CRYPIS 2020 May 30, 2020 to May 31, 2020, Vancouver, Canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Contextual Factors with an Impact on the Design and Management of Health Information Systems’ Interoperability Grace Kobusinge Due to their renowned great information processing and dissemination power, Health information systems (HIS) can ...
Readiness Analysis for Enterprise Information System Implementation: the Case Study of Nigeria Manufacturing Companies Nwanneka Ahmad Enterprise information systems plays an important role in manufacturing companies by integrating the firm’s information, ...
Transcript Level Analysis Improves the Understanding of Bladder Cancer Xiang Li Bladder cancer (BC) is one of the most globally prevalent diseases, attracting various studies on ...
Communication between Coroutines on Sunway Many-core Platform Yi Zhou , Shaodi Li , Junmin Wu Communication between parallel programs is an indispensable part of parallel computing. SW26010 is a heterogeneous ...
Identification of Technology-relevant Entities Based on Trend Curves Sukhwan Jung , Rachana Reddy Kandadi , Rituparna Datta , Ryan Benton , And Aviv Segev Technological developments are not isolated and are influenced not only by similar technologies but also ...
Leading Devops Practice and Principle Adoption Krikor Gulliver The contribution emphasizes research undertaken in highly structured software-intensive organizations and the transitional challenges associated ...
An Automatic etection of Fundamental Posturesin Vietnamese Traditional Dances Ngan-khanh Ma Preserving and promoting the intangible cultural heritage is one of the essential problems of interest. ...
Automatic Identification and Measurement of Antibiogram Analysis Merve Duman , Roya Tasel In this study, an automatic identification method of antibiogram analysis is implemented, existing methods are ...
Automatic Diagnosis of Acne and Rosacea using Deep Learning Firas Y.shih Acne and Rosacea are two common skin diseases that affect many people in United States. ...
Spectrophotometric Analysis Based Data Fusion for Shape Recovery Zhi Yu It has been a fascinating idea in the academic world( especially in our computer vision ...
Safety Helmet Detection in Industrial Environment Using Deep Learning Ankit Powar Safety is of predominant value for employees who are working in an industrial and construction ...
Cobb Angle Measurement from Radiograph Images Using CADX Hritam Maity In this paper we try to propose an automated method for cobb angle computation from ...
Rate Control Based on Similarity Analysis in Multi-view Video Coding Tao Yan , In-ho Ra , Shaojie Hou , Jingyu Feng , And Zhicheng Wu The joint video expert group proposed a JMVM reference model for multi-view video coding, but ...
A Hybrid Artificial Bee Colony Strategy for T-way Test Set Generation with Constraints Support Ammar K Alazzawi , Helmi Md Rais , Shuib Basri , Yazan A. Alsariera , Abdullateef Oluwagbemiga Balogun , Abdullahi Abubakar Imam t-way interaction testing is a systematic approach for exhaustive test set generation. It is a ...
A Novel Bit Allocation Algorithm in Multi-view Video Tao Yan , In-ho Ra , Jingyu Feng , Linyun Wu The difficulty of rate control for Multi-view video coding(MVC) is how to allocate bits between ...
A Semi-supervised Learning Approach to Forecast CPU Usages Under Peak Load in an Enterprise Environment Nitin Sharma The aim of a semi-supervised neural net learning approach in this paper is to apply ...
Advanced Rate Control Technologies for MVC Tao Yan , In-ho Ra , Zhicheng Wu , Shaojie Feng Current multi-view video coding(MVC) reference model in joint video team(JVT) does not provide efficient rate ...
Placement of Virtualized Elastic Regenerator with Threshold of Path Length in Distance-adaptive Translucent Elastic Optical Networks Ching-fang Hsu , Hao-chen Kao , Yun-chung Ho , Eunice Jhang Distance-adaptive Elastic Optical Networks (EONs) is an efficient network environment, traffic demands in it can ...
Incentive Based Network Resource Allocation to Automated and Connected Vehicles Abdullah Khan Autonomous vehicles are expected to arrive sooner than expected. Autonomous vehicles of higher automation rely ...
Multi-task Knowledge Distillation with Rhythm Features for Speaker Verification Ruyun Li , Peng Ouyang , Dandan Song , And Shaojun Wei Recently, speaker embedding extracted by deep neural networks (DNN) has performed well in speaker verification ...
A Hybrid Machine Learning Model with Cost-Function based Outlier Removal and its Application on Credit Rating Aurora Y. Mu This paper establishes a methodology to build hybrid machine learning models, aiming to combine the ...
A Non-Convex Optimization Framework for Large-Scale Low-rank Matrix Factorization Sajad Fathi Hafshejaniy , Saeed Vahidian , Zahra Lin Low-rank matrix factorization problems such as non negative matrix factorization (NMF) can be categorized as ...
Oversampling Log Messages Using A Sequence Generative Adversarial Network for Anomaly Detection and Classification Amir Gulliver Dealing with imbalanced data is one the main challenges in machine/deep learning algorithms for classification. ...
