{"title":"Prediction of Covid-19 Cases in India Through Machine Learning Using Python","authors":"S. Mathur, Krishnasheesh Datta","doi":"10.1109/icrito51393.2021.9596116","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596116","url":null,"abstract":"In this time of the pandemic we all are fighting to stay safe and work side by side and we all have one question in our mind and that is when all this will be over. In this paper we have proposed the SM Model of data prediction. This model can project the future growth of COVID-19 in the states of India and Union Territories by using machine learning in python3 and makes use of the data collected about all the Indian states and union territories. This paper makes use of data collected from various sources to make sure that the proposed model gives us a relatively low margin of error in the growth prediction.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133601814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AI & ML Based Anamoly Detection and Response Using Ember Dataset","authors":"Viraj Rathod, C. Parekh, Dharati Dholariya","doi":"10.1109/icrito51393.2021.9596451","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596451","url":null,"abstract":"In the era of rapid technological growth, malicious traffic has drawn increased attention. Most well-known offensive security assessment todays are heavily focused on pre-compromise. The amount of anomalous data in today's context is massive. Analyzing the data using primitive methods would be highly challenging. Solution to it is: If we can detect adversary behaviors in the early stage of compromise, one can prevent and safeguard themselves from various attacks including ransomwares and Zero-day attacks. Integration of new technologies Artificial Intelligence & Machine Learning with manual Anomaly Detection can provide automated machine-based detection which in return can provide the fast, error free, simplify & scalable Threat Detection & Response System. Endpoint Detection & Response (EDR) tools provide a unified view of complex intrusions using known adversarial behaviors to identify intrusion events. We have used the EMBER dataset, which is a labelled benchmark dataset. It is used to train machine learning models to detect malicious portable executable files. This dataset consists of features derived from 1.1 million binary files: 900,000 training samples among which 300,000 were malicious, 300,000 were benevolent, 300,000 un-labelled, and 200,000 evaluation samples among which 100K were malicious, 100K were benign. We have also included open-source code for extracting features from additional binaries, enabling the addition of additional sample features to the dataset.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122796170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Socialization between Quarantine Vehicle and Road Side Unit for Handling COVID-19: A Concept","authors":"Zaheeruddin, Hina Gupta, D. Mehrotra","doi":"10.1109/icrito51393.2021.9596333","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596333","url":null,"abstract":"The large-scale outbreak of pandemic COVID 19 has escalated the number of calls made to the Emergency Medical Services (EMS). EMS consists of the list of isolation centres and quarantine vehicles that are supposed to shift patients to isolation centres. The prime motive of the EMS is to provide quick and reliable assistance to the victims so that their exposure to other public is as low as possible. In this paper, we propose a novel concept of Socially Connected Quarantine Vehicle (SCQV) a subset of Social Internet of Vehicles (SIoV). The SCQV is a social network established among the quarantine vehicles and roadside units. It can be used for shifting the patients to isolation centres or hospitals and circulating messages regarding emergency help and formation of containment zone among people. The concept is new in its context where the socially and mutually connected entities will be capable of interacting with each other and make the handling of patients efficient.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120951298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Mahendher, Shivam Singhal, Khazi Mohammed Owais, Maheshwaran S., B. Robin
{"title":"Fostering Analysis of Livelihood Pre and Post Covid-19 using ML Techniques","authors":"S. Mahendher, Shivam Singhal, Khazi Mohammed Owais, Maheshwaran S., B. Robin","doi":"10.1109/icrito51393.2021.9596079","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596079","url":null,"abstract":"The energy sector is one of the major disrupted industries during the time of the lockdowns in all countries. This is causing an irregularity in supply and demand creating various challenges to the sector. The paper provides a comprehensive view on the factors affecting the power usage by the households and the change in trends of consumption of electricity. The paper also included the mental health of the people before and after the COVID lockdown. Two models were created, linear regression for power consumption and logistical regression for mental health. They were verified using various techniques. The purpose of these models is to help researchers and enthusiasts get a better idea about the relationship between various factors which are affecting the power consumption and mental health during the lockdown. They can also be used to predict the outcome if incase any similar event occurs in future.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116293848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Consumer Characteristics and Consumption Patterns of Soft Drinks","authors":"S. Sinha, Deepti Sinha, Neetu Mittal","doi":"10.1109/icrito51393.2021.9596207","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596207","url":null,"abstract":"A soft drink is generally treated as very common product aimed at a very casual consumption. Normally, not much of attention is paid to this product, which has almost become ‘commoditized’. But, a deeper and more careful observation would reveal that soft drinks are strong demographic descriptors of their consumers. Key insights into the characteristics and consumption patterns of consumers can be obtained through an incisive study of the soft drinks market. This research paper makes a concerted effort at unearthing the demographic details and consumption contours of the soft drink users in Kanpur, Agra, Varanasi, Allahabad, and Lucknow - the five representative cities of Uttar Pradesh, the most populous state of India. It has been conclusively established through this research that the residents of these five cities - which are demographically similar in nature - exhibit varying consumption patterns when it comes to soft drinks. It was also found that demographic variables like age, gender, educational qualification, income, and marital status do not significantly impact the consumption of soft drinks, whereas employment status is a key influencer of the same.