This conference proceedInformation Science and Cloud Computinging is a collection of the papers accepted by ISCC 2017 - the 5th International Conference on Information Science and Cloud Computing held on 16-17 December 2017 in Guangzhou, China.
This proceeding contains the four parts. Part I is Machine learning (15 papers) which mainly includes graphical models, algorithm improvement, and its related application. Part II is Information science (15 papers), which including the information analysis, risk assessment, and recommender system, etc.. Part III is System detection (14 papers), mainly related to fault diagnosis, network security monitoring, cloud computing and countermeasure power analysis. Part IV is Communication analysis (15 papers), which is primarily about the digital spread spectrum signal, communication data, and power analysis.
Each part is critical as an excellent reference by industry practitioners, university faculty, and undergraduate as well as graduate students who need to build a knowledge base of the most current advances and state-of-practice in the topics covered by this conference proceeding. This will enable them to produce, maintain, and manage systems with high levels of trustworthiness and complexity.
Thanks to the authors for their hard works and dedications as well as the reviewers for ensuring the selection of only the highest quality papers. Their efforts made this proceeding possible.
Sessions |
---|
Session I machine learning |
Session II: Information Science |
Sesssion III: System detection |
Session IV: Communication Analysis |
Session I machine learning |
Entity Relation Extraction Method Based on Improved K-means Clustering PoS(ISCC 2017)001 pdf |
Scheduling and Routing in Multi-Channel Allocation Based on the Greedy Algorithm for Wireless Mesh Network PoS(ISCC 2017)002 pdf |
Research on Intrusion Detection Based on Improved AntMiner Algorithm PoS(ISCC 2017)003 pdf |
Price Association Analysis of Agricultural Products based on Apriori Algorithm PoS(ISCC 2017)004 pdf |
Double Time Slot RFID Anti-collision Algorithm Based on Gray Code PoS(ISCC 2017)005 pdf |
A Novel Hyper Chaos-based Image Encryption Algorithm Using Dynamic DNA Coding and SHA-256 PoS(ISCC 2017)006 pdf |
Chinese-English Cross-Language Text Clustering Algorithm Based on Latent Semantic Analysis PoS(ISCC 2017)007 pdf |
A New Algorithm based on Bagging and NFS PoS(ISCC 2017)008 pdf |
Research on Similarity Detection of Massive Text Based on Semantic Fingerprint PoS(ISCC 2017)009 pdf |
A New Image Encryption Algorithm by the Combining of Chaotic Maps PoS(ISCC 2017)010 pdf |
Social Network Recommendation Algorithm Based on ICIP PoS(ISCC 2017)011 pdf |
The Application Research of Cellular Genetic Algorithm in Vehicle Routing Problem PoS(ISCC 2017)012 pdf |
An Algorithm for Densest Subgraphs of Vertex-weighted Graphs PoS(ISCC 2017)013 pdf |
Attention-based BiLSTM Neural Networks for Sentiment Classification of Short Texts PoS(ISCC 2017)014 pdf |
Research on Multimodal Emotion Recognition Platform Construction PoS(ISCC 2017)015 pdf |
Session II: Information Science |
Design of Tourism Information System with B/S and C/S Architecture Based on Android and Web Platform PoS(ISCC 2017)016 pdf |
A Constraint-based Tourist Attraction Recommender System PoS(ISCC 2017)017 pdf |
Antecedents of Project Success in Donation-based Crowdfunding-based on Tencent LeJuan Platform in China PoS(ISCC 2017)018 pdf |
Collaborative Filtering Recommendation System Based on User Potential Associated Information PoS(ISCC 2017)019 pdf |
Credit Risk Assessment of Receivable Accounts in Industry Chain based on SVM PoS(ISCC 2017)020 pdf |
Training on Statistical Feature Models of Action Units for 3D Facial Expression Recognition PoS(ISCC 2017)021 pdf |
Cognition-based Fusion Method for Infrared and Visible image PoS(ISCC 2017)022 pdf |
