Professional Documents
Culture Documents
Artificial
www.csi-india.org
Intelligence
COVER STORY RESEARCH FRONT
Artificial Intelligence: Simplifying Human Life 6 An Overview of Agent Based Intelligent Systems
and its Tools 15
Technical Trends
Analysis of Spread of Fake News on Article
Messaging Platforms Using Non- Artificial Intelligence & Education in Future
Cooperative Game Theory 10 21
Know Your CSI
Executive Committee (2018-19/20)
Vice President cum President Elect Hon. Secretary
Prof. A. K. Nayak Dr. Santosh Kumar Yadav
President (2018-19)
Director, Indian Institute of Business Director, Indian Institute of Business
POST VACANT
Management, Budh Marg, Patna Management, Budh Marg, Patna
(As the incumbent has been suspended)
(E) vp@csi-india.org / aknayak@iibm.in (E) secretary@csi-india.org
Regional Vice-Presidents
Region-I (2017-19) Region-II (2018-20) Region-III (2017-19)
Mr. Arvind Sharma Dr. Jyotsna Kumar Mandal Prof. Vipin Tyagi
3/294, Vishwas Khand, University of Kalyani, Kalyani, Dept. of CSE
Gomati Nagar, Lucknow-226010. UP Nadia 741235, West Bengal Jaypee University of Engg. and Tech.
(E) rvp1@csi-india.org (E) arvindsha@hotmail.com Raghogarh, Guna - MP 473226
(E) dr.vipin.tyagi@gmail.com
Region-VII (2017-19)
Dr. M. Sundaresan
Professor and Head,
Dept. of IT, Bharathiar University,
Coimbatore - 641046, Tamil Nadu.
(E) rvp7@csi-india.org
Division Chairpersons
Division-I (2017-19) Division-II (2018-20) Division-III (2017-19)
Mr. Apoorva Agha Col. Balraj Anand Post Vacant
8, Katra Road, Allahabad, UP - 211002 2/334, Guru Appartment (As the incumbent has been
(E) div1@csi-india.org Sector 6, Dwarka, New Delhi suspended)
(E) b_anand6@rediffmail.com
Contents
Chief Editor
S S Agrawal
KIIT Group, Gurgaon
PLUS
Call for Paper for CSI Journal of Computing 14
Bihar Pravasi Sammelan 20
CSI Advertisement Tariff 22
CSI Calendar 2018-19 30
Please note:
CSI Communications is published by Computer
2nd Asia Afria ICT and Development Summit, Expo & Awards 2018 34
Society of India, a non-profit organization. Report of CSI Student Chapter Inauguration, RJIT – Opening of CCSI Student Branch at 37
Views and opinions expressed in the CSI
Communications are those of individual
Rjit, Tekanpur
authors, contributors and advertisers and they Computer Day-2018 38
may differ from policies and official statements
of CSI. These should not be construed as legal
Special Session on “Information Technology & Development” in the Conference on 39
or professional advice. The CSI, the publisher, “Mathematical Sciences and Development”
the editors and the contributors are not
responsible for any decisions taken by readers
DIAL - 2018 40
on the basis of these views and opinions. Proceedings of the Faculty Development Programme on Data Science and Analytics 42
Although every care is being taken to ensure Internet of Things 43
genuineness of the writings in this publication,
CSI Communications does not attest to the Chapter Activities News 44
originality of the respective authors’ content. Book Review - Internet Based Marketing 45
© 2012 CSI. All rights reserved. Application Form for Individual / Life Membership 46
Instructors are permitted to photocopy isolated
articles for non-commercial classroom use One Day Seminar On Big Data Analytics & Business Intelligence – A Report 49
without fee. For any other copying, reprint or
republication, permission must be obtained
Student Branch News 50
in writing from the Society. Copying for other Printed and Published by Akshaya Kumar Nayak on behalf of Computer Society of India, Printed GP Offset Pvt. Ltd.
than personal use or internal reference, or of
articles or columns not owned by the Society
269, 2nd Floor, A-2, Shah & Nahar Indl. Estate, Sitaram Jadhav Marg, Lower Parel, Mumbai 400 013 and Published from
without explicit permission of the Society or Samruddhi Venture Park, Unit No. 3, 4th Floor, Marol Industrial Area, Andheri (East), Mumbai 400 093. • Email : hq@csi-india.org
the copyright owner is strictly prohibited. Editor: S. S. Agrawal
3
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
Editorial
www.csi-india.org
4
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
Computer Society of India
TM
http://www.csi-india.org
The theme of this issue of CSI Communication is Artificial on 24th December 2018. I congratulate the Chairman & Managing
Intelligence having great importance to create Expert Systems, the Committee Members of the Agra Chapter for their pioneer efforts
systems which demonstrate intelligent behavior, learn, explain, & spirit of Professionalism.
exhibits and advice its users as well as to Implement the Human Second Asia Africa ICT & Development Summit
Intelligence in Machines which create systems that understand, Second Asia Africa ICT & Development Summit, Expo &
learn, think and behave like humans. Award 2018 was held at Mumbai on 1st & 2nd December 2018
Now days the Artificial Intelligence (AI) has become very in which CSI was a prominent Collaborator. The gala event has
significant & playing the important role in ICT due to it’s widely use witnessed different activities like Business Conclave, Keynote
in e-commerce e-Governance, Education, Industries, Finance, Addresses, Interaction Sessions, Award ceremony & many more.
Aviations, Geography, Ecology & Environment, Government, The detailed report of the same is published in this issue for
Hospitals & Medicines, HRD, Job search, Marketing, Media, Music the reference of our esteem members. I take this opportunity to
News publishing & writing, Online Customer Services, Sensors, congratulate to Dr. Ripu Ranjan Sinha under whose leadership &
Telecommunications, Toys & Games, Transportation & many efforts this great event has been brought in to action to achieve the
more with the goal & objective of planning, controlling, executing, scale of excellence
knowledge reasoning, machine learning, natural language Though CSI is having good numbers of Chapters, Institutional
processing, computer vision & robotics etc. Viewing all these large Members, Students Branches & the number is increasing day
applications with goals & objectives of this concerned technology, by day still then it’s association with the increasing number of
I feel choosing Artificial Intelligence as the theme of January 2019 companies & corporations are most required. In this direction, the
issue of CSI Communication is praise worthy. efforts will be to enhance our services so as to render satisfactory
Inauguration of New Student Branch at RJIT, Madhya Pradesh services to the members & ensure their continued association
Expansion of CSI continues all over the country by Now a days, more & more Technical activities are conducted
establishing more & more Chapters & Student Branches. The by the chapters & student branches which is quite visible by the
establishment of a new Student Branch at RJIT in last month reports published in CSI Communication. Chapters & student
is another milestone which is the clear indication that more & branches are requested to come with more & more technical
more academic Institutions & students are extending their faith & activities to cater the effective services to their members, because
confidence in CSI by enrolling themselves under CSI Domain. The it is the need that members should be addressed regularly & value
society achieved the substantial growth in Student Membership to members should be enhanced.
enrolment in the current year comparison to the previous year. I I take this opportunity to seek the active & kind support of
take this opportunity to congratulate the Management & student the members to make CSI more dynamic, vibrant, productive &
members of RJIT along with Sri Jayant Binde, former Chairman of sustainable to achieve the height of excellence.
CSI Gwalior Chapter for their great efforts. I sincerely request all the Office Bearers, Executive Members,
Momentum in Chapter Activities Chapter Managing Committee, CSI Student Branch Coordinator,
Many of our chapters are quite dynamic & vibrat in organizing SIG Managing Committee & CSI Office Staffs to kindly work with
quality activities from local level, state level, national level responsibility for the Society (CSI) to serve honestly for the cause
to international level seminars/workshops/conferences. The of every Division, Region, Chapter, SIG, Student Branch & every
National Seminar DIAL organized by Lucknow Chapter on 8th Individual Members including Student Members.
December 2018, Computer Day Celebration by Kolkata Chapter on Let us come forward to make Clean CSI & Green CSI with
15 th December 2018 were successfully conducted. I congratulate transparent activities & visions to make it Swachh, Pardarshi &
Prof. Arvind Sharma, RVP-1 & Mr. Gautam Hazra, Vice Chairman Hara Vara.
cum Chairman Elect, Kolkata Chapter respectively for their
Wishing all of you a Happy & Prosperous New Year 2019
pioneer efforts & leadership to organize the respective events
successfully & effectively in excellent manner.
Being a new chapter, Agra Chapter became very active
& conducted one more prominent activity in December after
conducting two major activities in November 2018 i.e. A Special
Session on Information Technology & Development in the Prof. Akshaya Nayak
National conference on Mathematical Sciences & Development Vice President, CSI
5
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
COVER STORY
1. Introduction:
Human like behaviour/decision specially spray weeds on cotton plants. CROPIN, GOBASCO, FASAL,
making by a machine is artificial Specific spraying prevents herbicide SATSURE, INTELLO LABS, AIBONO
intelligence (AI). AI enabled computer resistance. Strawberry farmers select and are some of the foremost Indian
systems can execute several tasks just and bundle their crops using especially Agri-Tech Start-ups that are changing
similar or more often in efficient way designed robots which can harvest up to agriculture in India. These start-ups
than human saving time and energy. eight acres per day alike to thirty human make use of new technologies such as
AI systems are capable of giving an workers. satellite imaging, machine learning and
error less response to certain complex 2.1.2 Crop and Soil Monitoring – data analytics.
situations. AI is proposed by John PLANTIX is a deep learning SATSURE help farmers what to
McCarthy in 1956 the possibility of AI application for recognition of potential sow, when to irrigate or add fertilizers,
was verified by Turing test. In near future defects and nutrient deficiencies in or prepare for harvest. SATSURE’s
activities such as, visual understanding, soil. Analysis is carried out by software solutions are widely used by the Andhra
words identification, taking decisions, algorithms to associate particular Pradesh Government, large banks
and paraphrase will be carried out by AI. plant life patterns with certain soil and insurance companies in India are
2. Scope of Artificial Intelligence: defects, plant pests and diseases. For also leveraging SATSURE’s solutions.
AI is being used in almost every defects recognition images taken by the FASAL one more start-up presents
sector, such as agriculture, medical, user’s smart phone camera are used. microclimate forecast custom-made
health care services, education, legal, Soil reinstatement techniques, tips to each farm location carried out at
public, energy, insurance, banking, and other feasible solutions are also a point scale. AI-based microclimate
financial, water, big companies and provided. forecasting algorithm incorporates
social media platforms. AI incorporated Images of vineyards recorded by real in-field information and relates it
along with Machine Learning simplifies drone using machine vision are used for to explicitly reachable weather reports,
the task. AI powered digital assistants study to get comprehensive report on so that farmers can take advantage
has the potential to free people from the health of the vineyard, specially the from real-time, actionable information
everyday chores. It helps in planning condition of grapevine leaves to improve relevant to day-to-day operations at
routine tasks such as making restaurant crop yield at less costs. Such drones his farm. CROPIN is a collection of
booking. Self Driving Cars, Boston can inspect fifty acres in twenty four analytics solutions, supervision and
Dynamics, Navigation Systems, Human minutes and gives data analysis with 95 farm administration. INTELLO LABS
verses Computer Games are some % accuracy. Figure 1 gives use of AI in have provided machine vision based
of the applications of AI. Following agriculture sectory [1]. solutions with captured images for
sections briefs few areas where AI is deriving insights and executable
2.1.3 Predictive Analytics – options. It leverages AI, deep learning,
being used. Machine learning algorithms in and IOT to help farmers for efficient
2.1 AI in Agricultural Industry association with satellites can analyze growth of business.
Climate variation, population crop sustainability, detects farms for
expansion, marketing, demand and the existence of diseases and pests and 2.2 AI in medical field
supply, food safety concern are some predict weather. These tools are helpful 2.2.1 Clinical and Diagnostic
of the issues in front of agriculture to researchers, crop consultants and Instead of depending on experience,
industry. AI powered technology helps farmers[2]. Doctors are using AI powered and
to have better work rate, to tackle 2.1.4 AI in Indian Agriculture – providing health care and clinical
issues regarding crop yield, soil fertility Pruning fruits
and herbicide opposition in the field of
Measurement of
agriculture. Milking robots are generally Mobile field
plant’s geometry
Recommendation
Thinning leaves
robots and engine and decision
used in dairy farming. sensors Multi special
and non-visible
Computer support system
radiation bands
camera and vision and ML
2.1.1. Agricultural Robots – laser scanner algorithm Soil water level
By means of computerization
and robotics crops can be protected Precision farming + Higher yield + Better quality + Less resources
efficiently from weeds. See & Spray robot
Figure1: Representation of AI in Agriculture Sector
leverages machine vision to control and
www.csi-india.org
6
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
COVER STORY
services efficiently. Moreover, keeps a track of follow up. in wars and dangerous workspaces,
scientists use Intel AI diagnosed 2.2.2 Medicine – car accidents, natural disasters, saving
heart conditions with better AI is used in creation of drug, it time, money and energy. AI makes
exactness. Intel® Saffron™ AI saves time, money and sometimes everyday life easier by serving people
is able to examine ten thousand lives too. Recently, Ebola virus scare, a with tasks such as cleaning, shopping
signals per heartbeat and gives program powered by AI was used to and transportation. Scientists are
more than ninety percent accuracy. predicting that by the huge dependency
scrutinize existing medicines that could
AI is democratizing expert on AI humanity could extinct. Some
be redesigned to fight the disease and
diagnoses. AI based on genetics, is scientists are of the opinion that
finally found two medications that may
helpful in early detection of cancer by having AI machines, people will
lessen Ebola infectivity in one day[3].
and vascular diseases that people be jobless and that will conclude in
might face. 2.3. Other Applications: losing the sense of living. As machines
AI is used in law enforcement, for are learning and doing things more
2.2.1 Health care Services –
example, it helps in finding out a missing efficiently and effectively in a timely
Anthology and investigation of
or exploited child. Based on instances manner, this could be the reason of our
medical records, past history, a variety
of suspicious online activity, millions extinction.
