2nd National Conference of Recent Trends in Computer Science and Information Technology

Paper Type :: Research Paper
Title :: Real-Time and Non-Intrusive Method Based On the Diffusion Speed of Single Image
Country :: India
Authors :: Vibha Kamble || Prof. P. S. Mohod
Page No. :: 01-06
In today's world, with the increasing demand for high level security in devices and systems several techniques are developed. Face recognition from image is a widely used topic for biometric purpose . In many public places usually have CCTV cameras for capturing the videos and these cameras have their significant value for security purpose. In this paper a real-time method is proposed based on the diffusion speed. The diffusion speed of a single image is obtained to address this problem. Liveness detection is the key idea in surface properties between live and fake faces can be efficiently estimated. SVM classifier is proposed to define whether the given face is fake or not. The significant advantage of this method is that, as compared to previous approaches, it accurately identifies varied malicious attacks regardless of the medium of the image, e.g., paper or screen.

Keyword :Spoofing, Diffusion speed, Local speed pattern, Local binary pattern, SVM classifier, Face liveliness detection

[1]. Athira Prem1, Bineesh, V2," Anti-Spoofing of a Face Image Using Diffusion Speed Model," in IJIRSET,Vol. 5, Issue 8, August 2016
[2]. M.L.Athirai, Dr M.Sujaritha, "Diffusion speed based face liveliness detection to expose spoofing attack" in International Journal of Scientific & Engineering Research, Vol 7, Issue 3, March-2016.
[3]. G.Pradeepkumar, V.Parameshwari, V.Logeswari, "A Diffusion Speed Model to Detect Face Liveness for a Video Based Anti- Spoofing System " in Journal of Network Communi-cations and Emerging Technologies (JNCET),Vol 6, Issue 6, June (2016).
[4]. Faizan Ahmad1, Aaima Najam2 and Zeeshan Ahmed3, "Image-based Face Detection and Recognition: "State of the Art", " in IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 1, November 2012.
[5]. Kavita , Ms. Manjeet Kaur, "A Survey paper for Face Recognition Technologies ", in International Journal of Scientific and Research Publications, Volume 6, Issue 7, July 2016

Paper Type :: Research Paper
Title :: An Overview of R-Trees and Its Variants in Spatial Data Searching
Country :: India
Authors :: Bhagyashree Ambulkar || Rajeshree Ambulkar
Page No. :: 07-09

Indexing plays a vital role in query processing for fast retrieval of results. Queries using indexing executes fastly and provide noteworthy performance enhancement. The R-tree allows to index multidimensional objects. It arranges data in a treelike structure, with bounding boxes at the nodes. Bounding boxes indicate the next level of the data that is connected to the sub tree underneath. The R-Tree variants are categorized as the original R-Tree, hybrid of R-Tree and an extension of R-Tree to support several applications. In this paper, we overview the R-Tree and its variants R+ Tree, R* Tree, Hilbert R-tree, Spatio-temporal indexing by RST-trees spatial databases are presented.

Keywords: R-Tree, R-Tree variants, Spatial Index, Multidimensional data

[1]. https://www.tutorialspoint.com/Spatial-Databases
[2]. "R-trees Have Grown Everywhere", YANNIS MANOLOPOULOS, ALEXANDROS NANOPOULOS, APOSTOLOS N. PAPADOPOULOS Aristotle University of Thessaloniki, Greece and YANNIS THEODORIDIS University of Piraeus, Greece
[3]. R-Trees – A Dynamic Index Structure for Spatial Searching by Marios Hadjieleftheriou, Yannis Manolopoulos, Yannis Theodoridis, Vassilis J. Tsotras
[4]. A State-of-Art in R-Tree Variants for Spatial Indexing
[5]. https://www.ibm.com/support/knowledgecenter/en/SSGU8G_12.1.0/com.ibm.spatial.doc/ids_spat_071.htm
[6]. https://pdfs.semanticscholar.org/d237/bbb195007c1f9c91395488df0d62641f0e40.pdf
[7]. Timos K. Sellis, Nick Roussopoulos and Christos Faloutsos, ―The R+-Tree: A Dynamic Index for Multi-Dimensional Objects‖, Proceedings of 13th International Conference on Very Large Data Bases, pp.507-518, 1987

Paper Type :: Research Paper
Title :: Study of Technical Support for Mobile Process Mining
Country :: India
Authors :: Mr. Dhiraj Rane || Dr. Mahendra Dhore
Page No. :: 10-17

