Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977662
Prashant Agrawal, Neelam Rawat
Organization’s proficiency to deliver services and applications at high velocity requires competing effectively in the market. The practices and tools for such management processes demands the quick and reliable model. Changes need to start at the software engineering level when building applications in the cloud, so there is a need to automate our DevOps processes using cloud and non-cloud DevOps automation tools. The aim of this paper is to move DevOps to Cloud and become more agile at software development and operations. In parallel, consideration of how to extend those DevOps process and automation into public and/or private clouds are the prime approach for this research. While investigating the emergence of DevOps, this paper paints it as a dramatic change in IT world for process improvement. Goal is to understand how the DevOps and Cloud work together to help businesses achieve their transformation goals.
{"title":"Devops, A New Approach To Cloud Development & Testing","authors":"Prashant Agrawal, Neelam Rawat","doi":"10.1109/ICICT46931.2019.8977662","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977662","url":null,"abstract":"Organization’s proficiency to deliver services and applications at high velocity requires competing effectively in the market. The practices and tools for such management processes demands the quick and reliable model. Changes need to start at the software engineering level when building applications in the cloud, so there is a need to automate our DevOps processes using cloud and non-cloud DevOps automation tools. The aim of this paper is to move DevOps to Cloud and become more agile at software development and operations. In parallel, consideration of how to extend those DevOps process and automation into public and/or private clouds are the prime approach for this research. While investigating the emergence of DevOps, this paper paints it as a dramatic change in IT world for process improvement. Goal is to understand how the DevOps and Cloud work together to help businesses achieve their transformation goals.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116878611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977654
M. Singh, N. Chauhan, R. Popli
Plan driven methods or traditional methods of software development developers know all the requirements in advance because they are stable in nature. In the challenging world of software development where customer opinion and demands are changing on day to day basis, these traditional methods cause project failures due to poor customer communication and rigid time frame structures. Agile Software Development (ASD) is software development methodology that emphasizes on adaptability. Due to which it satisfies customer - centered development that supports quick and flexible response to change. Distributed Agile software development (DASD), is a methodology in software development paradigm where development teams are distributed in different countries across the globe. In this paper we have proposed a framework for transitioning of traditional software development method to Distributed Agile Software Development. The proposed framework addresses time - zone based problems in Distributed Environment.
{"title":"A Framework For Transitioning Of Traditional Software Development Method To Distributed Agile Software Development","authors":"M. Singh, N. Chauhan, R. Popli","doi":"10.1109/ICICT46931.2019.8977654","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977654","url":null,"abstract":"Plan driven methods or traditional methods of software development developers know all the requirements in advance because they are stable in nature. In the challenging world of software development where customer opinion and demands are changing on day to day basis, these traditional methods cause project failures due to poor customer communication and rigid time frame structures. Agile Software Development (ASD) is software development methodology that emphasizes on adaptability. Due to which it satisfies customer - centered development that supports quick and flexible response to change. Distributed Agile software development (DASD), is a methodology in software development paradigm where development teams are distributed in different countries across the globe. In this paper we have proposed a framework for transitioning of traditional software development method to Distributed Agile Software Development. The proposed framework addresses time - zone based problems in Distributed Environment.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126328415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/icict46931.2019.8977721
{"title":"ICICT 2019 Table of Contents","authors":"","doi":"10.1109/icict46931.2019.8977721","DOIUrl":"https://doi.org/10.1109/icict46931.2019.8977721","url":null,"abstract":"","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121808763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977710
A. Tripathi, Apoorv Jain, Naresh Chandra, Akash Rajak, A. Shrivastava
Blockchain is one of emerging research area and gaining attention due to its wide range of applications. Smart contracts are one of the latest application areas of blockchain, which enables secure, transparent and tamperproof transactions. Smart contracts create and verify the data with the help of hash functions. Hash functions are mathematical algorithms that take input and produces hashed output of specified length. It is very difficult to regenerate the original input from the hashed output. Ethereum is one of the leading blockchain platforms to provide functionality of smart contracts. This paper carries out study of blockchain on Ethereum platform. We have developed authentication-based business application with the help of smart contract for marketing services on Ethereum platform. Solidity is used to generate and manage smart contract.
{"title":"Business Service Management using Blockchain","authors":"A. Tripathi, Apoorv Jain, Naresh Chandra, Akash Rajak, A. Shrivastava","doi":"10.1109/ICICT46931.2019.8977710","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977710","url":null,"abstract":"Blockchain is one of emerging research area and gaining attention due to its wide range of applications. Smart contracts are one of the latest application areas of blockchain, which enables secure, transparent and tamperproof transactions. Smart contracts create and verify the data with the help of hash functions. Hash functions are mathematical algorithms that take input and produces hashed output of specified length. It is very difficult to regenerate the original input from the hashed output. Ethereum is one of the leading blockchain platforms to provide functionality of smart contracts. This paper carries out study of blockchain on Ethereum platform. We have developed authentication-based business application with the help of smart contract for marketing services on Ethereum platform. Solidity is used to generate and manage smart contract.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121869789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977651
M. Bhardwaj, A. Ahlawat
"Enormous Data" could be a term together with the employment of strategies to catch, process, break down and envision conceivably vast datasets during a wise time span not available to straightforward IT innovations. By augmentation, the stage, instruments and programming used for this reason for existing are by and enormous referred to as "Huge knowledge advancements". In this manuscript, we give the importance, attributes, models, advances, life cycle and diverse totally different components of Big data.
