PROGRAM
Days: Wednesday, November 21st Thursday, November 22nd Friday, November 23rd
Wednesday, November 21st
View this program: with abstractssession overviewtalk overview
10:30-11:30 Session 1: Tutorial
Chair:
Location: Multipurpose room
10:30 | Tutorial: Nature-Inspired Optimization Algorithms (abstract) |
11:30-12:00Coffee Break
12:00-13:00 Session 2: Plenary talk
Chair:
Location: Multipurpose room
12:00 | Towards enriched Cognitive Security Systems (abstract) |
13:00-14:00Lunch Break
14:10-16:10 Session 3A: Artificial Intelligence & Machine Learning: Theory
Chairs:
Location: Multipurpose room
14:10 | General Structure Preserving Network Embedding (abstract) |
14:25 | CGLAD: using GLAD in crowdsourced large datasets (abstract) |
14:40 | A first approach to face dimensionality reduction through denoising autoencoders (abstract) |
14:55 | Compositional Stochastic Average Gradient for Machine Learning and Related Applications (abstract) |
15:10 | Data Set Partitioning in Evolutionary Instance Selection (abstract) |
15:25 | Instance-based stacked generalization for transfer learning (abstract) |
15:40 | Multi-Dimensional Bayesian Network Classifier Trees (abstract) |
15:55 | Optimally Selected Minimal Learning Machine (abstract) |
14:10-16:10 Session 3B: Artificial Intelligence & Machine Learning: Applications
Chair:
Location: Mixed room
14:10 | Exploring the Perceived Usefulness and Attitude Towards using Tesys e-Learning Platform (abstract) |
14:25 | Peak Alpha Based Neurofeedback Training within Survival Shooter Game (abstract) |
14:40 | Support Vector Machine Based Method For High Impedance Fault Diagnosis in Power Distribution Networks (abstract) |
14:55 | Single-class bankruptcy prediction based on the data from annual reports (abstract) |
15:10 | On Application of Learning to Rank for Assets Management: Warehouses Ranking (abstract) |
15:25 | Towards the intelligent agents for blockchain e-voting system (abstract) |
15:40 | Thermal Prediction for Immersion Cooling Data Centers Based on Recurrent Neural Networks (abstract) |
15:55 | Suggesting Cooking Recipes Through Simulation and Bayesian Optimization (abstract) |
14:10-16:10 Session 3C: Workshop on Methods for Interpretation of Industrial Event Logs (MIEL)
Chair:
Location: Meeting room
14:10 | Introductory talk: Computational Sensemaking in Industry 4.0: From Analysis to Interpretation (abstract) |
14:25 | Automated, Nomenclature Based Data Point Selection For Industrial Event Log Generation (abstract) |
14:40 | Mining Attributed Interaction Networks on Industrial Event Logs (abstract) |
14:55 | A Taxonomy for Combining Activity Recognition and Process Discovery in Industrial Environments (abstract) |
15:10 | On the Opportunities for Using Mobile Devices for Activity Monitoring and Understanding in Mining Applications (abstract) |
15:25 | Causal rules detection in streams of unlabeled, mixed type values with finit domains (abstract) |
15:40 | Creation of an event log from machinery monitoring system on a selected example (abstract) |
15:55 | Monitoring Equipment Operation through Model and Event Discovery (abstract) |
16:10-16:40Coffee Break
16:40-18:00 Session 4A: Machine Learning: Theory & Applications
Chair:
Location: Multipurpose room
16:40 | A framework for form applications that use machine learning (abstract) |
16:55 | Overlap-Based Undersampling for Improving Imbalanced Data Classification (abstract) |
17:10 | Machine Learning Methods based Preprocessing to improve Categorical Data Classification (abstract) |
17:25 | Combined classifier based on quantized subspace class distribution (abstract) |
17:40 | A cluster-based prototype reduction for online k-NN classification (abstract) |
16:40-17:40 Session 4B: Artificial Intelligence & Applied Mathematics
Chair:
Location: Mixed room
16:40 | PostProcessing in Constrained Role Mining (abstract) |
16:55 | Extended Min-Hash Focusing on Intersection Cardinality (abstract) |
17:10 | New Fuzzy Singletons Distance Measure by Convolution (abstract) |
17:25 | A fast Metropolis-Hastings method for generating random correlation matrices (abstract) |