A Process mining is relatively young research area that meets the gap between processes and various IT systems. Event logs are the primary sources for a processmining project and they are captured by different data sources including databases, ERPsystems, CRM systems, audit trails, mobile communication, hospital information systems, bank transaction logs,etc. The extracted knowledge from this log enable us to discover the actual process andexisting process model for further analysis, evaluation and continuous improvement intheir quality. This way, various process mining tools have been developed in the market.Nevertheless, there is a lack of sufficient and comprehensive evaluation frameworks thatassist users in selecting the right tool. This thesis provides the schematic view

Keywords: Process Mining, ProM, Simulation, Disco, MATLAB, NS2, RapidMiner

[1]. H. Hoehle and V. Venkatesh, ―Mobile application usability: conceptualization and instrument development,‖ MIS Quarterly, vol. 39, no. 2, pp. 435–472, 2015. View at Google Scholar · View at Scopus
[2]. F. F. Ntawanga, A. P. Calitz, and L. Barnard, ―A context-aware model to improve usability of information display on smartphone apps for emerging users,‖ The African Journal of Information Systems, vol. 7, no. 4, p. 3, 2015. View at Google Scholar
[3]. V. V. S. M. Chintapalli, W. Tao, Z. Meng, K. Zhang, J. Kong, and Y. Ge, ―A comparative study of spreadsheet applications on mobile devices,‖ Mobile Information Systems, vol. 2016, Article ID 9816152, 10 pages, 2016. View at Publisher · View at Google Scholar · View at Scopus
[4]. H. Cai, C. Xie, L. Jiang, L. Fang, and C. Huang, ―An ontology-based semantic configuration approach to constructing Data as a Service for enterprises,‖ Enterprise Information Systems, vol. 10, no. 3, pp. 325–348, 2016. View at Publisher · View at Google Scholar · View at Scopus
[5]. B. Xu, L. D. Xu, H. Cai, C. Xie, J. Hu, and F. Bu, ―Ubiquitous data accessing method in iot-based information system for emergency medical services,‖ IEEE Transactions on Industrial Informatics, vol. 10, no. 2, pp. 1578–1586, 2014. View at Publisher · View at Google Scholar · View at Scopus

Paper Type :: Research Paper
Title :: An Overview of Mind Uploading
Country :: India
Authors :: Mrs. Mausami Sawarkar || Mr. Dhiraj Rane
Page No. :: 18-25

Mind uploading is an ongoing area of active research, bringing together ideas from neuroscience, computer science, engineering, and philosophy. Realistically, mind uploading likely lies many decades in the future, but the short-term offers the possibility of advanced neural prostheses that may benefit us. Mind uploading is the conceptual futuristic technology of transferring human minds tocomputer hardware using whole-brain emulation process. In this research work, we have discuss the brief review of the technological prospectsfor mind uploading, a range of philosophical and ethical aspects of the technology. We have also summarizes various issues for mind uploading...........

Keywords: Mind Uploading, Whole brain simulation

[1]. A framework for approaches to transfer of a mind's substrate, Sim Bamford
[2]. Goertzel, BEN; Ikle', Matthew (2012). "Introduction". International Journal of Machine Consciousness. 04: 1–3. doi:10.1142/S1793843012020015.
[3]. Coalescing minds: brain uploading-related group mind scenarios
[4]. Jump up to:a b c d e f g h Sandberg, Anders; Boström, Nick (2008). Whole Brain Emulation: A Roadmap (PDF). Technical Report #2008‐3. Future of Humanity Institute, Oxford University. Retrieved 5 April 2009. The basic idea is to take a particular brain, scan its structure in detail, and construct a software model of it that is so faithful to the original that, when run on appropriate hardware, it will behave in essentially the same way as the original brain.
[5]. Goertzel, Ben (December 2007). "Human-level artificial general intelligence and the possibility of a technological singularity: a reaction to Ray Kurzweil's The Singularity Is Near, and McDermott's critique of Kurzweil". Artificial Intelligence. 171 (18, Special Review Issue): 1161–1173. doi:10.1016/j.artint.2007.10.011.