of tests, scans, cardiology, radiology
of cyber tips, artificial intelligence in
reports, is being effectively managed References
correlation with advanced analytics
by artificial intelligence and digital [1] Website: https://www.mindtree.com/
helps analysts to process these tips
automation. Robots assemble, store, sites/default/files/201804/Artificial%20
in the service of law enforcement
reform, and trace data to formulate Intelligence%20in%20Agriculture.pdf
faster and more regular access. authorities. AI enabled system is able
to detect financial frauds by dealing [2] Website: https://emerj.com/ai-sector-
Babylon app using AI provides medical overviews/ai-agriculture-present-
consultation and suggests preventive out with large data dealt with by the
applications-impact
action using personal medical history financial institutions. Intel powered AI
can also prevent manufacturing errors. [3] Website:https://novatiosolutions.
and common medical knowledge/data. com/10-common-applications-
Molly, machine learning based digital 3. Merits and Demerits of AI: artificial-intelligence-healthcare
nurse monitors patient’s condition and AI can reduce human casualties n
Dr. D. V. Kurmude [CSI-2010001037] presently working as Associate Professor and Head in Department of Physics
at Milind College of Science, Aurangabad. MS-India. He has published more than 20 research papers in International
Journals and conferences. He has published four articles in CSI magazine. Authored one book published by international
publisher. He can be reached at dvkurmude@yahoo.com
Dr. S. N. Kakarwal [CSI-F8000602] is presently working as Professor in Department of Computer Science & Engineering
of P.E.S. College of Engineering, Aurangabad, MS-India. Her research interests include Image Processing, Pattern
Recognition. She has published 13 papers in International Journals, 25 papers in International Conference and 11 papers
in National Conferences. She has published six articles in CSI magazine. She can be reached at s_kakarwal@yahoo.com
Dr. Ratnadeep R. Deshmukh (Membership No: 00100518) has completed Ph.D. from Dr. B. A. M. University in 2002. He is
working as a Professor in Computer Science and Information Technology (CSIT) Department, at Dr. Babasaheb Ambedkar
Marathwada University, Aurangabad (MS) INDIA. He is a Sectional President of Information and Communication Science
& Technology (including Computer Sciences) section, Indian Science Congress. He is a fellow and Chairman of IETE,
Aurangabad Chapter and life member of various professional societies as ISCA, CSI, ISTE, IEEE, IAEng, CSTA, IDES, Etc.
He has published more than 200 research papers in various National and International Journals and Conferences. He
can be reached at rrdeshmukh.csit@bamu.ac.in.
7
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
COVER STORY
AI – Latest Buzzword
Artificial Intelligence, Robotics after an evil scientist hijacks him. Later If you were to log in to all your
or Learning Machines seem to be the he is banned and ceases to exist. websites and look to the side it is likely
household topic of discussion in India But in the sequel, he helps defeat you would see advertisements for
recently. Thanks to the recent movies the villain, restoring society’s trust products similar to your online activity
released in India in multiple languages in him. Recently I have been looking online
starring lead actors from South and for a good Wrist Watch. Yesterday I went
Bollywood industry, AI has become There are plenty of Hollywood to the Fox News website and when I
quite popular with Indian masses. While movies who have Super Heroes and looked at the advertisement on my
Hollywood have been making movies most of the super heroes have powers screen, it showed as below.
on Robotics since decades and earning acquired thru AI or some form of Robots. In my simple 15 years old brain,
Billions of Dollars, I am thrilled to see The Super Hero always manages to save these little “bots” tracked my activity
that the Indian Cinema is also catching the world from potential destruction and on my next logging, showed me
up and making movies on such complex caused by Aliens or Internal Villains. what I could still be looking for.
scientific topic. More excitement Robot is a film example of artificial These little bots make up 52% of
comes from the fact that these movies intelligence demonstrating that it can the internet, and their job is to track
are proving to be block busters and both be used for good and for bad. But your online activity for advertising and
earning hundreds of Crores of Rupees, what is artificial intelligence and is it data collection purposes. They do this
suggesting that the Masses are now possible to build a robot like what we by looking at the keywords you use and
able to Connect to these scientific see in Movies? Only time will tell. analyzing the images you look at
topics. However taking clues from movies, For example, a team of bots from
AI earlier was perceived to be which many a times are potential future Google and Amazon would notice me
reserved for only “Genius” or “Research” mirrors, can bad AI be built? And the spending a lot of time on different watch
or “Computer” Community whose place Logical Answer is “Yes”. websites. They will then scrutinize the
was in Science Labs or Mass Computer This calls for very strong activity and see that I mainly click on
Centers. How- ever it now impacts regulations around AI and monitoring watches with leather bands that are
each aspect of our lives and becoming the development closely to ensure that under $200. The bots are trained to
increasingly “Influential” in shaping it is not built with bad intentions. mark this down as preferences and if
our thoughts, actions, and day to day you notice in the advertisement above,
chores. Many times, we don’t even know AI – In day to day life all the watches are under $200 and
about it. Thru various AI workshops and most them have leather bands
Like every scientific innovation, seminars, I attended, my simple Wow! I expected advertisements for
AI too potentially has Good Aspect and interpretation is Artificial Intelligence is watches to be following me everywhere
Bad Aspects. The recent movies and the ability for a machine to Learn, think on the internet, but at that precise level
their sequel have brilliantly shown both and being able to act, perceiving its of accuracy!?
the aspects. environment just like humans already That is artificial intelligence at
can naturally with their in-built brains. work. But there is much more to
AI – Different Aspects But this is not the only type of AI,
The main character of the first artificial intelligence than just small
some other types include internet bots bots that spy on your computer.
movie is a robot which can feel emotions which are responsible for how search
and think just like a human while having On the US Citizenship and
engines and online advertisements Immigration Service website, there is
all powers of a Super Computer. The work which is an intelligent observation
“Robot”, causes a lot of destruction EMMA available now. Emma is a Virtual
by an Internet software put into action. chat assistant on the website which
www.csi-india.org
8
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
COVER STORY
is your first point of contact and will cameras. These are special computers rigorous tests.
answer most of your questions on chat. which are trained to recognize other While online bots and autonomous
I could imagine how intelligent she cars and humans while driving. cars are both artificial intelligence, the
needs to be as this website will have In as early as 2-3 years you could highest level of artificial intelligence is
millions of visitors having questions on be calling an Uber or an Ola and getting when a computer can start to think like a
variety of visas, green card, citizenship picked up by a car with no driver in it. human, just like what we see in movies.
etc. etc. and she is able to answer most But is it safe to put our lives at the This is what most people think of when
of them correctly and very quickly. hands of artificial intelligence? The they think of artificial intelligence.
AI – Driverless Cars companies making these cars have AI – Future Use
The next big thing on AI front is tested them for millions of hours and Whether we like it or not, argue a
Driverless Cars. driven them for millions of kilometres. lot about dangers of AI, it is here to stay,
Autonomous cars are now here, There have been few accidents where and the future belong to AI.
Thanks to Tesla which has already these so called smart cars could not Under proper security and control,
released the feature in its cars adopt to the situation and failed to AI can be a great aid for humanity and
Autonomous cars are self-driving perceive a new environment it was not will be very helpful in building new
cars without the need for a human driver. designed for. However, every invention technology. We could use this for things
They are being tested and integrated goes thru the failure cycle and these AI such as space exploration, quantum
into cars as you read this article. They cars are no exceptions. computing, virtual reality, and improving
consist of precise computer systems These cars will only be allowed by processors and transistors.
connected to motion sensors and governments after being put through n
Mr. Sanjay Bhatia (Membership No. 1161672) is a software Solution Architect based in Houston, USA. Sanjay
has worked in 12 countries and advised many Fortune 15 companies. Sanjay holds 11 software copyrights, 3
Trademarks and filed 4 patents. His ERP based data migration products use AI concepts and are self -learning
programs. Sanjay have been invited in many Conferences as Thought Leader Speaker. Sanjay can be reached
at bhts6@yahoo.com
9
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
Technical Trends
In recent times with the growth of social media and messaging platforms, a lot of information is in
circulation, most of which are clickbait, advertisements or misinformation. The issue arises when fake
news modelled as real news reaches thousands of users, altering their perceptions. This is especially
problematic when it leads to cases of mob lynching and other forms of violence or defamation.
Most algorithms used in field for tackling fake news utilize natural language processing and machine
learning for detection but are not involved in controlling the spread of fake news. This project aims
to mitigate the gap by modelling this problem as a game using non-cooperative game theory. The
game is currently being analyzed using the concept of subgame equilibria for infinitely repeating
extensive form games to find the Nash equilibria. The findings are needs to be compared to the result
of a controlled testing environment to simulate the game to conclude that over a long period of time
the behavior of the game in theory and practice merge which can be used by administrators to control
the spread of fake news.
1. Introduction
Due to the widespread use of situations in which public image is to external enforcement. In contrast,
social media and messaging platforms, crucial such as elections. non-cooperative game theory deals
falling prices of smartphones and Many approaches have been with games in which either such
ease of accessibility to the internet, developed to detect fake news using coalitions cannot be formed or need to
almost everyone is virtually connected natural language processing, machine be self-enforcing. The proposed model
to one another, leading to rapid learning, pattern recognition, etc. but considers a non-cooperative game as
spread of information. In recent times, analysis of the spread of fake news is there cannot be a coalition between the
misinformation has been forwarded paramount to control its spread. For users and perpetrators of fake news.
with the aim to change perceptions social media platforms it is economical The game is identified as a
of candidates in elections by causing and for the government methodical. sequential extensive form game as
defamation, to increase online Game theory is the study of players take turn to act and the game
readership to generate revenue, to strategic interaction between rational doesn’t end after a single simultaneous
spread hoaxes which can lead to decision makers known as players move taken by the players as in normal
unfortunate cases of mob lynching, and is widely applied in the fields of form or simultaneous move games. all
resulting in possible death of the victim. social sciences and computer science. players know the set of players, their
First, it creates mistrust amongst Basically, game theory tries to model strategies and their payoffs, hence it is
the users of such platforms on which a problem into a game to determine a game with complete information but
fake news is circulated causing harm the moves and strategies considering do not know about all other players
to the name of the platform. Second, the rationality of players and hence to past decisions, hence having imperfect
misinformation has led to several predict the likely outcome. information. Each player knows all their
incidents in which a warning circulated In game theory, games can be past moves, that is, have perfect recall
led to beatings and deaths of innocent modelled as cooperative or non- and it is assumed that all players are
people mistaken for kidnappers or cooperative depending on how multiple rational, thus they choose a strategy
criminals. Third, fake news undermines players act, that is, either independently that gives the highest possible payoff.
authentic news as the spread of or as a group. In cooperative game The objective of this project is to
sensational news is much higher than theory, coalitions between decision analyze how fake information spreads
real news which adversely affects makers, that is, players are formed due on a messaging platform using non-
www.csi-india.org
10
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
Technical Trends
cooperative game theory. determines the sentiment for each one Two sets of players are identified for
2. Related Works of them. It uses linguistic resources: the game, the first being perpetrators.
A game in the term game theory as sentiment lexicon and sentiment Perpetrators are those users who
defined in [2] is a set of rules described pattern database doe analysis. intentionally try to spread fake news.
by it, instance from the start to the end Arriving at applications of game Their moves include creating a fake
is called play of the game and strategy theory, game theory is being used in message, forwarding an existing fake
is the plan of moves taken to rise as various fields other than computer message or not forwarding it to avoid
the winner. A game is classified based science. Its most considerably used suspicion.
on the information available to the in economics, political science, social SP = {C, F, NF} where C=create,
players as complete and incomplete, science and applied mathematics and F=forward, NF=not forward.
on cooperation between the players as philosophy. Game theory was used in The second are users, who are
cooperative and non-cooperative, on economics initially to including behavior universal set of users minus the
rounds of decision-making as normal- of firms. markets and consumer[7]. It perpetrators, and hence include passive
is an effective tool for diplomats and spreaders of fake news and those who
form and extensive form. Extensive form
politicians to analysis any situation of actively try to stop their spread. Users
games further branches out to perfect-
conflict between individuals or group can either report a suspicious message,
information and imperfect-information.
of individuals. Anatol Rapoport in not forward a suspicious message or
The game used in the paper is
[8] speaks applying game theory in forward it, assuming its real.
extensive-form, complete and imperfect
critical circumstances like making a SU = {R, NF, F} where R=report, NF=not
information game. As the approach
decision in a nuclear-armed world any forward, F=forward
of this paper is new in its domain,
inappropriate decision would risk the Administrators keep track of the
appropriate reference is not available.
life of fellow citizens. Zijie, Lingyang, number of times a user is reported and
A major form of reference through the
Zhu Han and Geoffrey in [9] use game is found to be forwarding fake news. A
building phase of this paper in the book
theory in offloading data processing to user is blocked if he crosses a certain
written by Takako Fujiwara-Greve[1].
several agents and merging the results threshold. This serves as a warning for
Fake news is classified into: actual
to form the main large task that had to unintentional forwarders of fake news
fake news[3][4], fake satire news[3][4],
be achieved. to be more careful of the content they
poorly reported news [3], poorly written
Game theory is also used in forward and is also a reason for the move
news[4] or misleading news[3]. [4] takes
electrical grid system. [10] game theory NF for perpetrators to avoid suspicion.
into account detection of fake reviews in
Administrators are not considered as a
addition to fake news. is used to create infrastructure and
player of the game for simplification as
Researches also wind up at the algorithms to increase penetration of
they act only when R occurs by checking
fact that fake news in most cases is energy resources which are distributed,
the reported message for authenticity
similar to satire than to real news[5]. encourage local generation and
using existing algorithms for detection
Title structure and use of proper consumption and application of demand
of fake news.
nouns in titles is a significant form of response and storage technologies. The
In a game, each player considers
differentiating fake from real news. Real game assumed considers the following
all possible outcomes and assigns a
news articles have sound arguments players: generator, consumer and
payoff (real number) to them, with the
whereas fake news persuade readers retailer.
assumption that larger the payoff, the
through heuristics. Ling, Fang and Kolter in [11] came
better. Payoff depends not only on the
[6] uses theories of humor, satire up with end-to-end fully differential
individual player’s strategy (action plan
and irony to formulate predictive method learning framework for zero-sum
throughout the game) but on other
for satire detection that achieved normal and extensive form games to players’ strategies as well. Also payoff
90% precision and 84% recall while learn the payoff of partially observable can be used to capture certain abstract
considering grammar, punctuation and games with under-explored information. utilities like the good it can bring to the
absurdity in account. The conceptual It develops- (1) primal-dual Newton general public without considering any
contribution of this paper lies in linking method to find equilibrium points for monetary or concrete benefit from the
deception detection and computational the games (2) analytical computation action.
satire, irony and humor research. of gradients of relevant parameters For example, considering the game
Classification of a news as fake through backpropagation method. as a simultaneous move one, the payoff
or real requires computed technique 3. Technique can be something as follows:
to make it efficient and realistic.
