首页 > 最新文献

2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)最新文献

英文 中文
Devops, A New Approach To Cloud Development & Testing Devops,云开发和测试的新方法
Prashant Agrawal, Neelam Rawat
Organization’s proficiency to deliver services and applications at high velocity requires competing effectively in the market. The practices and tools for such management processes demands the quick and reliable model. Changes need to start at the software engineering level when building applications in the cloud, so there is a need to automate our DevOps processes using cloud and non-cloud DevOps automation tools. The aim of this paper is to move DevOps to Cloud and become more agile at software development and operations. In parallel, consideration of how to extend those DevOps process and automation into public and/or private clouds are the prime approach for this research. While investigating the emergence of DevOps, this paper paints it as a dramatic change in IT world for process improvement. Goal is to understand how the DevOps and Cloud work together to help businesses achieve their transformation goals.
组织要熟练地以高速度交付服务和应用程序,就需要在市场上进行有效的竞争。这种管理过程的实践和工具需要快速可靠的模型。当在云中构建应用程序时,更改需要从软件工程级别开始,因此需要使用云和非云DevOps自动化工具来自动化我们的DevOps流程。本文的目的是将DevOps迁移到云,并在软件开发和运维方面变得更加敏捷。与此同时,考虑如何将这些DevOps流程和自动化扩展到公共云和/或私有云是本研究的主要方法。在调查DevOps的出现时,本文将其描绘为it世界中流程改进的一个戏剧性变化。目标是了解DevOps和云如何协同工作以帮助企业实现转型目标。
{"title":"Devops, A New Approach To Cloud Development & Testing","authors":"Prashant Agrawal, Neelam Rawat","doi":"10.1109/ICICT46931.2019.8977662","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977662","url":null,"abstract":"Organization’s proficiency to deliver services and applications at high velocity requires competing effectively in the market. The practices and tools for such management processes demands the quick and reliable model. Changes need to start at the software engineering level when building applications in the cloud, so there is a need to automate our DevOps processes using cloud and non-cloud DevOps automation tools. The aim of this paper is to move DevOps to Cloud and become more agile at software development and operations. In parallel, consideration of how to extend those DevOps process and automation into public and/or private clouds are the prime approach for this research. While investigating the emergence of DevOps, this paper paints it as a dramatic change in IT world for process improvement. Goal is to understand how the DevOps and Cloud work together to help businesses achieve their transformation goals.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116878611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A Framework For Transitioning Of Traditional Software Development Method To Distributed Agile Software Development 传统软件开发方法向分布式敏捷软件开发过渡的框架
M. Singh, N. Chauhan, R. Popli
Plan driven methods or traditional methods of software development developers know all the requirements in advance because they are stable in nature. In the challenging world of software development where customer opinion and demands are changing on day to day basis, these traditional methods cause project failures due to poor customer communication and rigid time frame structures. Agile Software Development (ASD) is software development methodology that emphasizes on adaptability. Due to which it satisfies customer - centered development that supports quick and flexible response to change. Distributed Agile software development (DASD), is a methodology in software development paradigm where development teams are distributed in different countries across the globe. In this paper we have proposed a framework for transitioning of traditional software development method to Distributed Agile Software Development. The proposed framework addresses time - zone based problems in Distributed Environment.
