首页 > 最新文献

2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)最新文献

英文 中文
Devops, A New Approach To Cloud Development & Testing Devops,云开发和测试的新方法
Prashant Agrawal, Neelam Rawat
Organization’s proficiency to deliver services and applications at high velocity requires competing effectively in the market. The practices and tools for such management processes demands the quick and reliable model. Changes need to start at the software engineering level when building applications in the cloud, so there is a need to automate our DevOps processes using cloud and non-cloud DevOps automation tools. The aim of this paper is to move DevOps to Cloud and become more agile at software development and operations. In parallel, consideration of how to extend those DevOps process and automation into public and/or private clouds are the prime approach for this research. While investigating the emergence of DevOps, this paper paints it as a dramatic change in IT world for process improvement. Goal is to understand how the DevOps and Cloud work together to help businesses achieve their transformation goals.
组织要熟练地以高速度交付服务和应用程序,就需要在市场上进行有效的竞争。这种管理过程的实践和工具需要快速可靠的模型。当在云中构建应用程序时,更改需要从软件工程级别开始,因此需要使用云和非云DevOps自动化工具来自动化我们的DevOps流程。本文的目的是将DevOps迁移到云,并在软件开发和运维方面变得更加敏捷。与此同时,考虑如何将这些DevOps流程和自动化扩展到公共云和/或私有云是本研究的主要方法。在调查DevOps的出现时,本文将其描绘为it世界中流程改进的一个戏剧性变化。目标是了解DevOps和云如何协同工作以帮助企业实现转型目标。
{"title":"Devops, A New Approach To Cloud Development & Testing","authors":"Prashant Agrawal, Neelam Rawat","doi":"10.1109/ICICT46931.2019.8977662","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977662","url":null,"abstract":"Organization’s proficiency to deliver services and applications at high velocity requires competing effectively in the market. The practices and tools for such management processes demands the quick and reliable model. Changes need to start at the software engineering level when building applications in the cloud, so there is a need to automate our DevOps processes using cloud and non-cloud DevOps automation tools. The aim of this paper is to move DevOps to Cloud and become more agile at software development and operations. In parallel, consideration of how to extend those DevOps process and automation into public and/or private clouds are the prime approach for this research. While investigating the emergence of DevOps, this paper paints it as a dramatic change in IT world for process improvement. Goal is to understand how the DevOps and Cloud work together to help businesses achieve their transformation goals.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116878611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A Framework For Transitioning Of Traditional Software Development Method To Distributed Agile Software Development 传统软件开发方法向分布式敏捷软件开发过渡的框架
M. Singh, N. Chauhan, R. Popli
Plan driven methods or traditional methods of software development developers know all the requirements in advance because they are stable in nature. In the challenging world of software development where customer opinion and demands are changing on day to day basis, these traditional methods cause project failures due to poor customer communication and rigid time frame structures. Agile Software Development (ASD) is software development methodology that emphasizes on adaptability. Due to which it satisfies customer - centered development that supports quick and flexible response to change. Distributed Agile software development (DASD), is a methodology in software development paradigm where development teams are distributed in different countries across the globe. In this paper we have proposed a framework for transitioning of traditional software development method to Distributed Agile Software Development. The proposed framework addresses time - zone based problems in Distributed Environment.