Paper Type :: Research Paper
Title :: Literature Review: Analysis of Soft Computing Techniques Used In Pattern Recognition of 2-D Diagram/Object
Country :: India
Authors :: Dr. Girish Katkar || Mr. Nikam Vr
Page No. :: 26-29

When images are to be used in different areas of image analysis such as object recognition, it is important to reduce the amount of data in the image while preserving the important, characteristic, structural information. Many soft computing technique are been studied here, for object detection and analyzing the importance of it. Mathematics of soft computing technique varies according to the problem statement applied, here we are discussing most of the soft computing mathematics and how we are integrating with our object and pattern detection. We are discussing here about various past work in two dimensional diagram and pattern recognition. We have also discussed about some soft computing technique like Hough transform, genetic algorithm, neural network and ant colonization optimization.

[1]. Zadeh, Lotfi A., "Fuzzy Logic, Neural Networks, and Soft Computing," Communications of the ACM, March 1994, Vol. 37 No. 3, pages 77-84.
[2]. X. S. Yang, Z. H. Cui, R. Xiao, A. Gandomi, M. Karamanoglu, Swarm Intelligence and Bio-Inspired Computation: Theory and Applications, Elsevier, (2013).
[3]. D. K. Chaturvedi, "Soft Computing: Techniques and Its Applications in Electrical Engineering", Springer, (2008).
[4]. Shalinee Patel, Pinal Trivedi, and Vrundali Gandhi, "2D Basic Shape Detection Using Region Properties", International Journal of Engineering Research & Technology, vol. 2, no. 5, pp. 1147-1153, May 2013.
[5]. M. Sezgin and B. Sankur, "Survey over Image Thresholding Techniques and Quantitative Performance Evaluation", Journal of Electronic Imaging, vol. 13, no. 1, pp. 146–168, Jan. 2004.

Paper Type :: Research Paper
Title :: Overview of Intelligence Amplification
Country :: India
Authors :: Ashwinkumar Lilhare || Prof. Dhiraj Rane
Page No. :: 30-33

Intelligence amplification (I.A.) is a multidisciplinary field whose goal is to automate activities that presently require human intelligence. Recent successes in A.I. include computerized medical diagnosticians and systems that automatically customize hardware to particular user requirement. Perception is concerned with building model of the physical world from sensory input (visual, audio, etc.). Many important technical concepts have arisen from A.I. that unify these diverse problem areas and that from the foundation of the scientific discipline.

Keywords- Machine learning, Deep learning, Big data, Emotions Recognition.

[1]. B. Balzer, "HEARSAY-III: A Domain – Independent Framework For Expert Systems", Proceedings of the First Annual National Conference on Intelligence Amplification, 1980-August.
[2]. R. J. Brachman, R.E. Fikes, H.J. Levesque, "KRYPTON: Integrating Terminology and Assertion", Proceedings of the First Annual National Conference on Intelligence Amplification, 1983.
[3]. J. C. Kunz, A Physiological rule-based system for interpreting pulmonary function test rules, November 1978.
[4]. D. B. Lenat, "EURISCO: A Program That Learns New Heuristics and Domain Concepts", Artificial Intelligence, vol. 21, no. 1 and 2, March 1983.
[5]. J. D. Lowrance, T. D. Garvey, "Evidential Reasoning: A Developing Concept", IEEE 1982 Proceeding of the International Conference on Cybernetics and Society, 1982-Octomber

Paper Type :: Research Paper
Title :: An Overview of Redtactonhuman Area Networking Technology
Country :: India
Authors :: Ms.Tanushree N.Choudhari || Prof. Ms.Bhagyashree Ambulkar
Page No. :: 34-38

As, in these days international the communique generation may be very essential to speak with each other. To speak with each other we use gadgets like mobiles, pda's, pagers etc. And numerous networking technologies. Now what about if we should use yourself as a networking era as a RedTacton generation. RedTacton is a HAN (human area networking era) and it became advanced by means of NTT(Nippon Telegraph and cellphone Co-Operation),Japan in 2004. RedTacton transfers statistics 802.3half duplex conversation at the rate of 10 Mb/s. in this era the minute alternate in electric powered area generated with the aid of human because of RedTacton transmitter reasons the statistics switch .RedTacton conversation takes location within the RedTacton transmitter and RedTacton receiver..............

