Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICIS
ICIS 2018
Generate Citations
2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS)
June 6 2018 to June 8 2018
Singapore, Singapore
Table of Contents
Research and Implementation of Big Data System of Social Media
Full-text access may be available. Sign in or learn about subscription options.
pp. 629-636
by
Wen Lu
,
Ligu Zhu
,
Shufeng Duan
Fake Accounts Detection on Twitter Using Blacklist
Full-text access may be available. Sign in or learn about subscription options.
pp. 562-566
by
Myo Myo Swe
,
Nyein Nyein Myo
The Robotic Fish Strategy Based on The Extreme Learning Machine Optimized by Particle Swarm Optimization Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 315-320
by
XueXi Zhang
,
Shuibiao Chen
,
ZhiGuang Cao
,
ShuTing Cai
,
ZeRong Peng
,
XiaoMing Xiong
Game Based Optical Experiment Simulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 388-393
by
Wenfeng Hu
,
Jiangchun Guo
,
Xiaolin Li
Robotic Vision Inspection of Complex Joints for Automatic Welding
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-251
by
Wenyu Chen
,
Wei Xiong
,
Jierong Cheng
,
Ying Gu
,
Yusha Li
ICIS 2018 Keynote 2
Full-text access may be available. Sign in or learn about subscription options.
pp. i-i
Design of a VR-Based Upper Limb Gross Motor and Fine Motor Task Platform for Post-Stroke Survivors
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-257
by
Kumar Saurav
,
Adyasha Dash
,
Dhaval Solanki
,
Uttama Lahiri
Using CNN-based Representation Learning Method for Malicious Traffic Identification
Full-text access may be available. Sign in or learn about subscription options.
pp. 400-404
by
Yao Wang
,
Jing An
,
Wei Huang
The Implementation of Winnowing Algorithm for Plagiarism Detection in Moodle-based E-learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-325
by
Eric Ganiwijaya Hasan
,
Arya Wicaksana
,
Seng Hansun
Distance-based Clustering of Moving Objects’ Trajectories from Spatiotemporal Big Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 567-572
by
Khaing Phyo Wai
,
Than Nwe Aung
Research and Improvement of Convolutional Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 637-640
by
Ningning Yi
,
Chunfang Li
,
Xin Feng
,
Minyong Shi
Identifying Flood Prone Regions in Bangladesh by Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 556-561
by
Kazi Kowshin Raihana
,
Syed Mosahid Khurshid Rishad
,
Tahsin Sadia
,
Sarfaraz Ahmed
,
Md.Sakibul Alam
,
Rashedur M. Rahman
Analysis of the Art of War of Sun Tzu by Text Mining Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 626-628
by
Wang Huiqin
,
Lin Weiguo
Cn-MAKG: China Meteorology and Agriculture Knowledge Graph Construction Based on Semi-structured Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 692-696
by
Qi Chenglin
,
Song Qing
,
Zhang Pengzhou
,
Yuan Hui
Quality Assessment of Open Source Software: A Review
Full-text access may be available. Sign in or learn about subscription options.
pp. 411-416
by
Joseph Tassone
,
Shaochun Xu
,
Chunning Wang
,
Jiao Chen
,
Wencai Du
Fully-Convolutional Siamese Networks for Football Player Tracking
Full-text access may be available. Sign in or learn about subscription options.
pp. 330-334
by
Yuejie Ma
,
Shuang Feng
,
Yongbin Wang
Color Image Enhancement with Preservation of Gamut Range
Full-text access may be available. Sign in or learn about subscription options.
pp. 480-484
by
Myint Myint Maw
,
Renu
Bridging the Communication Gap: With Real Time Sign Language Translation
Full-text access may be available. Sign in or learn about subscription options.
pp. 485-490
by
Pavleen Kaur
,
Payel Ganguly
,
Saumya Verma
,
Neha Bansal
A Fast and Simple Model in Practice for Ranking
Full-text access may be available. Sign in or learn about subscription options.