计划驱动的方法或软件开发的传统方法,开发人员提前知道所有的需求,因为它们本质上是稳定的。在软件开发的充满挑战的世界中,客户的意见和需求每天都在变化,这些传统的方法由于糟糕的客户沟通和严格的时间框架结构而导致项目失败。敏捷软件开发(ASD)是一种强调适应性的软件开发方法。因此,它满足了以客户为中心的开发,支持快速灵活地响应变化。分布式敏捷软件开发(DASD)是软件开发范式中的一种方法,其中开发团队分布在全球不同的国家。本文提出了一个由传统软件开发方法向分布式敏捷软件开发方法过渡的框架。该框架解决了分布式环境中基于时区的问题。
{"title":"A Framework For Transitioning Of Traditional Software Development Method To Distributed Agile Software Development","authors":"M. Singh, N. Chauhan, R. Popli","doi":"10.1109/ICICT46931.2019.8977654","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977654","url":null,"abstract":"Plan driven methods or traditional methods of software development developers know all the requirements in advance because they are stable in nature. In the challenging world of software development where customer opinion and demands are changing on day to day basis, these traditional methods cause project failures due to poor customer communication and rigid time frame structures. Agile Software Development (ASD) is software development methodology that emphasizes on adaptability. Due to which it satisfies customer - centered development that supports quick and flexible response to change. Distributed Agile software development (DASD), is a methodology in software development paradigm where development teams are distributed in different countries across the globe. In this paper we have proposed a framework for transitioning of traditional software development method to Distributed Agile Software Development. The proposed framework addresses time - zone based problems in Distributed Environment.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126328415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
ICICT 2019 Table of Contents ICICT 2019目录
{"title":"ICICT 2019 Table of Contents","authors":"","doi":"10.1109/icict46931.2019.8977721","DOIUrl":"https://doi.org/10.1109/icict46931.2019.8977721","url":null,"abstract":"","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121808763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business Service Management using Blockchain 使用区块链的业务服务管理
A. Tripathi, Apoorv Jain, Naresh Chandra, Akash Rajak, A. Shrivastava
Blockchain is one of emerging research area and gaining attention due to its wide range of applications. Smart contracts are one of the latest application areas of blockchain, which enables secure, transparent and tamperproof transactions. Smart contracts create and verify the data with the help of hash functions. Hash functions are mathematical algorithms that take input and produces hashed output of specified length. It is very difficult to regenerate the original input from the hashed output. Ethereum is one of the leading blockchain platforms to provide functionality of smart contracts. This paper carries out study of blockchain on Ethereum platform. We have developed authentication-based business application with the help of smart contract for marketing services on Ethereum platform. Solidity is used to generate and manage smart contract.
区块链是一个新兴的研究领域,由于其广泛的应用而备受关注。智能合约是区块链的最新应用领域之一,它可以实现安全、透明和防篡改的交易。智能合约在哈希函数的帮助下创建和验证数据。哈希函数是一种数学算法,它接受输入并产生指定长度的哈希输出。从散列输出中重新生成原始输入是非常困难的。以太坊是提供智能合约功能的领先区块链平台之一。本文在以太坊平台上对区块链进行了研究。我们借助智能合约开发了基于身份验证的业务应用,用于以太坊平台上的营销服务。稳定性用于生成和管理智能合约。
{"title":"Business Service Management using Blockchain","authors":"A. Tripathi, Apoorv Jain, Naresh Chandra, Akash Rajak, A. Shrivastava","doi":"10.1109/ICICT46931.2019.8977710","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977710","url":null,"abstract":"Blockchain is one of emerging research area and gaining attention due to its wide range of applications. Smart contracts are one of the latest application areas of blockchain, which enables secure, transparent and tamperproof transactions. Smart contracts create and verify the data with the help of hash functions. Hash functions are mathematical algorithms that take input and produces hashed output of specified length. It is very difficult to regenerate the original input from the hashed output. Ethereum is one of the leading blockchain platforms to provide functionality of smart contracts. This paper carries out study of blockchain on Ethereum platform. We have developed authentication-based business application with the help of smart contract for marketing services on Ethereum platform. Solidity is used to generate and manage smart contract.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121869789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and Analysis of Technologies used in Big Data “大数据技术研究与分析
M. Bhardwaj, A. Ahlawat
"Enormous Data" could be a term together with the employment of strategies to catch, process, break down and envision conceivably vast datasets during a wise time span not available to straightforward IT innovations. By augmentation, the stage, instruments and programming used for this reason for existing are by and enormous referred to as "Huge knowledge advancements". In this manuscript, we give the importance, attributes, models, advances, life cycle and diverse totally different components of Big data.
