{"title":"Estimation of congestion level at intersection points using AI","authors":"Deepika, Gitanjali Pandove","doi":"10.1109/ICICT55121.2022.10064550","DOIUrl":"https://doi.org/10.1109/ICICT55121.2022.10064550","url":null,"abstract":"Congestion in vehicular scenarios has become one of the hot research areas among researchers. It is one of the most challenging issues, and it occurs when roads or channels become overloaded, mostly in highly dense network areas. Intersections on roads, generally called “congestion areas”, are places where most vehicles crash and accidents happen. So, controlling congestion is our primary motto. In this paper, the simulation over the map of Sonipat city (Haryana, India) is used via the Simulation of Urban MObility Simulator (SUMO). Various Machine Learning (ML) and Deep Learning (DL)-based models are used for calculating accuracy and calculating the R2 score. This study's findings show that gradient boosting offers the most promising approach for both congested and non-congested traffic conditions to real-time prediction of wait time. Using the gradient boosting model, an R2 score of 94.40% is achieved for the testing data. This paper provides an overview of various models for designing a strategy to avoid congestion-like situations for vehicular networks.","PeriodicalId":181396,"journal":{"name":"2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"25 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123495837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raorane Ashwini, Dhiraj B. Magare, Yogita D. Mistry
{"title":"Investigation of Thermographic Images of Photovoltaic Modules using Deep Learning Models","authors":"Raorane Ashwini, Dhiraj B. Magare, Yogita D. Mistry","doi":"10.1109/ICICT55121.2022.10064551","DOIUrl":"https://doi.org/10.1109/ICICT55121.2022.10064551","url":null,"abstract":"Recently Solar PV panel has important role in the power generation based on renewable energy. In this paper, presents a challenge faced by faults diagnosis using thermal image analysis of Photovoltaic (PV) Module is studied. In ancient time, compared to the modern technique of PV examination using thermal imaging, the manual PV inspection approach is frequently slower, riskier, and less accurate. The use of thermal photos has the advantage of being able to immediately identify the anomaly in PV array as well as offer other measurement parameters. This research on thermal image analysis will aid in the inspection of PV modules by offering a more accurate and cost-effective identification of PV defects. According to this study, deep learning approaches are currently being considered as a feasible classifier for image processing and computer vision. Various studies, on the other hand, employed the notion of deep learning to classify and detect thermographic images used to detect flaws in PV modules. The analysis of anomaly classification and parameter evaluation were presented and explored in this method. This study looks at how well Deep Neural Networks (DNNs) models perform when it comes to classifying abnormalities in images. DNNs models have high accuracy for implementing classification of anomalies.","PeriodicalId":181396,"journal":{"name":"2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130522121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Vrindavanam, T. Babu, Harika Gandiboina, Gopika G. Jayadev
{"title":"A Comparative Analysis of Machine Learning Algorithms for Agricultural Drought Forecasting","authors":"J. Vrindavanam, T. Babu, Harika Gandiboina, Gopika G. Jayadev","doi":"10.1109/ICICT55121.2022.10064511","DOIUrl":"https://doi.org/10.1109/ICICT55121.2022.10064511","url":null,"abstract":"The occurrence of drought is a climatic feature and is a phenomenon that happens over time. Depending on the severity, it can last for a short or long time. Farming households are trying to meet due to rising agricultural operating costs that hinder the country's development. This study aims to forecast the severity of the drought over time. Drought scores vary from 0 to 5, with 0 and 5 indicating the least and highest intensity drought conditions. This is done using weather and soil data of a region consisting of Precipitation, Surface Pressure, Humidity, Temperature, Wind Speed, and Soil data. The main reasons for the cause of drought are first identified. These features are used to train the multivariate time series models like Prophet, VAR (Vector Auto-Regression), LSTM (Long short-term memory), and Comparison of actual v/s predicted values. The results were promising. The study has done an analysis comparing different machine learning algorithms for agricultural drought forecasting and it was found that the LSTM model performed better than VAR and Prophet models.","PeriodicalId":181396,"journal":{"name":"2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133058529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Upadhyay, S. Srivastava, Siddharth S. Pandey, Aanandi Goel