16:40-18:00 Session 4C: Special Session on Data Selection in Machine Learning (DSML 1)
Location: Meeting room
16:40 | Semi-Supervised Learning to Reduce Data Needs of Indoor Positioning Models (abstract) |
16:55 | EMnGA : Entropy Measure and Genetic Algorithms Based Method for Heterogeneous Ensembles Selection (abstract) |
17:10 | A Study of Fuzzy Clustering to Archetypal Analysis (abstract) |
17:25 | Different Approaches of Data and Attribute Selection on Headache Disorder (abstract) |
17:40 | Feature selection and interpretable feature transformation: a preliminary study on feature engineering for classification algorithms (abstract) |
19:30-21:30Cultural event
Thursday, November 22nd
View this program: with abstractssession overviewtalk overview
09:30-10:30 Session 5A: Evolutionary Computation
Chair:
Location: Multipurpose room
09:30 | Knowledge-based Solution Construction for Evolutionary Minimization of Systemic Risk (abstract) |
09:45 | Crossover Operator using Knowledge Transfer for the Firefighter Problem (abstract) |
10:00 | Differential evolution for association rule mining using categorical and numerical attributes (abstract) |
10:15 | Intelligent Rub-Impact Fault Diagnosis based on Genetic Algorithm-based IMF Selection in Ensemble Empirical Mode Decomposition and Diverse Features Models (abstract) |
09:30-10:30 Session 5B: Time Series analysis
Chair:
Location: Mixed room
09:30 | Improving Time Series Prediction via Modification of Dynamic Weighted Majority in Ensemble Learning (abstract) |
09:45 | Assessment and Adaption of Pattern Discovery Approaches for Time Series under the Requirement of Time Warping (abstract) |
10:00 | ALoT: A time-series similarity measure based on alignment of textures (abstract) |
10:15 | Inferring Temporal Structure from Predictability in Bumblebee Learning Flight (abstract) |
09:30-10:30 Session 5C: Special Session on Data Selection in Machine Learning (DSML 2)
Chair:
Location: Meeting room
09:30 | Novelty Detection using Elliptical Fuzzy Clustering in a Reproducing Kernel Hilbert Space (abstract) |
09:45 | Bare Bones Fireworks Algorithm for Medical Image Compression (abstract) |
10:00 | Data Pre-processing to apply Multiple Imputation techniques: A case study on real-world census data (abstract) |
10:15 | Imbalanced data classification based on feature selection techniques (abstract) |
10:30 | MapReduce model for Random Forest algorithm: experimental studies (abstract) |
10:30-11:30 Session 6: Tutorial
Location: Multipurpose room
10:30 | Tutorial: Applying Machine Learning to detect Android Malware (abstract) |
11:30-12:00Coffee Break
12:00-13:00 Session 7: Plenary talk
Chair:
Location: Multipurpose room
12:00 | Tackling Many Objectives (abstract) |
13:00-14:00Lunch Break
14:10-16:10 Session 8A: Anomaly Detection and Trust Management
Chair:
Location: Multipurpose room
14:10 | Effective centralized trust management model for Internet of Things (abstract) |
14:25 | Applying Tree Ensemble to Detect Anomalies in Real-World Water Composition Dataset (abstract) |
14:40 | An Adaptive Anomaly Detection Algorithm for Periodic Real Time Data Streams (abstract) |
14:55 | ATM Fraud Detection using Outlier Detection (abstract) |
15:10 | Anomaly Detection in Spatial Layer Models of Autonomous Agents (abstract) |
15:25 | Intrusion Detection Using Transfer Learning in Machine Learning Classifiers Between Non-cloud and Cloud Datasets (abstract) |
15:40 | Signal Reconstruction using Evolvable Recurrent Neural Networks (abstract) |
15:55 | Applying cost-sensitive classifiers with reinforcement learning to IDS (abstract) |
14:10-16:10 Session 8B: Medical Applications of Artificial Intelligence
Chair:
Location: Mixed room
14:10 | Improving the Decision Support in Diagnostic Systems using Classifier Probability Calibration (abstract) |
14:25 | Compound local binary pattern and enhanced Jaya optimized extreme learning machine for digital mammogram classication (abstract) |
14:40 | An ELM based Regression Model for ECG Artifact Minimization from Single Channel EEG (abstract) |
14:55 | Intelligent wristbands for the automatic detection of emotional states for the elderly (abstract) |