The Detection of Web Abnormal Scan Behaviors Based on Cluster Analysis PoS(ISCC 2017)023 pdf |
Analysis the Influence of Official Information on Network Public Opinion based on Visualization Method PoS(ISCC 2017)024 pdf |
Study on the Organization and Storage of Remote Sensing Data Oriented to Visualization Management PoS(ISCC 2017)025 pdf |
Low-Quality and Multi-Target Detection in RSIs PoS(ISCC 2017)026 pdf |
Explore the Application of S-HAL in the Identification of the Sentiment Polarity of Chinese Words PoS(ISCC 2017)027 pdf |
From Bipartite Network to Function: Online-Nearline-Offline Hybrid Music Recommendation PoS(ISCC 2017)028 pdf |
Feature Split-based Information Extraction in the Field of Medicine PoS(ISCC 2017)029 pdf |
Design and Implementation of Human Space-based Automated Test Cases based on Script PoS(ISCC 2017)030 pdf |
A Study of Recommended Model of Aeronautic Products based on Collaborative Algorithm PoS(ISCC 2017)031 pdf |
Sesssion III: System detection |
A Study on Security Risk in Cloud Computing PoS(ISCC 2017)032 pdf |
Research on Security Threat Monitoring and Testing Framework in Software - Defined Network Based on Depth Learning PoS(ISCC 2017)033 pdf |
Research based on Big Data and Cloud Computing PoS(ISCC 2017)034 pdf |
Visual Localization for Copter based on 3D Model of Environment with CNN Segmentation PoS(ISCC 2017)035 pdf |
Rigid-Flexible Coupling Dynamics Simulation Analysis of Wheel/Rail Interaction in High-speed Turnout Zone PoS(ISCC 2017)036 pdf |
Concept Discovery of Specific Field Based on Conditional Random Field and Information Entropy PoS(ISCC 2017)037 pdf |
Fault Diagnosis of Power Quality and Disturbance Classification Based on KPCA - FDA Method PoS(ISCC 2017)038 pdf |
FPGA Optimal Implementation of PRINCE against Power Analysis Attacks PoS(ISCC 2017)039 pdf |
A Transient Finite Element Model to Simulate the Physical Mechanisms of High-speed Wheel/rail Rolling Contact on a Rail Welding Joint PoS(ISCC 2017)040 pdf |
An Intelligent Writing Assistant Module for Narrative Clinical Records Based on Named Entity Recognition and Similarity Computation PoS(ISCC 2017)041 pdf |
Security Analysis of GRID Protocol for MANET based on BAN Logic PoS(ISCC 2017)042 pdf |
Research on Application of Virtual Reality Technology in Design and Manufacturing Industry PoS(ISCC 2017)043 pdf |
Application of Data and Information Visualization in Electronic Commerce PoS(ISCC 2017)044 pdf |
TOGAF for Agile SOA Modelling PoS(ISCC 2017)045 pdf |
Session IV: Communication Analysis |
Security Path Checking of A Circuit with Behavior Description PoS(ISCC 2017)046 pdf |
Fast Acquisition for DS/FH Spread Spectrum Signals by Using Folded Sampling Digital Receiver PoS(ISCC 2017)047 pdf |
Routing Analysis of Protocol AODV in Wireless Mesh Network PoS(ISCC 2017)048 pdf |
Construction of a High Efficient Distinguisher in Differential Power Analysis Attacks PoS(ISCC 2017)049 pdf |
Research on Improved Particle Swarm Optimization based on Membrane System in Cloud Resource Scheduling PoS(ISCC 2017)050 pdf |
The Management System of Beef Cattle Breeding based on the Data Record of Whole Industry Chain PoS(ISCC 2017)051 pdf |
A Data Tamper Protection Method Based on Block Chain PoS(ISCC 2017)052 pdf |
Research on Hybrid Architecture System of Embedded and Cloud Computing Storage PoS(ISCC 2017)053 pdf |
An Energy-Efficient VM Consolidation Algorithm for Cloud Data Centers PoS(ISCC 2017)054 pdf |
Efficient and Flexible VLSI Architecture for Soft-Output Massive MIMO Detector PoS(ISCC 2017)055 pdf |
Assembly Data Mining Platform Based on Python PoS(ISCC 2017)056 pdf |
A Novel Signed Truncated Booth Multiplier Based on Probability PoS(ISCC 2017)057 pdf |
Application of CAUX in Remote Evaluation of Websites PoS(ISCC 2017)058 pdf |
CAUX Tool for Supporting Diary Studies PoS(ISCC 2017)059 pdf |
A Review of EEG Signal Classifier Based on Deep Learning PoS(ISCC 2017)060 pdf |