ISCC 2017 - (other iscc conferences)
16-17 December, 2017
Guangzhou, China
published March 08, 2018

This conference proceedInformation Science and Cloud Computinging is a collection of the papers accepted by ISCC 2017 - the 5th International Conference on Information Science and Cloud Computing held on 16-17 December 2017 in Guangzhou, China.

This proceeding contains the four parts. Part I is Machine learning (15 papers) which mainly includes graphical models, algorithm improvement, and its related application. Part II is Information science (15 papers), which including the information analysis, risk assessment, and recommender system, etc.. Part III is System detection (14 papers), mainly related to fault diagnosis, network security monitoring, cloud computing and countermeasure power analysis. Part IV is Communication analysis (15 papers), which is primarily about the digital spread spectrum signal, communication data, and power analysis.

Each part is critical as an excellent reference by industry practitioners, university faculty, and undergraduate as well as graduate students who need to build a knowledge base of the most current advances and state-of-practice in the topics covered by this conference proceeding. This will enable them to produce, maintain, and manage systems with high levels of trustworthiness and complexity.

Thanks to the authors for their hard works and dedications as well as the reviewers for ensuring the selection of only the highest quality papers. Their efforts made this proceeding possible.

Editorial Board

  • Jiangnan Chen
    Nanjing Zhong'ai Educational Technology Co
conference main image
Sessions
Session I machine learning
Session II: Information Science
Sesssion III: System detection
Session IV: Communication Analysis
Session I machine learning
Entity Relation Extraction Method Based on Improved K-means Clustering
B. Yu, K. Pan, C. Zhang, Y. Xie and J. Sun
Scheduling and Routing in Multi-Channel Allocation Based on the Greedy Algorithm for Wireless Mesh Network
W. Zhang, J. He, G. Gao, L. Ren and X. Shen
Research on Intrusion Detection Based on Improved AntMiner Algorithm
Y. Shen, K. Zheng and C. Wu
Price Association Analysis of Agricultural Products based on Apriori Algorithm
L. Qiao, C. Peng, X. Guo and Y. Wang
Double Time Slot RFID Anti-collision Algorithm Based on Gray Code
H. Deng, L. Li and H. Wang
A Novel Hyper Chaos-based Image Encryption Algorithm Using Dynamic DNA Coding and SHA-256
S. Zhu, W. Wang and C. Ban
Chinese-English Cross-Language Text Clustering Algorithm Based on Latent Semantic Analysis
H. Lan and J. Huang
A New Algorithm based on Bagging and NFS
J. Lei and J. He
Research on Similarity Detection of Massive Text Based on Semantic Fingerprint
X. Jin, S. Zhang, J. Liu and H. Guan
A New Image Encryption Algorithm by the Combining of Chaotic Maps
C. Zhu and S. Li
Social Network Recommendation Algorithm Based on ICIP
L. Bi, X. Di, W. Ren and Y. Zhang
The Application Research of Cellular Genetic Algorithm in Vehicle Routing Problem
Y. Jin, J. Fan, J. Yang, J. Li and D. Fan
An Algorithm for Densest Subgraphs of Vertex-weighted Graphs
Z. Liu, W. Chen, F. Li, K. Qi and J. Wang
Attention-based BiLSTM Neural Networks for Sentiment Classification of Short Texts
Research on Multimodal Emotion Recognition Platform Construction
W. Liu, H. Jiang and Y. Lu
Session II: Information Science
Design of Tourism Information System with B/S and C/S Architecture Based on Android and Web Platform
X. Dou, Y. Yang, W. Zhou, Z. Zhao, X. Chen and G. You
A Constraint-based Tourist Attraction Recommender System
Y. Shi and Z. Jia
Antecedents of Project Success in Donation-based Crowdfunding-based on Tencent LeJuan Platform in China
Y. Qian and J. Lin
Collaborative Filtering Recommendation System Based on User Potential Associated Information
H. Shen and K. Sun
Credit Risk Assessment of Receivable Accounts in Industry Chain based on SVM
Training on Statistical Feature Models of Action Units for 3D Facial Expression Recognition
Z. Dong, X. Jia, W. Gao and K. Wang
Cognition-based Fusion Method for Infrared and Visible image