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116587637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fake News Detection Using Intelligent Techniques","authors":"A. Vora, N. Shekokar","doi":"10.1109/icrito51393.2021.9596438","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596438","url":null,"abstract":"Nowadays fake news spreads very easily through internet and social media. People tend to easily believe in that fake information and start discussing about it. The more we hear about fake news, the more it becomes easier to believe on it. The main aim of fake news is to earn money through advertising revenue by web trafficking or discrediting a public figure, company,etc. Fake news is one of the biggest issues of this modern era especially in the world of social media. Lot of authors have contributed in detection of fake news using various machine learning algorithms but some gaps were found during analysis which are improved in our proposed model. Our approach detects fake news using intelligent techniques such as SVM, Naive Bayes and Logistic Regression. Their performance is analysed using parameters such as F1 score, recall, precision.support, accuracy.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123193660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kumud Kohli, Upasana Sharma, Mayank Sharma, A. Rana
{"title":"Experimental Comparison of Machine Learning Techniques for Analysing the Facial Expression","authors":"Kumud Kohli, Upasana Sharma, Mayank Sharma, A. Rana","doi":"10.1109/icrito51393.2021.9596122","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596122","url":null,"abstract":"Emoticons are miniature pictures that are customarily used in internet community Communications in the 21st century. The fusion of textual and imagery contained in the same message develops today's modern way of conversation. In spite of being universally utilized in online media, Emoticons basic interpretation has received very little observation from a “Natural Language Processing” point of view. In this paper, we investigate the relation between facial expressions and emoticons, studying the novel task of predicting which emojis are evoked by the user's facial expressions. We experimented with variants of word embedding techniques, and train various models based on MNBs and LSTMs in this task respectively. The experimental results show that our model can predict reasonable emoticons from emotions.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125526814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Workflow Automation of Routing Rules in the Accounting Process for Online Travel Agency","authors":"Mamta Nanda, Ashok Kumar","doi":"10.1109/icrito51393.2021.9596274","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596274","url":null,"abstract":"Robotic process automation (RPA) provides many benefits in business process management. Handling a large number of customer's requests for booking or refunding is difficult for Online Travel Agency (OTA) through the manual business process. To overcome these issues, RPA provides many benefits for OTA. It is helpful in managing tasks of businesses and increasing the efficiency. The manual work of accounting and refunds in online travel agency can be done by automation which leads business to get the efficient results. In the proposed study, it has been taken into consideration how RPA can be used in refunding process and how it is beneficial for the business. Automating the business processes by using Microsoft Power Platform leads to enhancement in productivity, cost optimization, error reduction and provide business growth for the organizations.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114606652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison between Code Clone Detection and Model Clone Detection","authors":"G. Shobha, A. Rana, Vineet Kansal, Sarvesh Tanwar","doi":"10.1109/icrito51393.2021.9596454","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596454","url":null,"abstract":"In software, clones are syntactically or semantically identical of two code fragments. Cloning by either deliberately or by coincidence. Cloning has pros and cons in software development. Bug propagation may be caused by cloning from original to copied segments. Cloning may lead to difficulties in software maintenance. Cloning is helpful in many functions like code reusability, inheritance, and libraries. Software developers before scripting the code design the model for it. Cloning can exist at any stage either at the design or coding phase, which influences on development, quality, and maintenance of the software. All software has constraints like budget and time are associated. In software development, life cycle budget and time constraints depend on irregularity and risk. These irregularities and risks can be minimized by identifying clones. There are different kinds of clones in Code and Model. In this paper, we present a concise summary of design and coding phase clone detection of these irregularities and risk as well as their for's and against of code clone detection and model clone detection.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128400842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review of Local Binary Pattern Based texture feature extraction","authors":"N. Kaur, Nahida Nazir, Manik","doi":"10.1109/icrito51393.2021.9596485","DOIUrl":"https://doi.org/10.1109/icrito51393.2021.9596485","url":null,"abstract":"In the sphere of image processing, image data investigation is required related to a specific application in order to extract the suggestive information and reach defined and crisp culminations. One of the most significant phase in image processing is feature extraction which is the third step following image acquisition and segmentation. The procedure of reconstructing the input image into a group of features is named as feature extraction. These features construe the textural characteristics of the image. Texture feature extraction is one such significant part of feature extraction that on majority influences the results of classification. A texture is principally based on recognizing the object or region of interest in an image. The Local Binary Pattern feature descriptor will be the pith of discussion of this paper. LBP is a texture operator that operates on an image by labeling its pixels by thresholding neighborhood of each pixel. Various quality journals have been referred in order to provide an insight into the trends in pattern recognition using LBP.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128780759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}