“海量数据”可以是一个术语,与在明智的时间跨度内捕获、处理、分解和设想大量数据集的策略结合在一起,而直接的IT创新是无法实现的。通过增强,用于此目的的舞台,工具和程序被大量地称为“巨大的知识进步”。在这篇文章中,我们给出了大数据的重要性、属性、模型、进展、生命周期和各种不同的组成部分。
{"title":"Research and Analysis of Technologies used in Big Data","authors":"M. Bhardwaj, A. Ahlawat","doi":"10.1109/ICICT46931.2019.8977651","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977651","url":null,"abstract":"\"Enormous Data\" could be a term together with the employment of strategies to catch, process, break down and envision conceivably vast datasets during a wise time span not available to straightforward IT innovations. By augmentation, the stage, instruments and programming used for this reason for existing are by and enormous referred to as \"Huge knowledge advancements\". In this manuscript, we give the importance, attributes, models, advances, life cycle and diverse totally different components of Big data.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132635095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation and Reliability Analysis of LEACH and SIMPLE protocols in WBAN for Health Monitoring of Canine 犬健康监测WBAN中LEACH和SIMPLE协议的实现及可靠性分析
Monica Kaushik, Sindhu Hak Gupta, V. Balyan
Recent technological growth of wireless sensor networks, encourage realization of Wireless Body Area Network (WBAN) for health sector. WBAN is developed formonitoring living bodies for example, human, pet etc. Human and pets often form a bond as pets benefit their owners mentally, physically, and socially. Hence idea to monitor the health of pets by using WBAN is very interesting. In the proposed worka WBAN has been deployed on a body of canine for health monitoring purpose. To make the considered WBAN, energy efficient and reliable a critical comparative analysis of SIMPLE protocol has been done with respect to LEACH protocol by evaluating various performance metrics (End to end delay, throughput propagation delay, BER). It is observable from the simulation results that SIMPLEprotocol has better throughput, end-to end delay and propagation delay in comparison to LEACH protocol for the considered WBAN. Additionally BER for SIMPLE protocol is better than LEACH protocol for the same WBAN. Thus it will be beneficial to implement SIMPLE protocol for WBAN.
近年来无线传感器网络技术的发展,促进了卫生领域无线体域网络(WBAN)的实现。无线局域网是为监测人类、宠物等活体而开发的。人类和宠物经常形成一种纽带,因为宠物对主人的精神、身体和社交都有好处。因此,利用无线局域网监测宠物健康的想法是非常有趣的。在拟议的工作中,已部署了一组犬,用于健康监测。为了使所考虑的WBAN,节能和可靠,通过评估各种性能指标(端到端延迟,吞吐量传播延迟,误码率),对SIMPLE协议进行了关于LEACH协议的关键比较分析。从仿真结果可以看出,对于所考虑的WBAN,与LEACH协议相比,SIMPLEprotocol具有更好的吞吐量、端到端延迟和传播延迟。此外,对于相同的无线局域网,SIMPLE协议的误码率优于LEACH协议。因此,在无线宽带网络中实现SIMPLE协议是非常有利的。
{"title":"Implementation and Reliability Analysis of LEACH and SIMPLE protocols in WBAN for Health Monitoring of Canine","authors":"Monica Kaushik, Sindhu Hak Gupta, V. Balyan","doi":"10.1109/ICICT46931.2019.8977645","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977645","url":null,"abstract":"Recent technological growth of wireless sensor networks, encourage realization of Wireless Body Area Network (WBAN) for health sector. WBAN is developed formonitoring living bodies for example, human, pet etc. Human and pets often form a bond as pets benefit their owners mentally, physically, and socially. Hence idea to monitor the health of pets by using WBAN is very interesting. In the proposed worka WBAN has been deployed on a body of canine for health monitoring purpose. To make the considered WBAN, energy efficient and reliable a critical comparative analysis of SIMPLE protocol has been done with respect to LEACH protocol by evaluating various performance metrics (End to end delay, throughput propagation delay, BER). It is observable from the simulation results that SIMPLEprotocol has better throughput, end-to end delay and propagation delay in comparison to LEACH protocol for the considered WBAN. Additionally BER for SIMPLE protocol is better than LEACH protocol for the same WBAN. Thus it will be beneficial to implement SIMPLE protocol for WBAN.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132239364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer vision based method for identification of freshness in mushrooms 基于计算机视觉的蘑菇新鲜度鉴定方法
A. Anil, Hardik Gupta, Monika Arora
Scientific testing of mushroom (Agaricus Bisporus) samples, and especially non-destructive can prove to be very beneficial in different fields of research including agriculture, food processing, health care, etc. This is mainly because, when these mushrooms are left exposed in the open atmosphere, these tend to react with surrounding and develop a brown coloured pigment. This phenomenon is commonly referred to as the "enzymatic browning". Here, this reaction is utilized to observe certain chemical changes over a course of time. This has led to a result which can be used for classification of mushroom samples. Hence, this classification can be used to prove the gradual change in pattern behaviour of mushrooms during different time intervals. SVM classifier is seen to give the result with an accuracy of 80%. Thus, this classification can also give an overlook of whether these mushroom samples are fresh for consumption or not.
