S. Kediya, D. Singh, Janmejay V. Shukla, A. Nagdive
{"title":"Analytical Study of Factors Affecting IoT in SCM","authors":"S. Kediya, D. Singh, Janmejay V. Shukla, A. Nagdive","doi":"10.1109/iccica52458.2021.9697145","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697145","url":null,"abstract":"This paper advocates employing IoT-based AI programming to integrate technology into industries' supply chain management and logistics. It emphasizes the importance of doing a thorough analysis of supply chain management and logistics strategy. The paper is aimed at facilitating a strategic change toward client-centric supply chain management strategies by enabling enterprises to engage in novel supply chain management and logistics practices based on the Internet of Things to meet industry requirements. The paper is a novel technique that provides businesses with valuable tools for satisfying a bigger client base through the use of new IoT technologies and some components of traditional supply chain management and logistics. The paper provides individuals, businesses, organizations, and researchers with Logistics and Supply Chain Management strategies that ensure maximum efficiency in all aspects of the handling of raw materials, component parts, and finished goods as they move from the manufacturing center to the final consumer. The paper's primary benefits will be cost savings, increased profitability, and the ability for enterprises to gain a competitive edge.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133273384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speech Recognition: A Concise Significance","authors":"Somnath Hase, S. Nimbhore","doi":"10.1109/iccica52458.2021.9697255","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697255","url":null,"abstract":"Speech Recognition and communication between humans and computers have made tremendous progress over the last three decades. Speech recognition technologies allow the machine to respond correctly to a human voice. Nowadays a lot of Automatic Speech Recognition Systems are developed which are more resistant to environmental, speaker, and language variability. The voice-based application provides valuable and useful services to the user. Deep learning is an emerging area, in the last few years research has focused on using it for speech-related different applications. Feature extraction, speech classifiers, speech representation, speech database, and performance are some important issues that should be considered while designing a speech recognition system. The challenges that exist in ASR, as well as the different methods developed by various researchers, have been described in sequence. This paper explores the significant advances in speech communication research over the years, also helps to identify a different tool along with its merits and demerits. The primary aim of the article is to conduct a comparison between various speech recognition methods. This paper shed light on the trends in speech recognition system and also bring focus to new research topics","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132756234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Load Frequency Control of Two Area System with Security Attack and Game Theory Based Defender Action Using ALO Tuned Integral Controller","authors":"S. Khadarvali, V. Madhusudhan, R. Kiranmayi","doi":"10.1109/iccica52458.2021.9697229","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697229","url":null,"abstract":"Cyber-attacks in electrical power system causes serious damages causing breakdown of few equipment to shutdown of the complete power system. Game theory is used as a tool to detect the cyber-attack in the power system recently. Interaction between the attackers and the defenders which is the inherent nature of the game theory is exploited to detect the cyber-attack in the power system. This paper implements the cyber-attack detection on a two-area power system controlled using the Load Frequency controller. Ant Lion Optimization is used to tune the integral controller applied in the Load Frequency Controller. Cyber-attacks that include constant injection, bias injection, overcompensation, and negative compensation are tested on the Game theory-based attack detection algorithm proposed. It is considered that the smart meters are attacked with the attacks by manipulating the original data in the power system. MATLAB based implementation is developed and observed that the defender action is satisfactory in the two-area system considered. Tuning of integral controller in the Load Frequency controller in the two-area system is also observed to be effective.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"132 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124254533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nakul Pandhare, Mukul Mangde, K. Jajulwar, Mukesh Mahule, Manthan Patil
