{"title":"Analysing Efficient MANET Routing Protocols To Integrate With Smart Devices","authors":"Lincy Joy, R. Dudhe","doi":"10.1109/ICCIKE51210.2021.9410733","DOIUrl":"https://doi.org/10.1109/ICCIKE51210.2021.9410733","url":null,"abstract":"The Internet of Things (IoT) architecture is structured as a network of devices that connect with one another and provide creative solutions to real-time problems. There have been studies regarding various combinations of routing protocols that defines the efficient pathway to interconnect the smart devices. Proactive, reactive and hybrid routing protocols are the three types of routing protocols defined on the basis of route discovery. The core objective of this paper is to provide a comparative performance analysis on the routing protocols using a ViSim tool that integrates the Ns2 simulator. This tool focus on MANET (Mobile Ad-Hoc Network) protocols for proactive - DSDV (Destination-Sequenced Distance-Vector Routing) and reactive - DSR (Dynamic Source Routing) and ADOV(Ad-hoc On-demand Distance Vector). Throughput, Goodput (packets and packet size) and Routing load (packets and packet size) are the parameters to make comparison between the routing protocols for performance analysis. This tool can be modified in the future for better analysis of different routing protocols.","PeriodicalId":254711,"journal":{"name":"2021 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121943307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meera Ramadas, Ved Prakash Mishra, Stefano Corti, Shah Faisal, Vinod Kumar Shukla
{"title":"Digital Monetization and Google Analytics","authors":"Meera Ramadas, Ved Prakash Mishra, Stefano Corti, Shah Faisal, Vinod Kumar Shukla","doi":"10.1109/ICCIKE51210.2021.9410749","DOIUrl":"https://doi.org/10.1109/ICCIKE51210.2021.9410749","url":null,"abstract":"People nowadays spend more time on technology than before. This has paved the path and created new opportunities for monetization by managing Ads on different pages, SDKs and content distribution. Hence Google started providing advertisers with different types of platforms to promote and monetize their products. Different types of ads like organic, paid, social media displays ads etc. were introduced later on. This paper mainly talks about the process of building, implementing and maintaining an Advanced Reporting Platform for complete stack of Google monetization products that allow monetizing CPM & CPC with Display, Video & in APP products.","PeriodicalId":254711,"journal":{"name":"2021 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123241053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of Delivery Apps Commission Rates on U.A.E Restaurants","authors":"Darryll Rose Dano, Ashok Chopra","doi":"10.1109/ICCIKE51210.2021.9410736","DOIUrl":"https://doi.org/10.1109/ICCIKE51210.2021.9410736","url":null,"abstract":"this paper examines that how COVID 2019 has negatively impacted the food industry in the U.A.E, resulting to the reliance of third-party applications to deliver food to their consumers. Food delivery apps have become popular not only in the U.A.E, but worldwide, as people take precaution through social distancing and quarantine in the hopes of curbing the spread of the coronavirus. Restaurant owners have put delivery services on the spotlight, urging them to cut down their commission rates as they are negatively implicating their businesses. Third-party services have been known to take commissions out of the restaurant owners they partner with. However, restaurant owners complain that these rates have increased over the years, with zero reductions especially with slow business as a result of the pandemic. Delivery apps have not waivered their commissions, charging as high as 35% per order, which is not inclusive of a delivery fee for the consumer. The food industry is requesting third-party companies for a 10% reduction for each order, for them to be able to make ends meet. The paper encloses a survey conducted on restaurants in the U.A.E to assess the impact of commission rates by these delivery apps. The results showed that the restaurants are struggling to keep afloat, a factor that is bound to affect the employment of many staff members in these hotels. The paper, therefore, outlines the impact of these commission rates among other charges on restaurants and other food businesses in the United Arab Emirates. .","PeriodicalId":254711,"journal":{"name":"2021 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122582082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ecological Velocity Planning of Plug-in Hybrid Electric Bus Through Signalized Intersections","authors":"Ziqing Wang, M. Dridi, A. El Moudni","doi":"10.1109/ICCIKE51210.2021.9410762","DOIUrl":"https://doi.org/10.1109/ICCIKE51210.2021.9410762","url":null,"abstract":"This work focuses on the velocity planning problem for Plug-in Hybrid Electric Bus (PHEB). Based on communication with transportation infrastructures, the traffic information like Signal Phase and Times (SPaT) of traffic signals or stop time of bus stations over the entire route will be known precisely in advance. A spatial PHEB velocity optimization formulation with communication to traffic information is proposed to minimize the energy consumption or travel time. Two procedures are used for optimizing the objective, first, a State-of-Charge (SOC) curve is obtained from optimization with known road conditions for replacing empirical data to avoid the heavy computational duty of solving three-dimension dynamic programming. Then the optimized velocity profiles are calculated via a two-dimension dynamic programming model. Finally, the simulation results validate the energy savings and time savings of the proposed velocity planning strategy.","PeriodicalId":254711,"journal":{"name":"2021 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)","volume":"13 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124996850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. A. Ogunmola, Bhopendra Singh, D. K. Sharma, R. Regin, Suman Rajest S, Nrashant Singh