[12] uses combination of machine Table 3.1 Payoff matrix for normal form representation of fake news game
learning, supervised learning and User/perpetrator C F NF
rule-based classification to create
R (50, -100) (50,-75) (-50, 0)
a hybrid classification of the news
fed. [13] approaches the problem in NF (25, -50) (25, -50) (0, 0)
a more realistic way by detecting any
F (-50, 100) (-50, 75) (50, 0)
online references of the subject and
11
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
Technical Trends
www.csi-india.org
12
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
Technical Trends
case and hence the payoffs in both the discount factor is multiplied such approach cannot identify the origin of
these scenarios are (0,0). When the that the power of the discount factor the fake message but only the one who
user chooses F, we assume that the increments by one each time. forwards it to the vigilant user. Second,
perpetrator knows if the message 4. Discussion a better method must be formulated
it receives is fake or not and hence As count of messages being to capture the circulation of authentic
decides accordingly. If the news is fake shared through messaging platform news along with fake news as maximum
and perpetrator chooses NF, then his is exponentially increasing in day to messages in consideration are fake.
payoff increases as any move which day life, it is not possible to check the Also, perpetrators can also forward real
promotes circulation of authentic genuinity of each and every message news alongside fake news, this fact is
news is encouraged in the game. If that is being shared. Though different not analysed in their moves. Third, the
the perpetrator chooses F or C, user’s approaches and methods for detecting game only considers fake news from
payoff decreases but the payoff of the fake news which are 95% accurate sources which formulate it to resemble
perpetrator is 0 as his payoff will be exists. Hence there is need for first real news, for example, articles with
decided by the subsequent subgames phase of screening of messages references or links to such articles. It
as those will decide the fate of the fake which are doubted to be fake and then does not consider personal messages
message that he circulates. When the these messages are analyzed either or fake news which are modelled as
news forwarded by the user is real, then through machine learning, sentimental personal messages. Also the developed
NF move of the perpetrator has no real analysis, Natural language processing theory applies only to textual news and
impact and hence a payoff of 0 but for techniques. Game theory approach is not for images or media. This is one
the user it increase. If the perpetrator employed in the first phase of filtering of the major drawbacks as in most
chooses F then it increases and if he messages which have the probability cases of lynching, warnings have been
chooses it is 0 according to the above of being unreal. Game theory tries forwarded in this format.
given explanation. categorizing the person as perpetrator 6. Conclusions and Future Work
Assumptions include, first, or genuine user based on the moves and The gaming approach taken
the game starts with the action of the corresponding payoff. After certain towards controlling the spread of
a perpetrator and at NF move, an period of time based on the actions and fake news though not simulated but
authentic message is considered payoff it is easy to categories people analytical complete is a satisfactory
resulting inclusion of circulation of fake and according actions are taken by the solution for problem statement. It aims
as well as real news. Second, at each administrator. at standing out as an unique approach
level in the game both sets of players As there are different categories in this field of fake news detection.
can make moves as each player consists of fake news, it is difficult to categories The users and perpetrators who are
of many individuals and no player knows the fake news and it was difficult to find the players sufficiently aid in achieving
which group a particular individual patterns among the category. Hence sub-goal states at each level of the
belongs to except their own group, thus the accuracy of detection of fake news game. The payoff matrix and game tree
the four possible subgames. Third, was less. But categorizing real news diagrams theoretically modelled justify
payoffs aren’t assigned at the end of a was less complicated as compared the game. Once properly implemented
game but at the end of each subgame to previous approach. There are two this game could ‘change the game’.
and each subgame begins in the middle categories in the latter method with The future aim is towards
of the previous subgame. Fourth, NF labels as real and unreal. Unreal would implementing this gaming approach
and R move for users ends in a terminal include satire, opinion pieces, fake into real time applications by employing
node for the entire game. news, everything else. Then patterns servers in various network domains
t1 (0,0)
Xb1 NF t2 (25,0) are found for each category. With this that can process the instructions
R F t3 (25,25) approach accuracy increased to 95%. specified. Servers would be capable
Real C t4 (25,0)
5. Limitations of keeping track of the hosts trying to
NF t5 (-2525)
Xa F Since the approach has not been spread fake news (belonging to their
Fake t6 (-25,0)
C
t7 (-25,0) finalized yet or simulated to check its network domain) based on the how
Users NF Xb2
t8 (0,0) strength in a testing environment, there genuine the actions/moves taken in
are multiple limitations which can be messaging platform are and take
Perpetrators
identified at this stage. Moreover, the actions accordingly. Initially server has
Fig. 3.4 : Subgame in which user forwards no information regarding the hosts in
a message to a perpetrator
structure of the identified game has
not been considered in the referenced their network domain that is if they are
literature as they do not analyse the intentional or unintentional fake news
For an infinite game, sum of infinitely repeating extensive form spreader. Server maintains a database
payoffs will tend to infinity, therefore games with multiple possible stage named wrongmoves. wrongmoves
for comparison between strategies, games. database has information regarding
discount factor is used, which is a real First, current encryptions for the hosts details, payoff of hosts taking
number between 0 and 1, common to messages are end to end therefore the wrong moves. Server starts learning
all players. At each payoff assignment, implementation of the game theoretic about the genuineness of the moves
13
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
Technical Trends
of hosts based on the report action of spread of fake news. Deception Detection. 2016.
other hosts in network. [8] Rapoport A. (2018) International
References:
When a person reports a message Relations and Game Theory. In:
[1] Fujiwara-Greve, Takako. Non-
the details of sender, receiver, message Foradori P., Giacomello G., Pascolini A.
cooperative game theory. Vol. 1.
(eds) Arms Control and Disarmament.
content will be sent to the respective Springer, 2015.
Palgrave Macmillan, Cham.
local server in the network. Then the [2] https://www.scientificamerican.com/
[9] Zheng, Zijie, et al. “Game Theoretic
message is processed using Natural article/what-is-game-theory-and-w/
[3] https://observer.com/2017/01/fake- Approaches to Massive Data Processing
Language Processing algorithms for in Wireless Networks.” IEEE Wireless
news-russia-hacking-clinton-loss/
detection of the content for real or fake. [4] Ahmed, Hadeer, Issa Traore, and Sherif Communications 25.1 (2018): 98-104.
If it is found to be fake, then server Saad. “Detecting opinion spams and [10] Marzband, Mousa, et al. “An advanced
maintains the details of the message fake news using text classification.” retail electricity market for active
sender and gives payoff accordingly. Security and Privacy 1.1 (2018): e9. distribution systems and home
In other case that is when message is [5] Horne, Benjamin D., and Sibel Adali. microgrid interoperability based on
“This just in: fake news packs a game theory.” Electric Power Systems
found to be real the reported person
lot in title, uses simpler, repetitive Research 157 (2018): 187-199.
details will be stored in wrongmoves [11] Ling, Chun Kai, Fei Fang, and J. Zico
content in text body, more similar to
database and given payoff accordingly. Kolter. “What game are we playing?
satire than real news.” arXiv preprint
Initially when a host payoff goes below arXiv:1703.09398 (2017). End-to-end learning in normal and
the min payoff value then he/she will be [6] Rubin, Victoria, et al. “Fake news extensive form games.” arXiv preprint
warned for their wrong actions and will or truth? using satirical cues to arXiv:1805.02777 (2018).
be deactivated from messaging platform detect potentially misleading news.” [12] Prabowo, Rudy, and Mike Thelwall.
for certain period. After activated if Proceedings of the Second Workshop on “Sentiment analysis: A combined
the same is being continued then they Computational Approaches to Deception approach.” Journal of Informetrics 3.2
Detection. 2016. (2009): 143-157.
will be disabled from accessing the
[7] Rubin, Victoria, et al. “Fake news [13] Yi, Jeonghee, et al. “Sentiment
messaging platform. This would force or truth? using satirical cues to analyzer: Extracting sentiments about
people into re-thinking before they take detect potentially misleading news.” a given topic using natural language
any action on such platforms, which will Proceedings of the Second Workshop processing techniques.” null. IEEE, 2003.
ultimately would lead to control of the on Computational Approaches to n
Prof. A K Nayak
Publisher
www.csi-india.org
14
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
R esearch f ront
An Overview of
Agent Based Intelligent Systems and its Tools
S. Balakrishnan
Professor, Department of Information Technology, Sri Krishna College of Engineering and Technology, Coimbatore, Tamilnadu, India.
In an Artificial Intelligence world, Agent-based technology is one of the most vibrant and important
areas of R&D, emerging in Information Technology in the industry in recent years. Intelligent Agent
(IA) is an autonomous entity which observes, analyses and responds to an environment appropriate
to achieve the expected objective. The IA posses several categories such as Coordination, Integration,
Mobility, Believable Agent and Assistance in achieving its expectancy. Agent Program is a tool/process
which supports the IA Implementation. Agent program is defined briefly as a mathematical function of
an IA which maps all the possible sequences of perceptions in every action. IA can respond either to
a resulted coefficients or feedback elements or even to a function or constant which affects eventual
actions.
1. Introduction
Intelligent Agents are initially Sociable. 1.2 Attributes of Intelligent Agents
originated from Artificial Intelligence IA is shown in the figure 1. For The three attributes: agency,
and Distributed Programming. These the purpose of attaining the goal, an intelligence and mobility are used in
two regions have been combined IA learns by itself and makes use of its intelligent agent systems, to measure
together, to form Distributed Artificial internal knowledge base. Thus it is seen system properties. Figure 2 illustrates
Intelligence (DAI), by which the vision as natural metaphor for human acts. It the relationship between agency and
of Intelligent Agent emerges. In mid- has an elevated performance behavior intelligence:
1950’s, the idea of an intelligent entity in data distribution and control of self- Agency - The degree and extent to
existed which was also known as an imposed expertise. which independence is exhibited by
Agent, but nothing really happened an agent. For example, given that
until the late 70’s. The actual progress an agent operates in an Internet
in its development began only in early Sensor Action environment, it must at the least,
90’s; coinciding with the breakthrough input Agent output be able to go on working while the
of the Internet. There is a very close user might not be connected or
connection across object-orientation might not be connected to the Web.
and agent-technology. This is only to be Intelligence - The ability of an
expected, since the fields of distributed Environment agent to assimilate and adjust to a
programming and artificial intelligence domain, by means of user requests
are developed on this basis. This agent- Fig. 1: Basic Agent and available assets to the agent.
Agency
orientation grasp the object-orientation
a bit extent by giving the agent a desired The core utilization of an IA Model Agent
target with its extant. is in the area of documentation, where
Interactivity
Machine
1.1 Intelligent Agent various IA types will be supported in Application
Interactivity
resident Threshold of intelligent agency
software
One among the fastest growing the system which is in the development agent
User
areas of artificial intelligence is the stage. IA instances will understand Interactivity
Expert system
agent technology, which is of paramount these agents clearly during its
importance in current research. An execution. Characteristics of an IA play
Intelligent Agent is considered to a critical role in the implementation Preference Reasoning Planning Learning
15
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
R esearch f ront
shown in Fig. 2. Those falling under systems. JADE (Java Agent Development
the threshold line, for example expert Portability: Portable agent/ object Framework) - Software framework
systems i.e. “systems representing solutions. which is entirely designed and
some knowledge they gathered by Assistance: Unique assistance, coded in the Java language.
means of elicitation or knowledge- soft-bots and data mining. The purpose of the framework
acquisition into a computer program to Believable Agents: life and is to make execution of multi-
perform specific tasks”. simulation. purpose systems easier, by using
2. Agent Function 3.1 Integration a middleware which is compliant
The agent function which maps The key goal of integration in any with the FIPA specifications and
a series of observations into action is situation is to give components that can using a group of built-in tools e.g.
a mathematical function. The agent facilitate various learning frameworks. the sniffer agent and the platform
function is applied as agent program. It is imperative that the fused data is management console to help
The part in which the agent takes an very much organized, and contains all debug and deploy agent - based
action is called an actuator. the data and clarifications important to systems. The JADE framework
its cognizance. can be distributed and remotley
2.1 Agent Versus Program controlled by using a built-in GUI.
Size: The size of an agent is 3.2 Coordination Bee-gent (Bonding and
typically less than that of a Coordination is a special case Encapsulation Enhancement
program. of interaction in which agents are aGent)–an agent - based system
Motive: The purpose of an aware how they depend on each other development framework. Bee-
agent is limited and pecullar and attempt to adjust their actions gent has integrated capabilities to
whereas the purpose of appropriately. Understanding the promote communication between
programs is multiuse. process of an IA technology is helping applications for software. Agents
Endurance: Agent’s duration people to work more effectively are used to deliver the messages.
doesn’t depend totally on a and contributes to better results. Developers can build open
user organize and depart it. The supportive coordination of this distributed systems so that existing
Self-Governing: Agents distributed-processing is in the interest application services can be used.
are autonomous and is not of various research communities. Zeus – “a toolkit designed to
dependent on user’s input for 3.3 Assistance help quickly design, develop and
functioning. Assistance typically acts as deploy agent - based systems”.
representative of a human or an Zeus toolkit includes components
Environment Environment organization endeavoring to accomplish of the library, construction and
their ultimate goals or intentions. visualization tools.
3.4 Believable Agent IBM Agent Building Environment
Sensors (ABE)-Intelligent agent design and
Believable agent has behavioral
characteristics which make it easier building toolkit developers.
Percept (Observations) to suspend the unbelief that the agent Java - based agent technology
is a true person. It interacts with the makes it easy to develop
player in real time and is sufficiently commercial agent - based
Agent Function
autonomous to plan its own actions in applications on a large scale that
Agent order to increase credibility. can share data with organizational
Actuator or Internet applications.
