Shambhavi Bhardwaj, T. Poongodi, Ashutosh Dixit, S. Sharma
{"title":"A Decentralized Digital Voting System Based on Block chain Architecture","authors":"Shambhavi Bhardwaj, T. Poongodi, Ashutosh Dixit, S. Sharma","doi":"10.1109/iciptm54933.2022.9754194","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754194","url":null,"abstract":"Voting is the backbone of democracy and the fundamental right of every citizen. BlockChain based Election is like a boon for every nation through which the election can be conducted digitally, Unlike those old (paper based) and traditional (EVM) voting systems it makes the whole process of election safe, smooth and easy. In this era of Covid-19 this Block chain enabled election is the need of the hour, People can cast votes from their own space just with the help of a mobile phone or a computer, Security would get enhanced and threats like EVM hacking, Chaos at election booth would reduce drastically just by the implementation of this advanced voting system. Personal ID's and unique keys would be provided to each and every eligible voter which can't be tampered at any cost. It has two modules to make the entire project look consolidated and unified. First module is the Election Commission who could be liable for undertaking it, appending concerned everyone competing for the voting attached under blockchain. User end will be the resident's component where every eligible voter can choose a leader according to their separate Constituent sitting and the votes would get registered on the blockchain to make it tamper protected.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"484 1","pages":"756-760"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85576207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Exploratory analysis of Machine Learning adaptability in Big Data Analytics Environments: A Data Aggregation in the age of Big Data and the Internet of Things","authors":"Ratchana Rajendran, Priyanka Sharma, Nitin Kumar Saran, Samrat Ray, Joel Alanya-Beltran, Korakod Tongkachok","doi":"10.1109/iciptm54933.2022.9753921","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9753921","url":null,"abstract":"The paper discusses a new concept combining the potentialities of Big Data processing as well as machine learning developed for security monitoring of mobile Internet of Things. The structure of the security monitoring system is considered as a most effective and useful element to create a new viewpoint of mobile IoT. This article focuses implementation of machine learning in online education. Thus mobile IoT has found successful application in few areas such as security monitoring in public places, transport management, medicine, smart houses, industrial production, electrical consumption, and robotics. All the mathematical foundations along with issues related to this have been considered in this study. In order to solve the classification task, several machine learning mechanisms have been mentioned in this paper. Large organizations are incorporating data-driven actions, and decision making in organizational function. The role of data aggregation is effective here achieving the business objectives. Vast amount of raw data can be processed linearly through data aggregation. This article describes the interaction of data aggregation through wireless networking assuming its effectiveness in online education. Data aggregation in machine learning is highlighted based on evidence based data. The purpose of this research article is to investigate the machine learning adaptability in big data analytics environments with the approach of IoT. In order to collect accurate data, the researcher has taken the help of a secondary data collection method. It has helped the researcher to find out the valid information about mobile IoT. In addition, qualitative methods have been adapted to malaise the collected data within a systematic way. Moreover, this study will help the readers to understand the value of mobile IoT helping in machine learning adaptability in big data analytics.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"8 1","pages":"32-36"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85388904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of Apache Kafka – A Modern Platform for Real Time Data Streaming","authors":"Shubham Vyas, R. Tyagi, Charu Jain, Shashank Sahu","doi":"10.1109/iciptm54933.2022.9754154","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754154","url":null,"abstract":"Current generation businesses become more demanding on timely availability of data. Many real-time data streaming tools and technologies are capable to meet business expectations. Apache Kafka is one of the capable open-source distributed scalable technology that enables real-time data streaming with good throughput and latency. In traditional batch processing, data is getting processed in groups or batches but in streaming services, data records are handled separately and there is a flow of data processing that is continuous and real-time. Once Data is available at the source, Kafka can detect and stream it in real-time to the target application. After doing the literature survey it was observed that there are insufficient experiments have been done till now with a variety of volumes and with different values of the number of partitions and polling intervals. The purpose of this study is to elaborate on Apache Kafka implementation and evaluate its performance. This study will analyse key performance indicators for the streaming platform and will provide useful insights from it. These insights will help to design optimized applications in Apache Kafka. Based on gaps identified after the literature survey, multiple experiments have been conducted for the producer and consumer API (Application Programming interface). Configuration of Kafka with Apache Zookeeper helped to drive the results which are captured in tabular form for different values of polling intervals, volumes, and partitions. Data for all test runs have been analysed further to drive the conclusions as mentioned in the results section. This study provides valuable insights about the utilization of CPU (Central Processing Unit) and memory for Apache Kafka streaming on changing volumes, also elaborates the impacts on streaming performance when key configurations are getting changed.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"46 1","pages":"465-470"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87697126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. P. S. K. Kusumanchi, L. Pappula, Sahiti Vankayalapati, Mohammed Irshaadullah, Siva Tarun Reddy Korrapti
