CRYPIS 2020 May 30, 2020 to May 31, 2020, Vancouver, Canada
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Contextual Factors with an Impact on the Design and Management of Health Information Systems’ Interoperability | Grace Kobusinge | Due to their renowned great information processing and dissemination power, Health information systems (HIS) can ... | |
Readiness Analysis for Enterprise Information System Implementation: the Case Study of Nigeria Manufacturing Companies | Nwanneka Ahmad | Enterprise information systems plays an important role in manufacturing companies by integrating the firm’s information, ... | |
Transcript Level Analysis Improves the Understanding of Bladder Cancer | Xiang Li | Bladder cancer (BC) is one of the most globally prevalent diseases, attracting various studies on ... | |
Communication between Coroutines on Sunway Many-core Platform | Yi Zhou , Shaodi Li , Junmin Wu | Communication between parallel programs is an indispensable part of parallel computing. SW26010 is a heterogeneous ... | |
Identification of Technology-relevant Entities Based on Trend Curves | Sukhwan Jung , Rachana Reddy Kandadi , Rituparna Datta , Ryan Benton , And Aviv Segev | Technological developments are not isolated and are influenced not only by similar technologies but also ... | |
Leading Devops Practice and Principle Adoption | Krikor Gulliver | The contribution emphasizes research undertaken in highly structured software-intensive organizations and the transitional challenges associated ... | |
An Automatic etection of Fundamental Posturesin Vietnamese Traditional Dances | Ngan-khanh Ma | Preserving and promoting the intangible cultural heritage is one of the essential problems of interest. ... | |
Automatic Identification and Measurement of Antibiogram Analysis | Merve Duman , Roya Tasel | In this study, an automatic identification method of antibiogram analysis is implemented, existing methods are ... | |
Automatic Diagnosis of Acne and Rosacea using Deep Learning | Firas Y.shih | Acne and Rosacea are two common skin diseases that affect many people in United States. ... | |
Spectrophotometric Analysis Based Data Fusion for Shape Recovery | Zhi Yu | It has been a fascinating idea in the academic world( especially in our computer vision ... | |
Safety Helmet Detection in Industrial Environment Using Deep Learning | Ankit Powar | Safety is of predominant value for employees who are working in an industrial and construction ... | |
Cobb Angle Measurement from Radiograph Images Using CADX | Hritam Maity | In this paper we try to propose an automated method for cobb angle computation from ... | |
Rate Control Based on Similarity Analysis in Multi-view Video Coding | Tao Yan , In-ho Ra , Shaojie Hou , Jingyu Feng , And Zhicheng Wu | The joint video expert group proposed a JMVM reference model for multi-view video coding, but ... | |
A Hybrid Artificial Bee Colony Strategy for T-way Test Set Generation with Constraints Support | Ammar K Alazzawi , Helmi Md Rais , Shuib Basri , Yazan A. Alsariera , Abdullateef Oluwagbemiga Balogun , Abdullahi Abubakar Imam | t-way interaction testing is a systematic approach for exhaustive test set generation. It is a ... | |
A Novel Bit Allocation Algorithm in Multi-view Video | Tao Yan , In-ho Ra , Jingyu Feng , Linyun Wu | The difficulty of rate control for Multi-view video coding(MVC) is how to allocate bits between ... | |
A Semi-supervised Learning Approach to Forecast CPU Usages Under Peak Load in an Enterprise Environment | Nitin Sharma | The aim of a semi-supervised neural net learning approach in this paper is to apply ... | |
Advanced Rate Control Technologies for MVC | Tao Yan , In-ho Ra , Zhicheng Wu , Shaojie Feng | Current multi-view video coding(MVC) reference model in joint video team(JVT) does not provide efficient rate ... | |
Placement of Virtualized Elastic Regenerator with Threshold of Path Length in Distance-adaptive Translucent Elastic Optical Networks | Ching-fang Hsu , Hao-chen Kao , Yun-chung Ho , Eunice Jhang | Distance-adaptive Elastic Optical Networks (EONs) is an efficient network environment, traffic demands in it can ... | |
Incentive Based Network Resource Allocation to Automated and Connected Vehicles | Abdullah Khan | Autonomous vehicles are expected to arrive sooner than expected. Autonomous vehicles of higher automation rely ... | |
Multi-task Knowledge Distillation with Rhythm Features for Speaker Verification | Ruyun Li , Peng Ouyang , Dandan Song , And Shaojun Wei | Recently, speaker embedding extracted by deep neural networks (DNN) has performed well in speaker verification ... | |
A Hybrid Machine Learning Model with Cost-Function based Outlier Removal and its Application on Credit Rating | Aurora Y. Mu | This paper establishes a methodology to build hybrid machine learning models, aiming to combine the ... | |
A Non-Convex Optimization Framework for Large-Scale Low-rank Matrix Factorization | Sajad Fathi Hafshejaniy , Saeed Vahidian , Zahra Lin | Low-rank matrix factorization problems such as non negative matrix factorization (NMF) can be categorized as ... | |
Oversampling Log Messages Using A Sequence Generative Adversarial Network for Anomaly Detection and Classification | Amir Gulliver | Dealing with imbalanced data is one the main challenges in machine/deep learning algorithms for classification. ... | |