4. Java - Based Agent Technology
Java - based agent technology 5. Java Agent Development
Action Environment includes the tools and support Framework
needed to develop multi-agent Java Agent Development
Fig. 3: Structure of Agent large - scale systems using the Java Framework (JADE) is a program
platform. Several organizations substructure developed in Java language
and vendors are involved in the by TILAB. This includes two segments,
3. Categories of Agent Based design of tools and frameworks for The first part is the libraries (Java
Intelligent Systems the construction of Java technology classes) in which the agent applications
There are five categories in the - based systems. Some of the and functions are developed. The second
Intelligent Agent based systems:- commonly used technologies are part is a run-time environment , which
Integration : Integration of summarized below: provides some needful assistance for
information and sharing of Aglets – The Aglets are invent to the agents’ execution. Platforms can
knowledge. locate mobile agents. One of the be executed in a peer-to-peer multi
Coordination : Cooperative first agent technologies built using party communications and distrvibuted
problem-solving and multi-agent Java technology are Aglets. networks . This system makes use of the
www.csi-india.org
16
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
R esearch f ront
6. Conclusion
17
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
R esearch f ront
Introduction
Digital revolution can be defined as NLP is widely used in business and analyzing the responses that
a change in the exertion of the humans market nowadays and has become are published on the social media in
and which have effect on the culture, the catchphrase in each and every respect to the business domain. It is
economy and the mankind. It has engineer’s life. In simple NLP is useful in analyzing the emotion and
become essential to be digitalized as we everywhere. mood of the person who is making
humans started to access information NLP or Natural Language comments on the social media. The
through applications and platforms Processing is also known as process of analyzing and understanding
on daily basis. This revolution in the computational linguistics is a the mood of the writers (happy, sad,
epoch of digital world is possible with combination of language, machine angry and annoyed etc.) is called as
the pillars such as platforms, crowd learning & artificial intelligence (AI). opinion mining. Opinion mining helps
and intelligent machines. Since the It figures an expertise that allows the the business firms to understand the
digital revolution the way in which the users to interact with machines like a consumer’s mindset and accordingly
information disseminated across the normal human to human conversation. they can adapt a system to meet the
earth had been changes and it affords An example for this is ‘Hey Siri’ on consumer requirements through
venues for business in international iPhone or ‘Ok Google’ on Android mobile which the customers/consumers can
standard. It also heightened the areas of is the products of Natural Language feel greater experience in utilizing the
communication for the empowerment Processing. Before the emergence product.Furtherly sentiment or emotion
of the economy and the users by of NLP if the user needs to search analysis is a way through the perception
giving access to information available something in Google, he/she should type of the brand can be explored.
through various platforms like mobile the keywords into the search engine to Chatbots
internet, cloud-based technology, big get the desired results/pages. But now One way of assisting the customers
data, IoT, nanotechnology, robots with the advent of NLP, the user can feed in case of any inconvenience is the
(artificial intelligence), and other the query in their voice which will be customer care call assistance system
digital technologies. Hence technically assisted. Natural Language but the customers feel frustration in
the digital revolution has concreted the Processing has enormous applications using it. One stop solution to this the
way for creation, communication, and in business nowadays. Apart from use of Chatbots which provides virtual
collaboration resulting in fewer barriers Natural Language Processing, the assistance to the customers for the
and more efficiency for innumerable research areas of machine learning problems experienced. Chatbots are
organizations. includes, the intelligent solution to assist the
Speech Recognition customers in near future. Salesforce
The role of NLP in Digital Revolution Image Recognition
Humans have reached the first launched an SMS chatbot product
Medical Diagnosis in 2014, and has since expanded it
highest of digital world as they expect Social Media Services
sophistication in what they are using as to include Facebook Messenger. The
Email Spam and Malware Filtering company also offers a product called
products and how it would be beneficial Product Recommendations and
for them on daily basis. In order to Live Agent Chat, which facilitates
etc. human-to-human interactions.
cope with the needs of the consumers,
business organizations handle various Business Applications of Natural Customer Service
tactics and advanced technologies. Language Processing The major challenge of a business
Natural Language Processing or NLP Here we are going to discuss the organization is to ensure that the
comes into the picture as a smart most top applications of language customers are happy and feel content
solution to meet the necessities of the processing for business. [1] with their products. To provide loyalty to
business organizations irrespective of Sentiment Analysis their customers, business organizations
the type of organization and domain,. NLP is a tool in understanding focus on customer service which
www.csi-india.org
18
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
R esearch f ront
IVR
various organizations, stakeholders, Call steering is a way in which
governments and regulatory bodies. It is the callers are directed to the right
Professionally
recorded sounds files
The IVR is then connected
on an incoming number
vital to stay up to date with the industry department. Speech recognition is a
trends and changing standards. NLP is solution where the customers can select
a useful technology to track and monitor a self-service path or they can directly
the market intelligence reports for and Combined to
communicate what they need and which make an IVR Outgoing calls are sent
extract the necessary information for will be steered to the right department
Develop call
flow logic
through a web-interface
with this IVR.
19
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
R esearch f ront
be provided options to wait on call, Next Level Education and the humans as well as the business
choose an automated facility or request Technology organizations to sustain their market
to callback. The system should be Bay Talkitec through the digital revolution. Thus we
able to authenticate the callers from Exotel the customers can happily enjoy the
the network. Certain biometrics like Knowlarity digital revolution.
account number, date of birth are MyOperator
References
obtained for user identification. IVR also Conclusion [1] h t t p s : / / u p g r a d . c o m / b l o g / 5 -
provides solutions where the customers Though the applications of Natural applications-of-natural-language-
will be prioritized based on his profile in Language Processing and Speech processing-for-businesses-in-2018/
the business firm. Processing aids humans in the digital [2] h t t p s : / / f i n d b i o m e t r i c s . c o m / 4 -
Due to the lack of proper revolutionary world still there are certain applications-voice-recognition-305180/
infrastructure to implement the IVR practical difficulties faced by them due [3] https://www.callcentrehelper.com/the-
systems, it is unable to handle the top-five-uses-of-speech-recognition-
to the unstandardized implementation
customers’ calls and it is unpopular technology-1536.htm
of the intelligent systems. Hence the
[4] https://nlet.in/ivr-service-providers-in-
because of the push button IVR menus. research works [5], [6] in the areas india/
Hence it is necessary to replace such of language and speech processing [5] https://www.sisense.com/blog/heres-
push button menus to improve the are focusing on implementation of natural-language-processing-future-
system. smart intelligent systems like bots, bi/
The popular IVR providers in India support of invisible UI, intelligence [6] https://www.expertsystem.com/future-
are from unstructured information to assist natural-language-processing/
Dr. M. Senthil Kumar (LM- I1504760) is currently working as an Associate Professor in Computer Science and
Engineering department at SRM Valliammai Engineering College of Tamil Nadu. He is a CSI-Student Branch
Counselor of the College. His research interests are in IOT, Big Data, Software Engineering and development
of new tools for effort estimation.
www.csi-india.org
20
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
A R T I C L E
21
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
A R T I C L E
Assistant: It might be tempting to for plagiarism. Any teacher will tell a replacement. But an AI isn’t anywhere
think that machine learning and AI you how this work takes up a majority close to being capable of doing a skilled
can replace classroom instructors, of their time, time that could be better educators job, much less outperforming
but that misses the essential role that spent using their specialized training them. Like other industries where
artificial intelligence should play in to improve the quality of their student’s artificial intelligence is making inroads
education, and not just in developing educations. By having an AI assisting and generating anxiety, this is largely
personalized learning plans. Machines the teacher, rather than replace them, a product of a misunderstanding of
are dreadful when it comes to tasks AI-enhanced education can unleash the the underlying technology. Proper
requiring emotional intelligence, a skill educator to fully utilize their training in introduction and teaching the teachers
that is essential for educating a diverse ways that simply were not possible to how to harness these new tools in
student body. earlier generations of educators. the classroom can go a long way to
Simply putting an AI in front of The Changing Role of the Educator: assuaging the anxieties such technology
a classroom is a recipe for disaster Naturally, there is some hesitancy when can create. It is vital that we begin to do
as students eager to slough off work it comes to bringing artificial intelligence so. Als cannot and should not replace
learn to game the AI, thereby ruining into the classroom. Teachers over the teachers, but through personalized
whatever advantage the AI brings to past couple of decades have been on learning programs and having AI
the wealth of educational data available the receiving end of budget cuts and assist the teacher by eliminating
to it. Instead, the AI is meant to free abuse, leading them to understandably time-consuming paperwork, AIs can
the educator from the most time- become rather twitchy when someone be a transformational and liberating
consuming and monotonous tasks, such comes into their classroom with the innovation in education.
as grading exams and checking papers next big idea that looks an awful lot like
n
(ADVERTISING TARIFF)
Rates effective from April, 2014
CSI Communications
COLOUR
Colour Artwork (Soft copy format) or positives are required for MECHANICAL DATA
colour advertisement
Back Cover ` 50,000/- Full page with Bleed 28.6 cms x 22.1 cms
Inside Covers ` 40,000/- Full Page 24.5 cms x 18.5 cms
Full Page ` 35,000/- Double Spread with Bleed 28.6 cms x 43.6 cms
Double Spread ` 65,000/- Double Spread 24.5 cms x 40 cms
Centre Spread (Additional 10% for bleed advertisement) ` 70,000/-
• Special Incentive to any Individual/Organisation for getting sponsorship 15% of the advertisement value.
• Special Discount for any confirmed advertisement for 6 months 10%.
• Special Discount for any confirmed advertisement for 12 months 15%.
• All incentive payments will be made by cheque within 30 days of receipt of payment for advertisement.
• All advertisements are subject to acceptance by the editorial team.
• Material in the form of Artwork or Positive should reach latest by 20th of the month for insertion in the following month.
All bookings should be addressed to :
Unit No. 3, 4th Floor, Samruddhi Venture Park, MIDC, Andheri (E), Mumbai-400 093.
Tel. 91-22-2926 1700 • Fax: 91-22-2830 2133 | Email: hq@csi-india.org
www.csi-india.org
22
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
A R T I C L E
Industrial Age
format allowed the new age media take
Bronze Age
Cogno Age
Space Age
Stone Age
Nano Age
Iron Age
Printing
through hand-held devices like mobile
IT Age
platforms, personal computers,
digital devices, and virtual computing
machines has aided the growth of new 4500 1500 1 1000 1500 1600 1900 1971 2012 2025 2050
age media. The medium of new media is BC BC AD AD AD AD AD AD AD AD AD
not just restricted to social networking
platforms, blogs, online newspapers, Timeline
digital games and virtual reality but any
Fig. 1: Evolution of Technology
aspect of communication that can be
real time communicated, processed,
stored and delivered in formats of around 80, 0000 years ago, started transmission of video. The combination
data instantaneously. Accessibility, representing data through cave arts at of audio and video revolutionized
speed of data access, reversibility & different geographical locations. The modern broadcasting. The invention
storage capacity are the basic three urge to communicate, co-operate and of transistor in 1947 and the ultimate
parameters which characterize new share is the basic aspect of human integration of first Pentium processor in
media. Since new media creates a species. With evolution of languages 1970 transformed data communication,
medium which is basically one and and visual art, the cognitive ability of the controlling and computation. The
zeros, which represent all aspects of human species, more tools and crafts data representation and growth in
human senses readability including like terracotta, dyes, inks, cotton etc. communication have eventually led to
video, audio and tactile data. In the emerged. And techniques of carving and new media by early 2000. The evolution
last one decade the rapid development writing aided representation of data from of technology is shown in Fig. 1.
in Artificial Intelligence has led to the the environment and also expressing 3. Composition of New Media
evolution of more intelligent new media creativity in a more refined from. This New media encompasses all
for communications. Since the machine technology advancement subsequently aspects of modern digitized data
learning codes can play the role of led to the development of paper 220 communication. The digitized data being
human cognitive abilities, they have AD in China. The breakthrough in created, consumed, communicated
the information storage and processing paper processing led to evolution more over the internet using digital devices.
ability to represent or imitate human books keeping and recording, which Even the old media have found new way
level of communication. eventually to rapid communication of expression within the new media like
with invention of printing press. The e-newspapers, e-books, etc. Evaluation
2. Evolution of New Media
16th century phenomena led to mass of smart phones based and apps have
The growth of new media has
media communication evolution. The led to mini revolution in the social and
been the generic development riding
technological breakthrough in late 18th interactive space. Standalone social
the wave of technology progress over
century and 19th century led to evolution networking platforms like Twitter,
the human species evolution. The
of transmission of sound and followed by Facebook, and Instagram have all tried
migrating human species out of Africa
23
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
A R T I C L E
www.csi-india.org
24
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
A R T I C L E
dreams, higher philosophy and security, and social media has been
Evolution &
Adaptation
ultimate consciousness. But though playing a viable role in complicating
these utopian abilities are long term, as well as finding solutions to the
Ga ral new issues. Globalization has been
currently the progresses are being The ming h avio ics
made toward achieving these goals. The ory Be ynam further strengthened by Social media.
D The transformation being brought by
methodologies include cybernetics &
brain simulation, symbolic intelligence, Complex AI new media between communities,
Networks Nonlinear
machine learning , cognitive simulations, Systems Dynamics societies and nations is purely based
logic programming, knowledge based on technological breakthroughs. The
computing, embodies computing, P detailed study of new media impact on
l AI for atter individual human behavior, emotions
computational intelligence, machine ssica ma n
Cla tion and aspiration is beyond the scope of
learning or self-learning systems and
Systems
Theory
this limited space for this topic.
other forms of intelligent computing.