pp. 326-329
by
Weijian Fan
,
Wen Liu
,
Jing An
,
Yongbin Wang
Reverse-Learning Particle Swarm Optimization Algorithm Based on Niching Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 405-410
by
Hongbin Dong
,
Hua Zhang
,
Shuang Han
,
Xiaohui Li
,
Xiaowei Wang
Relation Extraction Based on Deep Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 687-691
by
Liu Xue
,
Song Qing
,
Zhang Pengzhou
Chinese Listeners’ Preferences of Pop Music in Europe and America and the Influencing Factors
Full-text access may be available. Sign in or learn about subscription options.
pp. 622-625
by
Shen Qi
,
Zhang Hui
,
Cai JuanJuan
Using Big Data Technology to Analyze the Fluctuation Trends in Stock Price – As a Practice of Taiwan Financial Stock Market
Full-text access may be available. Sign in or learn about subscription options.
pp. 549-555
by
Shin-Jer Yang
,
Chia-Hua Chen
A Positive Real Order Strengthening Buffer Operator and Its Application in Data Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 732-735
by
Yingjian Qi
,
Zhengpeng Wu
,
Liyun Wu
,
Xiaomei Liu
Floor Heating Customer Prediction Model Based on Random Forest
Full-text access may be available. Sign in or learn about subscription options.
pp. 573-578
by
Zhihuan Yao
,
Xian Xu
,
Huiqun Yu
Matrix Operation and Its Application in Computer Engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 604-607
by
Fang Dong
,
Yinmei Lv
Tracing the Source of News Based on Blockchain
Full-text access may be available. Sign in or learn about subscription options.
pp. 377-381
by
Wenqian Shang
,
Mengyu Liu
,
Weiguo Lin
,
Minzheng Jia
A Greedy and Genetic Fusion Algorithm for Solving Course Timetabling Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 344-349
by
Kaixiang Wang
,
Wenqian Shang
,
Mengyu Liu
,
Weiguo Lin
,
Hao Fu
Automatic Extraction of Structural Model from Semi Structured Software Requirement Specification
Full-text access may be available. Sign in or learn about subscription options.
pp. 543-58
by
Shweta
,
Ratna Sanyal
,
Bibhas Ghoshal
Refined Fluent Builder in Java
Full-text access may be available. Sign in or learn about subscription options.
pp. 537-542
by
Mikhail Michael Chalabine
Image Segmentation Algorithms Based on Convolutional Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 350-354
by
Zeheng Zhou
,
Hongru Wang
,
Wenqian Shang
,
Lingfei Zhang
3D Model Dynamic Perforation Simulation Based on Game Engine
Full-text access may be available. Sign in or learn about subscription options.
pp. 382-387
by
Wenfeng Hu
,
Taobo Gao
,
Yue Li
ICIS 2018 Committees
Freely available from IEEE.
pp. i-iii
An Analysis Method of the Business Circumstance and Stock Price of Listed Company with Social Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 608-612
by
Xie Weihua
,
Su Qin
The Design and Implementation of Script Authoring Assistant System of Film and Television Big Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 579-584
by
Mengyu Liu
,
Wenqian Shang
,
Jianxiang Cao
,
Chan Pan
,
Weiguo Lin
,
Hao Fu
An Improved Distributed File System Based on GPU Acceleration
Full-text access may be available. Sign in or learn about subscription options.
pp. 736-739
by
Songtao Shang
,
Yong Gan
,
Huaiguang Wu
Recording and Storage of 4K Live Program
Full-text access may be available. Sign in or learn about subscription options.
pp. 617-621
by
Wang Bo
,
Zhang Xin
,
Wei Shiyao
Application of Ant Colony Algorithm in Finding Shortest Paths in Mobile Games
Full-text access may be available. Sign in or learn about subscription options.
pp. 589-592
by
Xuekun Jiang
,
MinYong Shi
ICIS 2018 Keynote 1
Full-text access may be available. Sign in or learn about subscription options.
pp. i-i
Visual Servoing in a Prioritized Constraint-based Torque Control Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 309-314
by
Caixia Cai
,
Nikhil Somani
Research on Keyword Extraction of Word2vec Model in Chinese Corpus
Full-text access may be available. Sign in or learn about subscription options.