计划驱动的方法或软件开发的传统方法,开发人员提前知道所有的需求,因为它们本质上是稳定的。在软件开发的充满挑战的世界中,客户的意见和需求每天都在变化,这些传统的方法由于糟糕的客户沟通和严格的时间框架结构而导致项目失败。敏捷软件开发(ASD)是一种强调适应性的软件开发方法。因此,它满足了以客户为中心的开发,支持快速灵活地响应变化。分布式敏捷软件开发(DASD)是软件开发范式中的一种方法,其中开发团队分布在全球不同的国家。本文提出了一个由传统软件开发方法向分布式敏捷软件开发方法过渡的框架。该框架解决了分布式环境中基于时区的问题。
{"title":"A Framework For Transitioning Of Traditional Software Development Method To Distributed Agile Software Development","authors":"M. Singh, N. Chauhan, R. Popli","doi":"10.1109/ICICT46931.2019.8977654","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977654","url":null,"abstract":"Plan driven methods or traditional methods of software development developers know all the requirements in advance because they are stable in nature. In the challenging world of software development where customer opinion and demands are changing on day to day basis, these traditional methods cause project failures due to poor customer communication and rigid time frame structures. Agile Software Development (ASD) is software development methodology that emphasizes on adaptability. Due to which it satisfies customer - centered development that supports quick and flexible response to change. Distributed Agile software development (DASD), is a methodology in software development paradigm where development teams are distributed in different countries across the globe. In this paper we have proposed a framework for transitioning of traditional software development method to Distributed Agile Software Development. The proposed framework addresses time - zone based problems in Distributed Environment.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126328415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
ICICT 2019 Table of Contents ICICT 2019目录
{"title":"ICICT 2019 Table of Contents","authors":"","doi":"10.1109/icict46931.2019.8977721","DOIUrl":"https://doi.org/10.1109/icict46931.2019.8977721","url":null,"abstract":"","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121808763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business Service Management using Blockchain 使用区块链的业务服务管理
A. Tripathi, Apoorv Jain, Naresh Chandra, Akash Rajak, A. Shrivastava
Blockchain is one of emerging research area and gaining attention due to its wide range of applications. Smart contracts are one of the latest application areas of blockchain, which enables secure, transparent and tamperproof transactions. Smart contracts create and verify the data with the help of hash functions. Hash functions are mathematical algorithms that take input and produces hashed output of specified length. It is very difficult to regenerate the original input from the hashed output. Ethereum is one of the leading blockchain platforms to provide functionality of smart contracts. This paper carries out study of blockchain on Ethereum platform. We have developed authentication-based business application with the help of smart contract for marketing services on Ethereum platform. Solidity is used to generate and manage smart contract.
区块链是一个新兴的研究领域,由于其广泛的应用而备受关注。智能合约是区块链的最新应用领域之一,它可以实现安全、透明和防篡改的交易。智能合约在哈希函数的帮助下创建和验证数据。哈希函数是一种数学算法,它接受输入并产生指定长度的哈希输出。从散列输出中重新生成原始输入是非常困难的。以太坊是提供智能合约功能的领先区块链平台之一。本文在以太坊平台上对区块链进行了研究。我们借助智能合约开发了基于身份验证的业务应用,用于以太坊平台上的营销服务。稳定性用于生成和管理智能合约。
{"title":"Business Service Management using Blockchain","authors":"A. Tripathi, Apoorv Jain, Naresh Chandra, Akash Rajak, A. Shrivastava","doi":"10.1109/ICICT46931.2019.8977710","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977710","url":null,"abstract":"Blockchain is one of emerging research area and gaining attention due to its wide range of applications. Smart contracts are one of the latest application areas of blockchain, which enables secure, transparent and tamperproof transactions. Smart contracts create and verify the data with the help of hash functions. Hash functions are mathematical algorithms that take input and produces hashed output of specified length. It is very difficult to regenerate the original input from the hashed output. Ethereum is one of the leading blockchain platforms to provide functionality of smart contracts. This paper carries out study of blockchain on Ethereum platform. We have developed authentication-based business application with the help of smart contract for marketing services on Ethereum platform. Solidity is used to generate and manage smart contract.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121869789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and Analysis of Technologies used in Big Data “大数据技术研究与分析
M. Bhardwaj, A. Ahlawat
"Enormous Data" could be a term together with the employment of strategies to catch, process, break down and envision conceivably vast datasets during a wise time span not available to straightforward IT innovations. By augmentation, the stage, instruments and programming used for this reason for existing are by and enormous referred to as "Huge knowledge advancements". In this manuscript, we give the importance, attributes, models, advances, life cycle and diverse totally different components of Big data.
