{"title":"Solving Speed Reducer Design Problem by Memorized Differential Evolution","authors":"Raghav Prasad Parouha","doi":"10.1109/AIC55036.2022.9848936","DOIUrl":"https://doi.org/10.1109/AIC55036.2022.9848936","url":null,"abstract":"Real-life optimization problems (RLOPs) are common in numerous research disciplines. In literature, evolutionary algorithms (EAs) have been deemed an emerging field to solve RLOPs. Among popular EAs, Differential Evolution (DE) is clever algorithm to solve RLOPs. DE and its varied alternatives are highly influenced by improper operators like mutation and crossover. Mostly, DE doesn’t compel to learn the optimum properties achieved in primary phase of the former aristocrats. In this article, a new DE (named as mbDE) created on memory mechanism is offered to solve a renowned RLOP, specifically speed reducer design. It enclosed different crossover & mutation (swarm, crossover and mutation) made through particle swarm optimization (PSO) context. Experimental outcomes endorse the competency of mbDE over various procedures.","PeriodicalId":433590,"journal":{"name":"2022 IEEE World Conference on Applied Intelligence and Computing (AIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130939572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Analysis of Fruit Fly-Inspired Multi-Robot Cooperative Algorithm for Target Search and Rescue","authors":"Vikram Garg, R. Tiwari, A. Shukla","doi":"10.1109/AIC55036.2022.9848813","DOIUrl":"https://doi.org/10.1109/AIC55036.2022.9848813","url":null,"abstract":"In an unforeseen or human-made disaster, any search and rescue agency’s primary concern are to locate the survivor immediately. For the victim’s survival, even minutes may play a critical part. To strengthen the performance of the SAR community, the research community could introduce some creative technologies. With faster victim searches, initial assessment and visualization of the environment, and real-time assessment and management of search and rescue operations, multi-robot programs can significantly increase the productivity of search and rescue operations. This article proposes an intelligent algorithm based on the fruit fly optimization algorithm’s food search pattern. To update the fruit flies’ position and speed, it uses particle swarm optimization. Repeated research simulations have confirmed the feasibility of the proposed process in a forest-like environment. The simulation results under different scenarios and performance comparison with existing techniques show the proposed algorithm’s accuracy and robustness to be quite efficient in terms of detection rate and search and rescue time. The detection rate improves 10-25% and search and rescue time by 5 to 15%.","PeriodicalId":433590,"journal":{"name":"2022 IEEE World Conference on Applied Intelligence and Computing (AIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129230235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Redekar, Aditi Sawant, Rajkumar Kolanji, Nirmit Sawant
{"title":"Heart Rate Prediction from Human Speech using Regression Models","authors":"S. Redekar, Aditi Sawant, Rajkumar Kolanji, Nirmit Sawant","doi":"10.1109/AIC55036.2022.9848913","DOIUrl":"https://doi.org/10.1109/AIC55036.2022.9848913","url":null,"abstract":"The heart and the mind are intimately connected. Negative states of mind, including depression, anxiety, loneliness, anger, and chronic stress, may increase the risk for heart disease over time or worsen heart issues that already exist. Heart Rate (HR) monitor is a term used to describe a device that monitors and records the HR in real time. Electrode leads linked to the chest were utilized in the early types of HR monitors. We thought of whether and if possible, the way we speak can be used to predict HR. As we know, speech is affected by the emotional environment so we can not only rely on the basic classification of speech so, we need to consider other factors to analyze and predict. This is where the spectral features come into the picture, one of them being MFCC. So, we move away from a conventional model to prove that your voice does depict and give what your HR is. Voice-based detection of HR is attractive because it does not require any additional sensors. In contrast to previous studies, we use real-time speech data as input. Regression is used when we can have the output over a range of values of the class label. In our case, it is the heart rate that can vary over a range of 60 to 130 in ideal conditions. We decided to compare various algorithms under regression and find the one with the best accuracy Results using random forest show modest but significant effects on HR predictions.","PeriodicalId":433590,"journal":{"name":"2022 IEEE World Conference on Applied Intelligence and Computing (AIC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115197646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Welcome