{"title":"Involvement of Distance Measure in Assessing and Resolving Efficiency Environmental Obstacles","authors":"G. A. Ogunmola, Bhopendra Singh, D. K. Sharma, R. Regin, Suman Rajest S, Nrashant Singh","doi":"10.1109/ICCIKE51210.2021.9410765","DOIUrl":"https://doi.org/10.1109/ICCIKE51210.2021.9410765","url":null,"abstract":"Details persistence axioms suggest that almost any based method conducts a normal quest without substitution, as well as an evolutionary algorithm unless it makes fun of concern search goal or lookup burdened. The protection of salt marshes below rapid sea-level rise (SLR) usually includes the survival of underdeveloped moorlands of marsh betrayal zones with which wetlands can transition. Optimal conservation planning of this kind includes details on forest protection's potential benefits and the cost of worthy sites for migrating marshes in specific areas. Although available content is known within the literature on marsh benefits, the prior study offers little visibility into the related costs of land protection. Discrete mathematics shows that a largish task requires the success of issue data. Computers are ineffective to overcome even moderately sized hiccups without reliable information to direct them, considering their pace in performing inquiries. Three tests are proposed to classify the information needed for an effective search: (1) ligneous particulars that measure the difficulty of finding a goal using a random search; (2) physiologic particulars that estimate the challenge of obtaining a goal once a search has some of the problem-relevant information; and (3) active particulars that distinguish the differences among specific particulars. The results show the conservation planning perspective that models can provide and help review simplistic proxies to estimate the cost of conservation of land desirable for marsh migration. This paper establishes a technique focused on these knowledge measures to gauge the efficiency with which efficient search is enabled by dilemma information. This technique is then extended to numerous search instruments commonly used in the evolutionary quest.","PeriodicalId":254711,"journal":{"name":"2021 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128874014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Sharma, Bhopendra Singh, Edwin Hernan Ramirez Asis, R. Regine, Suman Rajest S, V. P. Mishra
{"title":"Maximum Information Measure Policies in Reinforcement Learning with Deep Energy-Based Model","authors":"K. Sharma, Bhopendra Singh, Edwin Hernan Ramirez Asis, R. Regine, Suman Rajest S, V. P. Mishra","doi":"10.1109/ICCIKE51210.2021.9410756","DOIUrl":"https://doi.org/10.1109/ICCIKE51210.2021.9410756","url":null,"abstract":"we provided a framework for the acquisition of articulated electricity regulations for consistent states and actions, but it has only been attainable in summarised domains since then. Developers adapt our environment to learning maximum entropy policies, leading to a simple Q-learning service, which communicates the global optimum through a Boltzmann distribution. We could use previously approved amortized Stein perturbation theory logistic regression rather than estimated observations from that distribution form to obtain a stochastic diffusion network. In simulated studies with underwater and walking robots, we confirm that the entire algorithm's cost provides increased exploration or term frequency that allows the transfer of skills between tasks. We also draw a comparison to critical actor methods, which can represent on the accompanying energy-based model conducting approximate inference. Misleading multiplayer uses the recompense power to ensure that the user is further from either the evolutionary algorithms but has now evolved to become a massive task in developing intelligent exploration for deep reinforcement learning. In a misleading game, nearly all cutting-edge research techniques, including those qualify superstition yet, even with self-recompenses, which achieves enhanced outcomes in the sparse re-ward game, often easily collapse into global optimization traps. We are introducing another exploration tactic called Maximum Entropy Expand (MEE) to remedy this shortage (MEE). Based on entropy rewards but the off-actor-critical reinforced learning algorithm, we split the entity adventurer policy into two equal parts, namely, the target rule and the adventure policy. The explorer law is used to interact with the world, and the target rule is used to create trajectories, with the higher precision of the targets to be achieved as the goal of optimization. The optimization goal of the targeted approach is to maximize extrinsic rewards in order to achieve the global result. The ideal experience replay used to remove the catastrophic forgetting issue that leads to the operator's information becoming non-normalized during the off-exploitation period. To prevent the vulnerable, diverging, and generated by the dangerous triad, an on-policy form change is used specifically. Users analyse data likening our strategy with a region technique for deep learning, involving grid world experimentation techniques and deceptively recompense Dota 2 environments. The case illustrates that the MME strategy tends to be productive in escaping the current paper's coercive incentive trap and learning the correct strategic plan.","PeriodicalId":254711,"journal":{"name":"2021 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127570998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review on the ethical and legal challenges with IoT","authors":"Bushra Siddiqua