{"title":"Lane Line Detection Using Machine Learning","authors":"P. Upadhyay, S. Srivastava, Siddharth S. Pandey, Aanandi Goel","doi":"10.1109/ICICT55121.2022.10064598","DOIUrl":"https://doi.org/10.1109/ICICT55121.2022.10064598","url":null,"abstract":"Driving vehicles on roads in conditions such as fuzzy view, showery, and inside the tunnel is difficult for a driver. This research describes a reliable method for recognising road lanes in real time. The complexity of the road environment makes lane detection difficult. The test result shows that the design is accurate and robust for seeing the road lane. To improve traffic safety, this research paper suggests a real-time, efficient lane detecting approach.","PeriodicalId":181396,"journal":{"name":"2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125593889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study and Review on Link Failure Prediction and Detection in Mobile Ad hoc Network","authors":"Diksha Shukla, Raghuraj Singh","doi":"10.1109/ICICT55121.2022.10064618","DOIUrl":"https://doi.org/10.1109/ICICT55121.2022.10064618","url":null,"abstract":"A wireless network with multiple hops but no fixed infrastructure is known as a mobile ad hoc network (MANET). Its salient features are self-configuring, self-organized and dynamically changing network topology. Devices like laptop and personal digital assistants can transfer the data packets either over radio or infrared links. MANETs are prominently used in the area of military applications, disaster management, search and rescue operations etc. where the network architecture is temporary in nature and it is difficult to establish a central control for the network. Major limitations and challenges of the MANET include limited transmission range of nodes, limited battery power, node mobility, dynamic topology, effective routing and node & link failure. Transmission efficiency of the network is drastically reduced due to the frequent node and link failures. Hence link failure prediction plays a crucial role in increasing the efficiency and reliability of the network. The purpose of this paper is to do an exhaustive literature review and critical study of various challenges for improving routing efficiency of MANET protocols with specific attention to the link failure detection and prediction.","PeriodicalId":181396,"journal":{"name":"2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"265 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123972713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing ERP success model in Indian manufacturing sector","authors":"Archana Sar, Poonam Garg, Nishant Gupta, Madhavi Singh","doi":"10.1109/ICICT55121.2022.10064596","DOIUrl":"https://doi.org/10.1109/ICICT55121.2022.10064596","url":null,"abstract":"Manufacturing companies invest a lot of time and money into implementing ERP with the expectation that this will boost productivity. However, the failure rate of ERP adoption is typically very high. Critical success factors (CSF), factors related to risk and factors related to ERP project selection can help in achieving project management success in number of ways. This paper focuses on how CSF, risk factors and project selection factors have an impact on the project management success. Further this study has shown the mediating role of user satisfaction on realizing the benefits of ERP implementation.","PeriodicalId":181396,"journal":{"name":"2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129500603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Subjective Answers Using Machine Learning","authors":"S. G, S. G, T. Babu, Rekha R Nair","doi":"10.1109/ICICT55121.2022.10064615","DOIUrl":"https://doi.org/10.1109/ICICT55121.2022.10064615","url":null,"abstract":"Negative methods are currently used to evaluate subjective writing. The evaluation of the subjective responses is an essential responsibility. When a human analyses anything, the evaluation's quality can change depending on the person's emotions. All outcomes in machine learning are solely dependent upon the user's input data. To address this issue, our suggested method combines machine learning (ML) and natural language processing (NLP). To analyse the subjective response, our algorithm performs tasks including tokenizing words and phrases, classifying parts of speech, chunking and chinking, lemmatizing words, and word netting. Our suggested approach also offers the context's semantic meaning. There are two modules in our system. Extracting data from scanned photos is the initial step. Then arranging it properly, and the second is using ML and NLP to analyse the text obtained in the previous phase and assigning grades to it.","PeriodicalId":181396,"journal":{"name":"2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"129 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126301353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. M. Tshilongamulenzhe, Topside E. Mathonsi, DP DuPlessis, M. Mphahlele
