<p><span>This book features a collection of high-quality research papers presented at the International Conference on Intelligent and Cloud Computing (ICICC 2021), held at Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, India, during October 22â23, 2021. The book includes contributions
Intelligent Systems and Sustainable Computing: Proceedings of ICISSC 2021 (Smart Innovation, Systems and Technologies, 289)
â Scribed by V. Sivakumar Reddy (editor), V. Kamakshi Prasad (editor), D. N. Mallikarjuna Rao (editor), Suresh Chandra Satapathy (editor)
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 662
- Category
- Library
No coin nor oath required. For personal study only.
⊠Synopsis
The book is a collection of best selected research papers presented at the International Conference on Intelligent Systems and Sustainable Computing (ICISSC 2021), held in School of Engineering, Malla Reddy University, Hyderabad, India, during 24â25 September 2021. The book covers recent research in intelligent systems, intelligent business systems, soft computing, swarm intelligence, artificial intelligence and neural networks, data mining & data warehousing, cloud computing, distributed computing, big data analytics, Internet of Things (IoT), machine learning, speech processing, sustainable high-performance systems, VLSI and embedded systems, image and video processing, and signal processing and communication.
⊠Table of Contents
Conference Committee
Preface
Contents
About the Editors
Unsupervised Learning for the Automatic Management of Scientific Aspect in Academic Conferences
1 Introduction
2 Related Work
3 Methods' Description
3.1 Topic Modeling
3.2 Word Embedding
3.3 Detection of Out of Scope Papers Task
3.4 Sessions Creation and Conference Program Schedule
4 Experimental Results
4.1 Out of Scope Detection
4.2 Clustering Papers into Sessions
5 Conclusion
References
Context Sensing from Deployed IoT Sensors for Improved Public Transport Systems
1 Introduction
1.1 IoT Architecture
1.2 Vehicular Context-Awareness System
2 Related Work
3 Problem Statement and Case Study Area
3.1 Problem Statement
3.2 Case Study Area
4 Proposed Solution
4.1 Proposed System Architecture
4.2 IoT-Based Prototype Hardware Components
4.3 Data Collection Using the Prototype
5 Conclusion
References
College Admissions Counseling Using Intelligent Question Answering System
1 Introduction
2 Related Works
3 Methodology
3.1 The Proposed Model
3.2 Word Embedding
3.3 Bi-LSTM
3.4 Question Answering System
4 Experiments
4.1 Dataset
4.2 Result
5 Conclusion
References
Juvenile Crime Categorization with EM Clustering
1 Introduction
2 Related Work
3 Methodology
4 Experiments, Results and Discussions
5 Conclusions
References
Review of Interoperability Issues Influencing Acceptance and Adoption of Cloud Computing Technology by Consumers
1 Introduction
2 Review of Literature
2.1 Software as a Service (SaaS)
2.2 Platform as a Service (PaaS)
2.3 Infrastructure as a Service (IaaS)
3 Cloud Computing Implementation Challenges
3.1 Common Cloud Computing Issues
3.2 Issue of Interoperability of Resources Across Heterogeneous Cloud Platforms
4 Solutions to Cloud Computing Challenges
4.1 Results of Survey on Interoperability Solutions in the Cloud
5 Conclusion
References
Time Series Analysis Using Random Forest for Predicting Stock Variances Efficiency
1 Introduction
2 Literature Survey
3 Methodology
4 Conclusion
References
Prediction of COVID-19 Severity Level Using XGBoost Algorithm: A Machine Learning Approach Based on SIR Epidemiological Model
1 Introduction
2 Literature Review
3 Methodology
3.1 System Model
4 Model Evaluation
5 Conclusion
References
A Blockchain-Based Architecture for Implementing Job Recruitment Operations
1 Introduction
2 Blockchain Technology
3 Proposed Permissioned Blockchain Platform
3.1 Model
3.2 Phases of the Model
4 Implementation of the Network
5 Conclusion