{"title":"Design of Butterfly modeled patch in Hexagonal Conformal Array Antenna for SAR Applications","authors":"T. P. S. K. Kusumanchi, L. Pappula, Sahiti Vankayalapati, Mohammed Irshaadullah, Siva Tarun Reddy Korrapti","doi":"10.1109/iciptm54933.2022.9754175","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754175","url":null,"abstract":"In this work, a novel approach for the simulation of hexagonal conformal array (HCA) antenna design is produced and presented for X band applications. The array elements are embedded on FR-4 substrate with low profile having dimensions of $65times 65text{mm}$. The proposed conformal antenna is designed to resonate at 10 GHz with an impedance bandwidth of 300MHz (9.88GHz to 10.18GHz). This antenna array resonates at the same frequency as the single element but with increased gain and having omni-directional radiation pattern. This omni directional nature of the array is advantageous to receive signals equally from all directions. This antenna array can be utilized for SAR applications.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"193 1","pages":"752-755"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88475594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Tiwari, Srinivasa Reddy Basireddy, Velayutham T
{"title":"Identification of Possibly Intemperate Permission Demands in Android Apps","authors":"P. Tiwari, Srinivasa Reddy Basireddy, Velayutham T","doi":"10.1109/iciptm54933.2022.9753830","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9753830","url":null,"abstract":"There are millions of android applications being developed for smartphones and tablets. These apps are collecting enormous amounts of private data, compromising user's privacy. Researchers have tried to identify the difference between 'requested permissions' and 'used permissions' as some apps ask for a permission but may use it for stealing the user data. Android has put the system of asking user's consent for certain permissions but users have been found negligent in granting those permissions. For example, a note taking app may take the user's location data and send it to its server. As long as the app has requested the user's consent and the user has granted the permission, the state of art system will consider it benign. In this paper, we will try to identify and answer the question, 'are these permissions really necessary for the app?‘. There are thousands of applications hosted on playstore providing the same functionality. And for providing the same facility, different apps ask for a different set of permissions. It is not easy to understand whether the permissions are really used in the application. We are going to utilize a different approach by comparing and comprehending the app from its peers in the playstore. We will analyze the peer app in the same category and with similar functionality for the permission difference. If the same functionality is achieved with a lesser number of permissions, the app is considered to be malicious and will require further investigation. With this approach, we designed a statistical approach to evaluate an app for excessive permission requests. Experimental results and case studies have shown that this approach is effective in identifying malicious apps.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"76 1","pages":"101-106"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76085976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vishwash Chaturvedi, Ritika Babbar, Ishita Arora, Divakar Varshney, Hariharan U
{"title":"SAFA-E (The E-Waste Management System)","authors":"Vishwash Chaturvedi, Ritika Babbar, Ishita Arora, Divakar Varshney, Hariharan U","doi":"10.1109/iciptm54933.2022.9753821","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9753821","url":null,"abstract":"The term “e-waste” describes electronics/electrical items that have been discarded. Computers, servers, monitors, and other appliances like these are included. (E-waste) is composed of electronics or electrical items contains toxisubstances, such as lead and cadmium in circuit boards, The monitor contains lead oxide and cadmium, and the switch contains mercury, which is highly toxic. E-waste is the main cause of air, soil pollution caused due to improper disposal of e-waste which decomposed into soil and make it infertile and goes into the food chain. We propose a software system in this article publication paper - Safa-e (the E-waste management). Efforts are being made to address the wide scope of E-waste. We use an android application and website for these which take user data of e-waste in there house and give them the way to dispose and recycle it properly by taking help of us.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"43 1","pages":"401-405"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91134911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Kaushik, K. Tripathi, Rashmi Gupta, Prerna Mahajan
