{"title":"Coalescing Artificial Intelligence with Augmented Reality to vitalize Smart-Glasses","authors":"Naman Sharma, R. Bathla","doi":"10.1109/ISCON47742.2019.9036274","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036274","url":null,"abstract":"Over the last decade, artificial intelligence has become a core for success of Augmented Reality. This paper will discuss the rise of Artificial Intelligence, birth of Augmented Reality and the dwindling of Smart glasses. We will talk about what went right and what went wrong when the wave of smart glasses started in 2013 and how Artificial Intelligence and Augmented Reality; two of its major segments will enable it to flourish. Several other technologies have been discussed which have major impact on development of smart glasses. As well as a concept of smart glasses has been discussed, with this concept, we introduce about some new features which will be a major assistance to the further improvement of smart glasses in the future.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115859916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reconfigurable Antenna Design with Air Substrate for S and C bands","authors":"Farha, R. S. Yadav","doi":"10.1109/ISCON47742.2019.9036224","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036224","url":null,"abstract":"A key shaped Microstrip patch reconfigurable antenna (100X70X3.8 mm3) with air substrate has been presented for 5G spectrum applications. The antenna exhibits circular as well as elliptical polarization and operates at 3.5 GHz, 6GHz, 7.7GHz, 7.8 GHz and 7.9 GHz with pattern diversity as per the ON and OFF conditions of the two PIN switches with high gain.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116735275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Umbrella based Cognitive Environment Map in Uplink Cellular Networks","authors":"Astha Sharma","doi":"10.1109/ISCON47742.2019.9036191","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036191","url":null,"abstract":"Future devices are envisioned to be ‘Super Smart’ empowered by convergence of diverse advanced hardware and software technologies such as Cloud Computing, Cognitive Radio, Big Data, Machine Learning and Artificial Intelligence. These devices armed with cognitive intelligence will use perception capability to interact and learn from the environment and make the decisions instantly. It is challenging to accurately determine spatial spectrum opportunities available in uplink bands of cellular network due to varied primary user locations. This paper has laid a framework for spectrum opportunity detection wherein the future devices embedded with cognitive intelligence will have a potential to build a ‘Cognitive Environment Map (CEM)’. A CEM that can be viewed as a sort of internal neural representation of the geographical space in which the device operates to effectively detect spectrum opportunities. The performance improvement provided by the CEM, constructed using an efficient computational geometry technique named ‘Umbrella-based algorithm’ over traditional circular ranges is analyzed in an uplink cellular network. Results show that CEM are able to solve the hidden and exposed nodes problem considerably and performance of the opportunity detector is analyzed. Further, the impact of varying detection range, interference ranges of primary and secondary users as well as effect of propagation environment in terms of operational SNR and SINR is also discussed.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116860498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spam SMS Filtering using Recurrent Neural Network and Long Short Term Memory","authors":"A. Chandra, S. Khatri","doi":"10.1109/ISCON47742.2019.9036269","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036269","url":null,"abstract":"SMS is the abbreviation for Short Messaging Service which uses standard protocols for mobile devices to exchange information via short text messages. Today SMS's are an easy, inexpensive and widely accepted way to communicate rather than phone calls. Spam can be described as random unsolicited messages sent at large without any authorization from the receiver. People still deal with spammer's misusing SMS's to advertise false claims and can gain access to private information of users. Emails, social media sites, review, and even Twitter has seen spammers trying to intrude everywhere with the advent of Internet. Spam appears in many forms like comments, emails, search results and personal messages where spammers tend to gain revenues. Various Machine Learning algorithms like Neural Networks have tried to detect spam messages and normal messages or ham from SMS's. These techniques can learn high level features automatically using raw data unlike traditional ways where features are selected after analysis for classification. In this research paper, we propose a new method utilizing Recurrent Neural Network (RNN) and Long Short Term Memory (LSTM) using Keras models and Tensorflow backend to detect Spam and Ham from ‘SpamSMSCollection’ dataset available at UCI machine learning repository. Crucial preprocessing of dataset included tokenization, TF-IDF Vectorization and removal of stopwords. Overall accuracy of 98% is achieved and shows improvement from other machine learning algorithms for spam detection.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115628122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Employee Turnover Prediction System","authors":"Mehul Jhaver, Yogesh Gupta, A. Mishra","doi":"10.1109/ISCON47742.2019.9036180","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036180","url":null,"abstract":"Employee turnover has been recognized as a main problem for industries due to its contrary influence on work place throughput and long term development tactics. To resolve this issue, officialdoms use machine learning techniques to guess employee turnover. Precise predictions qualify administrations to take action for holding of employees. Nonetheless, the data for this type of issue comes from HR Information Systems. This leads to the supremacy of noise in the data that extracts predictive models disposed to over-fitting and hence imprecise. This is the main problem that is the motivation of this study, and one that has not been handled earlier. The innovative contribution of this study is to reconnoiter the application of Gradient Boosting technique which is more robust because of its regularization formulation. The global retailer data is used to compare Gradient Boosting against three traditionally used supervised classifiers like Logistic Regression, Support Vector Machine, Random Forest and reveal its suggestively higher accuracy for predicting employee turnover. In this study I have also implemented Artificial Neural Network to study how to the neural network helps in classification of different classes. This paper is aimed at developing models which can predict employee turnover and it can help the organization to take necessary steps to retain these employees.