pp. 339-343
by
Chenchen Zhang
,
Xingjuan Wang
,
Shuiyuan Yu
,
Yongbin Wang
Film and TV Actors Recommendation Based on SALSA Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 372-376
by
Xingyan Liu
,
Chunfang Li
,
Aimoerfu
,
Dianzhao Wu
Temporal Convolutional Neural Network for Gesture Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 367-371
by
Dongwei Lu
,
Chu Qiu
,
Yi Xiao
Speech Recognition of Confusable Word Based on Ideal Distance Matrix
Full-text access may be available. Sign in or learn about subscription options.
pp. 335-338
by
Qiang Gao
,
Shutao Sun
A Study on Development of Autonomous Vehicle for Urban Road Navigation
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-308
by
V. B. Saputra
,
S. Z. Ahmed
,
C. H. Pang
,
K. Zhang
,
Y. Chen
Improved Matching Algorithm Design Based on Dynamic Network Intrusion Feature
Full-text access may be available. Sign in or learn about subscription options.
pp. 585-588
by
Zhenhua Xu
Design of Audio system for the 4K-UHD Studio of Communication University of China
Full-text access may be available. Sign in or learn about subscription options.
pp. 613-616
by
Liu Jiefeng
,
Ben Xiaolong
,
Yu Jia
Research and Design of University Students Accurate Funding System
Full-text access may be available. Sign in or learn about subscription options.
pp. 836-840
by
Hui Yu
,
Xia Li
Electromagnetism Experiment Simulation Based on Game Engine
Full-text access may be available. Sign in or learn about subscription options.
pp. 781-785
by
Wenfeng Hu
,
Junjie Jiang
,
Li Shi
Proposing an Adaptive E-learning System Using Learners’ Knowledge in Simulating Medical Module
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-50
by
Arwa Allinjawi
,
Amjad Alsulami
,
Yasmeen Alsaedy
,
Khulood Hussein
PPNDN: Popularity-based Caching for Privacy Preserving in Named Data Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-44
by
Ji-Yeon Yang
,
Hyoung-Kee Choi
Chemistry Experiment Simulation based on Game Engine
Full-text access may be available. Sign in or learn about subscription options.
pp. 776-780
by
Wenfeng Hu
,
Shuhui Si
,
Yingzi Wang
Research on Decision Model of Soccer Robot System
Full-text access may be available. Sign in or learn about subscription options.
pp. 831-835
by
Zhong-qiu Zhang
,
Na-na Zhang
,
Hui Yu
Design of Polymorphic Real-Time Computational Model for UAV Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 841-845
by
Mei Luo
,
Linlin Li
,
Baocheng Wang
,
Kailong Zhang
ICIS 2018 Index
Freely available from IEEE.
pp. i-v
A Trust Model for Lightweight Semantic Annotation of Sensor Data in Pervasive Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-33
by
N Karthik
,
VS Ananthanarayana
An Improved Prorank Algorithm for Detection of Overlapping Protein Complexes using Protein Interaction and Gene Expression Datasets in Yeast
Full-text access may be available. Sign in or learn about subscription options.
pp. 110-115
by
P. Manikandan
,
D. Ramyachitra
Income Based Food List Recommendation for Rural People Using Fuzzy Logic
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-121
by
Muhammad Abrar Hussain
,
Sadia Yeasmin
,
Sadia Chowdhury
,
Farhan Rahman Wasee
,
Sadia Afrin
,
Sarkar Md Tanzim
,
Rashedur M. Rahman
Hybrid Intrusion Detection System using K-means and K-Nearest Neighbors Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 34-38
by
Yi Yi Aung
,
Myat Myat Min
The Application of Data Mining Technology in Employment Analysis of University Graduates
Full-text access may be available. Sign in or learn about subscription options.
pp. 846-849
by
Hui Yu
,
Zhong-qiu Zhang
Coherence based Dual Microphone Source Separation in Low SNR Noisy Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 865-869
by
Xuhui Chen
,
Nasir Saleem
,
Muhammad Irfan
,
Khalid Rabbani
Developing Smart Farm and Traceability System for Agricultural Products using IoT Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-184
by
Konlakorn Wongpatikaseree
,
Promprasit Kanka
,
Arunee Ratikan
My Data: A Framework for Transfer of User Data Using NS2 Simulator
Full-text access may be available. Sign in or learn about subscription options.
