{"title":"Statistics Review of Indian Automobile Industry Using Correlation& Linear Regression Techniques","authors":"Shailendra Kumar Srivastava, Ravi Kant Sharma, Pramod Kumar Srivastava, Ruchira Srivastava","doi":"10.1109/ICIEM51511.2021.9445382","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445382","url":null,"abstract":"The data based on the responses of 126 consumers of premium automobile companies i.e. Tata motors, BMW, Mercedes-Benz, and Ford shows that high-income group millennial from Delhi NCR are the primary users of connected technology-based automobiles. Further, SEM analysis results show that there is a significant role played by the digital service delivery via connected technology on influencing the level of satisfaction. The study aims the review of statistic review using various correlation and linear regression techniques","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128916594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Security using Hybrid Cryptography Algorithms","authors":"Sanjeev Kumar, Garima Karnani, Madhu Sharma Gaur, Anju Mishra","doi":"10.1109/ICIEM51511.2021.9445377","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445377","url":null,"abstract":"Security in cloud computing is the emerging research issues nowadays. A lot of organization are moving from their traditional data storage to cloud storage, which provides an efficient way to access the data anywhere and anytime. But, the main hitch of organization to use cloud computing is data security. This paper proposed a multilevel cryptography based security system for cloud computing. The model is hybrid approach of symmetric and asymmetric key cryptography algorithms. In this Data Encryption Standard (DES) and RSA are implemented to provide the multilevel of encryption and decryption at both sender and receiver side which increase the security of the cloud storage. This security model gives the transparency to the cloud user as well as cloud service provider in order to reduce the security threats. The proposed model is implemented in java and cloudsim cloud simulator tool. This model increases the data security up to a maximum extant and it takes less time in uploading and downloading the text file as compare to existing system.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129202219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Approach for Human Intelligence Analysis: Using Clustering Technique","authors":"Kanika Thakur, K. Lal","doi":"10.1109/ICIEM51511.2021.9445275","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445275","url":null,"abstract":"The purpose of this paper is to examine the relationship between various Intelligent Quotient tests as proposed by different researcher and reduce the gap present in the process of Intelligence evaluation of a student. To carry out this research, we conducted a survey on the students of Netaji Subhash Institute of Technology, Patna (Bihar). The first Step of IQ analysis was performed on the students from different streams of Engineering and Polytechnic of NSIT, Patna. Initially, the data size was 70. In the second Stage we collected and conducted the test on 300 students from different colleges from various disciplines and performed thorough analysis using the model. We have used Machine Learning algorithm to develop the robust model that can reduce the conceptual gap and evaluate the Intelligent Quotient of students in a very effective way","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116852643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An overview of soft computing techniques on Review Spam Detection","authors":"Irtiqa Amin, Mithilesh Kumar Dubey","doi":"10.1109/ICIEM51511.2021.9445280","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445280","url":null,"abstract":"Individuals that work with web services commonly focus on internet-based feedback to make decisions about shopping via online, booking an apartment, renting banquette halls etc., because people believe that making a decision which is based on the views of others, can contribute in making the right decision about their purchases. While publishing negative reviews or comments, brings financial benefit to manufacturers via online review websites and also increases the review spam happenings. Sentimental misinformation in feedback has therefore become a significant challenge for people to make decisions about their purchase and thus decrease the credibility of review on websites. The malicious spam identification of views is therefore an important activity in the fields of machine learning (NLP- Natural Language Processing). The conventional bag-of-words model is used to recognize the text analysis characteristics of most of the current research on review spam detection and to apply traditional machine learning models such as Support Vector Machines, Random forest, Decision tree and Naïve Bayes as classifiers. With increase in the effective applications of Soft computing, the spam detection framework has achieved improved efficiency over traditional machine learning and works well with unique models and provides better solutions to complicated real-life scenarios. This paper discusses the overview of soft computing techniques in spam detection.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116748689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Diagnosing Parkinson’s disease in Early Stages using Image Enhancement, ROI Extraction and Deep Learning Algorithms","authors":"Anupama Bhan, Sona Kapoor, Manan Gulati","doi":"10.1109/ICIEM51511.2021.9445381","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445381","url":null,"abstract":"Parkinson’s disease or PD is among the most common neurodegenerative disorders which, due to loss of neurons, leads to the deterioration of motor and non-motor functions like tremors, shaking, slow movement, impaired balance and depression. It is a slow developing disorder and there is no definitive treatment for it; but its symptoms can be reduced with the help of specific drugs. Various methods have been introduced in order to detect PD in its early stages. Magnetic resonance imaging (MRI) is an effective and efficient method since it is an inexpensive and non-invasive tool which produces high-resolution images. In this paper, early diagnosis of PD has been carried out using different CNN models. Image enhancement has been performed on the magnetic resonance (MR) images in the dataset. After extracting the region of interest (ROI), in this case the substantia nigra (SN) region, a custom CNN model and VGG-16 are implemented for automatically differentiating SN in image and no SN in the image. We then performed binary classification to accurately discriminate between PD and control subjects by implementing deep learning models ResNet-34, VGG-19, ResNet-50 and improved AlexNet. At the end, after comparing the accuracies and losses of different models, it can be concluded that the ResNet-50 model depicted the best performance for this purpose.