{"title":"Fuzzy Models for Water Quality Assessment","authors":"L. Arya, Gms Srivastava","doi":"10.1109/ICICT46931.2019.8977693","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977693","url":null,"abstract":"Water is the most abundant substance on the earth and is the principal constituent of all living things. At the present time rising populations and improving living standards are placing increasing pressers on available water resources. In past, fuzzy rationale based methodologies have shown to be fitting to address subjectivity and vulnerability in natural issues. In this examination, an approach dependent on Fuzzy System to survey the quality of water based on limited observations is proposed. A model for water quality with fuzzy reasoning has been developed for drinking and irrigational use. Application of proposed fuzzy model is demonstrated with a case study for Yamuna River, located in India. River water quality fuzzy model based on four water parameters pH, Dissolved Oxygen (DO), Total Dissolved Solids (TDS) & Chemical Oxygen Demand (COD) and two outputs was used to evaluate the Yamuna River quality.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126193480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web based Accounting Integrated Management System (AIMS) over Cloud using Mean Stack","authors":"Akhil Kulshreshta, Neelam Rawat, Krati Saxena, Prashant Agrawal","doi":"10.1109/ICICT46931.2019.8977661","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977661","url":null,"abstract":"This paper says how powerful a cloud based accounting management tool can be, which also provides platform independent services. This paper also observes the tools of MEAN stack (MongoDB, Express.js, Angular.js, Node.js) together with Material design. It also takes readers to the libraries like Bcryptjs, Body parser, Cors, JWT.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121686271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anjali Jain, Avinash Shakya, Harsh Khatter, A. Gupta
{"title":"A smart System for Fake News Detection Using Machine Learning","authors":"Anjali Jain, Avinash Shakya, Harsh Khatter, A. Gupta","doi":"10.1109/ICICT46931.2019.8977659","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977659","url":null,"abstract":"Most of the smart phone users prefer to read the news via social media over internet. The news websites are publishing the news and provide the source of authentication. The question is how to authenticate the news and articles which are circulated among social media like WhatsApp groups, Facebook Pages, Twitter and other micro blogs & social networking sites. It is harmful for the society to believe on the rumors and pretend to be a news. The need of an hour is to stop the rumors especially in the developing countries like India, and focus on the correct, authenticated news articles. This paper demonstrates a model and the methodology for fake news detection. With the help of Machine learning and natural language processing, author tried to aggregate the news and later determine whether the news is real or fake using Support Vector Machine. The results of the proposed model is compared with existing models. The proposed model is working well and defining the correctness of results upto 93.6% of accuracy.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122663831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review on Image Classification Techniques to classify Neurological Disorders of brain MRI","authors":"Vaishali Tyagi","doi":"10.1109/ICICT46931.2019.8977658","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977658","url":null,"abstract":"Neurological disorders have more than 600 brain disease. Therefore it is very complicated task to detect and classify the brain MRI data. To classify the brain MR image by many classification techniques such as K-nearest neighbor (KNN), decision tree (DT), Support vector machine (SVM), neural network and convolutional neural network, we have study and compered K-nearest neighbor, support vector machine, decision tree, neural network and convolution neural network . In this review paper we explain which classification technique is better for detection of brain MRI data set. The detection for normal and abnormal brain MRI, the CNN improve the accuracy as compare to other classification.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122702024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Railway Assets: A Potential Domain for Big Data","authors":"Yogita Jain, Yogesh","doi":"10.1109/ICICT46931.2019.8977714","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977714","url":null,"abstract":"The railway is an infrastructure insistent industry in which each railroad is operated and maintained on the basis of a significant quantity of data and information gathered from various sources. This paper examines the big data technologies to maintain and enhance the rail industry. Currently, a huge quantity of rail data is being collected at numerous sources in different countries. However, the available data is not effectively utilized with the traditionally existing techniques and technologies. Thus the significant information remains buried under a large number of gigabytes. The paper discusses, 5V’s concept of big data (velocity, volume, veracity, variety, and value) in the railroads monitoring system. Also addresses the different available monitoring systems for rail track defects, application of visual data analysis in railroads for passenger flow with a case study of Shanghai metro network, optimization in big data with a critical dissection of Metaheuristics method and how big technologies leads to big challenges in the real-time railway system.