References
Analysis of the Interest in the Profession of Tutor on the Internet (A Case Study of Google Trends)
1 Introduction
2 Research Methods
3 Results
3.1 Analysis of the Interest in the Search Query âTutorâ on the Internet in Ukraine Using the Web Service Google Trends
3.2 Assessment of the Relationship Closeness Between the Search Query âTutorâ Level of Popularity in Ukraine and the Average Percentage of People Who Passed the External Independent Testing (EIT)
4 Discussion and Conclusions
References
A PID Temperature Controller for Passive Solar Water Heaters with a Low-Cost Three-Way Valve
1 Introduction
2 Methodology
2.1 System Overview
2.2 Experimental Model Development
2.3 Control Algorithm Development
2.4 System Software Design
3 Results and Discussion
3.1 Characterization of the Three-Way Valve
3.2 Temperature Control with the Experimental Model
3.3 Temperature Control with the Passive-Heater Model
4 Conclusions
References
MATLAB/Simulink-Based Simulation Model for Minimizing the Torque Ripple Reduction in Brushless DC Motor
1 Introduction
2 Related Works
3 The Benefits of the Proposed Model
4 Proposed SystemâBLDC Motor Using Fuzzy Logic Controller
5 Results and Discussion
6 Conclusion
References
Improving Accuracy in Facial Detection Using Viola-Jones Algorithm AdaBoost Training Method
1 Introduction
2 Related Work
2.1 Face Detection
2.2 Accuracy Measurement
2.3 Viola-Jones Algorithm
2.4 Advantages of Viola-Jones Algorithm
3 Proposed System
3.1 Viola-Jones Algorithm
3.2 Procedure of Viola-Jones Algorithm
3.3 Stages of Viola-Jones Algorithm
4 Experimental Result
5 Conclusion
References
Comparative Analysis Model for Lambda Iteration, Genetic Algorithm, and Particle Swarm Optimization-Based Economic Load Dispatch for Saudi Arabia Network System
1 Introduction
2 Saudi Arabia Network Studied System
3 Lambda Iteration
3.1 Problem Formulation of Lambda Iteration for ELD
3.2 Neglecting Losses and Including Generations Limits
3.3 Including Losses and Generations Limits
4 Genetic Algorithm
5 PSO Algorithms
6 Result and Dissection
7 Conclusion
References
A Novel Approach for Providing Security for IoT Applications Using Machine Learning and Deep Learning Techniques
1 Introduction
2 Related Work
3 Proposed Learning Models
3.1 One Class SVM Algorithm
3.2 Deep Autoencoder Algorithm
4 Evaluation Methodology
5 Experimental Results
6 Conclusion and Future Work
References
Analysis of Bangla Keyboard Layouts Based on Keystroke Dynamics
1 Introduction
2 Previous Works
3 Bangla Keyboard Layouts
4 Analysis Criteria
5 Experimental Design
6 Key-Stroke Data Collection
7 Evaluation Corpus
7.1 Text Selection and Preparation
8 Methodology
9 Results
10 Conclusion
References
Improved Efficiency of Semantic Segmentation using Pyramid Scene Parsing Deep Learning Network Method
1 Introduction
2 Related Work
2.1 Semantic Segmentation
2.2 Pixel Accuracy Metrics Used in Semantic Segmentation
3 Proposed Methodology
3.1 Advantages of Pyramid Scene Parsing Network
3.2 Working of PSPNet
3.3 Dilated Convolution
4 Experimental Results
5 Conclusion
References
Fractional Approach for Controlling the Motion of a Spherical Robot
1 Introduction
2 System Modeling
3 Controller Design
4 Simulation Results
5 Conclusion
References
Progression of Metamaterial for Microstrip Antenna Applications: A Review
1 Introduction
2 Evolution of Metamaterials
3 Nicholson-Ross-Weir Method (NRW)âRF Material Measurement
3.1 Mathematical Formulation-Parametric Retrieval Method
4 Discussion
5 Conclusion
References
Natural Language Processing of Text-Based Metrics for Image Captioning
1 Introduction
2 Related Work
3 Proposed System
4 Implementation
4.1 Data Preprocessing
4.2 Extract Features
4.3 Formatting Dataset
4.4 Building Model
4.5 Evaluating the Model Performance
5 Results and Discussion
6 Conclusion
References
Li-Fi Enables Reliable Communication of VLT for Secured Data Exchange