Now the question arises how to achieve 7. Conclusion
these ultimate goals. The complex In human species evolution new
process cognition can be achieved Fig. 3: AI systems media is one aspect of current progress
only through integrating different of technology. Technology progress
methodologies. The two most common cannot be stopped, and this will have
6. Impact of New Media direct impact of how humans consume,
approaches are agent architecture and Impact of new media on human share and communicate data. The
cognitive architecture. Describing each life has become more complicated in current progress in computational
and every aspect of AI is beyond the recent years. The societal impact and platforms will have deeper impact than
scope of this article. But it’s better to individual personalized impact is beyond what happened with Radio, Television
stand the tools required to implement questions. As a species the content and Internet. The wireless world will
these methodologies. The tools include generated by users conveyed through be more interesting with virtual reality,
machine intelligence to search large machines is the norm which has communicating machines and more
database and optimize a solution evolutionary impact is debatable. The importantly emotional and intelligent
(search algorithm, mathematical recent social and political revolutions machines. As an off-shoot of this
optimization, evolutionary algorithm), from Europe, to Middle East, to Africa, cognitive technology development new
logic based programming (automated to Asia, to Americas are result of new media will give way to intelligent media.
reasoning, logic based decisions), media social networking platforms. The References:
probabilistic tools (bayesian networks, gender equality revolution happening [1] Lev Thackara, “The language of new
kalmann filtering, decision theory, around the world is purely a magic of media, Leonardo Book Series, MIT
utility theory), classifiers (classical new media. The chains which couldn’t Press, 2002.
mathematics, machine learning, be broken down in male dominated [2] John Carey and Martin C. J. Elton,
statistical classification), neural “When Media Are New: Understanding
human species evolution especially
the Dynamics of New Media Adoption
networks (Artificial Neural Networks after dark ages, has been undone and Use,” Michigan Publishing ,
(ANN), connectionism), Deep feed- by new media in matter of months. University of Michigan Library, 2010.
forward neural networks ( deep learning, New media has directly impacted on [3] Rabinder Henry, Lecture notes
image processing, computer vision, financial transactions and commercial “Science, Engineering and Technology,”
speech processing, natural language activities. This has enabled evolution PPCRC, 2014.
processing), Deep recurrent neural of infrastructure-less banking systems [4] Bebo White, Irwin King, Philip Tsang,
“Social Media Tools and Platforms in
networks and intelligent control system which is elevating millions out of poverty Learning Environments,” Springer New
based hierarchy based approach. The in Asia, Africa and Americas. The York, 2011.
aspects of AI tools are shown in Fig. 3. Nation states are more concerned about n
25
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
A R T I C L E
Introduction: lack of knowledge about the defined robotic equipment and for healthcare
Human Intelligence is a power problem. system.
which proves the mental quality of A particular problem some time The Google Brain is mainly
an individual brain. The quality of a may be solved by the interaction of other focusing on the fundamental research
brain defines the ability of marking people’s brain or many times it requires for advancement in the domain of
complex cognitive tasks and to learn more persons advice to solve it. machine intelligence and also creates
from experiences. Human Intelligence Consider a situation when pools better theoretical apprehensions of
enables human to experience, think of brain are required to solve a critical deep learning.
and react. Human brain possesses the problem of the humans. In other ways The success of the deep learning
ability of cognizance about learning a master brain who has an extreme model is depending on informative
from the concepts, understand it and knowledge bank and able to solve any real-world corpuses and also required
apply logical reasoning with the power problem any openly available to all enough computational resources
of recognizing patterns. any time. Such philosophical concept to actually train the large, powerful
Unlikely all human brains are of brain is required to develop for the models on these corpuses.
not equally intelligent. To make them future generations. In this article such To accelerate the machine
adequately intelligent we need to large, unified, domain independent learning research we need to have
trained them accordingly. artificial brain assumes as Param- rapid turnaround time on the system
Technology is creating the machine Brain. of machine learning experiments.
more and more intelligent like a human. The spectrum of AI is moving Then implement them for real world
The human brain gradually beyond the areas like Robotics, applications.
develops with the experiential learning Biosciences, Natural Language Natural Language Processing
and also need to take assistance of Understanding, Machine Learning The Natural Language Processing
other experienced brain. We never Algorithms and Techniques, Computer (NLP) focusing on the development of
say about a brain that is saturated or system for machine learning, Music and learning algorithms. These algorithms
grownup human brain, because it may Art generation, People and Artificial would be capable of understanding
possible that a particular brain may Intelligence Research (PAIR). natural languages. It will enable
not reacts intelligently for a never ever Google is handling various AI machines to translate the text [2],
faced problem [4]. projects, and Google-Brain (GB) is one answering the asked questions and also
Artificial Intelligence (AI) is a of them. GB is trying hard to achieve summarize the documents.
created intelligence by computing intelligent machines to improve the In the advanced form, we
machines. The objective is to simplify human lives [1]. may presume that machines can
the human lives [3]. AI helps to achieve Machine Learning: conversationally interact with humans.
the success with respect to the defined Machine Learning (ML) efforts are
problem which notified under any People and AI Research
to improves the ability of the machine’s The human-centric research and
parameters. listening and watching power. The deep
It moves beyond the experiences of the design of Artificial Intelligence
learning system will definitely help to enabled modules will be more
the human and provide the long lasting build the machines which naturally
knowledge for future problems. productive, enjoyable and fair.
interact with humans. The outcome Deep learning models are
The Param-Brain ideas may apply to real applications. The dominating now days on Robotics. Now
As we always connect the people ultimate goal is to create the perception the machine learning agents interact
to take advice/guidance for a particular of human to be a seamlessly integrated with its environment that requires
problem, when an individual is not able component of future software. These the true unsupervised learning.
to solve or able to take action due to may be useful for mobile devices, Such applications are also well
www.csi-india.org
26
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
A R T I C L E
connected with skill acquisition, active treatment to serve their patients having it will create a differently abled mental
learning, environment exploration and some critical diseases. resource for all of us.
reinforcement. These are fundamental Machine learning has the References:
ingredients of human learning. Human tremendous possibilities of application [1] Google Brain (2018). Google Artificial
learning is still not well understood. areas. Machine Learning tools and Intelligence Project 2018, from. https://
It must be exploited through the assistive symptomatic services will ai.google/research/teams/brain
supervised approaches of machine drastically improve the availability and [2] Google Translate (2018). Machine
learning that will dominate the deep the accuracy of the medical services for Translation Engine, Dec, 2018, from
http://translate.google.com/
learning. the common person. [3] Singh J. & Goswami, P.K. (2017). Text
Healthcare and Biosciences Conclusion Data Analysis of politics: Using R-Tool.
One of the prominent areas where This article is written to drag Proceedings of National Conference,
Artificial Intelligence is successively the attention of the readers. The Digital India-Altering Landscape. 2017.
(pp. 40-44)
moving to transform the impact of Artificial Intelligence (AI), would be the
[4] Srivastava D. (2017). Brain-Computer
medicines and providing assistance to assistive model for the human lives. Interfaces for Communication and
pharmacology. It helps to discovering The individual brain will create the control. Proceedings of National
new combination of drugs. It may super brain (Param-Brain) which will Conference, Digital India-Altering
become an assistive technology that facilitate the human lives worldwide as Landscape. 2017. (pp. 45-48)
will empower doctors to provide better openly available resources. Definitely n
Dr. Pankaj K. Goswami [CSI- I 1060967], Assistant Professor (Sr. Grade-III) at Amity Institute of Information Technology,
Amity University Uttar Pradesh, Lucknow. His area of interests includes Artificial Intelligence, Multi Engine Machine
Translation, Information Storage Management, Data Mining & Cloud Infrastructure Service. He can be reached at:
pkgoswami@amity.edu; goswamipankaj2k1@yahoo.com
Kind Attention !
Prospective Contributors of CSI Communications
27
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
A R T I C L E
The term “Artificial Intelligence” for many people may sound like intimidating to some-one or
something, but it is more than one might imagine. Many of us are already using artificial intelligence
software in day-to-day life for some or other needs. Every time you talk to someone from your
smartphone, perform a web search or write a message on a social media, you’re interacting with
artificial intelligence. We are likely to encounter AI techniques use; every time you do some online
shopping as well. Main aim of this work is to summarize; how Artificial Intelligence is impacting real
life in day-to-day activities. Numerous discussions and consultations were carried out from various
people, academic researchers, and journal articles for the study.
In this article, we intend to put forth important artificial intelligent software used in day to day
activities. Most AI software are helping to perform few mundane tasks like understanding our natural
language, identifying moving objects, tagging of faces in pictures, online shopping recommendations
and getting quick answers to common questions. Specific features of artificial intelligence and related
technologies in using a smartphone for online shopping are explained in this paper. This article also
describes the consequences of artificial intelligence in shaping our future.
www.csi-india.org
28
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
A R T I C L E
29
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
A R T I C L E
using artificial intelligence and where AI is making impact. Everyone International Conference on Systems,
computer vision processed; traffic is finding out various possibilities Man, and Cybernetics (SMC), 2017.
authorities can search surveillance of deploying AI within their own [4] R. Thubron, “Finish your emails in half
videos and specific plate numbers organizations for various services. the time,” TechSpot Newsletter, 2018.
from the images or videos. [5] V. Këpuska and G. Bohouta, “Next-
References: generation of virtual personal
Conclusion: [1] M. He, C. Ren, and H. Zhang, “Intent- assistants (Microsoft Cortana, Apple
Artificial intelligence is gearing up based recommendation for B2C Siri, Amazon Alexa and Google Home),”
rapidly from new technologically areas e-commerce platforms,” IBM J. Res. in 2018 IEEE 8th Annual Computing
to impacting every industry in the world Dev., vol. 58, no. 5/6, p. 5:1-5:10, 2014. and Communication Workshop and
[2] C. Dirican, “The Impacts of Robotics , Conference (CCWC), Las Vegas, NV, 2018,
and our daily life. Here we presented
Artificial Intelligence On Business and pp. 99–103.
overview of most day-to-day activities Economics,” Procedia - Soc. Behav. Sci., [6] C. Turakhia, “Engineering More Reliable
where artificial intelligence and its vol. 195, pp. 564–573, 2015. Transportation with Machine Learning
aligned technologies are used. In this [3] D. Efanov and G. Osadchy, “Trust in and AI at Uber,” Uber Technologies Inc,
article, we In this article, we have only autonomous vehicles: The case of 2017.
discussed a very few areas of our life Tesla Autopilot and Summon,” in IEEE n
Dr. Nilesh J. Uke [CSI Membership No. 00127331], received the B.E. degree in Computer Science and Engineering
from Amravati University in 1995, M.E. from Bharathi Vidhyapeeth in 2005 and Ph.D. degree in Computer Science from
SRTM University Nanded in 2014. He is currently working as Principal and Professor at Trinity Academy of Engineering
Pune, Maharashtra. His current research interests includes Visual Computing, Artificial Intelligence, Human Computer
Interface and Multimedia.
CSI CALENDAR 2018-19
February Second International Conference on Advanced Computational and Communication Paradigms (ICACCP-2019)
25-28, 2019 International Symposium on Computer Vision and Machine Intelligence in Medical Image Analysis (ISCMM)
http://symposium.icaccpa.in/ Venue: Sikkim Manipal Institute of Technology
Convener : Prof. Debanjan Konar, Sikkim Manipal Inst. of Technology, Sikkim, India
Co-Convener : Prof. Chinmoy Kar, Sikkim Manipal Institute of Technology, Sikkim, India
MARCH 2019 International Conference on Data Science and Communication (IconDSC) in technical association with IEEE-
01-02, 2019 Bangalore Section, IEEE-ComSoc, Bangalore Section and CSI Division IV, Communication.
Submission Deadline: 10 November’18, https://christuniversity.in/icondsc/
Contact : Dr. Samiksha Shukla, 9880462311 samiksha.shukla@christuniversity.in
www.csi-india.org
30
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
A R T I C L E
In business intelligence the agent based negotiation play a very important role for automatic
E-commerce. There are different types of model have been developed by the different researchers
which are rooted on the agent based negotiation for deployed in the automatic E-commerce. In this
article our focus is to represent different types of negotiation models which are used in the different
agent based negotiation.
Introduction:
Negotiation : In business the sellers agent which provide the They are given as follows.
intelligence the negotiation is the help for negotiation. In this type of 1. Heuristic based Approach:
process whose aim to provide negotiation field the aim of the sellers The heuristic-based approach
interaction between the buyer and agent to satisfies the requirements of which is almost based on some specific
seller by which they are reached at buyers agents through the negotiation mutually agreed and predefined
the profitable state in business. Many mechanism. conditions are fulfilled to get the clarity
number of standard as well as modern amongst the available options between
intelligent computing methods such as 2. Business Negotiation Models
used in various literature buyers and sellers e.g. to optimise the
knowledge based systems (KBS), case rate of functional cost considering the
based reasoning (CBR), artificial neural options [17, 37, 23]. Therefore, under the
nets (ANN) and genetic algorithm (GA) Business Negotiation heuristic approach these experimental
have been arranged to implement model results are compared with the standard
the (MAS) buyer and seller have been benchmark which helps this model to
represented as agents and broker get fast result in future ultimately based
represented as a coordinator agent. The on higher rate of success through a
buyer agent restrictions are associated rigorous action for negotiation.
with price, quality, quantity, brand,
payment mode etc. The seller agent 2. Machine Learning approach:
restrictions are associated with the The machine learning approach,
price and quality (Jennings 2003). The on the other hand, mainly based on
negotiation process have implemented ultramodern prospective features
by only limited numbers of researchers. that come only after a concrete and
They have focused to the cognitive Fact successful negotiation. Generally, the
Cognitive Opponent Negotiation
parameter such as preference, desire, Based machine learning approach is mainly
Model Model Model
intention, commitment, capability, trust Model focused on past (historical) data which
etc. as cognitive parameters for the comes after a long series of experiments
negotiation of buyer and seller agents. and thus it paves the ways of success
2.1 Cognitive model
In the literature several different that automatically generates and leads
methodologies for the negotiation based Mukun cao et al recommends to future prediction [14, 2].
selection of buyer agent have been an idea of goal oriented agents which 2.2 Fact-Based E-Negotiation Model
reported. These methodologies differ in are fully loaded with multi-strategy Hasan and Al-Sakran implemented
procedures, technologies and methods. selection model that help automated the Fact-based E-negotiation model.
In this work the aim of the model is negotiation between one end to another This model individually assign both
to stable the interaction between the end. The cognitive model describes the buyer and seller a weightage based
sellers and buyers through the third two major approaches which provide on functional attributes and then
party (broker agent) to appreciate help to design the negotiation strategy. selects the concessional strategy (i.e.
31
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
A R T I C L E
apprehensive, cautious, or desirous type assigned depending on proper [12] I. Roussaki, I. Papaioannou, M.
