2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)最新文献

筛选
英文 中文
Prediction of Covid-19 Cases in India Through Machine Learning Using Python 使用Python的机器学习预测印度Covid-19病例
S. Mathur, Krishnasheesh Datta
{"title":"Prediction of Covid-19 Cases in India Through Machine Learning Using Python","authors":"S. Mathur, Krishnasheesh Datta","doi":"10.1109/icrito51393.2021.9596116","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596116","url":null,"abstract":"In this time of the pandemic we all are fighting to stay safe and work side by side and we all have one question in our mind and that is when all this will be over. In this paper we have proposed the SM Model of data prediction. This model can project the future growth of COVID-19 in the states of India and Union Territories by using machine learning in python3 and makes use of the data collected about all the Indian states and union territories. This paper makes use of data collected from various sources to make sure that the proposed model gives us a relatively low margin of error in the growth prediction.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133601814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI & ML Based Anamoly Detection and Response Using Ember Dataset 基于Ember数据集的异常检测和响应
Viraj Rathod, C. Parekh, Dharati Dholariya
{"title":"AI & ML Based Anamoly Detection and Response Using Ember Dataset","authors":"Viraj Rathod, C. Parekh, Dharati Dholariya","doi":"10.1109/icrito51393.2021.9596451","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596451","url":null,"abstract":"In the era of rapid technological growth, malicious traffic has drawn increased attention. Most well-known offensive security assessment todays are heavily focused on pre-compromise. The amount of anomalous data in today's context is massive. Analyzing the data using primitive methods would be highly challenging. Solution to it is: If we can detect adversary behaviors in the early stage of compromise, one can prevent and safeguard themselves from various attacks including ransomwares and Zero-day attacks. Integration of new technologies Artificial Intelligence & Machine Learning with manual Anomaly Detection can provide automated machine-based detection which in return can provide the fast, error free, simplify & scalable Threat Detection & Response System. Endpoint Detection & Response (EDR) tools provide a unified view of complex intrusions using known adversarial behaviors to identify intrusion events. We have used the EMBER dataset, which is a labelled benchmark dataset. It is used to train machine learning models to detect malicious portable executable files. This dataset consists of features derived from 1.1 million binary files: 900,000 training samples among which 300,000 were malicious, 300,000 were benevolent, 300,000 un-labelled, and 200,000 evaluation samples among which 100K were malicious, 100K were benign. We have also included open-source code for extracting features from additional binaries, enabling the addition of additional sample features to the dataset.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122796170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Socialization between Quarantine Vehicle and Road Side Unit for Handling COVID-19: A Concept 新型冠状病毒隔离车与路边处理单位的社会化:一个概念
Zaheeruddin, Hina Gupta, D. Mehrotra
{"title":"Socialization between Quarantine Vehicle and Road Side Unit for Handling COVID-19: A Concept","authors":"Zaheeruddin, Hina Gupta, D. Mehrotra","doi":"10.1109/icrito51393.2021.9596333","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596333","url":null,"abstract":"The large-scale outbreak of pandemic COVID 19 has escalated the number of calls made to the Emergency Medical Services (EMS). EMS consists of the list of isolation centres and quarantine vehicles that are supposed to shift patients to isolation centres. The prime motive of the EMS is to provide quick and reliable assistance to the victims so that their exposure to other public is as low as possible. In this paper, we propose a novel concept of Socially Connected Quarantine Vehicle (SCQV) a subset of Social Internet of Vehicles (SIoV). The SCQV is a social network established among the quarantine vehicles and roadside units. It can be used for shifting the patients to isolation centres or hospitals and circulating messages regarding emergency help and formation of containment zone among people. The concept is new in its context where the socially and mutually connected entities will be capable of interacting with each other and make the handling of patients efficient.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120951298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fostering Analysis of Livelihood Pre and Post Covid-19 using ML Techniques 利用ML技术对Covid-19前后的生计进行培养分析
S. Mahendher, Shivam Singhal, Khazi Mohammed Owais, Maheshwaran S., B. Robin