对双孢蘑菇(Agaricus Bisporus)样品的科学检测,特别是无损检测,在农业、食品加工、医疗保健等不同研究领域都是非常有益的。这主要是因为,当这些蘑菇暴露在露天环境中时,它们倾向于与周围环境发生反应并形成棕色色素。这种现象通常被称为“酶促褐变”。在这里,这个反应被用来观察一段时间内的某些化学变化。这导致了一个可以用于蘑菇样品分类的结果。因此,这种分类可以用来证明蘑菇在不同时间间隔内模式行为的逐渐变化。SVM分类器给出的结果准确率为80%。因此,这种分类也可以忽略这些蘑菇样品是否新鲜可供食用。
{"title":"Computer vision based method for identification of freshness in mushrooms","authors":"A. Anil, Hardik Gupta, Monika Arora","doi":"10.1109/ICICT46931.2019.8977698","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977698","url":null,"abstract":"Scientific testing of mushroom (Agaricus Bisporus) samples, and especially non-destructive can prove to be very beneficial in different fields of research including agriculture, food processing, health care, etc. This is mainly because, when these mushrooms are left exposed in the open atmosphere, these tend to react with surrounding and develop a brown coloured pigment. This phenomenon is commonly referred to as the \"enzymatic browning\". Here, this reaction is utilized to observe certain chemical changes over a course of time. This has led to a result which can be used for classification of mushroom samples. Hence, this classification can be used to prove the gradual change in pattern behaviour of mushrooms during different time intervals. SVM classifier is seen to give the result with an accuracy of 80%. Thus, this classification can also give an overlook of whether these mushroom samples are fresh for consumption or not.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133833688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Survey on Quantum Key Distribution 量子密钥分发研究综述
Abhishek Sharma, Amit Kumar
Quantum key distribution is a catchword among industry specialist now a day.It is arising an alarming situation to all the current network security techniques. These are the basic properties of Quantum Mechanics, which makes a combination with network security. At present there are so many companies out there in market which are making progress it this fields day by day.Quantum cryptography is a very important technology now days as it is helping a lot to secure the future network communication. This particular field has gained the attention from industry as well as from academics. Here we are writing this paper to provide the general review of various fields belongs to Quantum Computing, but our main aim is to provide a brief review and analysis of recent development in the field of Quantum Key Distribution, most famous and developed field of Quantum Computing. This paper presents review of Quantum Computing including different application fields like Quantum public key cryptography, QKD, Quantum Authentication. First we discuss the basics of Quantum Cryptography then we discuss the definition of Quantum key Distribution, Various protocols of this field. Then after we discuss the opportunities in this field.
如今,量子密钥分发已成为业内专家的热门话题。这给当前的各种网络安全技术带来了令人担忧的局面。这些都是量子力学的基本性质,它与网络安全结合在一起。目前,市场上有很多公司在这一领域日益取得进步。量子加密技术是一项非常重要的技术,它对未来网络通信的安全起着重要的作用。这个特殊的领域已经得到了工业界和学术界的关注。在这里,我们写这篇论文是为了提供属于量子计算的各个领域的总体回顾,但我们的主要目的是提供一个简短的回顾和分析,在量子计算中最著名和最发达的领域——量子密钥分发领域的最新发展。本文综述了量子计算的研究进展,包括量子公钥加密、量子密钥分配、量子认证等不同的应用领域。首先讨论了量子密码学的基础知识,然后讨论了量子密钥分发的定义,以及该领域的各种协议。在我们讨论了这个领域的机会之后。
{"title":"A Survey on Quantum Key Distribution","authors":"Abhishek Sharma, Amit Kumar","doi":"10.1109/ICICT46931.2019.8977649","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977649","url":null,"abstract":"Quantum key distribution is a catchword among industry specialist now a day.It is arising an alarming situation to all the current network security techniques. These are the basic properties of Quantum Mechanics, which makes a combination with network security. At present there are so many companies out there in market which are making progress it this fields day by day.Quantum cryptography is a very important technology now days as it is helping a lot to secure the future network communication. This particular field has gained the attention from industry as well as from academics. Here we are writing this paper to provide the general review of various fields belongs to Quantum Computing, but our main aim is to provide a brief review and analysis of recent development in the field of Quantum Key Distribution, most famous and developed field of Quantum Computing. This paper presents review of Quantum Computing including different application fields like Quantum public key cryptography, QKD, Quantum Authentication. First we discuss the basics of Quantum Cryptography then we discuss the definition of Quantum key Distribution, Various protocols of this field. Then after we discuss the opportunities in this field.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115921934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Exploration of Deep Learning Techniques in Big Data Analytics 大数据分析中的深度学习技术探索
Poonam Rana, Vineet Sharma, P. Gupta
Due to the advancements in modern technologies, big data plays a significant role in every field. Now to extract information and meaningful data from the various sources of data is a tedious task. In this paper we present various techniques of deep learning used in Big data processing and present various applications of Deep Learning in Big Data Analytics. Data comes from various sources like facebook, youtube videos,twitter data, Linkedin, Millions of devices connected over the Internet,(IOT).