[30]), and try to get the final outcome utilisation capacity. Anangostou, Building automated
in the form of decision. Therefore, A high weighted issue will definitely negotiation strategies enhanced by
MLP and GR neural networks for
concession systems and characteristic depend on more utility Sometimes
opponent agent behaviour prognosis,
loads of each side are set for future exercises also try to minimise the Computational and Ambient,
result. losses on part of opponent’s utility. Intelligence, 2007, pp. 152–161.
Here in each round, seller agent References: [13] I. Bakam: Des systemes multi-agents
will evaluate the purchaser’s aim [1] A. Fabregues, C. Sierra, HANA: a aux reseaux de petri pour la gestion
matching with their objectives and human-aware negotiation architecture, des ressources naturelles : Le cas de la
scale–up their chances for better result Decision Support Systems 60 (2014) faune dans l’est cameroun. PhD thesis,
through negotiations. 18–28. University of Yaounde 1 (2003).
[2] A. Monteserin, A. Amandi, A [14] J. Brzostowski, R. Kowalczyk,
Here it may be noted that Dealer
reinforcement learning approach Modelling partner’s behaviour in agent
must exercise its own capacity, with negotiation, AI 2005: Advances in
to improve the argument selection
fruitful activities to decide and review its Artificial Intelligence, 2005, pp. 653–
effectiveness in argumentation-based
parameters. negotiation, Expert Systems with 663.
In each transaction round, expert Applications 40 (6) (2012) 2182–2188. [15] J. Cheng and M. Wellman. “The
from both i.e. purchaser or seller who [3] A. ElFallah-Seghrouchni, S.Haddad, H.: WALRAS algorithm: A Convergent
gets an adverse offer analyse the event Protocol engineering for multi-agent Distributed Implementation of General
and try to match with their own desire interaction. In: International Workshop Equilibrium Outcomes.” To appear,
on Modeling Autonomous Agents Computational Economics.
and finally decides to acknowledge
in a Multi-Agent World (MAAMAW), [16] Khasnabish, B., Chu, J., Ma, S., So, N.,
the i.e. to reject or to accept with the Unbehagen, P., Morrow, M., Hasan,
Valencia, Spain. (1999).
arrangement. M., Demchenko, Y. and Meng, Y. (2013)
[4] C. F. Lee, P.-L. Chang, Evaluations of
When seller’s agent offers to tactics for automated negotiations, Cloud reference framework. Internet
buyer and after rejection a modification Group Decision and Negotiation 17 (6) Eng. Task Force, 7, 1–47.
takes place through supporting (2008) 515–539. [17] L. Pan, et al., A two-stage win–win
characteristics. Here, process continues [5] Cpn tools. (http://cpntools.org). multi-attribute negotiation model:
till the attributable values reach to a [6] C.Balague: Les Syst_emes multi- optimization and then concession,
agents en marketing : Modelisation par Computational Intelligence 29 (4) (2013)
balance to accept the proposal.
les reseaux de Petri. PhD thesis, Ecole 577–626.
2.3 Opponent Model des Hautes etudes Commerciales [18] L. Pan, X. Luo, X. Meng, C. Miao,
Some competitive negotiation (2005). M. He, X. Guo, A two-stage win-win
based on utility is to get win –win [7] Dastjerdi, A.V., Tabatabaei, S. and Buyya, multiattribute negotiation model:
situation likely to be agreed. R. (2010) An Effective Architecture for Optimization and then concession,
Automated Appliance Management Computational Intelligence 29 (4) (2013)
In a competitive environment agent
System Applying Ontology-based 577-626.
keep a side their own strategy to reach [19] M. Kefi-Gazdare : Optimisation
Cloud Discovery. Proc. 2010 10th IEEE/
an agreement using secret action Heuristique Distribuee du Probleme de
ACM Int. Conf. Cluster, Cloud and
without the knowledge of opponents’ Grid Computing (CCGrid), Melbourne, Stockage de Conteneurs dans un Port.
negotiation parameters. Problems Australia, May 17–20, pp. 104–112. IEEE PhD thesis, ECOLE CENTRALE DE
inbuilt can be reduced only with certain Computer Society, Washington, DC, LILLE (2008).
approaches. Here agents of both play an USA. [20] M. Cao, M.Y. Kiang, BDI agent
important role to reach a useful solution [8] A. Chavez, D. Dreilinger, R. Guttman, architecture formulti-strategy selection
and P. Maes. “A Real-Life Experiment in automated negotiation, Journal of
of problems. Here, Agent’s bargaining
in Creating an Agent Marketplace.” Universal Computer Science 18 (10)
power conforming to the strategies to (2012) 1379–1404.
Proceedings of the Second International
reach at a solution point which comes [21] N. R. Jennings, et al., Automated
Conference on the Practical Application
only after attaining an integrated of Intelligent Agents and Multi-Agent negotiation: prospects, methods
application. In-fact here these Technology (PAAM’97). London, UK, and challenges, Group Decision and
prediction approaches are integrated April 1997. Negotiation 10 (2) (2001) 199–215.
with negotiable strategies of agents to [9] Faratin, P., Sierra, C. and Jennings, [22] Narasimhan, B. and Nichols, R.
draw a conclusion. Majorly here main N. (2002) Using similarity criteria to (2011) State of cloud applications and
make issue trade-offs in automated platforms: the cloud adopters’ view.
issue is concerned with negotiation of
negotiations. Artif. Intell., 142, 205–237. Computer, 44, 24–28.
multi-issue, one of the most important [23] P. Faratin, C. Sierra, N.R. Jennings,
[10] Forrester Research Report.“Affordable
negotiating parameters are preferences Using similarity criteria tomake issue
Intimacy Strengthens online
of several issues. Stores.”September, 1997. trade-offs in automated negotiations,
Preferences always taken a side in [11] H. Mazouzi, A.ElFallah-Seghrouchni, Artificial Intelligence 142 (2) (2002)
the interest of utility based gains where S.: Open protocol design for complex 205–237.
success depends upon these real utility interactions in multi-agent systems. [24] P. Faratin, C. Sierra, N.R. Jennings,
based activity. In: International Conference on Negotiation decision functions for
Autonomous Agents and Multi- Agents autonomous agents, Robotics and
Thus, it can be said that problems
Systems (AAMAS), Bologna, Italy, (2002). Autonomous Systems 24 (3) (1998)
can be solved with due weightage 159–182.
www.csi-india.org
32
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
A R T I C L E
[25] P. Wurman, M. Wellman, and W. Walsh. (1) (2008) 79–104. strategy combining trade-off and
“The Michigan Internet AuctionBot: [27] Rahwan, I., Kowalczyk, R. and Pham, concession moves, Autonomous Agents
A Configurable Auction Server for H.H. (2002) Intelligent Agents for and Multi-Agent Systems 12 (2) (2006)
Human and Software Agents.” In the Automated One-to-Many E-commerce 163-181.
Proceedings of the Second International Negotiation. Proc. Twenty-fifth [29] R. M. Coehoorn, N. R. Jennings,
Conference on Autonomous Agents. Australasian Conf. Computer Science, Learning on opponent’s preferences to
May, 1998. Melbourne, Victoria, Australia, January make effective multi-issue negotiation
[26] R.Y. Lau, et al., Mining trading partners’ 28–February 1, pp. 197–204. Australian trade-offs, in: Proceedings of the 6th
preferences for efficient multi-issue Computer Society, Inc., Darlinghurst, International Conference on Electronic
bargaining in e-business, Journal of Australia. Commerce, 2004, pp. 59-68.
Management Information Systems 25 [28] R. Ros, C. Sierra, A negotiation meta n
Dr. Bireshwar Dass Mazumdar - Associate Professor and Head, Department of Computer Science and
Technology, Institute of Engineering and Technology Rural Technology, Allahabad, U.P.
33
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
A Report
Participants: Malaysia, Ghana, Zimbabwe, Uganda, South Sudan, Rwanda, Japan, Bangladesh and many more
Jointly Organized By :
(i) Asia Africa Development Council, Council for
Sustainable Peace and Development
(ii) Innovation Society, India
(iii) Computer Society of India
Associate Partner :
(i) Navyashydhri Group of Institution, Pune
(ii) Ajjevenkya D Y PATIL university Pune
Organizers: World Academy of Informatics and Management
Sciences
Venue Partner: NCRD SIMS | NAVI MUMBAI Vice Chairmen - Computer Society, India (Jaipur Chapter)
Correspondent: 1st Dec. 2018 | NCRD SIMS Navi Mumbai | Republic of India:
Organizing Chairmen: Prof. (Dr.) Ripu Ranjan Sinha Asia Africa Development Council Promoted By Council for
www.csi-india.org
34
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
Sustainable Peace and Development. Council is Promoting/ In Line With UNSDG 2030 for the Promotion of Awareness
Supporting and Working in line with United Nations This Year Council Jointly with Innovation Society of India
guidelines and policies in relation with Sustainable Peace organized 2nd Asia Africa ICT and Development Summit,
and Development. Council is Authorized and Endorsed Expo and Awards 2018 on the Theme of ICT Attainment of
during India Africa ICT Summit 2017, During General UNSDG 2030 in Asia and Africa: Opportunities, Challenges
Assembly Delegate from USA, Rwanda, Uganda, South and Waysforword.This Information and Communication
Sudan, Ghana, United Kingdom, United Arab Emirate and Technology knowledge sharing Mega function which was
Indian States and Government of India. Council is Ministry attended by dignitaries from countries like Malaysia,
of Corporate Affairs Approved and Authorized Companies Ghana, Zimbabwe, Uganda, South Sudan, Rwanda, Japan,
license Under Section 8(1) of the Companies Acts , 2013. Bangladesh and many more was held at NCRD’s Sterling
Council is ICT Excellence Awardees 2017 for the Promotion Institute of Management Studies, Nerul, Navi Mumbai.
of Sustainable Peace and Development and on process Hon. Prof. Ripu Ranjan Sinha (Director General, Asia
to established overseas office at USA, Rwanda, Uganda, Africa Development Council), Prof. K. S. Charak (Chaiman,
South Sudan, Ghana, United Kingdom, and United Arab 2018 Asia –Africa ICT Summit), Mr. Ashish C. Swami
Emirate. Council Jointly Organized Innovative Activities with (Director, Council For Sustainable Peace and Development),
Innovation Society India (Nation WIDE society of Likeminded Hon. Haresh Tank ( Founder Director– Innovation Society,
People to innovate Infrastructure) and Computer Society, India) Hon. Ms. Poorva Walse Patil was Chief Guest, Mr.
India for the Promotion of Sustainable Innovation for the Zainal Azlan M. Nadzir (Consulate General of Malaysia) , Mr.
Betterment of Global Society and establishing Multipurpose John Yatta, Cosmas Lokun Chairman SIF Tech. Ltd. (South
Centers at USA, Rwanda, Uganda, South Sudan, Ghana, Sudan) were guest of honor and Mr. Abdul Diwale Mohmmed
United Kingdom, United Arab Emirate and Indian States to (Executive President, Global South Economic Forum),
Promote Dr. Satish Sharma (Director General, Maharaja Group of
Colleges), Dr. E. B. Khedkar (Vice Chancellor, Ajinkya D.Y.
Patil University, Pune.), Shri. Avinash Shinde- Treasurer
NCRD, Dr.Ashok Patil –Trustee NCRD were dignitaries on
dais. The event started with the tradition of lightning of
lamp, followed by video glimpses of IT goals of suitable
development that are aimed to be followed by India-Africa
ICT Summit. The Director General Asia Africa Development
Council and On Directive Dr.Prashant Gundawar, addressed
the audience with his welcome speech and all dignitaries
on dais did unveiling of Novelties Directory. Asia Africa
Development Council and Innovation Society (India) has
Recognized Professional Excellency by Release of Annual
ICT and Development Excellence Awards 2018 in different
i) Science and Technology sectors of Education and Industry who has worked and
ii) Innovation Working for the Betterment and Promotion of Humanities
iii) Water development through Information and Communication
iv) Food Security and Agriculture Development Technologies. All participants were enthralled by speeches
v) Clean and affordable Energy and panel discussions of expertise in ICT. Council received
vi) Tourism and Cultural Exchange award nomination by the nominator and organization and as
vii) Health Care and Gender Equality per the required information and based on the parameter of
viii) Quality Educational Innovation , development for the betterment of mankind. Our
ix) Sustainable countries three members jury of award search and selection committee
x) Infrastructure development identified and selected for the awards in Individuals (47) and
xi) Economic Growth & cooperation. organizational category (24) Council has Formed in 2017,
xii) Information & Communication Technology (ICT) The India-Africa ICT knowledge consortium (www.indiafrica.
implementation org) to smoothly facilitate networking among ICT leaders
xiii) Assists activities towards Sustainable Peace and and providers as well as consultants from Asian and African
Development. countries. It paves the way for business liaison between
Council Initiated Global Convention /Professional both regions through information sharing and generating
Excellency/Certification/ Accreditation/ Young International ideas that conquer ICT challenges. It provides a powerful
Internship Programme (YIIP) / Startup Mentoring/ Student/ impetus to mobilize Indian investors to invest strategically
Cultural Exchange Programme, Fellowships For the in the ICT sectors of African countries. The objective of the
standardizing Commerce/ Trade/ Culture for thrust areas. consortium was to promote research, enable networking
UNSDG 2030: The Sustainable Development Goals are the and expedite all activities that will support transformation
blueprint to achieve a better and more sustainable future for of the ICT sectors of Asian and African countries, whilst
all. They address the global challenges we face, including fighting cyber crimes and supporting Asia-African ICT
those related to poverty, inequality, climate, environmental exchange program. Different experts including scientists,
degradation, prosperity, and peace and justice. The Goals researchers and entrepreneurs the area of information
interconnect and in order to leave no one behind, it ís and communication technology pledged their support to
important that we achieve each Goal and target by 2030. the development of African Countries as per the charter
35
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
of UNSDG towards the achievement of the 2030 Agenda Panel 9: E-Trade platform for Africa and Asia
for Sustainable Development. It was decided that different Panel 10: Implementation of ICT in Growth of African
sectors and actors working together in an integrated manner Tourism Industry
by pooling financial resources, knowledge and expertise. In Panel 11: ICT Today and Beyond for Global Communities
the new development era with 17 intertwined Sustainable Sub Theme : Network Infrastructure, Artificial Intelligence,
Development Goals and 169 associated targets as a blue- Cloud Computing, Augmented /Reality, Virtual
print for achieving the sustainable future the requirement Reality, FinTech, BI/Big Data/ Analytics,
is cross sectorial and innovative multi-stakeholder Connected World, Information Security,
partnerships, which will play a crucial role for developing Internet of Everything, Healthcare, Embedded
the African Nations. In Relation and Slogan “EAK WORLD ! Technologies, Tele Communication.