Oosman, R. Dudhe","doi":"10.1109/ICCIKE51210.2021.9410714","DOIUrl":"https://doi.org/10.1109/ICCIKE51210.2021.9410714","url":null,"abstract":"IoT technology is vast field. It comprises of smart devices and applications connected to each other using internet. These devices like sensors, wearable health monitors, smart security systems etc, are continuously collecting data and monitoring people around it. All this data collected by the smart devices results in Big Data. When it comes to handling big data, safeguarding this sensitive data from hackers and cyber bullies is a difficult task. Apart from this, Big Data collection also gives rise to some serious ethical and legal issues. While in most countries there are now laws to deal with these issues, it is still a complicated task to tackle these cyber activities as they are not governed geographically. In the paper below we discuss the different technologies we can utilize, and the various cyber laws introduced to prevent the ethical and legal problems occurring due to the use of these IoT devices.","PeriodicalId":254711,"journal":{"name":"2021 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126432244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring the Quality of Hand and Surface Grinding Images by Applying Image Processing Tools of Scilab Software","authors":"Senthil Velan S, V. Poluru","doi":"10.1109/ICCIKE51210.2021.9410722","DOIUrl":"https://doi.org/10.1109/ICCIKE51210.2021.9410722","url":null,"abstract":"Powerful and resourceful Image Processing techniques can be applied in the field of manufacturing engineering to understand a good number of quality attributes. In this research, the focus has been to apply the edge detection algorithms of Canny, Prewitt and Sobel to identify the quality of hand grinding and surface grinding done on standard size steel metals flats. The edge detected images are compared with the reference good grinded surface images to understand the similarity between them. Multiple samples taken from a laboratory environment are considered for the comparison. Based on the results obtained it is found that Canny edge detection function is able to find a good number of defects in the given set of samples. It is also found that the grinding done in each case is only around 25% perfect even if the Sobel algorithm is used for the surface edge detections.","PeriodicalId":254711,"journal":{"name":"2021 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)","volume":"247 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133005073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Neel Gandhi, J. Patel, Rajdeepsinh Sisodiya, Nishant Doshi, Shakti Mishra
{"title":"A CNN-BiLSTM based Approach for Detection of SQL Injection Attacks","authors":"Neel Gandhi, J. Patel, Rajdeepsinh Sisodiya, Nishant Doshi, Shakti Mishra","doi":"10.1109/ICCIKE51210.2021.9410675","DOIUrl":"https://doi.org/10.1109/ICCIKE51210.2021.9410675","url":null,"abstract":"Web application attacks concerned with Structured Query Language Injection(SQLI) have been a major threat in the field of cybersecurity. SQLI attacks majorly lead to leakage of user’s data leading to data manipulation, updation and deletion in database management system. Traditional techniques used to prevent SQLI injections include rule-based matching and other related methods that are limited to a few number of SQL injections. Major concern regarding SQLI attacks relates to invention of new malicious SQL queries by hackers to perform SQLI attacks. The problem can be effectively dealt with use of machine learning algorithms for prediction of SQLI attacks. Paper proposes a hybrid CNN-BiLSTM based approach for SQLI attack detection. The proposed CNN-BiLSTM model had significant accuracy of 98% and superior performance compared to other machine learning algorithms. Also, paper presents a comparative study of different types of machine learning algorithms used for the purpose of SQLI attack detection. The study shows the performance of various algorithms based on accuracy, precision, recall, and F1 score with respect to proposed CNN-BiLSTM model in detection of SQL injection attacks.","PeriodicalId":254711,"journal":{"name":"2021 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)","volume":"396 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133444684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Fabrication of Automatic Flow Packing Machine: A Reverse Engineering Approach","authors":"Arafa S. Sobh, H. Hussein, V. Naranje, S. Aly","doi":"10.1109/ICCIKE51210.2021.9410769","DOIUrl":"https://doi.org/10.1109/ICCIKE51210.2021.9410769","url":null,"abstract":"In today’s competitive word, the automation of material handling, the manufacturing processes have replaced the mundane work in the various industries where the mass production of the part has taken place. The plastic product manufacturing is one of the mass production industry. A flow-packing machine is an essential equipment used for packing the final goods. It facilitates the material handling of bulk and unit material. Automation of flow-packing machine reduces labor requirement, lead time, workplace injuries, and by so allows maximum possible production with best quality. In this paper an automatic feeding mechanism is designed and fabricated for manually operated flow-packing machine. Before automation of the feeding mechanism, parts were placed on the conveyor manually. This results in a large waste of products and a rise possibility of workplace injury. Design of an automatic feeding mechanism overcome these problems. The proposed design is validated in real life scenario.","PeriodicalId":254711,"journal":{"name":"2021 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)","volume":"132 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114058818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}