from IEEE AIC 2022 General Chair","authors":"","doi":"10.1109/aic55036.2022.9848849","DOIUrl":"https://doi.org/10.1109/aic55036.2022.9848849","url":null,"abstract":"","PeriodicalId":433590,"journal":{"name":"2022 IEEE World Conference on Applied Intelligence and Computing (AIC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116100530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing a Multi-Module Machine Learning System to Identify Clinically Important Traumatic Brain Injuries in Children","authors":"Melody Yin","doi":"10.1109/AIC55036.2022.9848900","DOIUrl":"https://doi.org/10.1109/AIC55036.2022.9848900","url":null,"abstract":"Clinically important traumatic brain injuries (ciTBI) are a major health concern, yet early recognition is challenging. This research developed a multi-module machine learning system for efficient pre-screening and diagnosis with improved specificity. The study achieved a lower false positive rate and reduced unnecessary computed tomography (CT) scans, which pose risks especially for children. This system consists of three independent modules intended to assist ciTBI diagnosis. Module 1 prescreens patients using clinical metrics to determine if a CT scan is necessary, reaching specificities of 98.85% and 98.73% and positive predictive values 32.43% and 33.33% for ages under and over 2, respectively, better than previous reports. Module 2, a hybrid model, integrates clinical metrics and CT scans to predict ciTBI. Accuracy reached 99.08% and 99.28%, specificity 99.21% and 99.48%, and NPV 99.86% and 99.78% for the respective age groups, further improving previous results. Module 3 used CNNs to detect CT image abnormalities, achieving an accuracy of 86.56% and AUC ROC of 83.79%. The proposed system demonstrated the ability to improve current ED procedural efficiency by detecting higher risk cases with low false negative rate for early recognition and management.","PeriodicalId":433590,"journal":{"name":"2022 IEEE World Conference on Applied Intelligence and Computing (AIC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124732236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Study of Feature Engineering for Automated Short Answer Grading","authors":"Patil Shweta, K. Adhiya","doi":"10.1109/AIC55036.2022.9848851","DOIUrl":"https://doi.org/10.1109/AIC55036.2022.9848851","url":null,"abstract":"Recent advancement in the field of Natural Language Processing (NLP) has shown promising results in numerous NLP applications. Automated Short Answer Grading (ASAG) is one of the challenging applications of NLP. Understanding the underlying context and semantics in text will help to evaluate short answer responses and predict the scores more similar to human evaluator. Training machine to understand the domain knowledge of courses and utilize the same for evaluation has demanded for more robust method to generate word vectors which are capable of understanding the meaning of words based on context. In this paper we have studied and experimented with already existing word vector generation techniques TF-IDF, word2vec and BERT. Along with the pre-trained word2vec we have computed domain specific word vectors too. Finally, by the utilization of XGBoost we have computed the category of student answer. The comparison of similarity between human evaluated category and category generated by all studied embedding technique along with XGBoost algorithm is computed with the help of Quadratic Weighted Kappa. The results have shown that domain specific embedding will help to predict correct category of student answer.","PeriodicalId":433590,"journal":{"name":"2022 IEEE World Conference on Applied Intelligence and Computing (AIC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128768042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Security in IoT Networks using Software-Defined Networking: A Review","authors":"S. Shah, Raghav Sharma, N. Shukla","doi":"10.1109/AIC55036.2022.9848896","DOIUrl":"https://doi.org/10.1109/AIC55036.2022.9848896","url":null,"abstract":"Wireless Sensor networks can be composed of smart buildings, smart homes, smart grids, and smart mobility, and they can even interconnect all these fields into a large-scale smart city network. Software-Defined Networking is an ideal technology to realize Internet-of-Things (IoT) Network and WSN network requirements and to efficiently enhance the security of these networks. Software defines Networking (SDN) is used to support IoT and WSN related networking elements, additional security concerns rise, due to the elevated vulnerability of such deployments to specific types of attacks and the necessity of inter-cloud communication any IoT application would require. This work is a study of different security mechanisms available in SDN for IoT and WSN network secure communication. This work also formulates