{"title":"Creation of an Improved Software Testing Framework for the Cloud Environment","authors":"Manish Sharma, Chandani Sharma, Shilpy Sharma","doi":"10.1109/ICFIRTP56122.2022.10063210","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10063210","url":null,"abstract":"Software testing is the process of identifying flaws as a programme is being run so that a client can receive software that has no defects. Testing is the methodical, step-by-step detection of various sorts of defects with the least amount of time and effort possible. Software testing is a crucial tool for evaluating the quality of software. Testing is a method used to evaluate the quality, accuracy, and completeness of generated computer software. Testing is used to check performance, safety, fault tolerance, and security in addition to discovering mistakes. The most crucial method of software quality assurance is testing, which accounts for up to 40% of the budgets of some software companies.The heterogeneous and virtual networks are the main focus of this research. Therefore, we have found that explaining cloud computing is the best strategy when conducting research. There are various tools of cloud like cloudsim (To simulate cloud & its software architecture), live migration on cloudsim (To test service migration), Green cloudsim (to test service on cloud for application on green cloud & testing as per reliability as per new green computing norms) are available for software testing and analyze their performance by collecting simulation results.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115763656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Archika Jain, D. Somwanshi, Chaitanya Khurana, K. Joshi
{"title":"Review on Digital Watermarking Techniques and Its Retrieval","authors":"Archika Jain, D. Somwanshi, Chaitanya Khurana, K. Joshi","doi":"10.1109/ICFIRTP56122.2022.10059440","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10059440","url":null,"abstract":"The goal of the current review is to explore how to protect users' security and privacy when using digital watermarking, as well as to cover the research component. A digital watermark is a signal that transmits data about the creator or supplier of the media. The placement of a digital watermark on digital media makes it visible to computers but not the human eye. In digital watermarking embedded the watermark in original images or audio-video data by using embedding algorithm and then extract the watermark image from original image by using extracting algorithm. In this more than 40 research papers have been reviewed in the period of 2000 to 2022 and found three issues namely Perceptual Transparency, Payload of the Watermark and Robustness. These challenges led to the discovery of the findings, strengths, weaknesses, and solutions approaches.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122962369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Radical Approach for Goal-Oriented Testing","authors":"H. S. Pokhariya, Ruchira Rawat, Ankur Dumka","doi":"10.1109/ICFIRTP56122.2022.10063183","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10063183","url":null,"abstract":"Taking testing goals into account, this article lays forth a methodology for automating the testing of component-based and embedded systems. We work with the component-based systems from communication point of view. Hence, only the outward behaviour of the components at the contact locations can be seen. We optimise the number of created test sequences for practicality by including test purposes into a general FSM-based technique for test creation. These approaches have been broadly since decades effectively used for evaluating both hardware and software including protocols and communication systems","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114879618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Punita Panwar, Aditi Sharma, Sneha Garg, Kanika Bhutani
{"title":"A Prospective Approach on Covid-19 Forecasting Using LSTM","authors":"Punita Panwar, Aditi Sharma, Sneha Garg, Kanika Bhutani","doi":"10.1109/ICFIRTP56122.2022.10059439","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10059439","url":null,"abstract":"The novel Corona virus has been proclaimed as a worldwide pandemic through World Health Organization in the March 2020 has immensely affected the world with its ferocity. By observation, the scientists got to know that it transmits from one human to other by droplets which range from larger respiratory droplets to smaller aerosols or direct contact with an infected person. Its impurity has been assessed to have an incubation time of 6.4 days than a simple reproduction amount of 2.24-3.58.[19] The transmission rate and spread of infection is quite rapid as compared to other fatal viral infections encountered till date. A massive loss of human life was faced even by the developed countries which had the best health-care facilities. According to WHO, COVID-19 has been confirmed in 238,521,855 people over the world, with 4,863,818 deaths as of October 9th, 2021. After experiencing the second covid wave, the number of cases had got dropped drastically but the increase in their number in the recent days is a major cause of concern. This stresses us to build some prediction models which could help in providing relief to the virus-prone areas. In this study, we are using time series for predicting forthcoming cases of corona virus.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129377083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Plans and strategies for Growth Specialists' Projects","authors":"Subham Poddar, S. Dhondiyal, Ankur Dumka","doi":"10.1109/ICFIRTP56122.2022.10063182","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10063182","url":null,"abstract":"Managing IT systems are essential vital so as to govern the facilities associated to that system appropriately. As for certain firms happining troubles with their system can lower their business. Today, projects are being developed, and IT developers are always learning more about the many methods they might use and doing research to determine which one would be the most effective. The methods are compared and contrasted based on shared and unique characteristics and procedures. In addition, we will assess them by looking into their backgrounds and comparing the opinions of specialists. The two most popular approaches (AGILE and PRINCE 2) both aim towards the same thing but go about getting there in quite different ways. Features like as collaboration, use of appropriate tools, predictability, and teamwork are useful in comparing the two approaches.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"IA-19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126560657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nzanzu Katasohire Romeo, S. Rajbanshi, Womba Lukama, Mandeep Kaur, Nitin Rakesh, M. Goyal