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122035259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Restrictions in Smart Home Devices for Safety of Children","authors":"Sparsh Sangal, R. Bathla","doi":"10.1109/ISCON47742.2019.9036218","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036218","url":null,"abstract":"Children today have access to Smart home devices easily and regularly where they can openly communicate with these devices and these smart home devices can talk back to them in their normal matter regardless of having a better understanding of what should be said and what should not be said in front of young Children. This research paper analysis the Improved implementation of restrictions in smart home devices for safety of children, We'll be highlighting the role of Smart home devices in homes and how they affect different age groups of people mentally mainly Toddlers and how it can affect them for better or for worse and what security implementations can be implemented in the coming age of smart home devices like Alexa and Google home to make it more better and safer than it currently is so that there can be a controlled environment for its use and can be used by small children making sure that they stay away from the harmful stuff so that smart home devices like these won't affect the mentality of a small child for the worse","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115104669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Model to Implement and Secure Online Documentation using Blockchain","authors":"Paras Pant, R. Bathla, S. Khatri","doi":"10.1109/ISCON47742.2019.9036245","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036245","url":null,"abstract":"The past decade has seen a tremendous rise in the use of blockchains for facilitating a trust based decentralized financial framework, in hope of eliminating dependency on core institutions such as banks. A blockchain stores a chronological record for a document detailing all the alterations that have been made to it since its inception. This data contained within this document may be anything, e.g. a lease document, personal files, etc. Smart documents can be used everywhere within the industry or an enterprise. Although blockchain based structures are much less eco-friendly in comparison to the ones with a database-based approach. Inter Planetary File System can be used to remotely store massive quantities of statistical data that may be involved in a blockchain transaction and address it in the actual chain by an absolute, everlasting link. Each report and all the blocks in a chain are assigned a unique fingerprint known as a cryptographic hash. This virtual cryptographic signature is used to verify legitimacy of each block. In this paper with the help of IPFS, along with other encryption methods we propose a secure and tamper proof model for blockchain based financial transactions.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126702807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Intruder Monitoring System for Improving the Network Security","authors":"Sourav Thapliyal, Himanshu Gupta, S. Khatri","doi":"10.1109/ISCON47742.2019.9036195","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036195","url":null,"abstract":"As the new technologies are emerging and rapidly growing the security advisors have the focus on developing the complex solutions for monitoring and detection of the intruder. This paper proposes a model which will provide the intruder monitoring system for improving the security. The model will check for the vulnerabilities of the network and then provide the best solution to it. Based on open source software and using various networking techniques the model will be constructed to run on low – cost hardware, on demand for intruder scanning, and alerting the owner by giving alerts in case of the intrusion.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122063134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of target detection techniques for hyperspectral images","authors":"Dharambhai Shah, Madhumita Tripathy, T. Zaveri","doi":"10.1109/ISCON47742.2019.9036193","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036193","url":null,"abstract":"Target detection is a challenge to detect and classify objects in hyperspectral images. In this paper, a total of six algorithms broadly classified in type I and type II are used to detect targets such as metal, roof, and dirt. Type I algorithm differs from type II as in type II algorithm both target spectra and non-background spectra are used whereas in type I algorithm only target spectra is used as an external input. Vertex Component Analysis (VCA) is used to generate background spectra in type II algorithm. Two different hyperspectral data set such as Pavia and Urban are used for target detection. Detailed analysis of the output of the six methods shows that the wide range of output score plays an important role in the determination of threshold to detect any target. One of the type II method Orthogonal Subspace Projection (OSP) gives the best wide dynamic range compared to other techniques.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123601130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Approach for Classification of Microblog Tweets","authors":"Varsha Tiwari, Himani Sikarwar","doi":"10.1109/ISCON47742.2019.9036264","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036264","url":null,"abstract":"Nowadays, if something happens, then many tweets are posted. Peoples are generally influences what everyone else are saying. A person observes a thing according to their natures, whether they are positive or negative kind of person. When these persons tweet other persons influenced by their thoughts. These tweets contain the situational and non-situational information. Situational tweets may have attributes such as helpline number etc. While non-situational tweets may have the information about the charity etc. Therefore, the classification of tweets into these two categories are much required to extract the meaningful information. In this paper, a new methodology is proposed and implemented to classify situational and non-situational tweets. The present work is based on POS tagger, weighted parameter normalization and normalization of tweets. A comparative study is also presented in this paper in terms of F-measure. The results are satisfactory.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115011190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}