2017 4th International Conference on Information Science and Control Engineering (ICISCE)

21-23 July 2017

Filter Results

Displaying Results 1 - 25 of 373
  • [Front cover]

    Publication Year: 2017, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1462 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2017, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2017, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2017, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2017, Page(s):v - xxx
    Request permission for commercial reuse | PDF file iconPDF (181 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2017, Page(s): xxxi
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2017, Page(s): xxxii
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2017, Page(s): xxxiii
    Request permission for commercial reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2017, Page(s):xxxiv - xxxvi
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2017, Page(s):xxxvii - xxxix
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • 3D Reconstruction of Orchid Based on Virtual Binocular Vision Technology

    Publication Year: 2017, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (338 KB) | HTML iconHTML

    It is normally challenging to model flowering plants, which is affected by illumination, temperature, moisture, soil, etc. To further improve the accuracy and efficiency of such 3D modeling, a 3D reconstruction method for orchid flower, based on virtual binocular stereo vision, was proposed in this paper, where two cameras with baseline and fixed focal length were applied to constitute a binocular... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Convolutional Neural Network for Clickbait Detection

    Publication Year: 2017, Page(s):6 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    Click-baits are headlines that exaggerate the facts or hide the partial facts to attract user clicks. Click-baits deter readers from effectively and efficiently obtaining information in the era of information explosion, and will obviously affect user experience in news aggregator sites like Google News and Yahoo News. Detecting and preventing click-baits become crucial. Previous work achieved rema... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cyber Crime Investigation Model Based on Case Characteristics

    Publication Year: 2017, Page(s):11 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    With the recent development of Information Communication Technology (ICT) in every aspect in our life, cyber crime is also expanding and cyber crime investigation is maturing into a more challenging issue which needs to be confronted. In the early stages of the digital investigation of cyber crime case, digital evidence is inadequate, decentralized and fragmented. In this paper, we present a cyber... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Duty-Cycle MAC Algorithm with Traffic Prediction for Wireless Sensor Networks

    Publication Year: 2017, Page(s):16 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (423 KB) | HTML iconHTML

    In wireless sensor networks(WSNs), energy-efficiency and packet time delay are two major considerations in the design of medium access control(MAC) or routing algorithms. However, these two metrics always can't be satisfied at the same time, and existing works do not trade offthem well. In this paper, we first exploit a prediction model to evaluate the amount of packet in the next period. Then we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Facial Features Matching Method with Age Robustness Based on SIFT Algorithm

    Publication Year: 2017, Page(s):20 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (445 KB) | HTML iconHTML

    Facial change with age is always a problem in facial features matching for photos of ID cards. In order to solve this problem, a novel facial features matching method based on SIFT algorithm is proposed. Inspired by attention mechanism of the visual system, the facial features focuses on the four sub regions (left eye, right eye, nose and mouth), ignoring other unimportant regions, and different w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fuzzer Based on a Fine-Grained Deeper Strategy

    Publication Year: 2017, Page(s):24 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    Software nowadays suffers much danger from vulnerabilities, threatening much valuable thing, e.g. the security of private information. Fuzzing is a successful tool in bug-detecting without resorting to much prior knowledge, and has actually discovered many bugs. However, traditional fuzzing has a common drawback that it is limited in a superficial level, and nearly cannot drill deep into the progr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A GPU Based Parallel Clustering Method for Electric Power Big Data

    Publication Year: 2017, Page(s):29 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    With the explosive growth of user load data in power consumption information collection and load control systems, traditional computing frameworks and methods are faced with tremendous computational pressure when dealing with massive user load clustering and carrying out load characteristic analysis. In this paper, with a view to increasing accuracy and computational power of graphic process unit ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Load-Balancing and State-Sharing Algorithm for Fault-Tolerant Firewall Cluster

    Publication Year: 2017, Page(s):34 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (367 KB) | HTML iconHTML

    Traditional firewall is typically implemented as a single device that applies security policies for data packets. It will become the bottlenecks of internal and external network, even lead to the firewall's single-point of failure. In order to avoid this, in this paper, fault-tolerant firewall cluster is proposed as a new solution to achieve the firewall high performance, high reliability, high av... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method of Arc Priority Determination Based on Back-Propagation Neural Network

    Publication Year: 2017, Page(s):38 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    Due to the finite restricted ground TT&C resources, more and more conflicts appear caused by the increasing TT&C requirements of multi-satellite. The priority determination of TT&C arcs is affected by many factors. It is an important criterion of conflicts elimination for resources scheduling. This paper analyzes the main factors in practice, and put forward a method of using artificial neural net... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multidimensional Contribution-Based Service Differentiation Scheme for P2P Systems

    Publication Year: 2017, Page(s):42 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (602 KB) | HTML iconHTML

    For P2P systems, one of the key challenges is to motivate peers to contribute to the system by sharing authentic files. Since the peers differ from each other in the quantity and quality of services they provide for the system, service differentiation is necessary for the sake of fairness. In this paper, a multidimensional contribution-based service differentiation mechanism is proposed. We first ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-Image Stitching Method and Quality Evaluation

    Publication Year: 2017, Page(s):46 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (748 KB) | HTML iconHTML

    The rapid growth of urban image scale and its resulting high cost of data storage have become the factors which will restrict the development of the smart urban security system. Image stitching technology can synthesize many smallview images into a picture with large view and high quality which helps to smart city overall planning and regulation. Also, image stitching removes the repetitive, redun... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-Label Classification Method on Chinese Temporal Expressions Based on Character Embedding

    Publication Year: 2017, Page(s):51 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    Understanding temporal expressions is the important foundation of many NLP tasks. However, the varied representations of temporal expressions is difficulty in analysis and understanding. To parsing expressions, an effective classification method of temporal expressions is significant. A temporal expression may belong to one or more classes, but the classification usually requires manual annotation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-Objective Genetic Algorithm Based on Objective-Layered to Solve Network Optimization Design

    Publication Year: 2017, Page(s):55 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    The improved algorithm based on objective layered approach is used to deal with the multi-objective network optimization problem. Based on the traditional non-dominated sorting genetic algorithm, an improved algorithm is given. In order to increase the computational efficiency, the objective layered approach is used sort the individuals of population and identify the non-inferior solution. Individ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Network Model Based on Multiple Level of Granularity

    Publication Year: 2017, Page(s):60 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    Recent work on granular computing has introduced new notions which apply to research network structure. In this paper, we present a study of a multiple level of granularity for network. The first problem is how to model the multiple level network based on granular structure. We then propose a method of constructing a multiple level network. Compared with flooded searching path network, the propose... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Space Radiation Suppression Algorithm for Space-Based Optical Image

    Publication Year: 2017, Page(s):65 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (742 KB) | HTML iconHTML

    Space-based optical images are mainly affected by space radiation, sky glow background and CCD noise interference, in which space radiation noise can seriously interfere with the subsequent target detection. In this paper, we propose a space radiation interference suppression algorithm based on multi-feature, and compare with three algorithms which are commonly used to eliminate radiation noise: a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.