ruji P. Medina. 230-235 [doi]
- Deep Architectures for Crowd Flow PredictionJun He 0012, Jingyuan Wang, Yizhi Luo. 236-241 [doi]
- Modeling Customers' Loyalty Using Ten Years' Automobile Repair and Maintenance Data: Machine Learning ApproachesSheng Zhang, Xueliang Tan, Jiawen Wang, Jianghang Chen, Xinjun Lai. 242-248 [doi]
- Research on Safety Control of Refined Oil Depot based on Big Data TechnologyHeng Li, Longfu Zhou, Qian Yang. 249-254 [doi]
- Personalized Recommendation with User Categories of Different Behavior Modes: A Case in an E-Commerce Platform in ChinaYongzhong Wu, Xiangying Chen, Xiaoli Wu. 255-259 [doi]
- Predicting Employee Career Development based on Employee Personal Background and Education StatusHao Wang, Jiamin Liu, Erbao Wang, Jiting Li, Tao Wang, Yingwu Chen. 260-266 [doi]
- A Feasible Method for Realizing Leakage of DHCP Transactions under the Implementation of DHCP Snooping: To what extent can DHCP snooping protect clients from the cyberattack based on DHCP spoofingYao Tong, Shigeo Akashi. 267-272 [doi]