15:10 | Deep Learning-based Approach for the Semantic Segmentation of Bright Retinal Damage (abstract) |
15:25 | Machine Learning for drugs prescription (abstract) |
15:40 | Identification of individual glandular regions using LCWT and machine learning techniques (abstract) |
15:55 | Specifics Analysis of Medical Communities in Social Network Services (abstract) |
14:10-15:25 Session 8C-I: Special Session on Machine Learning for Renewable Energy applications (MLRE)
Chair:
Location: Meeting room
14:10 | Wind power ramp events ordinal prediction using minimum complexity echo state networks (abstract) |
14:25 | Distribution-based discretisation and ordinal classification applied to wave height prediction (abstract) |
14:40 | Merging ELMs with Satellite Data and Clear-sky models for Effective Solar Radiation Estimation (abstract) |
14:55 | Studying the effect of measured solar power on evolutionary multi-objective prediction intervals (abstract) |
15:10 | Gaussian Process Kernels for Support Vector Regression in Wind Energy Prediction (abstract) |
15:25-16:10 Session 8C-II: Special Session on Evolutionary Computing Methods for Data Mining: Theory and Applications (ECMD)
Chairs:
Location: Meeting room
15:25 | Hospital admission and risk assessment associated to exposure of fungal bioaerosols at a municipal landfill using statistical models (abstract) |
15:40 | Bat algorithm swarm robotics approach for dual non-cooperative search with self-centered mode (abstract) |
15:55 | GELAB – A Matlab Toolbox for Grammatical Evolution (abstract) |
16:10-16:40Coffee Break
16:40-18:10 Session 9A: Image Analysis
Chair:
Location: Multipurpose room
16:40 | Deep-Learning-based Classification of Rat OCT images after Intravitreal Injection of ET-1 for Glaucoma Understanding (abstract) |
16:55 | CCTV Image Sequence Generation and Modeling Method for Video Anomaly Detection using Generative Adversarial Network (abstract) |
17:10 | Retinal Image Synthesis for Glaucoma Assessment using DCGAN and VAE Models (abstract) |
17:25 | Comparison of Local Analysis Strategies for Exudate Detection in Fundus Images (abstract) |
17:40 | Improved Architectural Redesign of MTree Clusterer in the Context of Image Segmentation (abstract) |
17:55 | Deep Neural Networks with Markov Random Field Models for Image Classification (abstract) |
16:40-18:10 Session 9B: Natural Language Processing & Computational Linguistics
Chair:
Location: Mixed room
16:40 | Linguistic Features to Identify Extreme Opinions: An Empirical Study (abstract) |
16:55 | Handwritten Character Recognition using Active Semi-Supervised Learning (abstract) |
17:10 | Exploring Online Novelty Detection Using First Story Detection Models (abstract) |
17:25 | Semantic WordRank: Generating Finer Single-Document Summarizations (abstract) |
17:40 | Concatenating or Averaging? Hybrid Sentence Representations for Sentiment Analysis (abstract) |
17:55 | Weighted Voting and Meta-Learning for Combining Authorship Attribution Methods (abstract) |
16:40-17:55 Session 9C: Special Session on Intelligent Techniques for the Analysis of Scientific Articles and Patents (ITASAP)
Chair:
Location: Meeting room
16:40 | Measuring the impact of the international relationships of the Andalusian universities using Dimensions database (abstract) |
16:55 | Constructing bibliometric networks from Spanish doctoral Theses (abstract) |
17:10 | A new approach for implicit citation extraction (abstract) |
17:25 | Bibliometric network analysis to identify the intellectual structure and evolution of the Big Data research field (abstract) |
17:40 | Evidence-based Systematic Literature Reviews in the Cloud (abstract) |
20:00-23:30Gala dinner
Friday, November 23rd
View this program: with abstractssession overviewtalk overview
10:00-11:30 Session 10C: Workshop on RiskTrack: Analyzing radicalization in Online Social Networks
Chair:
Location: Meeting room
10:00 | Introductory talk: Present and future perspectives on radicalization tracking (abstract) |
10:15 | On Detecting Online Radicalization Using Natural Language Processing (abstract) |
10:30 | RiskTrack: assessing the risk of Jihadi radicalization on Twitter using linguistic factors. (abstract) |