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127995968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Study of Big Data Frameworks","authors":"H. K. Gupta, Dr. Rafat Parveen","doi":"10.1109/ICICT46931.2019.8977680","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977680","url":null,"abstract":"We are really living in ever growing volume of data production. The huge amount of data in terabyte and petabytes are generating in real word and it is a challenging task to access, storage, analysis of all structured, unstructured and semi structured heterogeneous and complex data, also traditional tools is not suitable towards distributed and real-time processing. We need an efficient framework for processing such heterogeneous data and transform it into optimized meaningful information. There are many frameworks for distributed computing has been developed to perform huge amount of data processing. Hadoop Map Reduce is the extensively used framework because of its scalability, security, latency and efficiency, and reliability. The intension of this paper is to relative study of common framework such as Hadoop, Spark, Flink, Samza and Storm.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126849250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Taxonomy & Analysis of Cloud Computing Vulnerabilities through Attack Vector, CVSS and Complexity Parameter","authors":"N. Mishra, R. Singh","doi":"10.1109/ICICT46931.2019.8977667","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977667","url":null,"abstract":"The world is witnessing an exceptional expansion in the cloud enabled services which is further growing day by day due to advancement & requirement of technology. However, the identification of vulnerabilities & its exploitation in the cloud computing will always be the major challenge and concern for any cloud computing system. To understand the challenges and its consequences and further provide mitigation techniques for the vulnerabilities, the identification of cloud specific vulnerabilities needs to be examined first and after identification of vulnerabilities a detailed taxonomy must be positioned. In this paper several cloud specific identified vulnerabilities have been studied which is listed by the NVD, ENISA CSA etc accordingly a unified taxonomy for security vulnerabilities has been prepared. In this paper we proposed a comprehensive taxonomy for cloud specific vulnerabilities on the basis of several parameters like attack vector, CVSS score, complexity etc which will be further act as input for the analysis and mitigation of cloud vulnerabilities. Scheming of Taxonomy of vulnerabilities is an effective way for cloud administrators, cloud mangers, cloud consumers and other stakeholders for identifying, understanding and addressing security risks.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130594461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Shrivastava, Chetan Vashistth, Akash Rajak, A. Tripathi
{"title":"A Decentralized Way to Store and Authenticate Educational Documents on Private Blockchain","authors":"A. Shrivastava, Chetan Vashistth, Akash Rajak, A. Tripathi","doi":"10.1109/ICICT46931.2019.8977633","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977633","url":null,"abstract":"A decentralized private Blockchain implementation for academic document storage and document verification can add self-sovereignty to the process. It can dramatically minimize the time and cost of verification at various layers of verification. Blockchain would remove all the layers at all and it will provide immediate auditing of any document. So, the request and response will be truly real time in our case.Apart from speeding up the verification process, it will also increase the security of personal education data and will check all kind of misuse also. Putting documents on Blockchain would increase the security, because all the data would only be accessible by private key and proper authentication to that private key.We are proposing a private Blockchain that would be managed by some private vendors and only those vendors will take part in consensus. So, we are using proof of stake consensus in our case. We are using private IPFS database server for storing our documents over Blockchain. We are considering Ethereum Blockchain ecosystem in our case. Alternatively we can also use Hyperledger Fabric for implementation but that discussion is out of the scope for current document.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133289197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Study of Fruit Defect Segmentation Techniques","authors":"Lalita Chaudhary, Yogesh Yogesh","doi":"10.1109/ICICT46931.2019.8977692","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977692","url":null,"abstract":"This paper elaborates different methods of image segmentation proposed on various fruit images. There are many ways to segment the image modified for a special need. One method is not applicable to all images to get the desired output. In this paper, defective fruit images are taken for segmentation. By applying various segmentation algorithms, the best methods are observed by comparing the results. There are many ways to implement image segmentation. In this paper various methods like k-means, edge detection, watershed and thresholding is applied for fruit defect segmentation.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"322 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134162332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Piggy ATM: A Meticulously crafted Interface to instil Money Management skill in Children","authors":"S. Arya, Shivani Deshmukh, Maithili Desai","doi":"10.1109/ICICT46931.2019.8977682","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977682","url":null,"abstract":"This research paper is about the design of an interface of the ATM for the kids. Like adults, even kids face situations in which they need emergency money, especially when they are on field trips or picnics. To accomplish this, we carried out a thorough market research with parents as well as children to understand requirements of the ATM as per different age groups. We designed the interface customized for each age group and gender. Our aim is to help kids explore the use and importance of money. There are a variety of ways or games which allow children to role play with money; but there is nothing to let them explore money management and banking. By using an ATM for kids, children will be able to integrate these additional building blocks into their life at an early stage.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134302953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}