Default Cover Image

2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)

June 6 2018 to June 8 2018

Singapore, Singapore

Table of Contents

Research and Implementation of Big Data System of Social MediaFull-text access may be available. Sign in or learn about subscription options.pp. 629-636
Fake Accounts Detection on Twitter Using BlacklistFull-text access may be available. Sign in or learn about subscription options.pp. 562-566
Game Based Optical Experiment SimulationFull-text access may be available. Sign in or learn about subscription options.pp. 388-393
Robotic Vision Inspection of Complex Joints for Automatic WeldingFull-text access may be available. Sign in or learn about subscription options.pp. 246-251
ICIS 2018 Keynote 2Full-text access may be available. Sign in or learn about subscription options.pp. i-i
Using CNN-based Representation Learning Method for Malicious Traffic IdentificationFull-text access may be available. Sign in or learn about subscription options.pp. 400-404
The Implementation of Winnowing Algorithm for Plagiarism Detection in Moodle-based E-learningFull-text access may be available. Sign in or learn about subscription options.pp. 321-325
Distance-based Clustering of Moving Objects’ Trajectories from Spatiotemporal Big DataFull-text access may be available. Sign in or learn about subscription options.pp. 567-572
Research and Improvement of Convolutional Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 637-640
Analysis of the Art of War of Sun Tzu by Text Mining TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 626-628
Cn-MAKG: China Meteorology and Agriculture Knowledge Graph Construction Based on Semi-structured DataFull-text access may be available. Sign in or learn about subscription options.pp. 692-696
Quality Assessment of Open Source Software: A ReviewFull-text access may be available. Sign in or learn about subscription options.pp. 411-416
Fully-Convolutional Siamese Networks for Football Player TrackingFull-text access may be available. Sign in or learn about subscription options.pp. 330-334
Color Image Enhancement with Preservation of Gamut RangeFull-text access may be available. Sign in or learn about subscription options.pp. 480-484
Bridging the Communication Gap: With Real Time Sign Language TranslationFull-text access may be available. Sign in or learn about subscription options.pp. 485-490
A Fast and Simple Model in Practice for RankingFull-text access may be available. Sign in or learn about subscription options.pp. 326-329
Reverse-Learning Particle Swarm Optimization Algorithm Based on Niching TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 405-410
Relation Extraction Based on Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 687-691
Chinese Listeners’ Preferences of Pop Music in Europe and America and the Influencing FactorsFull-text access may be available. Sign in or learn about subscription options.pp. 622-625
A Positive Real Order Strengthening Buffer Operator and Its Application in Data PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 732-735
Floor Heating Customer Prediction Model Based on Random ForestFull-text access may be available. Sign in or learn about subscription options.pp. 573-578
Matrix Operation and Its Application in Computer EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 604-607
Tracing the Source of News Based on BlockchainFull-text access may be available. Sign in or learn about subscription options.pp. 377-381
A Greedy and Genetic Fusion Algorithm for Solving Course Timetabling ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 344-349
Automatic Extraction of Structural Model from Semi Structured Software Requirement SpecificationFull-text access may be available. Sign in or learn about subscription options.pp. 543-58
Refined Fluent Builder in JavaFull-text access may be available. Sign in or learn about subscription options.pp. 537-542
Image Segmentation Algorithms Based on Convolutional Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 350-354
3D Model Dynamic Perforation Simulation Based on Game EngineFull-text access may be available. Sign in or learn about subscription options.pp. 382-387
ICIS 2018 CommitteesFreely available from IEEE.pp. i-iii
An Analysis Method of the Business Circumstance and Stock Price of Listed Company with Social DataFull-text access may be available. Sign in or learn about subscription options.pp. 608-612
An Improved Distributed File System Based on GPU AccelerationFull-text access may be available. Sign in or learn about subscription options.pp. 736-739
Recording and Storage of 4K Live ProgramFull-text access may be available. Sign in or learn about subscription options.pp. 617-621
Application of Ant Colony Algorithm in Finding Shortest Paths in Mobile GamesFull-text access may be available. Sign in or learn about subscription options.pp. 589-592
ICIS 2018 Keynote 1Full-text access may be available. Sign in or learn about subscription options.pp. i-i
Visual Servoing in a Prioritized Constraint-based Torque Control FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 309-314
Research on Keyword Extraction of Word2vec Model in Chinese CorpusFull-text access may be available. Sign in or learn about subscription options.pp. 339-343
Film and TV Actors Recommendation Based on SALSA AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 372-376
Temporal Convolutional Neural Network for Gesture RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 367-371
Speech Recognition of Confusable Word Based on Ideal Distance MatrixFull-text access may be available. Sign in or learn about subscription options.pp. 335-338
A Study on Development of Autonomous Vehicle for Urban Road NavigationFull-text access may be available. Sign in or learn about subscription options.pp. 303-308
Improved Matching Algorithm Design Based on Dynamic Network Intrusion FeatureFull-text access may be available. Sign in or learn about subscription options.pp. 585-588
