Pub Date : 2021-02-17DOI: 10.1109/ICIPTM52218.2021.9388341
Shilpi Yadav, Palak Gupta, Ashok Sharma
In the recent years, technology has been an important component in teaching and learning. Recent times have witnessed a lot of up shift in various sectors because of the pandemic COVID-19 during which working in many of them has either undergone shutdown or has come to a slowdown. Even higher educational institutions faced the same problem of mapping to digital transformation from offline to online education model. To combat this slowdown, ICT has played a vital role in providing us a number of solutions over internet through IOT enabled devices, cloud platforms and applications. This paper aims to study adoption of ICT Tools by students in Higher Education Institutions of Delhi NCR. A primary survey had been done where the research framework has been made on Technology Acceptance Model (TAM) to determine the predictors of ICT adoption by students. An empirical analysis was then done to understand various facets of ICT usage by students in higher education institutes. The findings show that perceived usefulness and perceived ease of use has a positive significant relationship on the attitude and behavioral intention of the students of higher educational institutions to use ICT tools and its adoption by the students is a must in the current scenario where online tools, virtual education and LMS are in high demand.
{"title":"An Empirical Study on Adoption of ICT Tools by Students in Higher Educational Institutions","authors":"Shilpi Yadav, Palak Gupta, Ashok Sharma","doi":"10.1109/ICIPTM52218.2021.9388341","DOIUrl":"https://doi.org/10.1109/ICIPTM52218.2021.9388341","url":null,"abstract":"In the recent years, technology has been an important component in teaching and learning. Recent times have witnessed a lot of up shift in various sectors because of the pandemic COVID-19 during which working in many of them has either undergone shutdown or has come to a slowdown. Even higher educational institutions faced the same problem of mapping to digital transformation from offline to online education model. To combat this slowdown, ICT has played a vital role in providing us a number of solutions over internet through IOT enabled devices, cloud platforms and applications. This paper aims to study adoption of ICT Tools by students in Higher Education Institutions of Delhi NCR. A primary survey had been done where the research framework has been made on Technology Acceptance Model (TAM) to determine the predictors of ICT adoption by students. An empirical analysis was then done to understand various facets of ICT usage by students in higher education institutes. The findings show that perceived usefulness and perceived ease of use has a positive significant relationship on the attitude and behavioral intention of the students of higher educational institutions to use ICT tools and its adoption by the students is a must in the current scenario where online tools, virtual education and LMS are in high demand.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126359023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-17DOI: 10.1109/iciptm52218.2021.9388340
Anmol Chauhan, Deepank Nagar, Prashant Chaudhary
In Todays era, Recommendation systems are the most important intelligent systems that plays in giving the information to the users. Previously approaches in recommendation systems (RS) include Content-based-filtering and collaborative filtering. Thus, these approaches has certain limitations as like the necessity of the user history as they visit. So as to make back the effect of such dependencies, this research paper provides a hybrid RS are those which mixes both Collaborative filtering, Content based filtering with sentiment analysis of movies. In this research paper, we developed a recommender system based on the sentiment of the user to suggest the movie to the user based on their view history.
{"title":"Movie Recommender system using Sentiment Analysis","authors":"Anmol Chauhan, Deepank Nagar, Prashant Chaudhary","doi":"10.1109/iciptm52218.2021.9388340","DOIUrl":"https://doi.org/10.1109/iciptm52218.2021.9388340","url":null,"abstract":"In Todays era, Recommendation systems are the most important intelligent systems that plays in giving the information to the users. Previously approaches in recommendation systems (RS) include Content-based-filtering and collaborative filtering. Thus, these approaches has certain limitations as like the necessity of the user history as they visit. So as to make back the effect of such dependencies, this research paper provides a hybrid RS are those which mixes both Collaborative filtering, Content based filtering with sentiment analysis of movies. In this research paper, we developed a recommender system based on the sentiment of the user to suggest the movie to the user based on their view history.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126006011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recent study shows that almost 30% of total global deaths are caused by heart disease. Medical diagnosis is done mainly by specialist's skill and experience but sometime cases are reported of wrong diagnosis therefore the doctor advises patients to take various tests for further analysis which is very expensive and time consuming as medical databases are huge and cannot be processed quickly. In this paper we have predicted heart disease possibility in patients with the help of neural network with Feature selection. This approach was applied to the dataset to get the better results and to increase the performance by reducing the unnecessary attributes from the existing dataset.
