D. Brar, Amit Kumar, Pallavi, Usha Mittal, Pooja Rana
{"title":"Face Detection for Real World Application","authors":"D. Brar, Amit Kumar, Pallavi, Usha Mittal, Pooja Rana","doi":"10.1109/ICIEM51511.2021.9445287","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445287","url":null,"abstract":"Face Detection has become a very prevalent issue in Machine Learning, not only in machine learning but in any field, one can think of. Due to this, it has gained a wide fan base and many people are working every day to improve the accuracy of object detection models using deep learning. But this improved performance comes at the price of increased computational overhead, which limits the ability of a machine learning model to be utilized on devices having small Graphical Processing Units. The core intent of this paper is to compare computation time for models such as Histogram of Oriented gradients (0.4 seconds) and ResNet (48.5 seconds) with BlazeFace (0.09 seconds), a model developed by google in the year 2020 and is a mobile device friendly model and fits well with real time application which need instant feedback and on top of that cannot handle bulky computations required for deep learning models","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"81 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120975298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mukesh Joshi, S. Budhani, Naveen Tewari, Satyam Prakash
{"title":"Analytical Review of Data Security in Cloud Computing","authors":"Mukesh Joshi, S. Budhani, Naveen Tewari, Satyam Prakash","doi":"10.1109/ICIEM51511.2021.9445355","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445355","url":null,"abstract":"All the organization wants to implement the same security parameters as they are already using with their internal data/resources. It is mandatory to understand and find the data protection challenges before outsourcing the data security in cloud computing. In present research we are discussing about the impact of security in cloud computing including all the challenges associated with it.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121224779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative study of different denoising techniques on Brain NCCT images","authors":"Simarjeet Kaur, Jimmy Singla, Nikita Nikita","doi":"10.1109/ICIEM51511.2021.9445309","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445309","url":null,"abstract":"Medical images often get affected by noise and artifacts while acquisition techniques or patient’s movement. Some time radiologists unable to make useful and accurate conclusion from noisy images. The main aim of this study is to conduct a comparative measure of various denoising techniques such as Gaussian filter, Median filter, Bilateral filter, Non-Local Mean filter(NLM), Total Variation (TV) Anisotropic Diffusion (AD), BM3D method, on brain NCCT(Non-Contrast computed tomography) images. The prime focus of this research is to make comparative analysis of these techniques not merely to remove but also to preserve edges of brain NCCT images. The experimental results present that BM3D shows the best performance in terms of PSNR value, followed by total variation method and anisotropic diffusion method in terms of removal of noise. However marginal loss of edges and other fine details are there.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129785034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Precision Pig Farming Image Analysis Using Random Forest and Boruta Predictive Big Data Analysis Using Neural Network and K- Nearest Neighbor","authors":"S. A. Shaik Mazhar, G. Suseendran","doi":"10.1109/ICIEM51511.2021.9445328","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445328","url":null,"abstract":"Conditions and monitoring for production are significant issues in livestock accuracy Agriculture, in which image measurement and smart data collection are required. Dynamical surveillance and review of this Article Man are suggested as a device for scientific identification and growth evaluation of pigs. The Watershed enhanced algorithm is adapted to each human animal's section in chronic occlusion, depending on the depth of the photos captured during flight Camera in the chosen area of interest. For swine's weight, the rate of development is calculated from the image-based calculations and predicted using a segmented linear fitting form. Related results will then be used to interpret and explain incidents. As real-time feedback to the farmers, it happens in the pig hen. Preliminary studies have demonstrated a high potential for precision farming methods for livestock farming to increase efficiency and animal health. In this paper, Machine Learning is used in IMAGE analysis using Random forest and boruta with Predictive Big Data analysis on the pig farming data using the neural network and k- nearest neighbor algorithm for advanced predictive data analysis of our pig farming agriculture.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125714686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zahid A. Bhat, Hamza Mushtaq, Jameel A. Mantoo, V. S. Yadav, Akash Kumar Shrivastava, Swati Swati
{"title":"Beyond 5G: Reinventing Network Architecture With 6G","authors":"Zahid A. Bhat, Hamza Mushtaq, Jameel A. Mantoo, V. S. Yadav, Akash Kumar Shrivastava, Swati Swati","doi":"10.1109/ICIEM51511.2021.9445274","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445274","url":null,"abstract":"The roll-out of 5G has begun in many parts of the world and ought to get completed by the end of 2021. However, given the ever-increasing bandwidth demand and need for automation, the existing capacity of even the most technologically advanced network architecture is expected to run out by 2030. The aim of this paper is to have a peep into the future of wireless communication and its associated technologies. With a higher transmittal rate, improved spectrum efficiency, greater connection proportions, a greater spectrum coherence, and much shorter latency, 6G is expected to revolutionize the digital world. This paper presents the findings of a detailed study regarding the construction of 6G. The main focus of this detailed survey is on the 6G along the lines of mobile communication and the key technologies likely to be fielded on 6G enable networks. Towards the end, this paper also presents ongoing research initiatives being carried out by various research organizations.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129321131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensemble method to predict impact of student intelligent quotient and academic achievement on placement","authors":"Kanika Thakur, K. Lal, Vinay Kumar","doi":"10.1109/ICIEM51511.2021.9445323","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445323","url":null,"abstract":"The study's aim is to see how academic achievement and student Intelligence Quotient influence placement. This paper will attempt to predict whether a student's intelligence quotient or academic score plays a significant role in placement. On a dataset of 193 students, we used a machine learning algorithm to compare the impact of student intelligence, behavior, and academic achievement on placement. We have used a Voting Classifier architecture to predict and classify the probability of a student being placed or not. The motivating force behind this research was to figure out why a group of students scoring the same marks in the same branch studying under the supervision of the same faculty are not able to fulfill the demands of an organization in order to be employed. The aim of this research was to combine conceptually different machine learning classifiers and predict the probability of a student being hired using a majority vote or the average expected probabilities. A classifier like this can be useful for balancing out the weaknesses of a group of models that are all performing well. Experiments show that student intelligence and attitude play a significant role in the recruiting process.