Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977662
Prashant Agrawal, Neelam Rawat
Organization’s proficiency to deliver services and applications at high velocity requires competing effectively in the market. The practices and tools for such management processes demands the quick and reliable model. Changes need to start at the software engineering level when building applications in the cloud, so there is a need to automate our DevOps processes using cloud and non-cloud DevOps automation tools. The aim of this paper is to move DevOps to Cloud and become more agile at software development and operations. In parallel, consideration of how to extend those DevOps process and automation into public and/or private clouds are the prime approach for this research. While investigating the emergence of DevOps, this paper paints it as a dramatic change in IT world for process improvement. Goal is to understand how the DevOps and Cloud work together to help businesses achieve their transformation goals.
{"title":"Devops, A New Approach To Cloud Development & Testing","authors":"Prashant Agrawal, Neelam Rawat","doi":"10.1109/ICICT46931.2019.8977662","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977662","url":null,"abstract":"Organization’s proficiency to deliver services and applications at high velocity requires competing effectively in the market. The practices and tools for such management processes demands the quick and reliable model. Changes need to start at the software engineering level when building applications in the cloud, so there is a need to automate our DevOps processes using cloud and non-cloud DevOps automation tools. The aim of this paper is to move DevOps to Cloud and become more agile at software development and operations. In parallel, consideration of how to extend those DevOps process and automation into public and/or private clouds are the prime approach for this research. While investigating the emergence of DevOps, this paper paints it as a dramatic change in IT world for process improvement. Goal is to understand how the DevOps and Cloud work together to help businesses achieve their transformation goals.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116878611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977654
M. Singh, N. Chauhan, R. Popli
Plan driven methods or traditional methods of software development developers know all the requirements in advance because they are stable in nature. In the challenging world of software development where customer opinion and demands are changing on day to day basis, these traditional methods cause project failures due to poor customer communication and rigid time frame structures. Agile Software Development (ASD) is software development methodology that emphasizes on adaptability. Due to which it satisfies customer - centered development that supports quick and flexible response to change. Distributed Agile software development (DASD), is a methodology in software development paradigm where development teams are distributed in different countries across the globe. In this paper we have proposed a framework for transitioning of traditional software development method to Distributed Agile Software Development. The proposed framework addresses time - zone based problems in Distributed Environment.
{"title":"A Framework For Transitioning Of Traditional Software Development Method To Distributed Agile Software Development","authors":"M. Singh, N. Chauhan, R. Popli","doi":"10.1109/ICICT46931.2019.8977654","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977654","url":null,"abstract":"Plan driven methods or traditional methods of software development developers know all the requirements in advance because they are stable in nature. In the challenging world of software development where customer opinion and demands are changing on day to day basis, these traditional methods cause project failures due to poor customer communication and rigid time frame structures. Agile Software Development (ASD) is software development methodology that emphasizes on adaptability. Due to which it satisfies customer - centered development that supports quick and flexible response to change. Distributed Agile software development (DASD), is a methodology in software development paradigm where development teams are distributed in different countries across the globe. In this paper we have proposed a framework for transitioning of traditional software development method to Distributed Agile Software Development. The proposed framework addresses time - zone based problems in Distributed Environment.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126328415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/icict46931.2019.8977721
{"title":"ICICT 2019 Table of Contents","authors":"","doi":"10.1109/icict46931.2019.8977721","DOIUrl":"https://doi.org/10.1109/icict46931.2019.8977721","url":null,"abstract":"","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121808763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977710
A. Tripathi, Apoorv Jain, Naresh Chandra, Akash Rajak, A. Shrivastava
Blockchain is one of emerging research area and gaining attention due to its wide range of applications. Smart contracts are one of the latest application areas of blockchain, which enables secure, transparent and tamperproof transactions. Smart contracts create and verify the data with the help of hash functions. Hash functions are mathematical algorithms that take input and produces hashed output of specified length. It is very difficult to regenerate the original input from the hashed output. Ethereum is one of the leading blockchain platforms to provide functionality of smart contracts. This paper carries out study of blockchain on Ethereum platform. We have developed authentication-based business application with the help of smart contract for marketing services on Ethereum platform. Solidity is used to generate and manage smart contract.