“海量数据”可以是一个术语,与在明智的时间跨度内捕获、处理、分解和设想大量数据集的策略结合在一起,而直接的IT创新是无法实现的。通过增强,用于此目的的舞台,工具和程序被大量地称为“巨大的知识进步”。在这篇文章中,我们给出了大数据的重要性、属性、模型、进展、生命周期和各种不同的组成部分。
{"title":"Research and Analysis of Technologies used in Big Data","authors":"M. Bhardwaj, A. Ahlawat","doi":"10.1109/ICICT46931.2019.8977651","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977651","url":null,"abstract":"\"Enormous Data\" could be a term together with the employment of strategies to catch, process, break down and envision conceivably vast datasets during a wise time span not available to straightforward IT innovations. By augmentation, the stage, instruments and programming used for this reason for existing are by and enormous referred to as \"Huge knowledge advancements\". In this manuscript, we give the importance, attributes, models, advances, life cycle and diverse totally different components of Big data.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132635095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation and Reliability Analysis of LEACH and SIMPLE protocols in WBAN for Health Monitoring of Canine 犬健康监测WBAN中LEACH和SIMPLE协议的实现及可靠性分析
Monica Kaushik, Sindhu Hak Gupta, V. Balyan
Recent technological growth of wireless sensor networks, encourage realization of Wireless Body Area Network (WBAN) for health sector. WBAN is developed formonitoring living bodies for example, human, pet etc. Human and pets often form a bond as pets benefit their owners mentally, physically, and socially. Hence idea to monitor the health of pets by using WBAN is very interesting. In the proposed worka WBAN has been deployed on a body of canine for health monitoring purpose. To make the considered WBAN, energy efficient and reliable a critical comparative analysis of SIMPLE protocol has been done with respect to LEACH protocol by evaluating various performance metrics (End to end delay, throughput propagation delay, BER). It is observable from the simulation results that SIMPLEprotocol has better throughput, end-to end delay and propagation delay in comparison to LEACH protocol for the considered WBAN. Additionally BER for SIMPLE protocol is better than LEACH protocol for the same WBAN. Thus it will be beneficial to implement SIMPLE protocol for WBAN.
近年来无线传感器网络技术的发展,促进了卫生领域无线体域网络(WBAN)的实现。无线局域网是为监测人类、宠物等活体而开发的。人类和宠物经常形成一种纽带,因为宠物对主人的精神、身体和社交都有好处。因此,利用无线局域网监测宠物健康的想法是非常有趣的。在拟议的工作中,已部署了一组犬,用于健康监测。为了使所考虑的WBAN,节能和可靠,通过评估各种性能指标(端到端延迟,吞吐量传播延迟,误码率),对SIMPLE协议进行了关于LEACH协议的关键比较分析。从仿真结果可以看出,对于所考虑的WBAN,与LEACH协议相比,SIMPLEprotocol具有更好的吞吐量、端到端延迟和传播延迟。此外,对于相同的无线局域网,SIMPLE协议的误码率优于LEACH协议。因此,在无线宽带网络中实现SIMPLE协议是非常有利的。
{"title":"Implementation and Reliability Analysis of LEACH and SIMPLE protocols in WBAN for Health Monitoring of Canine","authors":"Monica Kaushik, Sindhu Hak Gupta, V. Balyan","doi":"10.1109/ICICT46931.2019.8977645","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977645","url":null,"abstract":"Recent technological growth of wireless sensor networks, encourage realization of Wireless Body Area Network (WBAN) for health sector. WBAN is developed formonitoring living bodies for example, human, pet etc. Human and pets often form a bond as pets benefit their owners mentally, physically, and socially. Hence idea to monitor the health of pets by using WBAN is very interesting. In the proposed worka WBAN has been deployed on a body of canine for health monitoring purpose. To make the considered WBAN, energy efficient and reliable a critical comparative analysis of SIMPLE protocol has been done with respect to LEACH protocol by evaluating various performance metrics (End to end delay, throughput propagation delay, BER). It is observable from the simulation results that SIMPLEprotocol has better throughput, end-to end delay and propagation delay in comparison to LEACH protocol for the considered WBAN. Additionally BER for SIMPLE protocol is better than LEACH protocol for the same WBAN. Thus it will be beneficial to implement SIMPLE protocol for WBAN.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132239364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploration of Deep Learning Techniques in Big Data Analytics 大数据分析中的深度学习技术探索
Poonam Rana, Vineet Sharma, P. Gupta
Due to the advancements in modern technologies, big data plays a significant role in every field. Now to extract information and meaningful data from the various sources of data is a tedious task. In this paper we present various techniques of deep learning used in Big data processing and present various applications of Deep Learning in Big Data Analytics. Data comes from various sources like facebook, youtube videos,twitter data, Linkedin, Millions of devices connected over the Internet,(IOT).