SHRESTA WORLD” | “EAK EARTH ! SHRESTA EARTH” Council
worried on the Intention and Establishment of Human
Security not only National Security or Personal Security. ICT
is acting indispensable part for the same, The ICT sector has
established to be a strong driver of GDP growth in nations
across the globe. From developing countries, to developed
nations, The ICT sector has contributed to the success of
each of these country’s economies, the development of its
people’s skills and potential and positioning the country as
a place for international organization to more efficiently do
business. The expansion of information and communications
technology and worldwide connectivity has huge possibility
to speed up human growth, to connect the digital divide
and to develop knowledge societies. ICT is competent for
boosting the means of execution of long term development
goals by nurturing global collaboration and coordination, Interview Session by the Correspondent ADCO News:
encouragement of technology transfer and capacity building, On and After Panel Discussion , Board Correspondents
strengthening multi-stakeholder partnerships, facilitating had Recorded Interviews of Each Participants, Panelist
data monitoring and accountability. ICT provides a vital and Contributors and aware the Goals of United Nation
role in attaining the sustainable development, particularly and Council taken Pledge for the Contribution and
in rising information and knowledge societies. ICT are Support of UNSDG 2030 agenda achievement in strategic
open access to academic research, clearness in making Manner. All Awardees contributed lots for the betterment
informed decisions, and platforms for online partnership of global Communities with earned and Learned Skills
for co-creation, learning and work. By increasing access and Experience. Dr.Ripu Ranjan Sinha Originators and
to information and knowledge, ICT minimizes difference Executors proposed the vote of thanks and expressed his
within and among nation. This makes possible social and satisfaction that several important decisions were taken
economic progress, even to disadvantaged part of society, in this 2018 summit in relation with MAKE THE WORLD
such as persons with disabilities. There is no doubt that SUSTANABLE and he also endorsement to overwhelming
access to developed technologies has grown so fast and yet response and endorsement to South Sudan Vice President
the remarkable gains are still in weak position by existing James Wani Igga and given video thanks to them. Along with
gap in ICT access between and within countries, between the Council Sustainability he assure that Council , Society,
urban and rural settings, among men and women, and boys Consortium people is ready to take a challenge for the
and girls. A major digital divide is still in place, with more Holistic Development of South Sudan and he is very much
people offline than online and particularly poor access in sure within the decade upto 2030 South Sudan Shall be
vulnerable developing nations. The challenge now is to bring self-sustainable and shall be able to march together rest of
the rest of the world online and ensuring that no one is left world through energy, education , health , fast learning and
behind. Advanced computing technologies are the future. It overall development. He also planned to take and ready to
is mandate to understand the base and challenges. During bring investor, promoter and other business areas for the
this SUMMIT certain key issues shall be addressed such as holistic development of Countries in association with SIF
Panel 1: Socio Economic Transformation of Africa Technologies, South Sudan.
through ICT
Panel 2: Peace and Security through ICT
Panel 3: role of ICT in attaining Sustainable Important Resolution passed
Development Goals (i) ICT SUMMIT 2019 shall be Organized in Pune under the
Panel 4: Investment Opportunities and way forward. chairmanship of Prof.(Dr.) Kuldip S. Charak, Director-
Panel 5: pan African E – Network and Cyber challenges NavyaShyadri Group of Institution, Pune
Panel 6: Virtual Education Network of Universities and (ii) Council is Inviting South Sudan vice President and
Higher Education Requested to Assign task to council for the Holistic
Panel 7: effective ICT implementation in Transport Development of South Sudan
management (iii)
Council shall execute certificate and Diploma
Panel 8: Opportunities for the Asia in Development of Programme in association with University, College,
Africa NGO for the Promotion and Support of UNSDG-2030
www.csi-india.org
36
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
A Report
CSI Gwalior Student Branch have been inaugurated on 26th November 2018 at the Rustam Jee Institute of Technology,
Jhansi Road, Gwalior. The inauguration programme was attended by Commandant of the BSF academy & Director
RJIT, Tekanpur, Shri Pavan Kumar Dubey, Chief administrator of RJIT, Mr. Mahabir Prasad and Principal of the RJIT, Dr.
Arvind Kumar Jain. In this opening ceremony, Engg. R. K. Vishwakarma, Chairman CSI Gwalior Chapter, Mr. Jayant S.
Bhide, Immediate past Chairman, Engg R. K. Khetan, Past Chairman, Secretary Mr. Dilip Hayanran, Treasurer Mr. R. S.
Gadkari and a guest speaker and fellow of CSI, Dr. P. K. Arya (Dept. of Telecom, New Delhi) were also present during this
occasion. All dignitaries lighted the lamp and garlanded the idol of goddess Saraswati Devi. The welcome speech given
by Chief Administration of the college Shri Mahabir Prasad (Deputy Commandant of BSF, academy), thereafter Director
of RJIT Mr. P. K. Dubey, has spoken about various academic activities done and the achievement of the RJIT during last
4-5 years. While addressing the gathering and students, Engg. R. K. Vishwakarma has highlighted the necessity and the
advantage, to becomes the member of student chapter of computer society of the India. Fellow CSI and keynote speaker
Dr. P. K. Arya delivered his talk on recent trends in communication technologies.
Total more than 150 students of the computer science and electronics engineering branches has becomes the member
of this student branch of CSI, RJIT, Tekanpuer, Gwalior (MP). In this occasion all the head of the departments of the
various branches, lecturers and other teaching staff was present during this occasion. The vote of thanks was delivered
given by Prof. Soni, Head, Computer Science and Engineering.
37
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
CHAPTER Report, kOLKATA
Computer Day-2018
The CSI, Kolkata Chapter celebrated the Computer events who was supported by Mr. Snehasis Banerjee,
Day-2018 with great enthusiasm and overwhelming Dr. Madhumita Sengupta Treasurer, Mr. Gurudas Nag,
participation of students on 15th December 2018 at CSI, Mr. Chandan Pal, Mr. Ranjoy kumar Ghosh, Mr. D.P.Sinha,
Kolkata Conference Hall. Almost 60 students from well Ms. Sharmila Ghosh and Mr. Sib Daspal.
known 11 schools of Kolkata, few teachers and guardians Mr. Aniruddha Nag, Convenor of Computer Day-2018 ,
were present in that event apart from many Chapter conducted the whole program.
patrons and Life members of CSI. The event ended with the prize distribution ceremony
Mr. Sourav Chakraborty, Chapter Secretary gave the . Prizes are handed over to winners by all members of CSI,
welcome address. He welcomed Mr. Parijat Chakraborty, Kolkata Chapter who were present there.
mentor – Birla Industrial & Technological Museum, Dr. The list of winners is:
Subhabrata Roychoudury, Advisor – Maulana Abul Kalam Position School Name Name
Azad University of Technology (MAKAUT), West Bengal
and Prof. Utpal Kumar Mitra, Jadavpur University with a First B. E. College Model School Purbak Sengupta
Tridib Dalui
bouquet and introduced them to the participants.
Mayukh Pandit
Mr. Gautam Hajra, Vice Chairman of CSI Kolkata
Chapter also gave a brief about the history and role of Second Birla High School Ayush Tanna
Computer Society of India . Anuj Chopra
Tejas Asija
Dr. Subhabrata Roychoudury nicely pointed out the
need of Computer day and role of Science Association of Third THE BGES SCHOOL Rupesh Das
Bengal who are Joint organizer of this event. Smit Koradia
Amal Roy Memorial Lecture was given by Mr. Parijat Sujal Roy
Chakraborty on the topic ‘Getting Ready for Industry 4.0:
An Interactive Session on STEM curriculum to align with Extempore
Industry”, followed by hands-on Session on Automation. Position School Name Name
Thereafter, he interacted with students and solved their First B. E. College Model School Debopriya Ballabh
queries.
Vote of thanks was delivered by Mr. Aniruddha Nag, Second Hariyana Vidya Mandir (Day) Tuneer Saha
Convenor of Computer day-2018. Third The Bhawanipur Gujarati Bhavya M.Modi
The session further proceeded with one hour Debate Education Society School
competition to judge the debating skills of the students. (ISC)
Followed by one hour extempore Competition. One eye-
catching aspect of this event was how students of all ages Debate
participated with equal enthusiasm and zeal. Position School Name Name
After a short lunch break, there was an interactive
First The BGES School Smit Koradia
Quiz Competition, participated by 10 well known schools of
Kolkata. Quiz Competition was conducted by Mr. Snehasis Second Shri Shikshayatan School Soumili Bishi
Banerjee, MC member of Kolkata chapter . Third BIRLA HIGH SCHOOL Rayan Chakrabarti
Prof Saikat Mitra was the Judge for all the three
www.csi-india.org
38
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
CHAPTER Report, AGRA
Special Session on
“Information Technology & Development” in
the Conference on “Mathematical Sciences
And Development”
Conducted by Department of Mathematics, Dr. Bhimrao Ambedkar University, Agra, U.P. in
association with Computer Society of India, Agra Chapter on 24th December 2018
Prof. Hariom, Prof. Vilas Karat, Prof. Sunder Lal and Prof. D.S.
Hoodasharing the dais in the special session of the conference at
Department of Mathematics, Dr. Bhimrao Ambedkar University,
Agra
39
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
CHAPTER Report, LUCKNOW
DIAL - 2018
One Day National Conference
Digital India – Altering Lives
Smart Governance – Impact and Implementation Challenges
On 8th December, 2018
Organized by CSI Lucknow Chapter
The Lucknow Chapter following their annual activities After lighting of the lamp, the representatives of the
calendar, organized one day National Conference “DIAL- companies which sponsored the event were presented with
2018” (Digital India- Altering Lives) on 8th December 2018 at the mementos by the Chief Guest to mark the gratitude for
PNBIIT, Lucknow on the theme ‘Smart Governance Impact their help.
& Implementation Challenges’. A souvenir including the proceedings was also published
Prof. Anil K. Shukla, Hon’ble Vice Chancellor, MJP and the Guests present on Dias were requested to release
Rohilkhand University, Bareilly was the Chief Guest of the the Souvenir. To encourage the students and researchers
Inaugural Function and the Keynote address was delivered some selected research article were also published in this
by Mr. Jayant Krishna, CEO, ED & COO of National Skill conference proceeding with ISBN number.
Development Corporation, New Delhi. Mr. Maneesh Dubey, the Director of PNBIIT, (which has
been our venue partner for last few years), in his address
detailed the changes which are visible in the Banking Sector
after the introduction of e-banking. He also presented many
fact and figures indicating the involvement of crores of
citizens with the operations of the banking industry.
In his Key Note Address Mr. Jayant Krishna stressed
on the role of ICT in the fast development and growth of the
country. He also said that e-Governance is going through
positive changes and gradually the people are able to
use the services made available through technological
Invocation by Mr. Arvind Sharma, Regional Vice President, advancements.
Region-I, CSI, Mumbai Mr. Sameep Agarwal from Mahindra Special Service
group, representing Lt. Cmdr. Jasbir Singh Solanki
The conference started with the invocation by Mr. Arvind (who could not attend the conference because of some
Sharma, Regional Vice President of Region-I of Computer unavoidable reasons), detailed a road map to a safe and
Society of India. He said that the sutra of CSI is “Sarve secure system.
Bhavantu Sukhinah” and so is the objective of ICT which In his address Prof. Anil Kumar Shukla, Hon’ble
is trying hard to take all the facilities, knowledge and well Vice Chancellor of MJP Rohilkhand University, Bareilly
being to the each and every person in our country living emphasized on the need of maintaining the balance between
even at the remotest place. Mr. Rakesh Puri, Chairman of the technological advancement and human science. He said
Lucknow Chapter welcomed all the guests, delegates and the technology should be able to add value to the human
members present. Mr. Rakesh Puri and other OBs of the well being and the social values should be protected so that
Chapter presented bouquets to the Guests sharing the we are able to create a society which fulfils – Sarve bhavantu
Dias. He also introduced the audience with the theme and sukhinah, sarve santu niramaya.
objectives of the Conference and invited the guests to light
the lamp.
Release of Souvenir (L-R) Mr. Rakesh Puri, Mr. Sameep Agarwal, Mr.R.A.S. Tyagi (last year awarded Chapter Patron) presenting
Prof. Anil K. Shukla, Mr. Jayant Krishna & Mr. Maneesh Dubey. memento to the Chief Guest Hon’ble Prof. Anil K. Shukla.
www.csi-india.org
40
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
Shri G.P. Singh, Vice Chairman cum Chairman elect to express our honour and gratitude towards their services
offered the vote of thanks to the Guests and the members, and help.
who spared their valuable time to grace the Inaugural
Session of the Conference.
The Session-1 was chaired by Prof. D.S. Yadav,
Depatrment of Computer Science, IET, Lucknow. The
speakers were Mr. Sukrit Thareja (Open Source Technology),
Ms. Aparna Mishra (Women Enterprenureship and online
incubation centre) and Mr. Vikas Budhiraja (Leveraging the
flexibility, ability and cost effectiveness offered by cloud
technologies).
The second session was chaired by Mr. T.N. Shukla,
Chief General Manager Telecom, BSNL. Mr. Atul Sharma,
General Manager, (NWP-CFA) BSNL detailed the initiatives Offering the Vote of Thanks, Mr. Arvind Sharma, RVP-I
taken by BSNL towards Digital India. Mr. Amit Sengupta expressed his gratitude and respect for all the Guests,
presented the details on Speakers and delegates who made the Conference a grand
Echo-communicator and Mr. Aditya Kadiyan spoke on success. He also expressed his gratefulness to the Sponsors
Secutity Fabric. VMWare, SISL, Sophos, Red Hat and AMD who helped
The third Session belonged to Dr. Rakesh Verma, the conduct of such an event at such a grand magnitude.
