2018 IEEE 3rd International Conference on Big Data Analysis (ICBDA)

9-12 March 2018

Filter Results

Displaying Results 1 - 25 of 95
  • Cover page

    Publication Year: 2018, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (841 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2018, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2018, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2018, Page(s):iii - vii
    Request permission for commercial reuse | PDF file iconPDF (188 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2018, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • Conference committees

    Publication Year: 2018, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • The effect analysis of critical subgroup based on K-core on public outbreak as big data

    Publication Year: 2018, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB) | HTML iconHTML

    Now, information diffusion based on the most influential single node is a mainstream research perspective. However, very little attention has been given to the issue how the essential subgroups in the network are influenced the spread of information. Here we use k-shell decomposition method to measure critical subgroup in the Micro-blog, which examine its efficacy in realistic information spreadin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • College data analysis based on multi-learning method

    Publication Year: 2018, Page(s):5 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    This paper proposes a new approach to data analysis based on multi-learning method. The proposed method employs a combination of principal component analysis, K-means clustering, random forest, deep neural network and Jack Philips ROI evaluation model, and is effective in solving the problem of choosing donation recipients. Results are validated through data envelop analysis and are believed to ac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leveraging big data analytics to improve decision making in South African public universities

    Publication Year: 2018, Page(s):9 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    Despite the potential of Big Data analytics to improve decision making within organizations, there are a number of challenges that impede the achievement of this goal. Such challenges include but not limited to organizational preparedness and capacity to handle Big Data, lack of resources like skilled personnel and appropriate technology needed for analysis, lack of awareness of the relevant metho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Big data analytics using association rules in eLearning

    Publication Year: 2018, Page(s):14 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (497 KB) | HTML iconHTML

    Nowadays most data science researches focus on association rule in order to determine specific patterns and rules from big data. Association rule is built by simple data curation tool such as WEKA which includes classification, clustering, association rules and so on. In general, the association rule can be applicable for large eLearning datasets as they are relevant to unstructured format. In thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The research on industrial big data information security risks

    Publication Year: 2018, Page(s):19 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    With the industrial data digitized and across the enterprise boundaries and even across borders, industrial big data information security issues become a heated discussion. Due to the lack of mature laws and regulations, criterion and technical achievements, the industrial big data faces an increasingly severe security situation in the initial stage. Therefore it has important strategic significan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on the application of big data in accurate marketing of cross-border e-commerce in China

    Publication Year: 2018, Page(s):24 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (201 KB) | HTML iconHTML

    With the development of strategic goals of “The Belt and Road”, cross-border e-commerce has developed prosperously in China. The application of big data has been a vital strategic measure for cross-border e-commerce in “Internet+” era. Based on the motivation of many cross-border e-commerce enterprises to apply big data in marketing, this paper researches the procedures and fruits of applying big ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An effective selecting approach for social media big data analysis — Taking commercial hotspot exploration with Weibo check-in data as an example

    Publication Year: 2018, Page(s):28 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (561 KB) | HTML iconHTML

    According to the problem that efficient datasets cannot be quickly obtained from social media big data of social networks in the process of focused mining and analysis. An effective selection method for clustering mining with spacetime large data is proposed. The effective selection method of clustering mining divides the spatiotemporal large data from the dimension of space, time or attribute. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The logistics performance evaluation index system in the transportation industry based on big data

    Publication Year: 2018, Page(s):33 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    In recent years, with the rapid development of logistics industry in China, the management and evaluation of logistics performance have become more and more important. Firstly, this paper sorts out and analyzes the existing problems and main requirements of the industry index system construction. On this basis, combined with economic development, technical means, macro-environment and other factor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Centrality analysis of online social network big data

    Publication Year: 2018, Page(s):38 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    Node centrality and network centralization are usually applied to study the behaviour of individuals and group in social networks. As a typical online social network, BBS reply network is firstly constructed in this paper, in which identifications registered on BBS are considered as nodes and reply articles set up links between them. Then, degree centrality and betweenness centrality of nodes are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time big data warehousing and analysis framework