1 Introduction
2 Working Model
2.1 Energy Impart Section
2.2 Receiver Section
3 Implementation
3.1 Data Interpreting Unit
4 Results and Discussion
5 Conclusion and Future Work
References
Design of Dual-Stack, Tunneling, and Translation Approaches for Blockchain-IPv6
1 Introduction
1.1 IPv4
1.2 IPv6
2 Literature Survey
3 Proposed Work
3.1 Dual-Stack
3.2 Tunneling
4 Proposals in Tunneling
4.1 Translation
4.2 Translation Layout
5 Simulation Analysis
6 Conclusion
References
Wavelet-Based Aerial Image Enhancement Tools and Filtering Techniques
1 Introduction
2 Research Findings
2.1 Wavelet-Based Satellite Image Enhancement Techniques
2.2 Geo-correction and Orthorectification Techniques in Enhancing Aerial Images
2.3 Image Enhancement Using HE
2.4 Filtering Techniques Employed in Image Enhancement
3 Conclusion
References
Efficiency Optimization of Security and Safety in Cooperative ITS Communication for QoS Service
1 Introduction
2 Related Works
2.1 Standards of Security in C-ITS
2.2 C-ITS Involving Security-QoS-Safety Trade-Offs
2.3 Capture of Precise Vehicle Safety Awareness
3 Safety Awareness Metrics
3.1 Infrastructure-Centric Standards for Safety Awareness
3.2 Awareness Metrics Based on Vehicle-Centric Safety
4 Result
4.1 Network Performance
5 Conclusion
References
Classification of Medicinal Plants Using Machine Learning
1 Introduction
2 Related Works
3 Methodology
4 Results and Discussion
5 Comparison of Results of SVM and ResNet50
6 Conclusion
References
Performance Measures of Blockchain-Based Mobile Wallet Using Queueing Model
1 Introduction
2 Literature Review
3 Role of Blockchain in the Mobile Wallets and Mobile Payments
4 Model Description and Queueing Model
5 Numerical Results
6 Conclusion
References
Conventional Data Augmentation Techniques for Plant Disease Detection and Classification Systems
1 Introduction
2 Related Works
3 Materials and Methods
3.1 Dataset
3.2 Methodologies Adopted to Enhance the Dataset
4 Conclusion
References
Directionality Information Aware Encoding for Facial Expression Recognition
1 Introduction
2 Literature Survey
3 Proposed Approach
3.1 Robinson Compass Mask
3.2 Encoding
4 Experimental Results
4.1 Results Over 7-class
4.2 Results Over 6-class
5 Conclusion
References
MRI Breast Image Segmentation Using Artificial Bee Colony Optimization with Fuzzy Clustering and CNN Classifier
1 Introduction
1.1 Related Study
2 Materials and Methods
2.1 Image Dataset
2.2 Median Filters
2.3 Artificial Bee Colony Optimization
2.4 Fuzzy C Means Clustering
2.5 Convolutional Neural Network Classifier
2.6 Objective and Subjective Measures
3 Result and Discussion
4 Conclusion
References
Human Action Recognition in Still Images Using SIFT Key Points
1 Introduction
2 Methodology
2.1 Pre-processing
2.2 Generating SIFT Key Points
2.3 Statistical Information of SIFT Key Points
3 Experiment and Results
4 Conclusion
References
Detecting Credit Card Fraud Using Majority Voting-Based Machine Learning Approach
1 Introduction
1.1 Logistic Regression
1.2 Gradient Boosting
1.3 Random Forest
1.4 K-Nearest Neighbors
1.5 Voting Classifier
2 Related Lıterary Work
3 Experimental Setup
3.1 Dataset Description
3.2 About Anaconda Framework
4 Result and Discussion
5 Conclusion
References
Evaluation and Performance Analysis of Magnitude Comparator for High-Speed VLSI Applications
1 Introduction
2 Proposed Comparator Circuits
2.1 Proposed 11Â T 1-bit Comparator Circuit1
2.2 Proposed 10Â T 1-bit Comparator Circuit2
2.3 Proposed 2-bit Comparator Circuit
3 Simulation Results
4 Conclusions
References
Artificially Ripened Mango Fruit Prediction System Using Convolutional Neural Network
1 Introduction
2 Related Work
2.1 Motivation and Contribution
3 Proposed CNN-based Artificially Ripened Mango Fruit Prediction System
3.1 Image Acquisition and Preprocessing
3.2 Feature Extraction
3.3 Feature Extraction and Training for CNN-based Mango Fruit Prediction