10:45 | Measuring Extremism: Validating an Alt-Right Twitter Accounts Dataset (abstract) |
11:00 | ONTOLOGY USES FOR RADICALISATION DETECTION on Social Networks (abstract) |
11:15 | Jihadi radicalized women in Spain: a profile (abstract) |
10:30-11:30 Session 10A: Workshop on the Interplay between Human-Computer Interaction and Data Science (HCI-DS)
Chair:
Location: Mixed room
10:30 | Introductory talk: Clustering and visualization of high-dimensional and complex data (abstract) |
10:45 | Exploratory study of the effects of cardiac murmurs on electrocardiographic-signal-based biometric systems (abstract) |
11:00 | Model Selection in Committees of Evolved Convolutional Neural Networks using Genetic Algorithms (abstract) |
11:15 | Optimizing Meta-Heuristics for the Time-Dependent Traveling Salesman Problem Applied to Air Travels (abstract) |
10:30-11:30 Session 10B: Big Data: Theory and applications
Chair:
Location: Multipurpose room
10:30 | Reusable Big Data System for Industrial Data Mining - A case study on Anomaly Detection in Chemical Plants (abstract) |
10:45 | Spatial-Temporal K Nearest Neighbors Model on MapReduce for Traffic Flow Prediction (abstract) |
11:00 | Low Level Big Data Processing (abstract) |
11:30-12:00Coffee Break
12:00-13:00 Session 11: Plenary talk
Chair:
Location: Multipurpose room
12:00 | Statistical and Algorithmic Learning (abstract) |
13:00-14:00Lunch Break
14:10-16:10 Session 12A: Social and Human Applications of Artificial Intelligence
Chair:
Location: Multipurpose room
14:10 | Finding the Importance of Facial Features in Social Trait Perception (abstract) |
14:25 | Extending Independent Component Analysis on Online Social Media for Event Detection (abstract) |
14:40 | Chatbot Theory: A Naı̈ve and Elementary Theory for Dialogue Management (abstract) |
14:55 | Understanding Learner's Drop-out in MOOCs (abstract) |
15:10 | Unsupervised Domain Adaptation for Human Activity Recognition (abstract) |
15:25 | Communication Skills Personal Trainer based on Viola-Jones object detection algorithm (abstract) |
15:40 | Predicting Online Review Scores Across Reviewer Categories (abstract) |
15:55 | Generalized low-computational cost Laplacian eigenmaps (abstract) |
14:10-16:10 Session 12B: Deep learning & Neural Networks
Chair:
Location: Mixed room
14:10 | Deep Learning applied to Wind Energy Forecasting (abstract) |
14:25 | An approximation to Deep Learning touristic-related time series forecasting (abstract) |
14:40 | Towards Complex Features: Competitive Receptive Fields in Unsupervised Deep Networks (abstract) |
14:55 | Framework for the Training of Deep Neural Networks in TensorFlow using Metaheuristics (abstract) |
15:10 | Improving SeNA-CNN by Automating Task Recognition (abstract) |
15:25 | Learning Optimal Q-function using Deep Boltzmann Machine for Reliable Trading of Cryptocurrency (abstract) |
15:40 | Detecting Intrusive Malware with a Hybrid Generative Deep Learning Model (abstract) |
15:55 | Predicting the Household Power Consumption using CNN- LSTM Hybrid Networks (abstract) |
14:10-15:10 Session 12C-I: Special Session on New Models of Bio-inspired computation for Massive Complex Environments (NMBC)
Chair:
Location: Meeting room
14:10 | A metaheuristic approach for the α-separator problem (abstract) |
14:25 | Community Detection in Weighted Directed Networks using Nature-inspired Heuristics (abstract) |
14:40 | An Artificial Bee Colony algorithm for optimizing the design of sensor networks (abstract) |
14:55 | Design of Japanesse Tree Frog algorithm for Community Finding Problems (abstract) |
15:10-16:10 Session 12C-II: Recommender Systems
Chair:
Location: Meeting room
15:10 | Taking e-Assessment Quizzes - A Case Study with an SVD Based Recommender System (abstract) |
15:25 | Exploring coclustering for serendipity improvement in content-based recommendation (abstract) |
15:40 | An Improved Fuzzy Logic Based Recommender System by Integrating Social Tags and Social Networks’ Information (abstract) |
15:55 | Novel and Classic Metaheuristics for Tunning a Recommender System for Predicting Student Performance in Online Campus (abstract) |