{"title":"Design a Smart Cane for Visually Impaired Individuals’ Assistance","authors":"Nzanzu Katasohire Romeo, S. Rajbanshi, Womba Lukama, Mandeep Kaur, Nitin Rakesh, M. Goyal","doi":"10.1109/ICFIRTP56122.2022.10063212","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10063212","url":null,"abstract":"Recent years have seen the raise of new technologies to assist physically challenged people. Blind individuals’ assistance is constantly improving thanks to scientists’ and engineers’ efforts to suit the users’ needs. The new technologies comprise different gadget, software and prototypes, some of which are available on the market or still in research and development process. This paper explores some of the technologies available to this date with their features and proposes a new solution.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129550437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review Paper on Real-Time Video Analysis in Dense Environment for Surveillance System","authors":"Himanshu Tyagi, Vivek Kumar, Manish Kumar","doi":"10.1109/ICFIRTP56122.2022.10059434","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10059434","url":null,"abstract":"Dense environmental conditions such as snow, fog, lightning, heavy rain, and darkness drastically lower the quality of outdoor surveillance videos. The primary functions of video surveillance systems in crowded environments have received significant attention, particularly in detection, categorization, and event or object recognition. The methods and algorithms for real-time video analysis in various weather conditions have also significantly advanced with the advancement of technology. Examples include background extraction, the see-through algorithm, deep learning models, CNN for nighttime intrusions, the System for high-quality underwater Monitoring using optical-wireless video surveillance, the low-visibility enhancement network (LVENet), edge computing, and many others. Using various elements of these methodologies, the current research increased monitoring performance and avoided potential human failures. In-depth information about these video surveillance methods, systems, and supporting details is provided in this study. An overview of employed construction and architectural styles is given, and the critical assessments of these systems are then covered. Current surveillance systems and various methods for achieving accuracy in real-time video analysis in adverse weather circumstances are contrasted in terms of their features, benefits, and challenges, which are discussed in this paper, to provide a complete image and a broad view of the System. Future trends are also highlighted, pointing to the study that will be conducted in the future.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127405933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pravidhi Garkoti, Sarah Irshad, Ankit, P. Nand, Mandeep Kaur, Nitin Rakesh
{"title":"IoT based Third Eye for the Stone Blind","authors":"Pravidhi Garkoti, Sarah Irshad, Ankit, P. Nand, Mandeep Kaur, Nitin Rakesh","doi":"10.1109/ICFIRTP56122.2022.10059428","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10059428","url":null,"abstract":"Eyes are the primary sense organs for seeing the outside world; their failure has a significant impact on the outside world’s knowledge perceiving capability. As the technologies get advanced we can now enjoy most of the comforts as normal humans but visually impaired people cannot. Blind people usually depend upon specific support or help for them to do their daily work. They continue to face a variety of challenges in their lives. The proposed solution is a wearable band for people with visual impairments that can support them in navigating challenges and barriers and tracking their coordinates, which is then sent to a particular member of the family. This will be adorned with ultrasonic sensors made up of software components. The proposed technology works as a third eye for blind people because they have outstanding senses. A vibrator sensor is used in the band to provide vibration in their hand whenever a component is nearby. Also when the sensor detects any object the buzzer will make sound. Therefore it is an automated device. The blind person’s present position will be communicated to a particular person, who will be capable of locating individuals if they get lost and safeguarding them. This band will be of excellent assistance to blind individuals with regards to automatic identification and daily use.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134604858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analysis of Big Data Privacy and Safety","authors":"U. Aswal, A. Dumka, Rajesh Pokhariyal","doi":"10.1109/ICFIRTP56122.2022.10059410","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10059410","url":null,"abstract":"Quality of service (QoS) in big data networks is crucial, as is ensuring the security and privacy of big data analytics. Current research difficulties and potential solutions to big data network security are presented in this study. To address the security risks posed by big data and SDNs, we describe several methods of network security (such as intrusion detection and network threat monitoring), categorise the dangers we face, and contrast the many defences available to us (SDN).","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114476762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative review analysis for load balancing techniques in Cloud Computing using Machine Learning","authors":"Dhajvir Singh Rai, A. Dumka, Satyajee Srivastava","doi":"10.1109/ICFIRTP56122.2022.10059412","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10059412","url":null,"abstract":"Load balancing (LB) is a task to manage the performance and efficiency of multi-attribute, multi-variant cloud computing (CC) resources. CC system is more effective when its whole resources are employed in best probable manner and maintaining its load in proper accessing of its resources. Load includes the CPU load, network load, data traffic load, client requests load etc. So, load balancing process includes the management of all these loads as per the availability of resources. This paper deals with the multiple load balancing techniques and present them in hierarchical form and analysis them in performance and efficiency dynamics. This paper also discusses the comparative analysis of performance of existing techniques related to LB in CC using Machine learning (ML). A brief about hybrid methods will also be discussed through this paper. In conclusion part on the basis of analysis done through this study paper also suggests some new insights for LB in CC.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121962579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}