4 Results and Discussion
4.1 Experimental Setup
5 Conclusion
References
Quality and Dimensional Analysis of 3D Printed Models Using Machine Vision
1 Introduction
2 Methodology
2.1 Image Acquisition and Capturing
2.2 Edge Detection
2.3 Morphological Operations
2.4 Detection Algorithms for 3D Printed Models
3 Experimental Results
3.1 Shape Defect Detection
3.2 Chip Defect Detection
3.3 Color Defect Detection
3.4 Dimension Defect Detection
4 Conclusion
References
Traffic Density Determination Using Advanced Computer Vision
1 Introduction
2 Assumptions and Limitation
3 Methodology
3.1 Single Shot Detection (SSD)
3.2 Faster R-CNN (SSD)
4 Data Collection and Preparation
4.1 Data Sources
4.2 Video Capture and Frame Extraction
4.3 Data Annotation
4.4 Data Analysis and Initial Findings
5 Model Building and Research
5.1 Model Framework Selection
5.2 Model Selection
5.3 Faster R-CNN Inception V2
6 Result and Discussion
7 Conclusion
References
Analyzing and Detecting Fake News Using Convolutional Neural Networks Considering News Categories Along with Temporal Interpreter
1 Introduction
2 Problem Statement
3 Data Analysis
3.1 Datasets
3.2 Text Analysis
3.3 Image Analysis
4 Architecture
4.1 Text Image Convolutional Neural Network
4.2 Text Convolutional Neural Network
4.3 System Workflow
5 Implementation
5.1 Text Branch
5.2 Image Branch
6 News Category Classification
7 Temporal Interpreter
7.1 Sliding Lookback Window Analysis
8 Experiments
9 Conclusion and Future Scope
References
Automatic Student Attendance and Activeness Monitoring System
1 Introduction
2 Methodology
3 Implementation
3.1 Database Design Using XAMPP
3.2 Setting Up the Coding Environment
3.3 Home Window
3.4 Student Details Window
3.5 Dataset Training Functionality
3.6 Continuous Monitoring of the Students
3.7 Saved Photo Collection
3.8 Attendance Window
3.9 Help and Support
4 Results and Discussion
5 Conclusion
References
Greenput Algorithm for Minimizing Power and Energy Consumption in Hybrid Wireless Sensor Networks
1 Introduction
2 Related Works
3 Flow Control and Representations
4 Greenput Algorithm
5 Conclusion
References
Cloud-Based Face and Face Mask Detection System
1 Introduction
1.1 Overview
1.2 Conventional Methods
1.3 Related Works
2 Proposed System
2.1 Methodology
2.2 Applications/Advantages
3 Simulations/Implementation Results
3.1 Results with Description
3.2 CNN Model
4 Conclusion and Future Works
4.1 Conclusion
4.2 Future Works
References
Design of Delay-Efficient Carry-Save Multiplier by Structural Decomposition of Conventional Carry-Save Multiplier
1 Introduction
2 Conventional Carry-Save Multiplier
2.1 Half Adder
2.2 Full Adder
3 Modified Carry-Save Multiplier
4 Results and Discussion
5 Conclusion
References
Speech Intelligibility Quality in Telugu Speech Patterns Using a Wavelet-Based Hybrid Threshold Transform Method
1 Introduction
1.1 Speech Processing
1.2 Denoising Techniques
1.3 Wavelet Transforms
2 Literature Survey
2.1 Noisy Speech Enhancement
2.2 Existing Method
2.3 Problem Identification
3 Proposed Method
4 Results and Discussion
5 Conclusion and Future Scope
References
Landslide Susceptibility for Communities Based on Satellite Images Using Deep Learning Algorithms
1 Introduction
2 Methodology
2.1 Image Acquisition and Preprocessing
2.2 Pre-trained CNN and Classification of the Mixed Images
2.3 Hazard Prediction
3 Results and Discussion
4 Conclusion
References
Comparative Study on Estimation of Remaining Useful Life of Turbofan Engines Using Machine Learning Algorithms
1 Introduction
2 Related Work
3 Proposed Model
3.1 CNN + LSTM Ensemble Model
3.2 Long Short-Term Memory Model
3.3 Statistical Models
4 Results
5 Conclusion
References
Machine Learning-Based Framework for Malware Analysis in Android Apps
1 Introduction
1.1 Motivation
1.2 Problem Statement
1.3 Key Contributions
2 Literature Review
3 Android Malware Detection
3.1 Feature Extraction