    Publication Year: 2018, Page(s):43 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (622 KB) | HTML iconHTML

    Big Data technology is gradually becoming a dire need of large enterprises. These enterprises are producing large amount of offline and streaming data in both structured and unstructured forms on daily basis. Moreover, it is a challenging task to effectively extract useful insights from this type of complex data. On the other hand, the traditional systems are unable to efficiently manage transacti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining spatio-temporal patterns in multivariate spatial time series

    Publication Year: 2018, Page(s):50 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    With the advancement of the computing technology and its wide range of applications, collecting large sets of multivariate time series in multiple geographical locations introduces a problem of identifying interesting spatio-temporal patterns. We consider a new spatial structure of the data in the pattern discovery process due to the dependent nature of the data. This paper presents an information... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Association rules mining analysis of app usage based on mobile traffic flow data

    Publication Year: 2018, Page(s):55 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    With the rapid development of mobile Internet, more and more Apps emerge in people's daily life. It is important to analyze the relations among Apps, which is helpful for network management and control. In this paper, we utilize network footprint data which consists of DPI data from ISPs and Crawler data from Web for App usage analysis. Focusing on the most popular Apps in China, we propose a dist... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and prediction of influenza in the UAE based on Arabic tweets

    Publication Year: 2018, Page(s):61 - 66
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (407 KB) | HTML iconHTML

    Social Networks have been used recently for detecting different events, such as diseases. In this paper, we propose a system to analyze and predict influenza based on Arabic Twitter data. The proposed systems filters and extracts features from the Arabic tweets and classifies them into three categories; self-reporting, nonself-reporting and non-reporting. The classified tweets are then used to ana... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An algorithmic approach to handle circular trading in commercial taxation system

    Publication Year: 2018, Page(s):67 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    Tax manipulation comes in a variety of forms with different motivations and of varying complexities. This paper deals with a specific technique used by tax-evaders known as circular trading. In particular, algorithms are defined for the detection and analysis of circular trade. To achieve this, the whole system is modelled as a directed graph with the actors being vertices and the transactions amo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Kano model based on online comment data mining

    Publication Year: 2018, Page(s):76 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    The opinion mining and the sentiment analysis of the network comment are the key points of the text analysis. By excavating the comment information of the online products, the real demand of the customers can be obtained, however it does not reflect the differences among the requirements. In this paper, we come up with the ideal to combine the data mining technology with the Kano model, first we d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A brief analysis of the key technologies and applications of educational data mining on online learning platform

    Publication Year: 2018, Page(s):83 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    With the rapid development of the Internet and communication technology, online education has drawn more and more attention, online learning platforms, on the other hand, store massive learner behavioral data and educational data. How to effectively analyze and utilize the data to improve the quality of online education has become a key issue urgently needed to be solved in the field of big data i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and implementation of data fusion method based on RDF

    Publication Year: 2018, Page(s):87 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (318 KB) | HTML iconHTML

    With the continuous development of Internet technology, more and more fields have posted data information on the Internet, the amount of data on the Internet is becoming more and more huge. In order to enable decision makers to find more accurate data, and make a correct judgment, data fusion technology becomes more and more important. The implementation of data fusion requires a unified managemen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research hotspots of “course of action” based on bibliometrics

    Publication Year: 2018, Page(s):92 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (371 KB) | HTML iconHTML

    This paper makes a preliminary analysis and visualization of the basic situation and research hotspots in the field “Course of Action” in IEEE database by means of the combination of knowledge map tools and self - study software TVIZ. After a course of processing and analysis of the data, we describe the basic situation of the research of “Course of Action” in the IEEE database by means of keyword... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The simulation of open one-side uncertain probability for fusion model of data uncertainty and data relation uncertainty

    Publication Year: 2018, Page(s):97 - 101
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    Uncertain big data has become increasingly important in our life, since uncertainties exist in data generation/acquisition, physical measurements and data staling. Thus, in this paper, we aim to create a unified mathematical model between data uncertainties and data relation uncertainties, which are both important aspects of uncertain big data. We first proposed the fusion model of data uncertaint... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.