{"title":"Fostering Analysis of Livelihood Pre and Post Covid-19 using ML Techniques","authors":"S. Mahendher, Shivam Singhal, Khazi Mohammed Owais, Maheshwaran S., B. Robin","doi":"10.1109/icrito51393.2021.9596079","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596079","url":null,"abstract":"The energy sector is one of the major disrupted industries during the time of the lockdowns in all countries. This is causing an irregularity in supply and demand creating various challenges to the sector. The paper provides a comprehensive view on the factors affecting the power usage by the households and the change in trends of consumption of electricity. The paper also included the mental health of the people before and after the COVID lockdown. Two models were created, linear regression for power consumption and logistical regression for mental health. They were verified using various techniques. The purpose of these models is to help researchers and enthusiasts get a better idea about the relationship between various factors which are affecting the power consumption and mental health during the lockdown. They can also be used to predict the outcome if incase any similar event occurs in future.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116293848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Consumer Characteristics and Consumption Patterns of Soft Drinks 软饮料消费者特征与消费模式
S. Sinha, Deepti Sinha, Neetu Mittal
{"title":"Consumer Characteristics and Consumption Patterns of Soft Drinks","authors":"S. Sinha, Deepti Sinha, Neetu Mittal","doi":"10.1109/icrito51393.2021.9596207","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596207","url":null,"abstract":"A soft drink is generally treated as very common product aimed at a very casual consumption. Normally, not much of attention is paid to this product, which has almost become ‘commoditized’. But, a deeper and more careful observation would reveal that soft drinks are strong demographic descriptors of their consumers. Key insights into the characteristics and consumption patterns of consumers can be obtained through an incisive study of the soft drinks market. This research paper makes a concerted effort at unearthing the demographic details and consumption contours of the soft drink users in Kanpur, Agra, Varanasi, Allahabad, and Lucknow - the five representative cities of Uttar Pradesh, the most populous state of India. It has been conclusively established through this research that the residents of these five cities - which are demographically similar in nature - exhibit varying consumption patterns when it comes to soft drinks. It was also found that demographic variables like age, gender, educational qualification, income, and marital status do not significantly impact the consumption of soft drinks, whereas employment status is a key influencer of the same.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116587637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fake News Detection Using Intelligent Techniques 利用智能技术检测假新闻
A. Vora, N. Shekokar
{"title":"Fake News Detection Using Intelligent Techniques","authors":"A. Vora, N. Shekokar","doi":"10.1109/icrito51393.2021.9596438","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596438","url":null,"abstract":"Nowadays fake news spreads very easily through internet and social media. People tend to easily believe in that fake information and start discussing about it. The more we hear about fake news, the more it becomes easier to believe on it. The main aim of fake news is to earn money through advertising revenue by web trafficking or discrediting a public figure, company,etc. Fake news is one of the biggest issues of this modern era especially in the world of social media. Lot of authors have contributed in detection of fake news using various machine learning algorithms but some gaps were found during analysis which are improved in our proposed model. Our approach detects fake news using intelligent techniques such as SVM, Naive Bayes and Logistic Regression. Their performance is analysed using parameters such as F1 score, recall, precision.support, accuracy.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123193660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Experimental Comparison of Machine Learning Techniques for Analysing the Facial Expression 面部表情分析机器学习技术的实验比较
Kumud Kohli, Upasana Sharma, Mayank Sharma, A. Rana
{"title":"Experimental Comparison of Machine Learning Techniques for Analysing the Facial Expression","authors":"Kumud Kohli, Upasana Sharma, Mayank Sharma, A. Rana","doi":"10.1109/icrito51393.2021.9596122","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596122","url":null,"abstract":"Emoticons are miniature pictures that are customarily used in internet community Communications in the 21st century. The fusion of textual and imagery contained in the same message develops today's modern way of conversation. In spite of being universally utilized in online media, Emoticons basic interpretation has received very little observation from a “Natural Language Processing” point of view. In this paper, we investigate the relation between facial expressions and emoticons, studying the novel task of predicting which emojis are evoked by the user's facial expressions. We experimented with variants of word embedding techniques, and train various models based on MNBs and LSTMs in this task respectively. The experimental results show that our model can predict reasonable emoticons from emotions.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125526814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Workflow Automation of Routing Rules in the Accounting Process for Online Travel Agency 在线旅行社会计流程中路由规则的工作流自动化