the problems when existing methods are implemented with different networks parameters.","PeriodicalId":433590,"journal":{"name":"2022 IEEE World Conference on Applied Intelligence and Computing (AIC)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127294737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Analysis on Ensemble Learning Techniques for Groundwater Quality Assessment of Chhattisgarh Region","authors":"Anushree Shrivastava, Mridu Sahu, D. Jhariya","doi":"10.1109/AIC55036.2022.9848863","DOIUrl":"https://doi.org/10.1109/AIC55036.2022.9848863","url":null,"abstract":"Groundwater is considered to be an essential resource for freshwater in Chhattisgarh. The importance of groundwater leads to a concern about water quality because the bad quality of water may lead to an unhealthy life. In this paper, we have used the numerous techniques of Ensemble Learning- (namely, Stacking, Bagging, and Boosting) for the classification of groundwater based on the Water Quality Index. The Stacking has been done by combining the following Classification Models Logistic Regression, k-Nearest Neighbors, Decision Tree, Support Vector Machine, and Naive Bayes. Bagging has been done using Bagged Decision Trees, Random Forest, and Extra Trees. Boosting has been performed using AdaBoost and Stochastic Gradient Boosting. Further, a comparative analysis of the performance of these Ensemble Learning Techniques has been presented. It has been observed that the maximum accuracy for classification has been given by the Stacking, Bagged Decision Trees, and Gradient Boosting with an accuracy of 0.9953.","PeriodicalId":433590,"journal":{"name":"2022 IEEE World Conference on Applied Intelligence and Computing (AIC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128932869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic Image Segmentation using CNN (Convolutional Neural Network) based Technique","authors":"B. Mahmud, G. Hong","doi":"10.1109/AIC55036.2022.9848977","DOIUrl":"https://doi.org/10.1109/AIC55036.2022.9848977","url":null,"abstract":"Segmenting images makes computer vision applications more manageable. By breaking an image into smaller groups called “image segments,” an image segmentation approach simplifies the complexity of an image for later processing or analysis. Individual pixels are labeled as part of the process known as segmentation. Many computational research, modeling, and forecasts require a sufficient microstructure sample. An alternate method is to extrapolate a 2D image into a virtual 3D sample, which saves time and money compared to collecting 3D microstructural images. A CNN Architecture-based U-NET technique was used to find extrapolation-based reconstructions for alloys, porous media, and sandstones. Using a deep convolutional neural network, VGG16, the objective function in this optimization is built using microstructural properties. We use a permutation operator to create multiclass feature maps from these stacks. Sandstone datasets, which contain a number of unique materials, are used to demonstrate the actual application of our technique. Pre-annotated data was used to guide our analysis. Image reconstruction is a commonly used approach in various fields for deciphering the many objects in a picture. Using U-NET, we first segment the photographs and then reassemble the image slices to be shown. The overall IoU and accuracy rates for this suggested design were both high, at 85% and 96%, respectively.","PeriodicalId":433590,"journal":{"name":"2022 IEEE World Conference on Applied Intelligence and Computing (AIC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114505944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review on Secutity in Internet of Things","authors":"Eisha Akanksha, A. Javali, Jyoti","doi":"10.1109/AIC55036.2022.9848853","DOIUrl":"https://doi.org/10.1109/AIC55036.2022.9848853","url":null,"abstract":"Internet of Things (IoT) enables massive interconnectivity and interoperability between devices. With the growing number of devices, higher level of information exchange between the connected entities becomes possible. However, at the same time the sensitive information pertaining to the nodes becomes prone to security and privacy attacks. This is a serious topic in the IoT due to the large number of interconnections. In this paper, the detailed layer wise security vulnerabilities are enumerated. The security architecture of the IoT is presented. The solutions to the possible security attacks are detailed which will be a helping hand for the researchers working in this direction. The current state of the operational technology (OT)security is included.","PeriodicalId":433590,"journal":{"name":"2022 IEEE World Conference on Applied Intelligence and Computing (AIC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132763333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}