pp. 10-15
by
Masood Alam Abbasi
,
Sayeed Ghani
Traffic Adaptive Hybrid MAC with QoS Driven Energy Efficiency for WSNs Through Joint Dynamic Scheduling Mode
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-9
by
Jawad Ahmad Haqbeen
,
Takayuki Ito
,
Mohammad Arifuzzaman
,
Takanobu Otsuka
A Framework for CPS Modeling and Verification Based on dL
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-179
by
Ying Zhou
,
Xufang Gong
,
Bixin Li
,
Min Zhu
Research on Satellite Navigation Signal Analysis and Accelerate Optimization Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 860-864
by
Lirong Ai
,
Jun Yang
,
Beibei Yang
,
Weicong Sun
,
Xue Wang
Improved Stacking Model Fusion Based on Weak Classifier and Word2vec
Full-text access may be available. Sign in or learn about subscription options.
pp. 820-824
by
Jun Liu
,
Wenqian Shang
,
Weiguo Lin
Research on the Business Process Improvement and Reengineering of Multimedia Audio-visual in Colleges
Full-text access may be available. Sign in or learn about subscription options.
pp. 881-887
by
Chao Lin
,
Xuhui Chen
,
Ruizhe Ye
Research of the Infrared Ship Target Recognition Technology based on the Complex Background
Full-text access may be available. Sign in or learn about subscription options.
pp. 850-854
by
Xie Baorong
,
Zhang Yu
,
Feng Shuyi
,
Li Xian
,
Deng Songfeng
Coverage Optimization of Wireless Sensor Networks with Normal Distribution
Full-text access may be available. Sign in or learn about subscription options.
pp. 16-21
by
Anas Al-Roubaiey
,
Basheer Al-Gohi
A Triggered Delay-based Approach against Cache Privacy Attack in NDN
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-27
by
Naveen Kumar
,
Shashank Srivastava
Play games using Reinforcement Learning and Artificial Neural Networks with Experience Replay
Full-text access may be available. Sign in or learn about subscription options.
pp. 855-859
by
Meng Xu
,
Haobin Shi
,
Yao Wang
An Improved Deep Belief Network Prediction Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 825-830
by
Sun Yanchao
,
Qian Xu
,
Jia Minzheng
,
Bai Jing
Models of Field Strength Calculation in HF Sky-Wave Propagation on Rough Sea Surface
Full-text access may be available. Sign in or learn about subscription options.
pp. 802-805
by
Cheng Tian
,
Yan Du
Trademark Image Retrieval System Based on SIFT Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 740-743
by
Zhengkang Chen
,
Xiaohong Wang
Deep Neural Network based Supervised Speech Enhancement in Speech-Babble Noise
Full-text access may be available. Sign in or learn about subscription options.
pp. 871-874
by
Nasir Saleem
,
Muhammad Irfan
,
Xuhui Chen
,
Muhammad Ali
Skin Lesion Segmentation Using Multiple Density Clustering Algorithm MDCUT And Region Growing
Full-text access may be available. Sign in or learn about subscription options.
pp. 74-79
by
Soumaya Louhichi
,
Mariem Gzara
,
Hanêne Ben Abdallah
A Novel Approach to Define and Manage Security Indicators for the Fulfillment of Agreed Assurance Levels in Clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-165
by
Faraz Fatemi Moghaddam
,
Philipp Wieder
,
Ramin Yahyapour
,
Tayyebe Emadinia
ICIS 2018 Title Page
Freely available from IEEE.
pp. i-ii
Verifying CPS for Self-Adaptability
Full-text access may be available. Sign in or learn about subscription options.