{"title":"A Priority-Based Congestion Control Algorithm for Wireless Sensor Networks","authors":"T. M. Tshilongamulenzhe, Topside E. Mathonsi, DP DuPlessis, M. Mphahlele","doi":"10.1109/ICICT55121.2022.10064567","DOIUrl":"https://doi.org/10.1109/ICICT55121.2022.10064567","url":null,"abstract":"Wireless Sensor Networks (WSNs) is an area that has generated an increasing interest currently worldwide. WSNs fall under IEEE 802.11 standard in which wireless network is formed by sensor nodes (SNs) that interconnect with each other through wireless links. SNs are capable of sensing, processing, and communicating via a wireless channel in a harsh environment, and most of them are battery powered. WSNs are mostly used for traffic communication in different environments such as irrigations, healthcare, home, and the military. WSNs are implemented to monitor temperature, humidity, pressure, among others within the network environment. The implementation of WSNs in various environment came with different challenges such as traffic congestion. The traffic congestion that occurs during packet transmission is normally occurs when there is buffer overflow. As a result, packet loss, packet delay, and network throughput impairment occurred during packet transmission within the network. This paper proposed a Priority-Based Congestion Control (PBCC) algorithm in order to manage packet distribution to avoid the buffer overflow in WSNs while improving Quality of Service (QoS). The Particle Swarm Optimization Gravitational Search Algorithm (PSOGSA) and Weighted Priority based Fair Queue Gradient Rate Control (WPFQGRC) were integrated in order to develop the proposed PBCC algorithm. Network Simulator 2 (NS-2) was used to test the effectiveness of the proposed PBCC algorithm. The simulation results showed that the proposed PBCC algorithm reduced the packet loss by 29.4%, packet delay by 32.6%, and improved network throughput by 96.8% when compared with PSOGSA and WPFQGRC algorithms.","PeriodicalId":181396,"journal":{"name":"2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125007753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Issues and Research Challenges in Designing a Secure IoT with Blockchain","authors":"Hemani, Dayashankar Singh, Rajendra Kumar Dwivedi","doi":"10.1109/ICICT55121.2022.10064533","DOIUrl":"https://doi.org/10.1109/ICICT55121.2022.10064533","url":null,"abstract":"Now a day, Internet of Things (IoT) are being used in several areas such as vehicular systems, smart city, healthcare, and supply chain management. Sensor data is stored in the cloud in an IoT system. Therefore, there is always a security concern with this data. There are several techniques for maintaining security, but most of them work in a centralized manner. However, blockchain is an emerging technology that works in a distributed manner and is based on peer-to-peer computing. Security can be enhanced using blockchain in any system. Blockchain technology offers decentralised security and privacy. Sensors used in loT systems are resource constrained. Therefore, implementing blockchain in any loT system creates several research challenges. This paper provides a discussion on such performance issues and research challenges while integrating blockchain with loT. The paper also gives some insights to overcome such issues.","PeriodicalId":181396,"journal":{"name":"2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"24 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129153499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Pari, S. Rajashree, Adithya Prakash, R. M. Shanthosh
{"title":"Role Based Access Control Framework for Healthcare Records Using Hyperledger Fabric","authors":"S. Pari, S. Rajashree, Adithya Prakash, R. M. Shanthosh","doi":"10.1109/ICICT55121.2022.10064512","DOIUrl":"https://doi.org/10.1109/ICICT55121.2022.10064512","url":null,"abstract":"Blockchain has a significant influence on the health-care sector with respect to data sharing. Electronic Health Records (EHR), a highly sensitive method, are currently used in healthcare to store and share medical records. Due to a lack of trustworthy and dependable health data sharing systems, the majority of sharing of Electronic Health Record data is still done by mail. This leads to considerable delays in the patient's treatment. Smart contracts enabling data access, security, and cryptographic guarantees of data integrity are available on the decentralized blockchain platform. By putting the patient at the center of the system, enhancing healthcare data privacy, and enhancing interoperability, the storage of electronic medical records on a centralized or private blockchain has the potential to improve healthcare. Using the Hyperledger fabric technology, a permissioned blockchain system has been suggested to store and share medical records. By using grant and revoke access procedures, patients have full control over their medical information and give clinicians permission to see the patient's medical records. Three different roles have been considered and hence, the access permissions have been given to the roles accordingly, hence ensuring integrity and security. The proposed solution shows a 42.71% in average latency for granting and revoking access to EHRs and also shows a 46% decrease in execution time as compared to previously proposed solutions.","PeriodicalId":181396,"journal":{"name":"2022 3rd International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128380829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}