{"title":"Research and Analysis of Technologies used in Big Data","authors":"M. Bhardwaj, A. Ahlawat","doi":"10.1109/ICICT46931.2019.8977651","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977651","url":null,"abstract":"\"Enormous Data\" could be a term together with the employment of strategies to catch, process, break down and envision conceivably vast datasets during a wise time span not available to straightforward IT innovations. By augmentation, the stage, instruments and programming used for this reason for existing are by and enormous referred to as \"Huge knowledge advancements\". In this manuscript, we give the importance, attributes, models, advances, life cycle and diverse totally different components of Big data.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132635095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977645
Monica Kaushik, Sindhu Hak Gupta, V. Balyan
Recent technological growth of wireless sensor networks, encourage realization of Wireless Body Area Network (WBAN) for health sector. WBAN is developed formonitoring living bodies for example, human, pet etc. Human and pets often form a bond as pets benefit their owners mentally, physically, and socially. Hence idea to monitor the health of pets by using WBAN is very interesting. In the proposed worka WBAN has been deployed on a body of canine for health monitoring purpose. To make the considered WBAN, energy efficient and reliable a critical comparative analysis of SIMPLE protocol has been done with respect to LEACH protocol by evaluating various performance metrics (End to end delay, throughput propagation delay, BER). It is observable from the simulation results that SIMPLEprotocol has better throughput, end-to end delay and propagation delay in comparison to LEACH protocol for the considered WBAN. Additionally BER for SIMPLE protocol is better than LEACH protocol for the same WBAN. Thus it will be beneficial to implement SIMPLE protocol for WBAN.
{"title":"Implementation and Reliability Analysis of LEACH and SIMPLE protocols in WBAN for Health Monitoring of Canine","authors":"Monica Kaushik, Sindhu Hak Gupta, V. Balyan","doi":"10.1109/ICICT46931.2019.8977645","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977645","url":null,"abstract":"Recent technological growth of wireless sensor networks, encourage realization of Wireless Body Area Network (WBAN) for health sector. WBAN is developed formonitoring living bodies for example, human, pet etc. Human and pets often form a bond as pets benefit their owners mentally, physically, and socially. Hence idea to monitor the health of pets by using WBAN is very interesting. In the proposed worka WBAN has been deployed on a body of canine for health monitoring purpose. To make the considered WBAN, energy efficient and reliable a critical comparative analysis of SIMPLE protocol has been done with respect to LEACH protocol by evaluating various performance metrics (End to end delay, throughput propagation delay, BER). It is observable from the simulation results that SIMPLEprotocol has better throughput, end-to end delay and propagation delay in comparison to LEACH protocol for the considered WBAN. Additionally BER for SIMPLE protocol is better than LEACH protocol for the same WBAN. Thus it will be beneficial to implement SIMPLE protocol for WBAN.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132239364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977698
A. Anil, Hardik Gupta, Monika Arora
Scientific testing of mushroom (Agaricus Bisporus) samples, and especially non-destructive can prove to be very beneficial in different fields of research including agriculture, food processing, health care, etc. This is mainly because, when these mushrooms are left exposed in the open atmosphere, these tend to react with surrounding and develop a brown coloured pigment. This phenomenon is commonly referred to as the "enzymatic browning". Here, this reaction is utilized to observe certain chemical changes over a course of time. This has led to a result which can be used for classification of mushroom samples. Hence, this classification can be used to prove the gradual change in pattern behaviour of mushrooms during different time intervals. SVM classifier is seen to give the result with an accuracy of 80%. Thus, this classification can also give an overlook of whether these mushroom samples are fresh for consumption or not.