{"title":"Agile Approach of Predicting Cardiac Disease using ANN Based on Feature Selection","authors":"Ankit Maithani, Reetika Koli, Ritu Pal, Dhajvir Singh Rai, A. Rohilla, Rahul Kumar","doi":"10.1109/iciptm52218.2021.9388325","DOIUrl":"https://doi.org/10.1109/iciptm52218.2021.9388325","url":null,"abstract":"Recent study shows that almost 30% of total global deaths are caused by heart disease. Medical diagnosis is done mainly by specialist's skill and experience but sometime cases are reported of wrong diagnosis therefore the doctor advises patients to take various tests for further analysis which is very expensive and time consuming as medical databases are huge and cannot be processed quickly. In this paper we have predicted heart disease possibility in patients with the help of neural network with Feature selection. This approach was applied to the dataset to get the better results and to increase the performance by reducing the unnecessary attributes from the existing dataset.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123430623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-17DOI: 10.1109/iciptm52218.2021.9388347
A. Bansal, Utkarsh Jayant
Since the onset of COVID-19 pandemic, officials and several others have been making an effort to form informed decisions and take relevant measures to curb the outbreak. Mostly authorities have used standard statistical models, and epidemiological models to determine the outbreak. Although these models have shown to have accuracy in the past, they seem to be highly ineffective during the COVID-19 pandemic, mostly because of the complexities in it's outbreak. With the lack of studies done on the outbreak, it's imperative for us to determine the attributes which could show correlation with the spread for us to improve upon our predictions. Therefore in this paper the authors have tried to find the attributes which best help in the outbreak modelling and have applied those attributes to the traditional regression models to study their effects on the predictions.
{"title":"Covid-19 Outbreak Modelling Using Regression Techniques","authors":"A. Bansal, Utkarsh Jayant","doi":"10.1109/iciptm52218.2021.9388347","DOIUrl":"https://doi.org/10.1109/iciptm52218.2021.9388347","url":null,"abstract":"Since the onset of COVID-19 pandemic, officials and several others have been making an effort to form informed decisions and take relevant measures to curb the outbreak. Mostly authorities have used standard statistical models, and epidemiological models to determine the outbreak. Although these models have shown to have accuracy in the past, they seem to be highly ineffective during the COVID-19 pandemic, mostly because of the complexities in it's outbreak. With the lack of studies done on the outbreak, it's imperative for us to determine the attributes which could show correlation with the spread for us to improve upon our predictions. Therefore in this paper the authors have tried to find the attributes which best help in the outbreak modelling and have applied those attributes to the traditional regression models to study their effects on the predictions.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132556404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-17DOI: 10.1109/iciptm52218.2021.9388348
S. Bajpai, D. Sharma
Due to the excessive increase in visual data set on the web it has led to the fuzziness of not able to search mage based on ranking and inconsistency. The Content Based Fuzzy Information Retrieval has led to the sustainability of achieving better results through visual identification and neglecting noise. The semantic gap between similar images and tags attached to it has led to challenges that are encountered in the present world. The proposed algorithm to quantify and evaluate algorithm are studied and surveyed in this paper.
{"title":"Retrieving images through Content Based Fuzzy Information Retrieval-A Survey","authors":"S. Bajpai, D. Sharma","doi":"10.1109/iciptm52218.2021.9388348","DOIUrl":"https://doi.org/10.1109/iciptm52218.2021.9388348","url":null,"abstract":"Due to the excessive increase in visual data set on the web it has led to the fuzziness of not able to search mage based on ranking and inconsistency. The Content Based Fuzzy Information Retrieval has led to the sustainability of achieving better results through visual identification and neglecting noise. The semantic gap between similar images and tags attached to it has led to challenges that are encountered in the present world. The proposed algorithm to quantify and evaluate algorithm are studied and surveyed in this paper.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126495104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-17DOI: 10.1109/ICIPTM52218.2021.9388354
A. Najdawi, Jeshua Sachin Stanley
The purpose of this research-in-progress is to provide an updated literature review and focused analysis on the potential of Big Data Analytics in renovating higher education's value proposition in the gulf region for countries with higher indicators of AI-readiness and data-driven economies such as the UAE and KSA. Such countries are planning to move faster toward an oil-free economy and boost digital innovation across all sectors of their economy. This study aims to focus on higher education as the vital knowledge creation and sharing engine for this region and analyze to which extent the current institutions are ready to capitalize on big data analytics to drive real innovation and support in the whole country's digital transformation. The expected result will highlight how educational institutions can benefit from big data analytics to build educational strategies that boost the digital economy and innovation in the whole region. Such results will impact academia, policymaking, and digital transformation consultants of higher education to run more effective and efficient transformation projects.
