This conference proceedInformation Science and Cloud Computinging is a collection of the papers accepted by ISCC 2017 - the 5th International Conference on Information Science and Cloud Computing held on 16-17 December 2017 in Guangzhou, China.
This proceeding contains the four parts. Part I is Machine learning (15 papers) which mainly includes graphical models, algorithm improvement, and its related application. Part II is Information science (15 papers), which including the information analysis, risk assessment, and recommender system, etc.. Part III is System detection (14 papers), mainly related to fault diagnosis, network security monitoring, cloud computing and countermeasure power analysis. Part IV is Communication analysis (15 papers), which is primarily about the digital spread spectrum signal, communication data, and power analysis.
Each part is critical as an excellent reference by industry practitioners, university faculty, and undergraduate as well as graduate students who need to build a knowledge base of the most current advances and state-of-practice in the topics covered by this conference proceeding. This will enable them to produce, maintain, and manage systems with high levels of trustworthiness and complexity.
Thanks to the authors for their hard works and dedications as well as the reviewers for ensuring the selection of only the highest quality papers. Their efforts made this proceeding possible.

| Sessions |
|---|
| Session I machine learning |
| Session II: Information Science |
| Sesssion III: System detection |
| Session IV: Communication Analysis |
| Session I machine learning |
|---|
|
Entity Relation Extraction Method Based on Improved K-means Clustering
|
|
Scheduling and Routing in Multi-Channel Allocation Based on the Greedy Algorithm for Wireless Mesh Network
|
|
Research on Intrusion Detection Based on Improved AntMiner Algorithm
|
|
Price Association Analysis of Agricultural Products based on Apriori Algorithm
|
|
Double Time Slot RFID Anti-collision Algorithm Based on Gray Code
|
|
A Novel Hyper Chaos-based Image Encryption Algorithm Using Dynamic DNA Coding and SHA-256
|
|
Chinese-English Cross-Language Text Clustering Algorithm Based on Latent Semantic Analysis
|
|
A New Algorithm based on Bagging and NFS
|
|
Research on Similarity Detection of Massive Text Based on Semantic Fingerprint
|
|
A New Image Encryption Algorithm by the Combining of Chaotic Maps
|
|
Social Network Recommendation Algorithm Based on ICIP
|
|
The Application Research of Cellular Genetic Algorithm in Vehicle Routing Problem
|
|
An Algorithm for Densest Subgraphs of Vertex-weighted Graphs
|
|
Attention-based BiLSTM Neural Networks for Sentiment Classification of Short Texts
|
|
Research on Multimodal Emotion Recognition Platform Construction
|
| Session II: Information Science |
|
Design of Tourism Information System with B/S and C/S Architecture Based on Android and Web Platform
|
|
A Constraint-based Tourist Attraction Recommender System
|
|
Antecedents of Project Success in Donation-based Crowdfunding-based on Tencent LeJuan Platform in China
|
|
Collaborative Filtering Recommendation System Based on User Potential Associated Information
|
|
Credit Risk Assessment of Receivable Accounts in Industry Chain based on SVM
|
|
Training on Statistical Feature Models of Action Units for 3D Facial Expression Recognition
|
|
Cognition-based Fusion Method for Infrared and Visible image
|
|
The Detection of Web Abnormal Scan Behaviors Based on Cluster Analysis
|
|
Analysis the Influence of Official Information on Network Public Opinion based on Visualization Method
|
|
Study on the Organization and Storage of Remote Sensing Data Oriented to Visualization Management
|
|
Low-Quality and Multi-Target Detection in RSIs
|
|
Explore the Application of S-HAL in the Identification of the Sentiment Polarity of Chinese Words
|
|
From Bipartite Network to Function: Online-Nearline-Offline Hybrid Music Recommendation
|
|
Feature Split-based Information Extraction in the Field of Medicine
|
|
Design and Implementation of Human Space-based Automated Test Cases based on Script
|
|
A Study of Recommended Model of Aeronautic Products based on Collaborative Algorithm
|
| Sesssion III: System detection |
|
A Study on Security Risk in Cloud Computing
|
|
Research on Security Threat Monitoring and Testing Framework in Software - Defined Network Based on Depth Learning
|
|
Research based on Big Data and Cloud Computing
|
|
Visual Localization for Copter based on 3D Model of Environment with CNN Segmentation
|
|
Rigid-Flexible Coupling Dynamics Simulation Analysis of Wheel/Rail Interaction in High-speed Turnout Zone
|
|
Concept Discovery of Specific Field Based on Conditional Random Field and Information Entropy
|
|
Fault Diagnosis of Power Quality and Disturbance Classification Based on KPCA - FDA Method
|
|
FPGA Optimal Implementation of PRINCE against Power Analysis Attacks
|
|
A Transient Finite Element Model to Simulate the Physical Mechanisms of High-speed Wheel/rail Rolling Contact on a Rail Welding Joint
|
|
An Intelligent Writing Assistant Module for Narrative Clinical Records Based on Named Entity Recognition and Similarity Computation
|
|
Security Analysis of GRID Protocol for MANET based on BAN Logic
|
|
Research on Application of Virtual Reality Technology in Design and Manufacturing Industry
|
|
Application of Data and Information Visualization in Electronic Commerce
|
|
TOGAF for Agile SOA Modelling
|
| Session IV: Communication Analysis |
|
Security Path Checking of A Circuit with Behavior Description
|
|
Fast Acquisition for DS/FH Spread Spectrum Signals by Using Folded Sampling Digital Receiver
|
|
Routing Analysis of Protocol AODV in Wireless Mesh Network
|
|
Construction of a High Efficient Distinguisher in Differential Power Analysis Attacks
|
|
Research on Improved Particle Swarm Optimization based on Membrane System in Cloud Resource Scheduling
|
|
The Management System of Beef Cattle Breeding based on the Data Record of Whole Industry Chain
|
|
A Data Tamper Protection Method Based on Block Chain
|
|
Research on Hybrid Architecture System of Embedded and Cloud Computing Storage
|
|
An Energy-Efficient VM Consolidation Algorithm for Cloud Data Centers
|
|
Efficient and Flexible VLSI Architecture for Soft-Output Massive MIMO Detector
|
|
Assembly Data Mining Platform Based on Python
|
|
A Novel Signed Truncated Booth Multiplier Based on Probability
|
|
Application of CAUX in Remote Evaluation of Websites
|
|
CAUX Tool for Supporting Diary Studies
|
|
A Review of EEG Signal Classifier Based on Deep Learning
|