由于现代技术的进步,大数据在各个领域都发挥着重要作用。现在,从各种数据源中提取信息和有意义的数据是一项繁琐的任务。在本文中,我们介绍了在大数据处理中使用的各种深度学习技术,以及深度学习在大数据分析中的各种应用。数据来自各种来源,如facebook, youtube视频,twitter数据,Linkedin,数百万通过互联网连接的设备(IOT)。
{"title":"Exploration of Deep Learning Techniques in Big Data Analytics","authors":"Poonam Rana, Vineet Sharma, P. Gupta","doi":"10.1109/ICICT46931.2019.8977641","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977641","url":null,"abstract":"Due to the advancements in modern technologies, big data plays a significant role in every field. Now to extract information and meaningful data from the various sources of data is a tedious task. In this paper we present various techniques of deep learning used in Big data processing and present various applications of Deep Learning in Big Data Analytics. Data comes from various sources like facebook, youtube videos,twitter data, Linkedin, Millions of devices connected over the Internet,(IOT).","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114882103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Quantum gate design based on the interaction between Orbital momentum of an electron into a magnetic field 量子门的设计基于轨道动量之间的相互作用使电子进入磁场
Mahendra Gupta, H. Parthasarathy, Sarita Gupta
The total Hamiltonian of an electron in an atom is expressed in terms of its kinetic energy, its potential energy of interaction into the nucleus and the interaction of its total orbital angular momentum into a control magnetic field. By paring over to the interaction picture we get a second order Dyson series approximation for the evolution operator and then control the magnetic field so that the generator of the evolution operator well approximate a given generator when there is noise in the control magnetic field ,we evaluate the mean square error energy in this approximation
原子中电子的总哈密顿量是用它的动能,它与原子核相互作用的势能和它与控制磁场的总轨道角动量的相互作用来表示的。通过对比相互作用图我们得到演化算子的二阶Dyson级数近似值然后控制磁场使演化算子的生成器很好地逼近给定的生成器当控制磁场中有噪声时,我们在这个近似值中计算均方误差能量
{"title":"Quantum gate design based on the interaction between Orbital momentum of an electron into a magnetic field","authors":"Mahendra Gupta, H. Parthasarathy, Sarita Gupta","doi":"10.1109/ICICT46931.2019.8977670","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977670","url":null,"abstract":"The total Hamiltonian of an electron in an atom is expressed in terms of its kinetic energy, its potential energy of interaction into the nucleus and the interaction of its total orbital angular momentum into a control magnetic field. By paring over to the interaction picture we get a second order Dyson series approximation for the evolution operator and then control the magnetic field so that the generator of the evolution operator well approximate a given generator when there is noise in the control magnetic field ,we evaluate the mean square error energy in this approximation","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123359125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
"Online Transaction Security Enhancement": An Algorithm Based on Cryptography “在线交易安全增强”:一种基于密码学的算法
Zeenat Hasan, C. Agrawal, Meena Agrawal
Online transaction has become daily routine in our life. All of us are using online transaction very frequently today, so to deal with related security issues like Authorization, data protection, confidentiality is very important. Every person who is doing online transaction, every organization and every government must have the ability to control over the operations of online transactions for securing the information. It is necessary to apply better security mechanism in online transaction for maintaining data integrity, privacy of data and confidentiality. Cryptography uses encryption and decryption process for protecting the data. There are many cryptographic algorithms which uses single key which is private or two keys called public key and private key. One can select the algorithm for transferring the data on the basis of higher security and efficiency criteria of the algorithm. This paper presents role of cryptography for different issues of security and also proposes a new cryptography based algorithm for better security of online transactions. The new algorithm is based on probabilistic cipher and since it uses single key so it is a symmetric encryption algorithm.