{"title":"Exploring the Role of Big Data Analytics in Reinnovating Higher Education: The Case of UAE","authors":"A. Najdawi, Jeshua Sachin Stanley","doi":"10.1109/ICIPTM52218.2021.9388354","DOIUrl":"https://doi.org/10.1109/ICIPTM52218.2021.9388354","url":null,"abstract":"The purpose of this research-in-progress is to provide an updated literature review and focused analysis on the potential of Big Data Analytics in renovating higher education's value proposition in the gulf region for countries with higher indicators of AI-readiness and data-driven economies such as the UAE and KSA. Such countries are planning to move faster toward an oil-free economy and boost digital innovation across all sectors of their economy. This study aims to focus on higher education as the vital knowledge creation and sharing engine for this region and analyze to which extent the current institutions are ready to capitalize on big data analytics to drive real innovation and support in the whole country's digital transformation. The expected result will highlight how educational institutions can benefit from big data analytics to build educational strategies that boost the digital economy and innovation in the whole region. Such results will impact academia, policymaking, and digital transformation consultants of higher education to run more effective and efficient transformation projects.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134372706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-17DOI: 10.1109/ICIPTM52218.2021.9388366
Vimal Bibhu, Akhilesh Kumar, B. P. Lohani, Pradeep Kushwaha
Mobile Ad Hoc Network is a infrastructure less wireless network where the mobile nodes leaves and joins the mobile network very frequently. The routing of the packets from source node to destination node, the routing protocol is used. On Demand Distance Vector Routing protocol is very common and implemented with Mobile Ad Hoc Network nodes to handle the operations of packet routing from by any node as a source node to destination node. In this paper prevention of black hole attack by modifying the On Demand Distance Vector routing protocol. The sequence number of 32 bit is initiated with the Route Reply and route sequence packet broadcast to determine the request reply from black hole node under the Mobile Ad Hoc Network. The sequence number and On demand Distance Vector Routing protocol are integrated with a mechanism to find the Request Reply of message containing routing information from source to destination node in Mobile Ad Hoc Network.
{"title":"Black Hole Attack in Mobile Ad Hoc Network and its Avoidance","authors":"Vimal Bibhu, Akhilesh Kumar, B. P. Lohani, Pradeep Kushwaha","doi":"10.1109/ICIPTM52218.2021.9388366","DOIUrl":"https://doi.org/10.1109/ICIPTM52218.2021.9388366","url":null,"abstract":"Mobile Ad Hoc Network is a infrastructure less wireless network where the mobile nodes leaves and joins the mobile network very frequently. The routing of the packets from source node to destination node, the routing protocol is used. On Demand Distance Vector Routing protocol is very common and implemented with Mobile Ad Hoc Network nodes to handle the operations of packet routing from by any node as a source node to destination node. In this paper prevention of black hole attack by modifying the On Demand Distance Vector routing protocol. The sequence number of 32 bit is initiated with the Route Reply and route sequence packet broadcast to determine the request reply from black hole node under the Mobile Ad Hoc Network. The sequence number and On demand Distance Vector Routing protocol are integrated with a mechanism to find the Request Reply of message containing routing information from source to destination node in Mobile Ad Hoc Network.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124255915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-17DOI: 10.1109/iciptm52218.2021.9388333
D. Mahima
There is a high probability that a cyber-attack would cause havoc, probably impacting a company's resources and assets, its clients, time and brand value. An incident response framework aims to control this damage and recover as smoothly as possible. As most organizations have encountered cyber-attacks at some point of their corporate life cycle, a formidable and a well-developed defense is the most excellent way to protect a company. As the types of information breaches upsurge, the absence of an customized response plan could lead to extensive interruption and recovery periods and high cost. In today's era of digital and mobile use in a globally integrated society, it always pays to have an incident response framework for an organization. Therefore, this paper explores the evolution and design modeling of the incident response framework.
