Software Engineering Approaches to Enable Digital Transformation Technologies

Book description

The book highlights a number of software engineering techniques to design and develop systems and applications for digital innovation. It covers the institutional perspective of digital innovation and transformation to create novel products and services. It also highlights institutional arrangements critical for digital transformation

Table of contents

  1. Cover
  2. Half Title
  3. Title
  4. Copyright
  5. Contents
  6. Preface
  7. Contributors
  8. 1 Precise Prediction of Water Level Using the Naïve Bayes Algorithm for Smart Irrigation in Pomegranate Farms
    1. 1.1 Introduction
    2. 1.2 Literature Survey
    3. 1.3 Methodology
    4. 1.4 Adaptive Plant Requirement Prediction Algorithm
    5. 1.5 Observations
    6. 1.6 Result and Discussion
      1. 1.6.1 Part A for Identification of Ideal Irrigation Pattern
      2. 1.6.2 Part B for Implementation of Prediction Model
    7. 1.7 Conclusion
    8. 1.8 Future Work
    9. References
  9. 2 A Brief Review on Lightweight Practice of Docker Vulnerabilities
    1. 2.1 Introduction
    2. 2.2 Docker Weakness
    3. 2.3 Methodology
    4. 2.4 Contaminated Images
    5. 2.5 Vulnerability of Images
    6. 2.6 Docker Architecture
    7. 2.7 Threats to Validity
    8. 2.8 HelloBench
    9. 2.9 Containerization
    10. 2.10 Conclusion
    11. References
  10. 3 Deep Learning-Based Serverless Image Handler Using Amazon Web Services
    1. 3.1 Introduction
      1. 3.1.1 Digital Image Processing
    2. 3.2 Related Work
    3. 3.3 Image Processing Procedures
    4. 3.4 Role of Machine Learning and Deep Learning in Image Processing
      1. 3.4.1 Machine Learning
      2. 3.4.2 Deep Learning
    5. 3.5 Serverless Image Handler in AWS
      1. 3.5.1 Rekognition
    6. 3.6 Conclusion
    7. References
  11. 4 Ontology-Based Delegation Enforcement in the Cloud Ecosystem
    1. 4.1 Introduction
      1. 4.1.1 Types of Cloud
    2. 4.2 Case Study on Clinical Trials
    3. 4.3 Integrated Multi-Agent Environment
    4. 4.4 Related Work and Literature Review
    5. 4.5 Delegation of Authority
    6. 4.6 Result and Discussion
    7. 4.7 Future Work
    8. 4.8 Proposed Framework
    9. 4.9 Conclusion
    10. References
  12. 5 Applicability of Artificial Intelligence for Social Development in Rural and Urban Sectors
    1. 5.1 Introduction
    2. 5.2 Literature Review
    3. 5.3 Implementing AI in Social Development
    4. 5.4 AI in Social Work
    5. 5.5 Areas of AI for Social Development
      1. 5.5.1 Healthcare
      2. 5.5.2 Education
      3. 5.5.3 Agricultural Productivity
      4. 5.5.4 Environmental Protection
      5. 5.5.5 Authenticated Information
      6. 5.5.6 Crisis Intervention
    6. 5.6 Prospects and Challenges of AI
    7. 5.7 Findings
    8. 5.8 Conclusion
    9. References
  13. 6 Disease Prediction Using Bayes’ Theorem
    1. 6.1 Introduction
    2. 6.2 Implementation of Naïve Bayes Classifier
      1. 6.2.1 Classifier
      2. 6.2.2 Naïve Bayes
      3. 6.2.3 Bayesian Theorem
    3. 6.3 Implementation of Bayesian Classification
    4. 6.4 Results and Discussion
    5. 6.5 Data Preparation
    6. 6.6 Conclusion
    7. References
  14. 7 Secure Voting System Using Blockchain Technology
    1. 7.1 Introduction
    2. 7.2 UML and General Architecture