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115624037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review on evaluation techniques for better student learning outcomes using machine learning","authors":"Pooja Rana, Lovi Raj Gupta, M. K. Dubey, G. Kumar","doi":"10.1109/ICIEM51511.2021.9445294","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445294","url":null,"abstract":"The paper represents review on student learning outcomes on the basis of various evaluation parameters which plays an important role in an education system. Student learning outcomes along with other attributes are taken into consideration like learner factor, learner engagement, learning strategies use, teacher experience, motivational beliefs and technology in learning etc. With the help of examination and evaluation we can measure student learning outcome. Classification Algorithms like Decision Tree, Naïve Bayes and Support Vector Machine can help us to classify student’s performance. This classifier helps in tracking student performance. With the use of machine learning techniques we are trying to identify whether learning outcome is achieved or not. Students learning evaluation should be done on regular basis so that true learning outcomes can be measure. Once learning outcome is evaluated on regular basis, its aggregation should be done to sum up the learning outcome of course.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114144890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Overview of PDF Malware Classifiers","authors":"Sanjeev Reddy Gopaldinne, Harpreet Kaur, Pawandeep Kaur, Gunseerat Kaur, Madhuri","doi":"10.1109/ICIEM51511.2021.9445341","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445341","url":null,"abstract":"PDF means Portable Document Format. It is a commonly used format for data exchange nowadays. Though, it turns out to be the most striking to the target for misuse by malware designer and vulnerability researcher. PDF which contains malicious based attacks mainly targeting individuals, Financial sectors and government official. The existing tools like IDS mean Intrusion Detection System and packages like antivirus are inefficient to overcome these kinds of attacks. In this paper, we discussed about PDF structure file structure and its working and we have discussed some classifiers related to malware detection.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114263311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"‘Covid-Proof’ Smart World","authors":"Fathimath Shahina C. A, Saifudeen Kabeer","doi":"10.1109/ICIEM51511.2021.9445313","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445313","url":null,"abstract":"The rare corona virus epidemic has placed communities all over the world in perilous situations. This paper proposed a systematic approach to survive the any kind of pandemic more efficiently by merging the concept of Internet of Things (IoT), Augmented Reality (AR), Unmanned Aerial Vehicles (UAVs), and machine learning (ML). We have designed technology systems and scientific solutions for various smart sectors including Education, Health, Residents, Food and safety, Transportation, Agricultural, Occupation and Finance, Recreation and fitness, and Law and enforcement, which will work in convergence to develop ‘pandemic-proof’ future smart world. Smart emerging innovations are playing a critical role in the world's survival at the time of lockdown and social distancing. This smart application can be a potential tool for supporting remote service delivery, ensuring uninterrupted education, food and medicine delivery, mitigating the crises' impact on businesses and urban citizens and empowering new types of local governance.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114680739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing Ant Colony Optimization on Evolution Obstacle for Scheduling a Software Project","authors":"Pooja Singh, Prashant Gupta, Deepankar Singh","doi":"10.1109/ICIEM51511.2021.9445366","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445366","url":null,"abstract":"Planning any software development project is a crucial, vital and high-cost activity for software companies. Allocating resources and allocating tasks among software development teams is a strenuous task that can affect the cost of the project and it’s time to completion. Inference for such a problem requires methodical tools and techniques that can solve this software project management problem. This article shows how to apply the Ant Colony Optimization (ACO) algorithm in the programming problem of the software development project proposed above. The paper implements an \"Elite-Behavior\" version of ACO for the project scheduling problem in a parameter-constrained environment. The implemented example showed in the article inference how the stochastic nature of the ACO is useful for exploring possible paths and then choosing the optimal path between them. Experimental results show that an Elite-ACO, which is referenced to as Employee Ant Colony Optimization (EACO) technique in the paper provides solutions very close to the optimal solutions for the particular programming problem.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124359950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid approach to identify Software Reusable Components in Software Intelligence","authors":"A. Sandhu, Ranbir Singh Batth","doi":"10.1109/ICIEM51511.2021.9445378","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445378","url":null,"abstract":"Reusability is demarcated as the way of utilizing existing software components in software development. It plays a significant role in component-based software engineering. Extracting the components from the source code and checking the reusability factors is the most crucial part. Software Intelligence, a combination of data mining and artificial intelligence, helps to cope with the extraction and detection of reusability factor of the component. In this work prediction of reusability factor is considered. This paper proposes a hybrid PSO-NSGA III approach to detect whether the extracted component is reusable or not. The existing models lack in tuning the hyper parameters for prediction, which is considered in this work. The proposed approach was compared with four models, showing better outcomes in terms of performance metrics.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124761526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}