{"title":"Design of Multipurpose Agro System using Swarm Intelligence","authors":"Nakul Pandhare, Mukul Mangde, K. Jajulwar, Mukesh Mahule, Manthan Patil","doi":"10.1109/iccica52458.2021.9697192","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697192","url":null,"abstract":"Agriculture is the process of cultivation of land, growing crops, and raising livestock. It plays a major role in the country's economy. Agriculture involves a lot of steps in the whole process. From the very first step to the last step, each and every activity requires skilled and hardworking labor. In this paper we are trying to design a multipurpose agriculture robot that can be used for all types of work that requires a lot of manpower and hard work. The robot will be able to perform tasks like seed sowing, watering plants, spraying medicines, and surveillance. This paper aims to automate the process of agriculture using the latest technology to meet the current increasing demands of the country.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128711938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Devendra Prasad, Afshan Hassan, D. Verma, P. Sarangi, Sunny Singh
{"title":"Disaster Management System using Wireless Sensor Network: A Review","authors":"Devendra Prasad, Afshan Hassan, D. Verma, P. Sarangi, Sunny Singh","doi":"10.1109/iccica52458.2021.9697236","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697236","url":null,"abstract":"Due to the changes in the environment natural catastrophe is increasing day by day. Any hazardous incident can happen at any time, with that effect lot of people loss their life, property. These calamities can be of any type weather it can be natural or human induced cause mass devastation. Wireless Sensor Network (WSN) is very realistic and demandable technology from past few years which can be supportive in monitoring and managing disaster. In this paper, we are describing the WSN architecture and how it works. Another is the types of disaster and the sensors which are used to compute their intensity. After that, a survey is done on the literature in which the issues, technologies and protocols used and their solutions are explained. An architecture of early warning system for disaster detection in WSN is elucidated which can be helpful in detecting, alerting and rescuing operation.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126584904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey on Centric Data Protection Method for Cloud Storage Application","authors":"N. Sultana, K. Srinivas","doi":"10.1109/iccica52458.2021.9697235","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697235","url":null,"abstract":"IT personnel are being reassigned the ability to alter resources to suit business shifting needs as businesses compete to get their applications up and operating quicker with increased manageability and less preservation. The Cloud Computing Mechanism, which is distinguished by a \"pay as you go\" pricing model, can help with this. An on-demand pool of adjustable computer resources is provided as part of the paradigm, along with storage options. There are security risks and weaknesses with Cloud Computing, just like with any new technology. These risks and vulnerabilities include illegal eavesdropping and data tampering, deliberate malicious data mutations, data loss and identity theft. Because of these security flaws, cloud computing is now a hot topic for researchers. An indepth look into cloud security research and mitigation methods is presented in this article. Among organizations, cloud storage and cloud services are the most commonly used applications. These two areas, however, present the greatest number of risks and security issues. Outsourcing sensitive data to cloud service providers (CSPs) creates trust difficulties within enterprises as a result of this arrangement. A comparative study of cloud storage and cloud service security frameworks is presented in this paper, which sheds light on the need for additional research.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114264657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jaichandran R, S. Jagan, S. Khasim, Logeshwari Dhavamani, V. Mathiazhagan, Dilip Kumar Bagal
{"title":"Crime Visualization using A Novel GIS-Based Framework","authors":"Jaichandran R, S. Jagan, S. Khasim, Logeshwari Dhavamani, V. Mathiazhagan, Dilip Kumar Bagal","doi":"10.1109/iccica52458.2021.9697127","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697127","url":null,"abstract":"Past decades have experienced the rage of GIS technology in a never-ending scope. In today’s era, visualization of high-dimensional hyperspectral data is an indispensable task and GIS is simply a platform to practically experience the visualization. Furthermore, crime is an unprecedented event and to analyze crime their exists many technologies but to visualize it we are limited to adopt a few technologies and GIS is one of those few. Since crime data which are location-specific acts as a better data for crime analysis, we prefer GIS technology for mapping and visualization. This paper focuses on visualization of crime data using GIS technology and proposes a framework for futuristic crime analysis with the aid of deep learning acting at the backend. The experimentation performed over crime dataset presents the visualization of crime hotspots over a specified region basing on the dataset. The entire workflow is mentioned as a consequence of GIS technology over crime hotspot detection. Furthermore, the essence of deep learning is proposed as a future research direction for the real-time visualization of crime so that it can be checked before it happens. Finally, this paper provides the crime hotspot mappings as the output for visualization and analysis through proper experimentation.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114601661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Gupta, Meenu Khurana, D. Prasad, A. Garg, Deepali Gupta