3.2 Feature Selection
3.3 Training ML Model
4 Proposed Methodology
4.1 Model Building
4.2 App Prediction
5 Dataset
6 Results
7 Conclusion and Future Work
References
A Survey on Byzantine Agreement Algorithms in Distributed Systems
1 Introduction
2 Analysis of the Algorithms
2.1 The Byzantine Generals Problem ch44c1
2.2 Solution to Byzantine Algorithm When Both Links and Processors Are Subjected to Hybrid Faults ch44c2
2.3 A Randomized Protocol to Solve Byzantine Agreement ch44c3
2.4 Protocol to Solve Byzantine Agreement in Cloud Environment ch44c4
2.5 Degradable Byzantine Agreement
2.6 Protocol to Have Distributed Agreement When Both Links and Nodes are Subjected to Faults
3 Conclusions
References
An Autonomous Intelligent System to Leverage the Post-harvest Agricultural Process Using Localization and Mapping
1 Introduction
2 Scope and Contribution
3 Previous Work
4 Proposed Approach
5 Simulation and Results
5.1 Simultaneous Localization and Mapping for the Un-mapped Model
5.2 Experimental Analysis for the Un-mapped Model of the Farm
6 Conclusion
References
Zero-Day Attack Detection Analysis in Streaming Data Using Supervised Learning Techniques
1 Introduction
1.1 Anatomy of a Zero-Day Malware
1.2 Zero-Day Exploit Market
2 Related Works
2.1 Renowned Zero-Day Vulnerabilities
3 Methodology
3.1 CICIDS 2017 Dataset
3.2 Experimental Setup
3.3 Random Forest
3.4 Random Tree
3.5 NaĂŻve Bayes
3.6 Hoeffding Tree
3.7 Analysis Tool Used
4 Experimental Result Analysis
4.1 Dataset Processing
4.2 Result Analysis
5 Conclusion
References
Comparative Evaluation of Machine Learning Methods for Network Intrusion Detection System
1 Introduction
2 Prior Survey
3 Network Anomalies
3.1 Network Configuration Anomalies
3.2 Security-related Anomalies
4 Network Anomalies Detection
4.1 Intrusion Detection System (IDS)
5 Network Anomalies Identification Techniques
5.1 Misuse Detection
5.2 Anomaly Detection
5.3 Hybrid Approach
6 Machine Learning
6.1 Supervised Learning
6.2 Unsupervised Learning
7 Datasets
7.1 KDD Cup 1999 Datasets
8 Evaluation Metrics
9 Machine Learning Tools
9.1 WEKA
10 Experiments and Results
11 Conclusion
References
Rare Pattern Mining from Data Stream Using Hash-Based Search and Vertical Mining
1 Introduction
2 Related Work
2.1 Basic Terminology
2.2 Rare Pattern Mining from a Data stream
2.3 Hybrid Eclat Algorithm for Rare Pattern Mining from Data Stream: HEclat-RPStream
2.4 Extending Two Items to Generate Large Itemsets
2.5 Structure of Two level Hash Table
3 Experimental Results
4 Conclusion
References
A Novel ARDUINO Based Self-Defense Shoe for Women Safety and Security
1 Introduction
1.1 Literature Survey and Existing System
2 Proposed System
2.1 Methodology
3 Results
4 Advantages
5 Conclusion
6 Future Scope
References
A New Supervised Term Weight Measure Based Machine Learning Approach for Text Classification
1 Introduction
2 Dataset Characteristics
3 A Term Weight Measure-Based ML Approach for Text Classification
4 Term Weight Measures (TWMs)
4.1 Term Frequency and Inverse Document Frequency (TFIDF)
4.2 Term Frequency and Relevance Frequency (TFRF) Measure
4.3 Term Frequency Inverse Document Frequency and Inverse Class Frequency (TFIDFICF) Measure
4.4 Proposed Class Specific Supervised Term Weight Measure (CSTWM)
5 Experimental Results of Term Weight Measures
6 Conclusions and Future Scope
References
Machine Learning-Based Human Activity Recognition Using Smartphones
1 Introduction
2 Proposed Work
3 Model Testing and Results
3.1 Random Forest Model
3.2 SVM Model
3.3 KNN Algorithm
3.4 Artificial Neural Network
4 Conclusion
References
A Feature Selection Technique-Based Approach for Author Profiling
1 Introduction
2 Dataset Characteristics
3 Feature Selection Techniques-Based Approach for Author Profiling
3.1 Chi-Square (CHI2) Measure
3.2 Mutual Information (MI)
3.3 Information Gain (IG)
3.4 Proposed Distributional Class Specific Correlation-Based FS Technique (DCC)