Playing Virtual Musical Drums by Mems 3D Accelerometer Sensor Data and Machine Learning Shaikh Farhad Hossain , Kazuhisa Hirose , Shigehiko Altaf-ul-amin Music is an entertainment part of our lives who’s the important supporting elements are musical ...
Industrial Duct Fan Maintenance Predictive Approach Based on Random Forest Mashael Maashi , Nujood Alwhibi , Fatima Alamr , Rehab Alzahrani , Alanoud Altawallah When manufacturers equipment encounters an unexpected failure, or undergo unnecessary maintenance pre-scheduled plan, which happens ...
Solving University Timetable Problem using Evolution Strategy Che-yuan Chen Solve timetable problem with evolution strategy; build real system for any department in university that ...
Classification of Computer Hardware and Performance Prediction Using Statistical Learning and Neural Networks Courtney Foots , Palash Segev Computer performance is affected by hardware. Thus, vendors aim to build computers with the most ...
Spam Detection in Twitter using Machine Learning Algorithms: A Systematic Review Lamia Alghazzawia Twitter is an open-source communication network where users share their views and ideas. Due to ...
Network Performances over Virtual Forces Algorithm For Autonomous Aerial Drone Systems Mahamat Skorek The FANET networks have seen some progress recently. Solutions for positioning network nodes are numerous. ...
DEEC Protocol with ACO Based Cluster Head Selection in Wireless Sensor Network Ramesh Kumar Kait , Renu Jangra The protocols of routing in wireless sensor networks have a great role in the network ...
Linking Social Media Posts to News with Siamers Transformers Jacob Danovitch Many computational social science projects examine online discourse surrounding a specific trending topic. These works ...
Topic Detection from Conversational Dialogue Corpus with Parallel Latent Dirichlet Allocation Model and Elbow Method Haider Wade A conversational system needs to know how to switch between topics to continue the conversation ...
A Most Discriminative and Highly Informative Feature Selection Method on Multilingual Text Data Suman Mamidi The presence of irrelevant features in the data leads to high dimensionality and complexity in ...
Hate Speech Detection of Arabic Short Text Abdullah Aref , Rana Mahmoud , Khaled Taha , And Mahmoud Al-sharif The aim of sentiment analysis is to automatically extract the opinions from a certain text ...
Quantum Criticism: A Tagged News Corpus Analysed for Sentiment and Named Entities Andrew Wang , Kai Yu , Ashwini Badgujar , Sheng Cheng , Paul Brizan In this project, we continuously collect data from the RSS feeds of traditional news sources. ...
VSMBM: A New Metric for Automatically Generated Text Summaries Evaluation Alaidine Ben Ayed , Ismaïl Meunier In this paper, we present VSMbM; a new metric for automatically generated text summaries evaluation. ...
Fat Albert: Finding Answers in Large Texts using Semantic Similarity Attention Layer based on Bert Omar Mossad , Amgad Ahmed , Anandharaju Raju , Hari Karthikeyan , And Zayed Ahmed Machine based text comprehension has always been a significant research field in natural language processing. ...
Detect Language of Transliterated Texts Sourav Sen Informal transliteration from other languages to English is prevalent in social media threads, instant messaging, ...
Free-text and Structured Clinical Time Series for Patient Outcome Predictions Emilia Apostolova , Joe Morales , Ioannis Velez While there has been considerable progress in building deep learning models based on clinical time ...
Use of an IoT Technology to Analyse the Inertial Measurement of Smart Ping-pong Paddle Rajeev Kanth , Tuomas Heikkonen In this article, a Smart Ping Pong Paddle has been introduced as an example of ...
Performance Analysis of AODV, DSDV and ZRP Routing Protocols for Wireless Sensor Networks using NS2 Tool Faïza Tabbana A wireless sensor network (WSN) consists of a large number of sensors which are spatially ...
The Impact of Mobile Communication Power Supply Systems on Communication Reliability and Viability and Their Solutions Matyokubov U.k. , Davronbekov D.a. It is possible to significantly save economic resources by reducing energy consumption in the energy ...
ParaCom: An IoT based affordable solution enabling people with limited mobility to interact with machines Siddharth Sekar , Nirmit Bapodra This paper proposes a solution to improve the lives of patients who are paralyzed and/or ...
Dynamic Cipher for Enhanced Cryptography and Communication for Internet of Things Prabjot Kaur Security represents a vital element for sanctioning the widespread adoption of Internet of Things technologies ...
TPM Based Design for Enhanced Trust in SaaS Services Mustapha Hedabou On the past decade, Trusted Platform Modules (TPM) have become a valuable tool for providing ...
Design and Hardware Implementation of A Separable Image Steganographic Scheme using Public-key Cryptosystem Salah Harb , M. Swamy In this paper, a novel and efficient hardware implementation of steganographic cryptosystem based on a ...