pp. 166-172
by
Ying Zhou
,
Xufang Gong
,
Jiakai Li
,
Bixin Li
Analysis of Soil Properties and Climatic Data to Predict Crop Yields and Cluster Different Agricultural Regions of Bangladesh
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-85
by
Sadia Afrin
,
Abu Talha Khan
,
Mahrin Mahia
,
Rahbar Ahsan
,
Mahbubur Rahman Mishal
,
Wasit Ahmed
,
Rashedur M. Rahman
Stacked Microstrip Array Antenna with Fractal Patches for Satellite Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 875-880
by
Taimur Ahmed Khan
,
Muhammad Irfan Khattak
,
Abdul Baseer Qazi
,
Nasir Saleem
,
Xuhui Chen
The Research of Several Situations About Memory Accessing on Non-Uniform Memory Access Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 744-747
by
Xiaomei Guo
,
Haiyun Han
Comprehensive Evaluation Research on Farmer Entrepreneurship Based on Poverty Alleviation
Full-text access may be available. Sign in or learn about subscription options.
pp. 806-810
by
Xianhong Xu
,
Ruifang Han
OPNET-based Performance Analysis of Encrypted Communication Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 754-757
by
Yanli Wu
,
Zhiguo Hong
,
Minyong Shi
The Experimental Implementation of GrabCut for Hardcode Subtitle Extraction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Dong Wang
,
Aimoerfu
Applying the differential evolution algorithm with the fuzzy selection mechanism for the flexible job shop scheduling problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-159
by
Ajchara Phu-ang
SBC: A New Strategy for Multiclass Lung Cancer Classification Based on Tumour Structural Information and Microarray Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-73
by
Hasseeb Azzawi
,
Jingyu Hou
,
Russul Alnnni
,
Yong Xiang
Comparative Analysis of Discretization Algorithms on Decision Tree
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-67
by
Rattayagon Thaiphan
,
Thimaporn Phetkaew
An Improved Primate Swarm Algorithm with Adaptive K-Mean for Optimization Problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-153
by
Amarita Ritthipakdee
Flight Safety Analysis with Multi-information’s Dynamic Perception and Synthesis
Full-text access may be available. Sign in or learn about subscription options.
pp. 811-814
by
Huang Hui
,
Xiang Yang
,
Ma Cunbao
,
Chen Jie
Research on LDA Model Algorithm of News-oriented Web Crawler
Full-text access may be available. Sign in or learn about subscription options.
pp. 748-753
by
Yuxing Wang
,
Zhiguo Hong
,
Minyong Shi
Construction on Framework of Rumor Detection and Warning System Based on Web Mining Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 767-771
by
Haiyun Han
,
Xiaomei Guo
Pricing Models for Crowdsourcing Tasks Based on Geographic Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 794-797
by
Yuxin Niu
,
Yingtao Zhang
,
Mingyang Song
Research on the Business Process Improvement and Reengineering of Multimedia Audiovisual in Colleges
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-56
by
Chao Lin
,
Xuhui Chen
,
Ruizhe Ye
Preference Based Recommendation System for Apparel E-Commerce Sites
Full-text access may be available. Sign in or learn about subscription options.
pp. 122-127
by
Gayumie Nimesha Kottage
,
Dineth Keshawa Jayathilake
,
Kapuliyanage Chashika Chankuma
,
Gamage Upeksha Ganegoda
,
Thanuja Sandanayake
Classification Based on Spectral Characterization and Analysis of Land Cover Change in Dhaka
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-91
by
Farhan Rahman Wasee
,
Asif Amin
,
Zareen Tasnim Raisa
,
Sadia Chowdhury
,
Tanisha Nourin Alam
,
Rashedur M. Rahman
Comparative Study of Prediction Models for Final GPA Score: A Case Study of Rajabhat Rajanagarindra University
Full-text access may be available. Sign in or learn about subscription options.
pp. 92-97
by
Narongsak Putpuek
,
Natcha Rojanaprasert
,
Kanokwan Atchariyachanvanich
,
Thananya Thamrongthanyawong
Parametric Representation of Voiced Speech Phoneme using Multicomponent AM Signal Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-133
by
Mohan Bansal
,
Pradip Sircar
A Review of Human Action Recognition in Video
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-62
by
Nenghuan Zhang
,
Yongbin Wang
,
Peng Yu
Showing 100 out of 174
Load More
Load All