{"title":"Business Service Management using Blockchain","authors":"A. Tripathi, Apoorv Jain, Naresh Chandra, Akash Rajak, A. Shrivastava","doi":"10.1109/ICICT46931.2019.8977710","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977710","url":null,"abstract":"Blockchain is one of emerging research area and gaining attention due to its wide range of applications. Smart contracts are one of the latest application areas of blockchain, which enables secure, transparent and tamperproof transactions. Smart contracts create and verify the data with the help of hash functions. Hash functions are mathematical algorithms that take input and produces hashed output of specified length. It is very difficult to regenerate the original input from the hashed output. Ethereum is one of the leading blockchain platforms to provide functionality of smart contracts. This paper carries out study of blockchain on Ethereum platform. We have developed authentication-based business application with the help of smart contract for marketing services on Ethereum platform. Solidity is used to generate and manage smart contract.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121869789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977651
M. Bhardwaj, A. Ahlawat
"Enormous Data" could be a term together with the employment of strategies to catch, process, break down and envision conceivably vast datasets during a wise time span not available to straightforward IT innovations. By augmentation, the stage, instruments and programming used for this reason for existing are by and enormous referred to as "Huge knowledge advancements". In this manuscript, we give the importance, attributes, models, advances, life cycle and diverse totally different components of Big data.
{"title":"Research and Analysis of Technologies used in Big Data","authors":"M. Bhardwaj, A. Ahlawat","doi":"10.1109/ICICT46931.2019.8977651","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977651","url":null,"abstract":"\"Enormous Data\" could be a term together with the employment of strategies to catch, process, break down and envision conceivably vast datasets during a wise time span not available to straightforward IT innovations. By augmentation, the stage, instruments and programming used for this reason for existing are by and enormous referred to as \"Huge knowledge advancements\". In this manuscript, we give the importance, attributes, models, advances, life cycle and diverse totally different components of Big data.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132635095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977645
Monica Kaushik, Sindhu Hak Gupta, V. Balyan
Recent technological growth of wireless sensor networks, encourage realization of Wireless Body Area Network (WBAN) for health sector. WBAN is developed formonitoring living bodies for example, human, pet etc. Human and pets often form a bond as pets benefit their owners mentally, physically, and socially. Hence idea to monitor the health of pets by using WBAN is very interesting. In the proposed worka WBAN has been deployed on a body of canine for health monitoring purpose. To make the considered WBAN, energy efficient and reliable a critical comparative analysis of SIMPLE protocol has been done with respect to LEACH protocol by evaluating various performance metrics (End to end delay, throughput propagation delay, BER). It is observable from the simulation results that SIMPLEprotocol has better throughput, end-to end delay and propagation delay in comparison to LEACH protocol for the considered WBAN. Additionally BER for SIMPLE protocol is better than LEACH protocol for the same WBAN. Thus it will be beneficial to implement SIMPLE protocol for WBAN.
{"title":"Implementation and Reliability Analysis of LEACH and SIMPLE protocols in WBAN for Health Monitoring of Canine","authors":"Monica Kaushik, Sindhu Hak Gupta, V. Balyan","doi":"10.1109/ICICT46931.2019.8977645","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977645","url":null,"abstract":"Recent technological growth of wireless sensor networks, encourage realization of Wireless Body Area Network (WBAN) for health sector. WBAN is developed formonitoring living bodies for example, human, pet etc. Human and pets often form a bond as pets benefit their owners mentally, physically, and socially. Hence idea to monitor the health of pets by using WBAN is very interesting. In the proposed worka WBAN has been deployed on a body of canine for health monitoring purpose. To make the considered WBAN, energy efficient and reliable a critical comparative analysis of SIMPLE protocol has been done with respect to LEACH protocol by evaluating various performance metrics (End to end delay, throughput propagation delay, BER). It is observable from the simulation results that SIMPLEprotocol has better throughput, end-to end delay and propagation delay in comparison to LEACH protocol for the considered WBAN. Additionally BER for SIMPLE protocol is better than LEACH protocol for the same WBAN. Thus it will be beneficial to implement SIMPLE protocol for WBAN.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132239364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977641
Poonam Rana, Vineet Sharma, P. Gupta
Due to the advancements in modern technologies, big data plays a significant role in every field. Now to extract information and meaningful data from the various sources of data is a tedious task. In this paper we present various techniques of deep learning used in Big data processing and present various applications of Deep Learning in Big Data Analytics. Data comes from various sources like facebook, youtube videos,twitter data, Linkedin, Millions of devices connected over the Internet,(IOT).