{"title":"Performance Analysis of AODV and SAODV Routing Protocol using SVM against Black Hole Attack","authors":"S. Kaushik, K. Tripathi, Rashmi Gupta, Prerna Mahajan","doi":"10.1109/iciptm54933.2022.9754166","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754166","url":null,"abstract":"This paper presents the performance analysis of Ad-hoc-on-Demand Distance Vector (AODV) and Secure Ad-hoc-on-Demand Distance Vector (SAODV) protocol for packets transfer and communication among the nodes using Support Vector Machine (SVM) technique. The comparative analysis of SAODV and AODV protocol are presented against blackhole attack for the parameters energy consumption, throughput, packet delivery ratio and end-to-end delay in ad hoc networks. A methodology is designed which lays rules based on learnings from the computations and estimations made at the time of packet transfer. It has been found that the proposed methodology gives promising results than the one which lays networking rules at the time of setting up the network.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"153 1","pages":"455-459"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78208253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predictive Maintenance in Forging Industry","authors":"G. K. A. Prasad, Chetan Panse","doi":"10.1109/iciptm54933.2022.9754058","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754058","url":null,"abstract":"Overall Equipment Effectiveness (OEE), which is a standard to measure equipment productivity, heavily depends on the efficiency with which it is working. Any downtime of equipment will immensely affect the efficiency and subsequently affect the OEE of the equipment. In a production line, this unplanned downtime will have repercussions over other work centres causing a catastrophic effect on the factory's throughput. If such downtime occurs on any of the bottlenecks, the entire factory remains shut, with throughput becoming zero until the issue at the jam is resolved. To avoid such equipment failures, it is imperative to conduct maintenance of the machines in the facility at subsequent intervals. Although timely maintenance has a cost attached to itself, it certainly does save a lot more than the downtime cost incurred during a failure. With that being said, the cost is not the only concern concerning a machine failure; improper maintenance can even have safety concerns and can cause injuries to workers, subsequently leading to legal issues. Hence, timely equipment maintenance is of paramount importance for any state-of-the-art facility to remain a global leader in the market. Predictive maintenance is a method that can be done by utilizing the various analytics and machine learning tools that help predict with accuracy when a machine requires support. A viable PM model, with the utilization of memorable information of disappointments, assists us with foreseeing the time at which a machine will run into disappointment.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"78 1","pages":"794-800"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77199191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dev Karan Joshi, Kirti Rattan, A. Rudhra, Nitin Verma, Mohit Pratap, Dinesh Vij
{"title":"Attendance Marking System based on Hog Descriptor Algorithm","authors":"Dev Karan Joshi, Kirti Rattan, A. Rudhra, Nitin Verma, Mohit Pratap, Dinesh Vij","doi":"10.1109/iciptm54933.2022.9753963","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9753963","url":null,"abstract":"The atmosphere of individuals in a workspace is an important part of the daily management. Attendance is however a method to keep the record of the presence and absence of the individuals. Students' attendance has been taken using paper-based methods for decades. This attendance approach has been used for a long time. This strategy may be appropriate and practicable for a small group of attendees, but it is time and energy consuming for a bigger group. The drawbacks of this procedure are well-known and well-understood: it takes time, is prone to errors, and there is always the possibility of proxy attendance. We provide a practical and fashionable way for recording attendance using face recognition technology. The technology will recognize a person's face, and compare it to the database to determine whether they are present. Furthermore, the attendance sheet is kept with student information and time, which can be manually amended if necessary. Using this approach, the problem of fraudulent attendance and proxies can be solved.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"22 3 1","pages":"194-199"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83292512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WBMS: Waste Bin Management System for densely populated urban areas","authors":"D. Singh, Prateek Chaturvedi, Garima Dhawan, Ashutosh Kumar Singh, Rashmi Aggarwal","doi":"10.1109/iciptm54933.2022.9754190","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754190","url":null,"abstract":"Management of solid waste is a major challenge in densely populated urban areas. Such areas also have other predominant health management issues and improper waste management contributes to that. With the rise of COVID in the last two years hygiene has become the first priority of the Government to control the pandemic. Traditionally, municipality vehicles come as their routine to collect solid waste from commonly collected garbage bins placed by local authorities in residential and commercial areas. These bins are usually over-full and the waste roll-out of these bins is due to botching actions of the local occupants. These openly overflowing waste bins add to the contaminated environmental conditions leading to the spread of numerous diseases. Waste-bin management is a challenge in highly populated areas for municipal corporations. Internet of Things (IoT) can be used to monitor such waste bins and notify the municipal corporations about the waste level so that the bins can be cleared on time avoiding the spilling of garbage around them. In this paper, we have proposed an approach to waste bin management using IoT in urban areas. The model is built using LoRa waste-bin surveil units that will monitor and locate waste-bins in residential/commercial areas and notify the authority about their level.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"5 1","pages":"770-774"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90845824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}