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133761857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Key Management Scheme for Clustered Sensor Networks with Node Addition Support","authors":"Vipin Kumar, Navneet Malik","doi":"10.1109/ICIEM51511.2021.9445393","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445393","url":null,"abstract":"A sensor network is wireless with tiny nodes and widely used in various applications. To track the event and collect the data from a remote area or a hostile area sensor network is used. A WSN collects wirelessly connected tiny sensors with minimal resources like the battery, computation power, and memory. When a sensor collects data, it must be transferred to the control center through the gateway (Sink), and it must be transferred safely. For secure transfer of data in the network, the routing protocol must be safe and can use the cryptography method for authentication and confidentiality. An essential issue in WSN structure is the key management. WSN relies on the strength of the communicating devices, battery power, and sensor nodes to communicate in the wireless environment over a limited region. Due to energy and memory limitations, the construction of a fully functional network needs to be well arranged. Several techniques are available in the current literature for such key management techniques. Among the distribution of key over the network, sharing private and public keys is the most important. Network security is not an easy problem because of its limited resources, and these networks are deployed in unattended areas where they work without any human intervention. These networks are used to monitor buildings and airports, so security is always a major issue for these networks. In this paper, we proposed a dynamic key management scheme for the clustered sensor network that also supports the addition of a new node in the network later. Keys are dynamically generated and securely distributed to communication parties with the help of a cluster head. We verify the immunity of the scheme against various attacks like replay attack and node captured attacker. A simulation study was also done on energy consumption for key setup and refreshed the keys. Security analysis of scheme shows batter resiliency against node capture attack.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131441251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technology Progress and Availability Effect on Hungarian and Indian Student for Real-Time","authors":"C. Verma, Z. Illés, Veronika Stoffová","doi":"10.1109/ICIEM51511.2021.9445369","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445369","url":null,"abstract":"In continuation of the unprecedented pandemic, we explored the impact of technology Development and Availability (DA) on the student’s mindset who belonged to heterogeneous continents (Asia and Europe). We followed the inference analysis with non-parametric tests: Kruskal-Wallis H, Welch’s T-test, Mann-Whitney U test on real samples. The students belonged to Indian and Hungarian higher education institutions. The results of each statistical test are self-evident about the technology DA disparity between Indian and Hungarian universities. Our presented differential approach might support the university’s student real-time response system to identify the impact on students.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130023975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face Detection System for Health Care Units Using Raspberry PI","authors":"Pronaya Bhattacharya, Anand Handa, Mohd. Zuhair","doi":"10.1109/ICIEM51511.2021.9445367","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445367","url":null,"abstract":"Computer vision has one of its primary applications as facial detection and recognition system, which can perform two essential functions of identifying and verifying an individual. An image capturing system with embedded computing as one of its significant parts extracts image information and requires no external processing system. To deliver results to other devices for the corresponding inputs, we use an interface device. The designed system is fast and efficient. It coordinates efficiently with the image recognition unit and the recognition algorithm. The system ensures a smooth flow of data stream between the two devices, namely, the Raspberry PI board and the camera. It also handles the data stream flow to occur smoothly between the camera and the Raspberry PI board. During this pandemic era, the application has a wide range of applicability for healthcare systems, helping in a contactless authentication of patients.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132890457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Machine Learning in Precision Agriculture using IoT","authors":"Sharvane Murlidharan, V. Shukla, A. Chaubey","doi":"10.1109/ICIEM51511.2021.9445312","DOIUrl":"https://doi.org/10.1109/ICIEM51511.2021.9445312","url":null,"abstract":"The demand for food has been increasing over the past six decades with the global population increase. Scientists have been finding different ways to meet this demand, such as; green revolution and genetically modified crop methods. These involve an unnatural technique to increase the yield, such as chemical fertilizers, pesticides, and modified seeds; these might be beneficial in the short term but might slowly disturb the internal body mechanism. In recent years, consumers are becoming more concerned about their food intake and prefer food with no adulteration and harmful pesticides. This has brought in the hype for a subdivision of framing, organic farming, where organic fertilizers and pesticides are used to retain the quality and nutrition values of the crop bring harvested. In organic farming, the right crop must be chosen according to the soil type and climate. This reduces the chance of pre-harvest crop losses caused by the abiotic stress in the environment, such as the soil pH levels, improper irrigation, climate, and temperature. However, when the desired conditions are provided to the crop, we can reduce the pre-harvest loss up to 35%. This paper offers a practical approach to reduce this loss by predicting what crop can be planted according to the present soil conditions and climate to prevent pre-harvest losses. The model involves a temperature and humidity sensor, a soil moisture sensor, a soil pH sensor, IoT, and a water pump under a greenhouse environment connected with the help of a development board, Raspberry pi, and machine learning techniques.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130744563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}