网上交易已经成为我们日常生活的一部分。今天,我们所有人都非常频繁地使用在线交易,因此处理相关的安全问题,如授权,数据保护,保密是非常重要的。每一个进行网上交易的人、每一个组织和每一个政府都必须有能力控制网上交易的运作,以确保信息的安全。为了维护数据的完整性、隐私性和保密性,有必要在网上交易中应用更好的安全机制。密码学使用加密和解密过程来保护数据。有许多加密算法使用单个密钥(即私钥)或称为公钥和私钥的两个密钥。可以根据算法较高的安全性和效率标准来选择传输数据的算法。本文介绍了密码学在不同安全问题中的作用,并提出了一种新的基于密码学的算法,以提高在线交易的安全性。该算法基于概率密码,由于使用的是单密钥,因此是一种对称加密算法。
{"title":"\"Online Transaction Security Enhancement\": An Algorithm Based on Cryptography","authors":"Zeenat Hasan, C. Agrawal, Meena Agrawal","doi":"10.1109/ICICT46931.2019.8977669","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977669","url":null,"abstract":"Online transaction has become daily routine in our life. All of us are using online transaction very frequently today, so to deal with related security issues like Authorization, data protection, confidentiality is very important. Every person who is doing online transaction, every organization and every government must have the ability to control over the operations of online transactions for securing the information. It is necessary to apply better security mechanism in online transaction for maintaining data integrity, privacy of data and confidentiality. Cryptography uses encryption and decryption process for protecting the data. There are many cryptographic algorithms which uses single key which is private or two keys called public key and private key. One can select the algorithm for transferring the data on the basis of higher security and efficiency criteria of the algorithm. This paper presents role of cryptography for different issues of security and also proposes a new cryptography based algorithm for better security of online transactions. The new algorithm is based on probabilistic cipher and since it uses single key so it is a symmetric encryption algorithm.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121685214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Review on Data Flow Risk based on IoT 基于物联网的数据流风险研究综述
Anku Sharma, Yogesh
The IoT has come too far to be a protruding technology in the ongoing era. It is regarding facilitating the connection among objects ("things") and the backend system via the Internet. Today, IoT attracts many considerations and provides a stunning picture of what the future holds for us. Recently, IoT has glided the entire society and attracted major research ideas. It is a central part of the current generation of information technology. Along with its rapid expansion in the population thickness in developed cities, the demand for more resources is emerging gradually. To look after the issues of city improvement, the practice of web of things (IoT) devices and the savvy frameworks are the sharp and lucrative source. All these smart devices make our living way easier, comfortable and advanced, but on the conflicting, we are bare to a number of threats, various types of cyber-attacks, security and privacy issues regarding data integrity, confidentiality, and authenticity. This paper emphasizes on the architecture of the IoT, the security threats and how to deal with these threats so as to secure our IoT device.
物联网已经走得太远了,不能成为正在进行的时代的突出技术。它是关于通过Internet促进对象(“事物”)和后端系统之间的连接。今天,物联网吸引了许多考虑,并为我们提供了一幅令人惊叹的未来图景。近年来,物联网在全社会掀起了一股热潮,并吸引了很多研究思路。它是当前一代信息技术的核心部分。随着发达城市人口密度的迅速扩大,对资源的需求逐渐显现。为了解决城市改善问题,物联网(IoT)设备的实践和精明的框架是尖锐而有利可图的来源。这些智能设备让我们的生活变得更加便捷、舒适和先进,但与此同时,我们也面临着各种威胁,各种网络攻击,以及数据完整性、保密性和真实性方面的安全和隐私问题。本文重点介绍了物联网的架构、安全威胁以及如何应对这些威胁,以确保我们的物联网设备的安全。
{"title":"A Review on Data Flow Risk based on IoT","authors":"Anku Sharma, Yogesh","doi":"10.1109/ICICT46931.2019.8977646","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977646","url":null,"abstract":"The IoT has come too far to be a protruding technology in the ongoing era. It is regarding facilitating the connection among objects (\"things\") and the backend system via the Internet. Today, IoT attracts many considerations and provides a stunning picture of what the future holds for us. Recently, IoT has glided the entire society and attracted major research ideas. It is a central part of the current generation of information technology. Along with its rapid expansion in the population thickness in developed cities, the demand for more resources is emerging gradually. To look after the issues of city improvement, the practice of web of things (IoT) devices and the savvy frameworks are the sharp and lucrative source. All these smart devices make our living way easier, comfortable and advanced, but on the conflicting, we are bare to a number of threats, various types of cyber-attacks, security and privacy issues regarding data integrity, confidentiality, and authenticity. This paper emphasizes on the architecture of the IoT, the security threats and how to deal with these threats so as to secure our IoT device.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121845321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1