{"title":"Exploration of Deep Learning Techniques in Big Data Analytics","authors":"Poonam Rana, Vineet Sharma, P. Gupta","doi":"10.1109/ICICT46931.2019.8977641","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977641","url":null,"abstract":"Due to the advancements in modern technologies, big data plays a significant role in every field. Now to extract information and meaningful data from the various sources of data is a tedious task. In this paper we present various techniques of deep learning used in Big data processing and present various applications of Deep Learning in Big Data Analytics. Data comes from various sources like facebook, youtube videos,twitter data, Linkedin, Millions of devices connected over the Internet,(IOT).","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114882103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977670
Mahendra Gupta, H. Parthasarathy, Sarita Gupta
The total Hamiltonian of an electron in an atom is expressed in terms of its kinetic energy, its potential energy of interaction into the nucleus and the interaction of its total orbital angular momentum into a control magnetic field. By paring over to the interaction picture we get a second order Dyson series approximation for the evolution operator and then control the magnetic field so that the generator of the evolution operator well approximate a given generator when there is noise in the control magnetic field ,we evaluate the mean square error energy in this approximation
{"title":"Quantum gate design based on the interaction between Orbital momentum of an electron into a magnetic field","authors":"Mahendra Gupta, H. Parthasarathy, Sarita Gupta","doi":"10.1109/ICICT46931.2019.8977670","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977670","url":null,"abstract":"The total Hamiltonian of an electron in an atom is expressed in terms of its kinetic energy, its potential energy of interaction into the nucleus and the interaction of its total orbital angular momentum into a control magnetic field. By paring over to the interaction picture we get a second order Dyson series approximation for the evolution operator and then control the magnetic field so that the generator of the evolution operator well approximate a given generator when there is noise in the control magnetic field ,we evaluate the mean square error energy in this approximation","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123359125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977669
Zeenat Hasan, C. Agrawal, Meena Agrawal
Online transaction has become daily routine in our life. All of us are using online transaction very frequently today, so to deal with related security issues like Authorization, data protection, confidentiality is very important. Every person who is doing online transaction, every organization and every government must have the ability to control over the operations of online transactions for securing the information. It is necessary to apply better security mechanism in online transaction for maintaining data integrity, privacy of data and confidentiality. Cryptography uses encryption and decryption process for protecting the data. There are many cryptographic algorithms which uses single key which is private or two keys called public key and private key. One can select the algorithm for transferring the data on the basis of higher security and efficiency criteria of the algorithm. This paper presents role of cryptography for different issues of security and also proposes a new cryptography based algorithm for better security of online transactions. The new algorithm is based on probabilistic cipher and since it uses single key so it is a symmetric encryption algorithm.
{"title":"\"Online Transaction Security Enhancement\": An Algorithm Based on Cryptography","authors":"Zeenat Hasan, C. Agrawal, Meena Agrawal","doi":"10.1109/ICICT46931.2019.8977669","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977669","url":null,"abstract":"Online transaction has become daily routine in our life. All of us are using online transaction very frequently today, so to deal with related security issues like Authorization, data protection, confidentiality is very important. Every person who is doing online transaction, every organization and every government must have the ability to control over the operations of online transactions for securing the information. It is necessary to apply better security mechanism in online transaction for maintaining data integrity, privacy of data and confidentiality. Cryptography uses encryption and decryption process for protecting the data. There are many cryptographic algorithms which uses single key which is private or two keys called public key and private key. One can select the algorithm for transferring the data on the basis of higher security and efficiency criteria of the algorithm. This paper presents role of cryptography for different issues of security and also proposes a new cryptography based algorithm for better security of online transactions. The new algorithm is based on probabilistic cipher and since it uses single key so it is a symmetric encryption algorithm.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121685214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977646
Anku Sharma, Yogesh
The IoT has come too far to be a protruding technology in the ongoing era. It is regarding facilitating the connection among objects ("things") and the backend system via the Internet. Today, IoT attracts many considerations and provides a stunning picture of what the future holds for us. Recently, IoT has glided the entire society and attracted major research ideas. It is a central part of the current generation of information technology. Along with its rapid expansion in the population thickness in developed cities, the demand for more resources is emerging gradually. To look after the issues of city improvement, the practice of web of things (IoT) devices and the savvy frameworks are the sharp and lucrative source. All these smart devices make our living way easier, comfortable and advanced, but on the conflicting, we are bare to a number of threats, various types of cyber-attacks, security and privacy issues regarding data integrity, confidentiality, and authenticity. This paper emphasizes on the architecture of the IoT, the security threats and how to deal with these threats so as to secure our IoT device.
{"title":"A Review on Data Flow Risk based on IoT","authors":"Anku Sharma, Yogesh","doi":"10.1109/ICICT46931.2019.8977646","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977646","url":null,"abstract":"The IoT has come too far to be a protruding technology in the ongoing era. It is regarding facilitating the connection among objects (\"things\") and the backend system via the Internet. Today, IoT attracts many considerations and provides a stunning picture of what the future holds for us. Recently, IoT has glided the entire society and attracted major research ideas. It is a central part of the current generation of information technology. Along with its rapid expansion in the population thickness in developed cities, the demand for more resources is emerging gradually. To look after the issues of city improvement, the practice of web of things (IoT) devices and the savvy frameworks are the sharp and lucrative source. All these smart devices make our living way easier, comfortable and advanced, but on the conflicting, we are bare to a number of threats, various types of cyber-attacks, security and privacy issues regarding data integrity, confidentiality, and authenticity. This paper emphasizes on the architecture of the IoT, the security threats and how to deal with these threats so as to secure our IoT device.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121845321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}