Keywords- RedTacton, Data, NTT, HAN, Transmission Mediumetc

[1]. wikipedia.RedTacton[Online].Available:http://en.wikipedia.org/wiki/RedTacton
[2]. .NTT (February 2005). "RedTacton: An innovative Human Area Networking technology.
[3]. Prof. VasantkumarUpadhye and Pooja C Kallatti,"Redtacton", International Journal of New Innovations in Engineering and Technology, Volume4Issue March 2016 ISSN : 2319-6319
[4]. M.Jadhav, KrushnkumarA.Bhanuse, Chetan S.Lokhande and Ms. A. A. Pujari, "Data Transfer Through Human Body using REDTACTON",INTERNATIONAL JOURNAL FOR RESEARCH IN EMERGING SCIENCE AND TECHNOLOGY, VOLUME-3, ISSUE-3, MAR-2016, E-ISSN: 2349-7610
[5]. Ashutoshkumar, M.V.N.R. Pavan Kumar, UtkarshKamble, Mahesh Dhebe , Amol Khot, "Overview on RedTacton Technology",Internatrch in Advent Technology, Vol.2, No.4, April 2014 E-ISSN: 2321-9637

Paper Type :: Research Paper
Title :: Survey on Artificial Life Brain
Country :: India
Authors :: Ms.Jivanjyoti S. Thakare || Prof. Rashmi Dukhi
Page No. :: 39-42

Three components of a brain model operating on neuromolecular computing principles are described. The first component comprises neurons whose input-output behavior is controlled by significant internal dynamics. Models of discrete enzymatic neurons, reaction-diffusion neurons operating on the basis of the cyclic nucleotide cascade, and neurons controlled by cytoskeletal dynamics are described. The second component of the model is an evolutionary learning algorithm which is used to mold the behavior of enzymedriven neurons or small networks of these neurons for specific function, usually pattern recognition or target seeking tasks.

Keywords- neuromolecular, cytoskeleton, perceptron,gyros,cortical.

[1]. Artificial brain '10 years away' 2009 BBC news
[2]. Aston University's news report about the project
[3]. The critics:
a. Searle, John (1980), "Minds, Brains and Programs", Behavioral and Brain Sciences, 3(3): 417–
457, doi:10.1017/S0140525X00005756, retrieved May 13, 2009
b. Dreyfus, Hubert (1972), What Computers Can't Do, New York: MIT Press, ISBN 0-06-090613-8
c. Penrose, Roger (1989), The Emperor's New Mind: Concerning Computers, Minds, and The Laws of Physics, Oxford University
Press, ISBN 0-14-014534-6
[4]. Voss, Peter (2006), "Essentials of general intelligence", in Goertzel, Ben; Pennachin, Cassio, Artificial General Intelligence, Springer, ISBN 3-540-23733-X, archived from the original on July 23, 2013
[5]. see Artificial Intelligence System, CAM brain machine and cat brain for examples

Paper Type :: Research Paper
Title :: Screenless Display Technology
Country :: India
Authors :: kalyani V. Chikhale || rupali Chikhale
Page No. :: 43-48

This paper discusses about the new computing technology i.e., Screenless display, that has become a good prospect in the near future for a wide range of applications. The main idea behind this technology is displaying the image without any physical screens like projector, LCD etc. This paper it is a survey paper that demonstrates about how the screen less display technology works and its applications in the various fields of science. Using this display technology, we can directly project any image on the human retina, free space and to the brain of human. It requires only light weight device and at the same time the privacy will be at the high state.

Keywords: Hologram, VRD, LCD, Screenless displays.

[1.] https://www.technologyreview.com/s/420266/the-future-of-interfaces-is-mobile-screen-less-and-invisible/
[2.] https://www.scribd.com/document/296700043/Final-Screenless-Display
[3.] https://www.scribd.com/doc/316412527/Report-Sem
[4.] https://www.slideshare.net/vikasraj225/screenless-display-report
[5.] https://www.scribd.com/document/355998334/V5I11-0311-1
[6.] https://www.seminarsonly.com/computer%20science/screenless-display-seminar-report-ppt-pdf.php

Paper Type :: Research Paper
Title :: Roles Ofhoneypot
Country :: India
Authors :: Ruchika Pantawane || Prof Sandhya Dahake
Page No. :: 49-53

These days, firewall innovation in the field of the system security has been utilized generally, The different methods for assaults, the weakness and constraints of firewall innovation are increasingly selfevident. The Research paper talks about the honeypot innovation in the field of the system security innovation. The existed lack of honeypot framework, the conveyed honeypot interruption framework dependent on interruption following was proposed. The framework utilizes circulated arrangement. It sends the system territory and utilizations the bundle stamping innovation to recognize wellsprings of genuine assaults. The existed system is secured better.