J. Ma and D. Zhang
The Detection of Web Abnormal Scan Behaviors Based on Cluster Analysis
D. Bai, M. Feng, L. Chen and X. Guo
Analysis the Influence of Official Information on Network Public Opinion based on Visualization Method
C. Dong and G. Sun
Study on the Organization and Storage of Remote Sensing Data Oriented to Visualization Management
H. Yu, S. Li and T. Zhang
Low-Quality and Multi-Target Detection in RSIs
G. Liu, S. Li and Y. Shao
Explore the Application of S-HAL in the Identification of the Sentiment Polarity of Chinese Words
From Bipartite Network to Function: Online-Nearline-Offline Hybrid Music Recommendation
P. Zhang, J. Yan, Y. Wang, T. Lin, Y. Leng and J. Chen
Feature Split-based Information Extraction in the Field of Medicine
J. Wan, H. Yan and X. Zhang
Design and Implementation of Human Space-based Automated Test Cases based on Script
A Study of Recommended Model of Aeronautic Products based on Collaborative Algorithm
W. Qiu, C. Lu and X. Cheng
Sesssion III: System detection
A Study on Security Risk in Cloud Computing
L. Chen and X. Chen
Research on Security Threat Monitoring and Testing Framework in Software - Defined Network Based on Depth Learning
S. Yang, L. Wang, D. Zhao, X. Han and S. Zhang
Research based on Big Data and Cloud Computing
X. Chen and L. Chen
Visual Localization for Copter based on 3D Model of Environment with CNN Segmentation
A. Buyval, R. Mustafin, M. Gavrilenkov, A. Gabdullin and I. Shimchik
Rigid-Flexible Coupling Dynamics Simulation Analysis of Wheel/Rail Interaction in High-speed Turnout Zone
M. Yu, W. Wang, J. Liu and J. Qu
Concept Discovery of Specific Field Based on Conditional Random Field and Information Entropy
J. Wan, L. Xing, S. Zhang and W. Liang
Fault Diagnosis of Power Quality and Disturbance Classification Based on KPCA - FDA Method
L. Xie and J. Wei
FPGA Optimal Implementation of PRINCE against Power Analysis Attacks
Y. Zou and L. Li
A Transient Finite Element Model to Simulate the Physical Mechanisms of High-speed Wheel/rail Rolling Contact on a Rail Welding Joint
M. Yu, W. Wang and J. Liu
An Intelligent Writing Assistant Module for Narrative Clinical Records Based on Named Entity Recognition and Similarity Computation
T. Zhou and J. Li
Security Analysis of GRID Protocol for MANET based on BAN Logic
S. Han and W. Jiao
Research on Application of Virtual Reality Technology in Design and Manufacturing Industry
Y. Zhang, P. Yang, L. Liu and A. Chen
Application of Data and Information Visualization in Electronic Commerce
H. Huang, J. Zhao and Z. Xu
TOGAF for Agile SOA Modelling
F. Ni and R. Li
Session IV: Communication Analysis
Security Path Checking of A Circuit with Behavior Description
C. Ma, A. He, T. Jia, L. Li and Z. Feng
Fast Acquisition for DS/FH Spread Spectrum Signals by Using Folded Sampling Digital Receiver
X. Wen, B. Yang and G. Zou
Routing Analysis of Protocol AODV in Wireless Mesh Network
W. Zhang, J. He, G. Gao, L. Ren and X. Shen
Construction of a High Efficient Distinguisher in Differential Power Analysis Attacks
Y. Guo, Y. Ou and L. Li
Research on Improved Particle Swarm Optimization based on Membrane System in Cloud Resource Scheduling
J. Chen, W. Gong, T. Liang, J. Xu and S. Wei
The Management System of Beef Cattle Breeding based on the Data Record of Whole Industry Chain
R. Yao, Y. Song and R. Zhang
A Data Tamper Protection Method Based on Block Chain
F. Zhou, Z. Yu, Y. Xie, T.e. Chen and Y. Liao
Research on Hybrid Architecture System of Embedded and Cloud Computing Storage
H. He, C. Chen and Y. Qiao
An Energy-Efficient VM Consolidation Algorithm for Cloud Data Centers
Efficient and Flexible VLSI Architecture for Soft-Output Massive MIMO Detector
Q. Wei, L. Liu, G. Peng, S. Yin and S. Wei
Assembly Data Mining Platform Based on Python
K. Zhang, G. Li and M. Zhang
A Novel Signed Truncated Booth Multiplier Based on Probability
Y. Tan, L. Liu, G. Peng, S. Yin and S. Wei
Application of CAUX in Remote Evaluation of Websites
Z. Wang and Z. Liu
CAUX Tool for Supporting Diary Studies
X. Wang and Z. Liu
A Review of EEG Signal Classifier Based on Deep Learning
Y. Lu, H. Jiang and W. Liu