Special Secretary of IT & Electronics, GoUP who presented Special thanks were expressed for the efforts put in by the
the details of the initiatives being taken by the UP Govt. Organizing Committee members with a special mention of
to implement the Digital India Mission of the Central Mr. G.P. Singh, Shri Deepak Sharma, Dr. (Ms.) Nilu Singh,
Government. Mr. H.C. Gupta, Mr. Nfisul Hasan Kidwai and Ms. Shivanshi
In the fourth session Mr. A.K. Gupta, Addl. Director Puri for putting in extra efforts in making this conference
of Regional Centre for Urban and Environment Studies successful.
presented an overview of the Smart Cities in Uttar Pradesh In the end Mr. Sharma congratulated extending special
and Mr. R.N. Rastogi, CM(IT), State Bank of India shared the thanks to Mr. Rakesh Puri, Chairman Lucknow Chapter, for
Digital Banking initiatives undertaken by the Banking Sector. the organization of such a successful event.
After this Session RVP-I requested the Session Chair The RVP-I also informed the house that a Chapter in
Mr. A.K. Gupta to present the mementoes to the volunteers Agra has already become functional and a Chapter in Solan/
Ms. Shivanshi Puri, Ms. Swati Singh and Ms. Kamakshi Puri Shimla is also to be formally inaugurated by March, 2019.
41
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
A Report
www.csi-india.org
42
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
Activity Report
Internet of Things
Aurora’s Technological and Research Institute held Measuring temperature, humidity etc.
3-day workshop on Internet of Things is conducted to create On the last day of the event feedback is take from
awareness on new technologies that are evolving in market, the students about the session, overall impression and
held on 31-07-2018 to 02-08-18 at 9:00 a.m. - 4:00 p.m. with suggestions. Finally, certificates are distributed to all the
220 participants in association with CSI. As IOT is one such participants.
technology that is boosting the market now a days and much
research is going on in this area.
Overview on IOT is given to Students like background/
history of IOT, what is IOT and future of IOT.
1. During 1970’s Theodore G. Paraskevakos conceptualizes
and patented the idea of a device which combined
with both telephony and computing capabilities and
these are now known as smart phones. Today many
devices apart from smart phones and computers have
the capability to connect and communicate through
internet.
2. The interconnection of these uniquely identifiable
computing devices within the existing internet Poster Presentation Competition
infrastructure can be termed as internet of things (IOT). Department of CSE & IT in association with CSI had
3. The IOT is expected to offer unprecedented connectivity conducted Poster Presentation Competition for all the final
of the things. This kind of interconnection would create year students of CSE & IT on 28-7-2018 in Room No. C106
a platform to automate and connect for almost all the from 12:00 pm onwards. The idea behind this competition
fields and industry. According to Gartner and Cisco was to make the students understand that the impact of
there would be around 50 billion devices that will be professional Flex-Poster Presentation in evaluation process.
interconnected by the end of 2020, while the population A count of 6 groups each with a maximum 2 members in
forecast for 2020 is 7.6 billion. That makes it 6.6 devices each had participated and show-cased their creative talent.
for each person on the planet. So, to conclude IOT is a Professors of the department are invited to judge the
long-standing area. presentation skills of participants. The entire program is
Schedule of the workshop was explained which is as well organized and coordinated by Ms. S. Anuradha, Assoc.
follows: Prof., CSE with the support of Ms. B. Malathi, Assoc. Prof.,
Day1 - Session 1 - Introduction to Computer Networks by CSE.
Mr. C. Chaitanya
Session 2 - Wireless Sensors and technologies by
Dr. K. Madhuri
Day2 - session1 - Introduction to IOT, devices and C
programming
session2 - practical (beginning with IOT
programming)
Day3 - Session 1 - practical’s (programming to connecting
sensors)
Session 2 - practical’s (to measure temperature
with sensors)
CSE and IT HOD Ms. A. Durga Pavani madam wished all Poster Presentation
best to the students, and requested to gain the knowledge Aurora’s Technological and Research Institute held
through these sessions. 3-day workshop on Internet of Things is conducted to create
Mr. C. Chaitanya explained about the different layers in awareness on new technologies that are evolving in market,
OSI and TCP/IP, their functions, and also gave overview on held on 31-07-2018 to 02-08-18 at 9:00 a.m. - 4:00 p.m. with
different protocols like ARP , ARP spoofing. He gave many 220 participants in association with CSI.
real time examples while explaining. The objective of conducting this activity was to improve the
Dr. K.Madhuri thought different sensors , their purpose presentation and communication skills of students. In this
in project building. She also gave many explains while competition four topics were given for preparing posters ie,
explaining about MANETS. 1. China’s Artificial Lunar Project, 2. Technologies Behind
Smart Bridge team trained students to work Space Station, 3. Gadget’s Used by Secret Agents and 4.
with sensors. In the session students learnt how to Crypto Currency Technologies. Students could select any
connect different sensing devices and control them with one topic based on their area of interest. In this competition
programming. Some of them are like turning on LED bulb, 12 groups participated with each group consisting of
Contd. on pg. 44 >>
43
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
CHAPTER Report, chennai
Technical Talk
the Valley such a great place? Is it the people, the culture,
weather, access to capital or anything else? What are the
current hot trends in the valley? Is it possible to emulate
the Valley in our State and Country? Answers to all these
questions have been dealt in his talk by taking us on a fun
journey through the landscape of
AI, ML, Big Data
Mixed Reality (AR, VR)
Maker Movement - DIY, 3D printing
IoT
Chennai Chapter organized a Technical talk on Current Tech Drones
Trends : A Valley Perspective by Mr Rajkumar Madhuram, Voice Assistants
CTO at C1X Inc.Santa Clara, California on 30th October 2018. Blockchain & Cryptocurrency
He started his talk by showing the origin of Silicon Valley Digital Transformation (blending physical & digital) Self
which is also called the Mecca of Tech. It is the focal point - Driving Cars.
geographically and ideologically, from which World changing He gives insight on where are we in all these? What does
innovations spring forth and spread all over. What makes it take to grow and nurture innovation?
three members. Students from different branches like participants in association with CSI.
Electronics, Computer Science, Information Technology and The objective of conducting this activity was to
Mechanical engineering participated. The event started as encourage students to participate in technical activities
the students placed the posters in the assigned slots and and train them for placements in technical rounds. Tek-
judges evaluated the posters for 50 marks based on different query was a written quiz competition, which is planned for
parameters like impact at first glance, design, presentation two rounds. In round one, 93 students participated out of
and innovation. which 52 were CSI registered and 41 others from I-IV years.
Ms. G.Alekya, Ms. M. Malleswari, Ms. S.Navya of CSE-IIIA The quiz was planned in such a way that it covers subjects
were the winners and Ms. Ramadevi ,Mr. Harsh Nandwani like Mathematics, Operating systems, Computer Networks,
of CSE-IIIB were the runner up teams. FLAT and Basics of Programming . Students were required
to answer 30 questions in 1 hour. 34 students qualified
for the second round. In round 2, 15 questions were given
with a time limit of one hour. Questions framed were mostly
from programming languages like C and Java. Most of
their answers were either outputs or debugging. Mr. Harsh
Nandwani of CSE-IIIB was the winner and Mr. B. Dileep
Kumar of CSE-IVA was the runner up.
Tek-Query
Aurora’s Technological and Research Institute held
workshop on Tek-Query is conducted to create awareness
on new technologies that are evolving in market, held on 28-
07-2018 & 28-09-2018 at 12:00 p.m. to 01:00 p.m. with 93
www.csi-india.org
44
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
Book Review
Internet Based Marketing: Trends issues and Challenges for
Digital Marketing & Web Based Advertising
Mrs. Sunita Yadav
MA, MBA
Secretary,
Parsottam Memorial Trust,
A.No 640, Lalpur, Chandmari, Varanasi-221003, Uttar Pradesh
E-ID: bsysunita@gmail.co
ISBN: 978-81-7975-780-2
Published by: First Published 2015
Publisher: Anamika Publishers & Distributors(P) Ltd., New Delhi
Dr Bhagwan Singh, author of the book is Head of Department is simple to understand and the mode of explanation is in
(HoD) of Marketing and Supply Chain Management, School of pictorial form which helps to understand advertising via
Business and Management Studies in Central University of internet.
Himachal Pradesh, Dharmshala, Dist. Kangra, H. P. He has The reader centric approach of the book also clears
rich experience of more than 15 years in the field of Internet misconceptions for web based advertising models. It is
Based Marketing as from his profile it is depicted that he has now the truth that today’s youth and public are connected
his Ph D on this area. This book was published in 2015 as to internet for business. Many websites are 24 X 7 engaged
first Edition and came in limelight gradually when demands to help customers for this. Thus book gives an overview for
for digital marketing and web based advertising and online those readers who are interested in doing purchase, sale or
business were searched for overview. advertisements through websites or even want to develop
The book comprises of six chapters, staring from introducing websites.
Internet Based Marketing (IBM), followed by abbreviations This book will be definitely be useful CAGS i.e. Corporate,
used while using IBM. Thereafter, the explanation about Academia, Government and Society for know-how about
digital marketing and further the book defines Web Based Internet Based Marketing as an overview for trend, issues and
Advertising and about its know-how. In this book the language challenges for digital marketing and web based advertising.
45
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
Computer Society of India
TM
Form – II
Version 2.4
Samruddhi Venture Park, Unit No.3, 4th Floor, MIDC, w.e.f. 01st July. 2017
Andheri (E), Mumbai-400 093 Maharashtra, INDIA.
Phone : 022-2926 1700 Fax : 022-2830 2133
Email : sonalicsi28@gmail.com / swapnil@csi-india.org Website : www.csi-india.org
University/Institute:
(*Please email copy of payment response page along with Application Form)
If payment made through Demand Draft DD / Cheque payable at par at Mumbai should be drawn in favour of “Computer
Society of India”.
Cheque DD Cash (Please tick as applicable)
Amount Paid in ` / $
Bank Details
A/c Name: Computer Society of India
Bank Name: Axis Bank Ltd.
A/c type: Saving
A/c No.: 060010100082439
IFSC code: UTIB0000060
Bank Address: Aman Chembers Ground Floor, Opposite New Passport Office, Veer Savarkar Marg Worli, Mumbai 400 025
GSTIN - 27AAATC1710F1ZC
SAC - 9995
47
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
Computer Society of India
TM
Form – II
Version 2.4
Samruddhi Venture Park, Unit No.3, 4th Floor, MIDC, w.e.f. 01st July. 2017
Andheri (E), Mumbai-400 093 Maharashtra, INDIA.
Phone : 022-2926 1700 Fax : 022-2830 2133
Email : sonalicsi28@gmail.com / swapnil@csi-india.org Website : www.csi-india.org
Attach photocopy of Pay-in-slip with application form and write your Name, Contact no. on the reverse side of the Cheque / DD /
Pay-in-Slip.
Membership No.
www.csi-india.org
48
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
CHAPTER Report, patna
Theme presentation by Prof. A K Nayak, Keynote address by Prof. M N Hoda, Souvenir released by Guests and Felecitation of Prof. A K Nayak
49
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
f rom student branches
Region-I Region-II
Shri Ram Murti Smarak College of Engg. & Tech., Bareilly Elitte Institute of Engineering and Management, Kolkata
30-10-2018 - Expert talk on Blockchain Technology 7-12-2018 - Expert talk on RF and Microwave Education –
Current and Future Trends by Dr Siban K Koul
Region-III Region-V
Devang Patel Inst. of Advance Tech. and Research, Anand Sasi Institute of Technology & Engineering, Tadepalligudem
3-12-2018 to 8-12-2018 - STTP on Machine Learning & 27-11-2018 - Workshop on Cognitive Cloud
Deep Learning for Data Science and Analytics using NVIDIA
Graphics card & GPU Cloud
www.csi-india.org
50
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
f rom student branches
Region-V
G. Pullaiah College of Engineering & Technology, Kurnool B.N.M. Institute of Technology, Bangalore
20-11-2018 to 21-11-2018 - Workshop on Sales Force 2-11-2018 & 3-11-2018 – Workshop on Circuit Prototyping
Application Development
K.S. Institute of Technology, Bangalore
13-11-2018 & 14-11-18 - Workshop on VMware Virtualization 17-11-2018 - Workshop on Artificial Intelligence
and Cloud Essentials
New Horizon College of Engineering, Bangalore
1-9-2018 – Guest Lectures by the Distinguished Alumni on 7-12-2018 – FDP on Artificial Intelligence and Machine Learning
various topics i.e. Innovations, Placement Requirements for by Mr Sachin Mudholkar
VMware & Techno-fashion
Amrita School of Engineering, Bangalore
17-9-2018 & 18-9-2018 – Event on Blind Coding 25-10-2018 - Workshop on Introduction to Machine Learning
with Python
51
C S I C o m m u n ic a t i o n s | J ANUA R Y 2 0 1 9
Registered with Registrar of News Papers for India - RNI 31668/1978 If undelivered return to :
Regd. No. MCN/316/2019-2021 Samruddhi Venture Park, Unit No.3,
Posting Date: 10 & 11 every month. Posted at Patrika Channel Mumbai-I 4th floor, MIDC, Andheri (E). Mumbai-400 093
Date of Publication: 10th of every month
f rom student branches
Region-VII
S.A. Engineering College, Chennai Hindusthan College of Engg. and Tech., Coimbatore
10-12-2018 to 12-12-2018 – FDP on Wireless Sensor Network 15-12-2018 - National Level Workshop on Redhat Academy -
and the internet of things - A research perspective Linux
Nandha College of Technology, Erode
15-9-2018 – National Level Technical Symposium on 22-9-2018 - Hands-on Workshop on Grid & Cloud Computing
CRYOSAT’18
Valliammai Engineering College, Kattankulathur
16-11-2018 - Workshop on Programming with Python for 29-11-2018 to 4-12-2018 – FDP Artificial Intelligence, Machine
Tamil Computing Process by Mr. T. Shreenivasan learning, Cloud Computing and their Applications
Viswajyothi College of Engg. and Technology, Ernakulam
3-12-2018 to 10-12-2018 - SES- International Symposium on Kindly send High Resolution Photograph with the report.
Databases