Keywords: Honeypot, Firewall, instruction tracking.

[1]. Y. Yun, Y. Hongli, M. Jia, "Design of distributed honeypot system based on intrusion tracking", 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN), pp. 196-198, 2011.
[2]. J.C. Chang, T. Vi-Lang, "Design of virtual Honeynet collaboration system in existing security research networks", 2010 International Symposium on Communications and Information Technologies (ISCIT), pp. 798-803, 2010.
[3]. L. Li, H. Sun, Z. Zhang, The Research and Design of Honeypot System Applied in the LAN Security in Beijing, pp. 360-363, 2011.
[4]. L. J. Zhang, "Honeypot-based defense system research and design", Computer Science and Information Technology 2009. ICCSIT 2009. 2nd IEEE International Conference on, pp. 466-470, 2009.
[5]. T. Holz, F. Raynal, "Detecting honeypots and other suspicious environments", Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop 2005. IAW '05., pp. 29-36

Paper Type :: Research Paper
Title :: Cognitive Computing Applications
Country :: India
Authors :: Ms. Nikita S. Lanjewar || Mr. Dhiraj Rane
Page No. :: 54-59

The goal of Cognitive computing is to simulate human thought process in a computerized model. The result is cognitive computing – a combination of cognitive science and computer science. Cognitive computing models provide a realistic roadmap to achieve artificial intelligence. Cognitive computing represents selflearning systems that utilize machine learning models to mimic the way brain works." Eventually, this technology will facilitate the creation of automated IT models which are capable of solving problems without human assistance Cognition comes from the human brain.

Keywords: Cognitive science, Human brain, Artificial Intelligence

[1]. https://www.techopedia.com/definition/32482/cognitive-technology
[2]. https://www.techopedia.com/definition/32710/cognitive-science
[3]. https://dataconomy.com/2017/01/cognitive-computing-next-level/

Paper Type :: Research Paper
Title :: A Study Of Student Monitoring System Through RFID
Country :: India
Authors :: Chetan Dilip Bhonde || Ms. Bhagyashree Ambulkar
Page No. :: 60-63

The idea behind this paper is to track the student in school campus and record the place where the student visited. The proposed system requires the RFID tag which will be embedded in the identity card of students. System also requires RFID readers which will be installed at various places in school campus and also in classes. When student comes in the range of reader then location can be found which will sends that location to server. The RFID card Reader reads the Student identity. The Interface software is responsible to record the location of the student in the server. The system generates the reports of location of the students. It is application which is completely automated and parents can see the location of their child through application.

Keywords: Security, Smart Monitoring, Smart Reader

[1]. N. Amiyana and M. Alias, "Attendance and Access Control System Using RFID System", (2011).
[2]. C. E. Geoffrey, "Automatic Access Control System using Student's Identification Card based on RFID Technology", Unpublished Thesis Faculty of Electrical Engineering, University of Teknologi Malaysia, (2012).
[3]. M. P. V. Mojares, G. A. T. Litan and J. G. Mojares, iNotified: An SMS and RFID-Based Notification System of Lipa City Colleges", Journal of Applied Global Research, vol. 6, no. 18, (2013).
[4]. B. M. Stephen, E. S. Sanjay and R. W. John, "RFID Technology and Applications", Cambridge University Press, (2008).
[5]. https://www.rfidjournal.com/.

Paper Type :: Research Paper
Title :: 3-D Face Image Identification from Video Streaming Using Map Reduce (Hadoop)
Country :: India
Authors :: Ms.Shamali Baware || Prof. Rashmi Dukhi
Page No. :: 64-68

This paper focuses on the massive face identification system. I want to recognize a face from a lot of faces at public places. There are two of techniques are used to hit the goal: one is the 3Dface identification technique and the other is the Hadoop detection technique. Face identification technique find a similar face by 3D face features form mass face data. The Hadoop is a parallel processing structure; it can boost the computation ability. From imulation outcome, it is demonstrate that our algorithm is an efficient and accurate method for huge face identification.

Keywords: huge, Face identification, Hadoop, Features, Parallel Processing.