{"title":"Cyber Threat in Public Sector: Modeling an Incident Response Framework","authors":"D. Mahima","doi":"10.1109/iciptm52218.2021.9388333","DOIUrl":"https://doi.org/10.1109/iciptm52218.2021.9388333","url":null,"abstract":"There is a high probability that a cyber-attack would cause havoc, probably impacting a company's resources and assets, its clients, time and brand value. An incident response framework aims to control this damage and recover as smoothly as possible. As most organizations have encountered cyber-attacks at some point of their corporate life cycle, a formidable and a well-developed defense is the most excellent way to protect a company. As the types of information breaches upsurge, the absence of an customized response plan could lead to extensive interruption and recovery periods and high cost. In today's era of digital and mobile use in a globally integrated society, it always pays to have an incident response framework for an organization. Therefore, this paper explores the evolution and design modeling of the incident response framework.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121648429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-17DOI: 10.1109/ICIPTM52218.2021.9388329
Reddy SaiSindhuTheja, G. Shyam
Software-as-a-service (SaaS) is a license to get a particular software via Internet. Moreover, these services are overdue and completely interrupted due to the Internet's unavailability which offers more number of threats. Research regarding cloud security concentrates more on declining the unauthorized persons to initiate the attacks by using cloud. This work introduces an innovative framework for SaaS security by detecting the attacks. The major contribution of this work offers an attack detection process with Deep Belief Network (DBN) and an Enhanced Sea Lion Optimization algorithm (ESLnO) which is extended form of the Sea Lion Optimization algorithm. The results show that the proposed technique outperformed with other conventional models.
{"title":"A Deep Belief Network based Attack Detection using a Secure SaaS Framework","authors":"Reddy SaiSindhuTheja, G. Shyam","doi":"10.1109/ICIPTM52218.2021.9388329","DOIUrl":"https://doi.org/10.1109/ICIPTM52218.2021.9388329","url":null,"abstract":"Software-as-a-service (SaaS) is a license to get a particular software via Internet. Moreover, these services are overdue and completely interrupted due to the Internet's unavailability which offers more number of threats. Research regarding cloud security concentrates more on declining the unauthorized persons to initiate the attacks by using cloud. This work introduces an innovative framework for SaaS security by detecting the attacks. The major contribution of this work offers an attack detection process with Deep Belief Network (DBN) and an Enhanced Sea Lion Optimization algorithm (ESLnO) which is extended form of the Sea Lion Optimization algorithm. The results show that the proposed technique outperformed with other conventional models.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116679861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-17DOI: 10.1109/ICIPTM52218.2021.9388371
L. R. Paul, L. Sadath
Today, FinTech is integrating with IoT and Artificial Intelligence to challenge banks at a very speedy pace. Fast support and better convenience are major characteristics of FinTech that makes it desirable to customers. This article covers some of the most active and prominent areas classified under the term FinTech they are: Cryptocurrency and digital cash, Smart contracts, Open banking, Blockchain technology, RegTech, InsurTech, Unbanked services, Robo-advisors, Crowd funding. This paper offers coherent research themes built on a critical assessment of the literature. This paper provides a review of the history of FinTech and the various areas under FinTech. Know-hows like Machine Learning, AI, and predictive analytics in financial services can directly affect overall business policy, revenue generation, and resource optimization.
{"title":"A Systematic Analysis on FinTech and Its Applications","authors":"L. R. Paul, L. Sadath","doi":"10.1109/ICIPTM52218.2021.9388371","DOIUrl":"https://doi.org/10.1109/ICIPTM52218.2021.9388371","url":null,"abstract":"Today, FinTech is integrating with IoT and Artificial Intelligence to challenge banks at a very speedy pace. Fast support and better convenience are major characteristics of FinTech that makes it desirable to customers. This article covers some of the most active and prominent areas classified under the term FinTech they are: Cryptocurrency and digital cash, Smart contracts, Open banking, Blockchain technology, RegTech, InsurTech, Unbanked services, Robo-advisors, Crowd funding. This paper offers coherent research themes built on a critical assessment of the literature. This paper provides a review of the history of FinTech and the various areas under FinTech. Know-hows like Machine Learning, AI, and predictive analytics in financial services can directly affect overall business policy, revenue generation, and resource optimization.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133005471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}