由于现代技术的进步,大数据在各个领域都发挥着重要作用。现在,从各种数据源中提取信息和有意义的数据是一项繁琐的任务。在本文中,我们介绍了在大数据处理中使用的各种深度学习技术,以及深度学习在大数据分析中的各种应用。数据来自各种来源,如facebook, youtube视频,twitter数据,Linkedin,数百万通过互联网连接的设备(IOT)。
{"title":"Exploration of Deep Learning Techniques in Big Data Analytics","authors":"Poonam Rana, Vineet Sharma, P. Gupta","doi":"10.1109/ICICT46931.2019.8977641","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977641","url":null,"abstract":"Due to the advancements in modern technologies, big data plays a significant role in every field. Now to extract information and meaningful data from the various sources of data is a tedious task. In this paper we present various techniques of deep learning used in Big data processing and present various applications of Deep Learning in Big Data Analytics. Data comes from various sources like facebook, youtube videos,twitter data, Linkedin, Millions of devices connected over the Internet,(IOT).","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114882103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
"Online Transaction Security Enhancement": An Algorithm Based on Cryptography “在线交易安全增强”:一种基于密码学的算法
Zeenat Hasan, C. Agrawal, Meena Agrawal
Online transaction has become daily routine in our life. All of us are using online transaction very frequently today, so to deal with related security issues like Authorization, data protection, confidentiality is very important. Every person who is doing online transaction, every organization and every government must have the ability to control over the operations of online transactions for securing the information. It is necessary to apply better security mechanism in online transaction for maintaining data integrity, privacy of data and confidentiality. Cryptography uses encryption and decryption process for protecting the data. There are many cryptographic algorithms which uses single key which is private or two keys called public key and private key. One can select the algorithm for transferring the data on the basis of higher security and efficiency criteria of the algorithm. This paper presents role of cryptography for different issues of security and also proposes a new cryptography based algorithm for better security of online transactions. The new algorithm is based on probabilistic cipher and since it uses single key so it is a symmetric encryption algorithm.
网上交易已经成为我们日常生活的一部分。今天,我们所有人都非常频繁地使用在线交易,因此处理相关的安全问题,如授权,数据保护,保密是非常重要的。每一个进行网上交易的人、每一个组织和每一个政府都必须有能力控制网上交易的运作,以确保信息的安全。为了维护数据的完整性、隐私性和保密性,有必要在网上交易中应用更好的安全机制。密码学使用加密和解密过程来保护数据。有许多加密算法使用单个密钥(即私钥)或称为公钥和私钥的两个密钥。可以根据算法较高的安全性和效率标准来选择传输数据的算法。本文介绍了密码学在不同安全问题中的作用,并提出了一种新的基于密码学的算法,以提高在线交易的安全性。该算法基于概率密码,由于使用的是单密钥,因此是一种对称加密算法。
{"title":"\"Online Transaction Security Enhancement\": An Algorithm Based on Cryptography","authors":"Zeenat Hasan, C. Agrawal, Meena Agrawal","doi":"10.1109/ICICT46931.2019.8977669","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977669","url":null,"abstract":"Online transaction has become daily routine in our life. All of us are using online transaction very frequently today, so to deal with related security issues like Authorization, data protection, confidentiality is very important. Every person who is doing online transaction, every organization and every government must have the ability to control over the operations of online transactions for securing the information. It is necessary to apply better security mechanism in online transaction for maintaining data integrity, privacy of data and confidentiality. Cryptography uses encryption and decryption process for protecting the data. There are many cryptographic algorithms which uses single key which is private or two keys called public key and private key. One can select the algorithm for transferring the data on the basis of higher security and efficiency criteria of the algorithm. This paper presents role of cryptography for different issues of security and also proposes a new cryptography based algorithm for better security of online transactions. The new algorithm is based on probabilistic cipher and since it uses single key so it is a symmetric encryption algorithm.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121685214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1