Mamta Nanda, Ashok Kumar
{"title":"Workflow Automation of Routing Rules in the Accounting Process for Online Travel Agency","authors":"Mamta Nanda, Ashok Kumar","doi":"10.1109/icrito51393.2021.9596274","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596274","url":null,"abstract":"Robotic process automation (RPA) provides many benefits in business process management. Handling a large number of customer's requests for booking or refunding is difficult for Online Travel Agency (OTA) through the manual business process. To overcome these issues, RPA provides many benefits for OTA. It is helpful in managing tasks of businesses and increasing the efficiency. The manual work of accounting and refunds in online travel agency can be done by automation which leads business to get the efficient results. In the proposed study, it has been taken into consideration how RPA can be used in refunding process and how it is beneficial for the business. Automating the business processes by using Microsoft Power Platform leads to enhancement in productivity, cost optimization, error reduction and provide business growth for the organizations.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114606652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison between Code Clone Detection and Model Clone Detection 代码克隆检测与模型克隆检测的比较
G. Shobha, A. Rana, Vineet Kansal, Sarvesh Tanwar
{"title":"Comparison between Code Clone Detection and Model Clone Detection","authors":"G. Shobha, A. Rana, Vineet Kansal, Sarvesh Tanwar","doi":"10.1109/icrito51393.2021.9596454","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596454","url":null,"abstract":"In software, clones are syntactically or semantically identical of two code fragments. Cloning by either deliberately or by coincidence. Cloning has pros and cons in software development. Bug propagation may be caused by cloning from original to copied segments. Cloning may lead to difficulties in software maintenance. Cloning is helpful in many functions like code reusability, inheritance, and libraries. Software developers before scripting the code design the model for it. Cloning can exist at any stage either at the design or coding phase, which influences on development, quality, and maintenance of the software. All software has constraints like budget and time are associated. In software development, life cycle budget and time constraints depend on irregularity and risk. These irregularities and risks can be minimized by identifying clones. There are different kinds of clones in Code and Model. In this paper, we present a concise summary of design and coding phase clone detection of these irregularities and risk as well as their for's and against of code clone detection and model clone detection.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128400842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Review of Local Binary Pattern Based texture feature extraction 基于局部二值模式的纹理特征提取方法综述
N. Kaur, Nahida Nazir, Manik
{"title":"A Review of Local Binary Pattern Based texture feature extraction","authors":"N. Kaur, Nahida Nazir, Manik","doi":"10.1109/icrito51393.2021.9596485","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596485","url":null,"abstract":"In the sphere of image processing, image data investigation is required related to a specific application in order to extract the suggestive information and reach defined and crisp culminations. One of the most significant phase in image processing is feature extraction which is the third step following image acquisition and segmentation. The procedure of reconstructing the input image into a group of features is named as feature extraction. These features construe the textural characteristics of the image. Texture feature extraction is one such significant part of feature extraction that on majority influences the results of classification. A texture is principally based on recognizing the object or region of interest in an image. The Local Binary Pattern feature descriptor will be the pith of discussion of this paper. LBP is a texture operator that operates on an image by labeling its pixels by thresholding neighborhood of each pixel. Various quality journals have been referred in order to provide an insight into the trends in pattern recognition using LBP.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128780759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信