{"title":"Computer vision based method for identification of freshness in mushrooms","authors":"A. Anil, Hardik Gupta, Monika Arora","doi":"10.1109/ICICT46931.2019.8977698","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977698","url":null,"abstract":"Scientific testing of mushroom (Agaricus Bisporus) samples, and especially non-destructive can prove to be very beneficial in different fields of research including agriculture, food processing, health care, etc. This is mainly because, when these mushrooms are left exposed in the open atmosphere, these tend to react with surrounding and develop a brown coloured pigment. This phenomenon is commonly referred to as the \"enzymatic browning\". Here, this reaction is utilized to observe certain chemical changes over a course of time. This has led to a result which can be used for classification of mushroom samples. Hence, this classification can be used to prove the gradual change in pattern behaviour of mushrooms during different time intervals. SVM classifier is seen to give the result with an accuracy of 80%. Thus, this classification can also give an overlook of whether these mushroom samples are fresh for consumption or not.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133833688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977649
Abhishek Sharma, Amit Kumar
Quantum key distribution is a catchword among industry specialist now a day.It is arising an alarming situation to all the current network security techniques. These are the basic properties of Quantum Mechanics, which makes a combination with network security. At present there are so many companies out there in market which are making progress it this fields day by day.Quantum cryptography is a very important technology now days as it is helping a lot to secure the future network communication. This particular field has gained the attention from industry as well as from academics. Here we are writing this paper to provide the general review of various fields belongs to Quantum Computing, but our main aim is to provide a brief review and analysis of recent development in the field of Quantum Key Distribution, most famous and developed field of Quantum Computing. This paper presents review of Quantum Computing including different application fields like Quantum public key cryptography, QKD, Quantum Authentication. First we discuss the basics of Quantum Cryptography then we discuss the definition of Quantum key Distribution, Various protocols of this field. Then after we discuss the opportunities in this field.
{"title":"A Survey on Quantum Key Distribution","authors":"Abhishek Sharma, Amit Kumar","doi":"10.1109/ICICT46931.2019.8977649","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977649","url":null,"abstract":"Quantum key distribution is a catchword among industry specialist now a day.It is arising an alarming situation to all the current network security techniques. These are the basic properties of Quantum Mechanics, which makes a combination with network security. At present there are so many companies out there in market which are making progress it this fields day by day.Quantum cryptography is a very important technology now days as it is helping a lot to secure the future network communication. This particular field has gained the attention from industry as well as from academics. Here we are writing this paper to provide the general review of various fields belongs to Quantum Computing, but our main aim is to provide a brief review and analysis of recent development in the field of Quantum Key Distribution, most famous and developed field of Quantum Computing. This paper presents review of Quantum Computing including different application fields like Quantum public key cryptography, QKD, Quantum Authentication. First we discuss the basics of Quantum Cryptography then we discuss the definition of Quantum key Distribution, Various protocols of this field. Then after we discuss the opportunities in this field.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115921934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977641
Poonam Rana, Vineet Sharma, P. Gupta
Due to the advancements in modern technologies, big data plays a significant role in every field. Now to extract information and meaningful data from the various sources of data is a tedious task. In this paper we present various techniques of deep learning used in Big data processing and present various applications of Deep Learning in Big Data Analytics. Data comes from various sources like facebook, youtube videos,twitter data, Linkedin, Millions of devices connected over the Internet,(IOT).
{"title":"Exploration of Deep Learning Techniques in Big Data Analytics","authors":"Poonam Rana, Vineet Sharma, P. Gupta","doi":"10.1109/ICICT46931.2019.8977641","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977641","url":null,"abstract":"Due to the advancements in modern technologies, big data plays a significant role in every field. Now to extract information and meaningful data from the various sources of data is a tedious task. In this paper we present various techniques of deep learning used in Big data processing and present various applications of Deep Learning in Big Data Analytics. Data comes from various sources like facebook, youtube videos,twitter data, Linkedin, Millions of devices connected over the Internet,(IOT).","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114882103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977669
Zeenat Hasan, C. Agrawal, Meena Agrawal
Online transaction has become daily routine in our life. All of us are using online transaction very frequently today, so to deal with related security issues like Authorization, data protection, confidentiality is very important. Every person who is doing online transaction, every organization and every government must have the ability to control over the operations of online transactions for securing the information. It is necessary to apply better security mechanism in online transaction for maintaining data integrity, privacy of data and confidentiality. Cryptography uses encryption and decryption process for protecting the data. There are many cryptographic algorithms which uses single key which is private or two keys called public key and private key. One can select the algorithm for transferring the data on the basis of higher security and efficiency criteria of the algorithm. This paper presents role of cryptography for different issues of security and also proposes a new cryptography based algorithm for better security of online transactions. The new algorithm is based on probabilistic cipher and since it uses single key so it is a symmetric encryption algorithm.
{"title":"\"Online Transaction Security Enhancement\": An Algorithm Based on Cryptography","authors":"Zeenat Hasan, C. Agrawal, Meena Agrawal","doi":"10.1109/ICICT46931.2019.8977669","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977669","url":null,"abstract":"Online transaction has become daily routine in our life. All of us are using online transaction very frequently today, so to deal with related security issues like Authorization, data protection, confidentiality is very important. Every person who is doing online transaction, every organization and every government must have the ability to control over the operations of online transactions for securing the information. It is necessary to apply better security mechanism in online transaction for maintaining data integrity, privacy of data and confidentiality. Cryptography uses encryption and decryption process for protecting the data. There are many cryptographic algorithms which uses single key which is private or two keys called public key and private key. One can select the algorithm for transferring the data on the basis of higher security and efficiency criteria of the algorithm. This paper presents role of cryptography for different issues of security and also proposes a new cryptography based algorithm for better security of online transactions. The new algorithm is based on probabilistic cipher and since it uses single key so it is a symmetric encryption algorithm.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121685214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}