{"title":"A Framework for PO Attainment in HEI’s using Machine Learning in India","authors":"K. Gupta, Meenu Khurana, D. Prasad, A. Garg, Deepali Gupta","doi":"10.1109/iccica52458.2021.9697218","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697218","url":null,"abstract":"Outcome-based learning comprehends in the overall technical and professional growth of a student. This generates a need for clear liberation of the desired educational outcomes in the structuring of the curriculum. The unequivocal expounded outcome well represents the type of course offered and coverage of topics. It is imperative to construct courses that can align with the objectives of the Programme. This constructive alignment can facilitate the efficacious implementation of teaching and learning processes and assessment tasks. The outcome-based approach provides a mechanism to ensure the accountability and quality assurance to an educational Programme. Therefore, it establishes a need to map learning outcomes of each course with the Programme Objectives to analyze the attainment of objectives specific to a Programme. The result strongly indicates whether the students can achieve the course learning objectives. Therefore, this study liberates a detailed discussion on Outcome- Based Education, PO Attainment and proposes a framework for PO Attainment. Subsequently, the research work presents a case study of a HEI in India that has successfully implemented the concept of PO Attainment. The dataset of the HEI has been applied using Naïve Bayes and K* classifiers to verify the results.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115700212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aniket Dhole, Mohit Gandhi, Shrishail Kumbhar, Harsh Singhal, S. Gore
{"title":"Review of Deep Learning Models for Mask Detection and Medical Sensors for IoT based Health Care System","authors":"Aniket Dhole, Mohit Gandhi, Shrishail Kumbhar, Harsh Singhal, S. Gore","doi":"10.1109/iccica52458.2021.9697230","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697230","url":null,"abstract":"The growth of medical sensors like heart rate, blood sugar, and other health monitoring sensors is huge. Along with the use of sensors in devices and healthcare systems, the use of image classification models like mask detection on edge devices is of growing demand. The survey consists of various techniques used in modern healthcare devices and various other methods like sensor fusion and wireless sensors to collect and monitor health data. And it also includes a comparison of multiple mask detection models which were deployed on embedded devices like Raspberry Pi, Nvidia Jetson and cameras like OpenMV, ESP32Cam and deep learning models like MobileNetV1, InceptionV4, and YOLO Tiny which were optimized using TensorFlow Lite.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129158839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Impact of Managerial Approach to Untreated Type -2 Diabetes using AI Techniques","authors":"Priyabrata Sahu, J. K. Mantri","doi":"10.1109/iccica52458.2021.9697120","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697120","url":null,"abstract":"Individuals aged 20 years and over are considered. We identified participants as having diabetes if they had a HbA1c level greater than 6.5 %. People with diabetes who say they do not actually obtain care is deemed to be untreated for the purposes of this research. In this research, we used logistic regression to assess which risk factors were correlated with untreated diabetes. The aim of Review Machine learning (ML) is to diagnose, cure, and prevent diabetes. While a number of ML models have been created, they are not relevant to real- world scenarios yet. There has been a significant disconnect between ML architects, health care researchers, physicians, and patients in their technologies. Our aim is to perform an in-depth analysis on ML to recognize the potential and shortcomings of the technology. Recent advances in the development of insulin delivery devices, diabetes retinopathy diagnostic methods, and other medical studies have significantly helped people diagnosed with diabetes. Compared with these, the usage of statistical methods for diabetes treatment is only at an early level. The Food and Drug Administration (FDA) employs several highly creative ideas to get their drugs to the consumer. Description ML offers a fantastic chance to handle diabetes with improved strategies and technology.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129824583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}