Playing Virtual Musical Drums by Mems 3D Accelerometer Sensor Data and Machine Learning | Shaikh Farhad Hossain , Kazuhisa Hirose , Shigehiko Altaf-ul-amin | Music is an entertainment part of our lives who’s the important supporting elements are musical ... | |
Industrial Duct Fan Maintenance Predictive Approach Based on Random Forest | Mashael Maashi , Nujood Alwhibi , Fatima Alamr , Rehab Alzahrani , Alanoud Altawallah | When manufacturers equipment encounters an unexpected failure, or undergo unnecessary maintenance pre-scheduled plan, which happens ... | |
Solving University Timetable Problem using Evolution Strategy | Che-yuan Chen | Solve timetable problem with evolution strategy; build real system for any department in university that ... | |
Classification of Computer Hardware and Performance Prediction Using Statistical Learning and Neural Networks | Courtney Foots , Palash Segev | Computer performance is affected by hardware. Thus, vendors aim to build computers with the most ... | |
Spam Detection in Twitter using Machine Learning Algorithms: A Systematic Review | Lamia Alghazzawia | Twitter is an open-source communication network where users share their views and ideas. Due to ... | |
Network Performances over Virtual Forces Algorithm For Autonomous Aerial Drone Systems | Mahamat Skorek | The FANET networks have seen some progress recently. Solutions for positioning network nodes are numerous. ... | |
DEEC Protocol with ACO Based Cluster Head Selection in Wireless Sensor Network | Ramesh Kumar Kait , Renu Jangra | The protocols of routing in wireless sensor networks have a great role in the network ... | |
Linking Social Media Posts to News with Siamers Transformers | Jacob Danovitch | Many computational social science projects examine online discourse surrounding a specific trending topic. These works ... | |
Topic Detection from Conversational Dialogue Corpus with Parallel Latent Dirichlet Allocation Model and Elbow Method | Haider Wade | A conversational system needs to know how to switch between topics to continue the conversation ... | |
A Most Discriminative and Highly Informative Feature Selection Method on Multilingual Text Data | Suman Mamidi | The presence of irrelevant features in the data leads to high dimensionality and complexity in ... | |
Hate Speech Detection of Arabic Short Text | Abdullah Aref , Rana Mahmoud , Khaled Taha , And Mahmoud Al-sharif | The aim of sentiment analysis is to automatically extract the opinions from a certain text ... | |
Quantum Criticism: A Tagged News Corpus Analysed for Sentiment and Named Entities | Andrew Wang , Kai Yu , Ashwini Badgujar , Sheng Cheng , Paul Brizan | In this project, we continuously collect data from the RSS feeds of traditional news sources. ... | |
VSMBM: A New Metric for Automatically Generated Text Summaries Evaluation | Alaidine Ben Ayed , Ismaïl Meunier | In this paper, we present VSMbM; a new metric for automatically generated text summaries evaluation. ... | |
Fat Albert: Finding Answers in Large Texts using Semantic Similarity Attention Layer based on Bert | Omar Mossad , Amgad Ahmed , Anandharaju Raju , Hari Karthikeyan , And Zayed Ahmed | Machine based text comprehension has always been a significant research field in natural language processing. ... | |
Detect Language of Transliterated Texts | Sourav Sen | Informal transliteration from other languages to English is prevalent in social media threads, instant messaging, ... | |
Free-text and Structured Clinical Time Series for Patient Outcome Predictions | Emilia Apostolova , Joe Morales , Ioannis Velez | While there has been considerable progress in building deep learning models based on clinical time ... | |
Use of an IoT Technology to Analyse the Inertial Measurement of Smart Ping-pong Paddle | Rajeev Kanth , Tuomas Heikkonen | In this article, a Smart Ping Pong Paddle has been introduced as an example of ... | |
Performance Analysis of AODV, DSDV and ZRP Routing Protocols for Wireless Sensor Networks using NS2 Tool | Faïza Tabbana | A wireless sensor network (WSN) consists of a large number of sensors which are spatially ... | |
The Impact of Mobile Communication Power Supply Systems on Communication Reliability and Viability and Their Solutions | Matyokubov U.k. , Davronbekov D.a. | It is possible to significantly save economic resources by reducing energy consumption in the energy ... | |
ParaCom: An IoT based affordable solution enabling people with limited mobility to interact with machines | Siddharth Sekar , Nirmit Bapodra | This paper proposes a solution to improve the lives of patients who are paralyzed and/or ... | |
Dynamic Cipher for Enhanced Cryptography and Communication for Internet of Things | Prabjot Kaur | Security represents a vital element for sanctioning the widespread adoption of Internet of Things technologies ... | |
TPM Based Design for Enhanced Trust in SaaS Services | Mustapha Hedabou | On the past decade, Trusted Platform Modules (TPM) have become a valuable tool for providing ... | |
Design and Hardware Implementation of A Separable Image Steganographic Scheme using Public-key Cryptosystem | Salah Harb , M. Swamy | In this paper, a novel and efficient hardware implementation of steganographic cryptosystem based on a ... |