Design of Audio system for the 4K-UHD Studio of Communication University of ChinaFull-text access may be available. Sign in or learn about subscription options.pp. 613-616
Research and Design of University Students Accurate Funding SystemFull-text access may be available. Sign in or learn about subscription options.pp. 836-840
Electromagnetism Experiment Simulation Based on Game EngineFull-text access may be available. Sign in or learn about subscription options.pp. 781-785
PPNDN: Popularity-based Caching for Privacy Preserving in Named Data NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 39-44
Chemistry Experiment Simulation based on Game EngineFull-text access may be available. Sign in or learn about subscription options.pp. 776-780
Research on Decision Model of Soccer Robot SystemFull-text access may be available. Sign in or learn about subscription options.pp. 831-835
Design of Polymorphic Real-Time Computational Model for UAV ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 841-845
ICIS 2018 IndexFreely available from IEEE.pp. i-v
A Trust Model for Lightweight Semantic Annotation of Sensor Data in Pervasive EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 28-33
Hybrid Intrusion Detection System using K-means and K-Nearest Neighbors AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 34-38
The Application of Data Mining Technology in Employment Analysis of University GraduatesFull-text access may be available. Sign in or learn about subscription options.pp. 846-849
Coherence based Dual Microphone Source Separation in Low SNR Noisy EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 865-869
My Data: A Framework for Transfer of User Data Using NS2 SimulatorFull-text access may be available. Sign in or learn about subscription options.pp. 10-15
A Framework for CPS Modeling and Verification Based on dLFull-text access may be available. Sign in or learn about subscription options.pp. 173-179
Research on Satellite Navigation Signal Analysis and Accelerate Optimization AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 860-864
Improved Stacking Model Fusion Based on Weak Classifier and Word2vecFull-text access may be available. Sign in or learn about subscription options.pp. 820-824
Research on the Business Process Improvement and Reengineering of Multimedia Audio-visual in CollegesFull-text access may be available. Sign in or learn about subscription options.pp. 881-887
Research of the Infrared Ship Target Recognition Technology based on the Complex BackgroundFull-text access may be available. Sign in or learn about subscription options.pp. 850-854
Coverage Optimization of Wireless Sensor Networks with Normal DistributionFull-text access may be available. Sign in or learn about subscription options.pp. 16-21
A Triggered Delay-based Approach against Cache Privacy Attack in NDNFull-text access may be available. Sign in or learn about subscription options.pp. 22-27
Play games using Reinforcement Learning and Artificial Neural Networks with Experience ReplayFull-text access may be available. Sign in or learn about subscription options.pp. 855-859
An Improved Deep Belief Network Prediction MethodFull-text access may be available. Sign in or learn about subscription options.pp. 825-830
Models of Field Strength Calculation in HF Sky-Wave Propagation on Rough Sea SurfaceFull-text access may be available. Sign in or learn about subscription options.pp. 802-805
Trademark Image Retrieval System Based on SIFT AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 740-743
Deep Neural Network based Supervised Speech Enhancement in Speech-Babble NoiseFull-text access may be available. Sign in or learn about subscription options.pp. 871-874
Skin Lesion Segmentation Using Multiple Density Clustering Algorithm MDCUT And Region GrowingFull-text access may be available. Sign in or learn about subscription options.pp. 74-79
ICIS 2018 Title PageFreely available from IEEE.pp. i-ii
Verifying CPS for Self-AdaptabilityFull-text access may be available. Sign in or learn about subscription options.pp. 166-172
The Research of Several Situations About Memory Accessing on Non-Uniform Memory Access ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 744-747
Comprehensive Evaluation Research on Farmer Entrepreneurship Based on Poverty AlleviationFull-text access may be available. Sign in or learn about subscription options.pp. 806-810
OPNET-based Performance Analysis of Encrypted Communication ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 754-757
The Experimental Implementation of GrabCut for Hardcode Subtitle ExtractionFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Comparative Analysis of Discretization Algorithms on Decision TreeFull-text access may be available. Sign in or learn about subscription options.pp. 63-67
An Improved Primate Swarm Algorithm with Adaptive K-Mean for Optimization ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 148-153
Flight Safety Analysis with Multi-information’s Dynamic Perception and SynthesisFull-text access may be available. Sign in or learn about subscription options.pp. 811-814
Research on LDA Model Algorithm of News-oriented Web CrawlerFull-text access may be available. Sign in or learn about subscription options.pp. 748-753
Construction on Framework of Rumor Detection and Warning System Based on Web Mining TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 767-771
Pricing Models for Crowdsourcing Tasks Based on Geographic InformationFull-text access may be available. Sign in or learn about subscription options.pp. 794-797
Research on the Business Process Improvement and Reengineering of Multimedia Audiovisual in CollegesFull-text access may be available. Sign in or learn about subscription options.pp. 51-56
Parametric Representation of Voiced Speech Phoneme using Multicomponent AM Signal ModelFull-text access may be available. Sign in or learn about subscription options.pp. 128-133
A Review of Human Action Recognition in VideoFull-text access may be available. Sign in or learn about subscription options.pp. 57-62
Showing 100 out of 174