4 Experimental Results
4.1 Experimental Results with Most Frequent Terms
4.2 Experiment with Feature Selection Techniques
5 Conclusion and Future Scope
References
Detection of Fake News Using Natural Language Processing Techniques and Passive Aggressive Classifier
1 Introduction
2 Literature Survey
3 Proposed Work
3.1 Dataset
3.2 Data Preprocessing
3.3 Train-Test Split of Dataset
3.4 Feature Extraction
3.5 TF-IDF Vectorizer
3.6 Passive Aggressive Classifier
4 Algorithm and Implementation
4.1 Approach
5 Experimental Results and Discussion
6 Conclusion and Future Scope
References
Efficiency Analysis of Pre-trained CNN Models as Feature Extractors for Video Emotion Recognition
1 Introduction
2 Related Works
3 Methodology
3.1 Input Generation
3.2 Training of Models
3.3 Datasets Used
4 Result Analysis
5 Conclusion and Future Works
References
Mapping of Computational Social Science Research Themes: A Two-Decade Review
1 Introduction
2 Research Methods
3 Result and Discussion
3.1 Most Productive Organizational Affiliations in Computational Social Science Research
3.2 Most Individual Researcher in Computational Social Science Research
3.3 The Computational Social Science Sector's Annual Publications
3.4 Research Theme Map
4 Conclusion
References
Diagnosis of Pneumonia with Chest X-Ray Using Deep Neural Networks
1 Introduction
2 Methodology
2.1 Data Collection
2.2 Data Preprocessing
3 Proposed System
4 Results
5 Conclusion
References
High Performance Algorithm for Content-Based Video Retrieval Using Multiple Features
1 Introduction
2 Shot Boundary Detection
3 Key Frame Extraction
4 Proposed Spatio-temporal Feature Extraction
4.1 CBVR System Design
5 Performance Evaluation
6 Conclusion
References
Smart Recruitment System Using Deep Learning with Natural Language Processing
1 Introduction
2 Pre-processing
3 Proposed Work
4 Semantic Analysis
5 Result
6 Conclusion
References
Early Diagnosis of Age-Related Macular Degeneration (ARMD) Using Deep Learning
1 Introduction
2 Literature Survey
3 Preprocessing and Feature Extraction
4 Wet/Dry/No Disease
5 Role of Deep Learning on ARMD
6 Conclusion
References
Recent Trends in Calculating Polarity Score Using Sentimental Analysis
1 Introduction
2 Sentence Level Sentimental Analysis
3 Text Tokenization and Sentiment Scores
4 The Average Sentiment and Variance
References
Author Index
đ SIMILAR VOLUMES
<p><span>This book addresses different methods and techniques of integration for enhancing the overall goal of data mining. The book is a collection of high-quality peer-reviewed research papers presented in the Sixth International Conference on Computational Intelligence in Data Mining (ICCIDM 2021
<p><span>This book includes best selected, high-quality research papers presented at the International Conference on Intelligent Manufacturing and Energy Sustainability (ICIMES 2021) held at the Department of Mechanical Engineering, Malla Reddy College of Engineering & Technology (MRCET), Maisam
<span>This book features original papers from the 3rd International Conference on Smart IoT Systems: Innovations and Computing (SSIC 2021), presenting scientific work related to smart solution concepts. It discusses scientific works related to smart solutions concept in the context of computational
<p><span>This book includes best selected, high-quality research papers presented at the International Conference on Intelligent Manufacturing and Energy Sustainability (ICIMES 2023) held at the Department of Mechanical Engineering, Malla Reddy College of Engineering & Technology (MRCET), Hydera
<span>This book includes best selected, high-quality research papers presented at the International Conference on Intelligent Manufacturing and Energy Sustainability (ICIMES 2020) held at the Department of Mechanical Engineering, Malla Reddy College of Engineering & Technology (MRCET), Maisammag