    3. 7.3 Configuration and Working of APP
      1. 7.3.1 MetaMask Configuration
      2. 7.3.2 Ganache
      3. 7.3.3 Truffle
      4. 7.3.4 Testing the Contracts (Using Chai and Mocha)
      5. 7.3.5 Starting the Browser-Sync Lite Server
      6. 7.3.6 Importing Account to MetaMask from Ganache
      7. 7.3.7 Voting through the Front-End Webpage
      8. 7.3.8 Reviewing the Transactions That Happened in Ganache
    4. 7.4 Conclusion
    5. 7.5 Future Scope
    6. References
  15. 8 Malware Analysis: An Experimental Approach
    1. 8.1 Introduction
    2. 8.2 Malware Basics
    3. 8.3 Malware Analysis
    4. 8.4 Methods of Malware Analysis
    5. 8.5 General Information
    6. 8.6 Detecting Packers and Protectors
    7. 8.7 Analyzing Malware Sample on VirusTotal
    8. Conclusion
    9. References
  16. 9 Deployment of New Life Cycle Model for Applications of Web
    1. 9.1 Introduction
    2. 9.2 Literature Review: Software Development Life Cycle
      1. 9.2.1 Traditional Models
    3. 9.3 Proposed Iterative Lifecycle Model
      1. 9.3.1 Proposed Model
    4. 9.4 Implementation and Results
      1. 9.4.1 Case Study for ARQI
      2. 9.4.2 Case Study for Scrum
    5. 9.5 Conclusions
    6. 9.6 Future Scope
    7. References
  17. 10 The Future Possibilities of Artificial Intelligence in Modern Drapes
    1. 10.1 Introduction
    2. 10.2 Review of Literature
      1. 10.2.1 “Create” a Representation/Design Visualization/Virtual Try-On for Consumption
      2. 10.2.2 Fit Preferences
    3. 10.3 Evaluating Fit
    4. 10.4 Effects of AI on the Business World
    5. 10.5 Utilization of a 3D Virtual Simulation Technology in the Online Clothing Sector
    6. 10.6 Modern Developments in the Digital Garment Industry
    7. 10.7 Conclusion
    8. References
  18. 11 Mobile Application and Communication
    1. 11.1 Introduction
    2. 11.2 Mobile Services
      1. 11.2.1 Features of Mobile Services
    3. 11.3 Government in Motion
      1. 11.3.1 Past and Present of Mobile Application
      2. 11.3.2 Mobiles in Business
      3. 11.3.3 Market of Mobile Applications
    4. 11.4 Mobile Device Use for Education
      1. 11.4.1 Learning English in Mobile Application
      2. 11.4.2 Intelligent Systems
    5. 11.5 Mobile Application's Effect in Society
    6. 11.6 Conclusion and Future Scope
    7. References
  19. 12 Emerging and Growing Technologies in Blockchain Security: A Review
    1. 12.1 Introduction
    2. 12.2 Categories of Blockchain
    3. 12.3 Process Security in Blockchain
      1. 12.3.1 Smart Contract Security
      2. 12.3.2 Implementation Security of Blockchain
      3. 12.3.3 Operation Standards and Regulations
      4. 12.3.4 Risk Assessment and Fraud Detection
    4. 12.4 Data Security in Blockchain
      1. 12.4.1 Access Control in Blockchain
      2. 12.4.2 Privacy Protection Techniques in Blockchain
    5. 12.5 Research Aspiration
      1. 12.5.1 Enhancing Process Security in Blockchain
      2. 12.5.2 Enhancing Data Security In Blockchain
    6. 12.6 Conclusion
    7. References
  20. Index

Product information

  • Title: Software Engineering Approaches to Enable Digital Transformation Technologies
  • Author(s): Sanjay Misra, Amit Jain, Manju Kaushik, Chitresh Banerjee
  • Release date: November 2023
  • Publisher(s): Routledge
  • ISBN: 9781000987089