[1]. Advantages of hadoop"https://www.tutorialspoint.com/articles/advantages-of-hadoop-mapreduce-programming"
[2]. A Massive Face Recognition Algorithm Based on the Hadoop Technique Wei Li, Ming-Ming Li "http://ij3c.ncuteecs.org/volume/paperfile/4-4/IJ3C_5.pdf"
[3]. Face detection using Map Reduce "https://www.irjet.net/archives/V5/i3/IRJET-V5I3361.pdf "
[4]. M. E. Iber and M. L. Stone, "Low altitude wind shear detection using airport surveillance radars," IEEE Aerospace.Electron. Syst. Mag., vol. 10, no. 6, 1995, pp. 3-9.
[5]. P. Avis, "Surveillance and Canadian maritime domestic Security," Canada. Military J., 2003, pp. 9- 15.

Paper Type :: Research Paper
Title :: Study of Natural Language Processing and Its Factors
Country :: India
Authors :: Monica N.P Tiwari || Prof. Rupali Chikhale
Page No. :: 69-74

The Natural language processing is a combination of computer science and artificial intelligence.
Basically it is related to artificial intelligence. It is concerned that interaction between the computers and
human languages. These include the spoken language systems that integrate speech and natural language.
Natural language processing has a role in computer science because many aspects of the field deal with
linguistic(related language) features of computation. Natural language processing is an area of an application
and research to explore how the computers can be used to manipulates and understands natural language text
or speech to do useful things.The paper has been distributed in four phases by discussing different levels of NLP
and components ofNatural Language Generation (NLG) the history NLP, state ofthe art presenting the various
applications of NLP and current trends andits factors.

Keywords: Natural Language Processing; Aspects of Syntactic Analysis; Component of NLP; Matrix

[1] https://www.tutorialspoint.com/artificial_intelligence/artificial_intelligence_natural_language_processing.html.
[2] https://www.tutorialspoint.com/artificial_intelligence
[3] https://arxiv.org/pdf/1708.05148

Paper Type :: Research Paper
Title :: Overview on Airborne Internet System
Country :: India
Authors :: Mrunali Makeshwar || Prof. Sandhya Dahake
Page No. :: 75-83

NASA is undertaking the developmentof the Small Aircraft Transportation System (SATS).SATS could play a major role in decreasing the doorstop to destination times for travel and shipping. It is conceived to meet four major objectives: higher volume at non-towered/non-radar airports, lower landing minimums at minimally equipped landing facilities, increased single crew safety and mission reliability, and integrated procedures and systems for integrated fleet operations. SATS is to be prototyped in the 2005 timeframe.A key enabling technology for such a system is the development of an Airborne Internet to provide aircraft to the ground, ground to ground and aircraft to aircraft communications in support of air traffic management, fleet operations, and passenger support services............

Keywords: Small Aircraft Transportation System (SATS), Airborne Internet (AI)

[1]. Allen, David L., et al. The Economic Evaluation of CNS/ATM Transition, Boeing Commercial Airplane Group, September 2001.
[2]. BCI. Proposed FAA ATN Architecture White Paper, August 1999.
[3]. Eurocontrol. An Overview of ADS—Principles, Drivers, Activities, Technology and Standards, June 1999.
[4]. NEXCOM IPT AND-360. Next Generation Air/Ground Communications (NEXCOM) System Requirements Document (SRD), September 2001.
[5]. Global Weather Dynamics, Inc. Air Traffic Services Message Handling System (AMHS) on the ATN, http://www.gwdi.com/prodserv/ATS.html

Paper Type :: Research Paper
Title :: An overview of Agile Software Development and Future Scope
Country :: India
Authors :: Manishakaikadi || Dhiraj Rane
Page No. :: 84-92

Agile software development has rapidly gained a lot of interest in the field of software engineering. Agile software development, despite its novelty, is an important domain of research within software engineering discipline. Agile software development methods have caught the attention of software engineers and researchers worldwide. Scientific research is yet scarce, there has been little detailed reporting of the usage, penetration and success of agile methodologies in traditional, professional software development organizations. Report on the results of an empirical study conducted at Microsoft to learn about agile development and its perception by people in development, testing, and management. This paper reports results from a study, which aims to organize, analyses and make sense out of the dispersed field of agile software development methods.

Keywords: Agile, Scrum, Kanban, DSDM Atern, DAD, AUP.

[1]. https://www.agilealliance.org/agile101/
[2]. https://en.wikipedia.org/wiki/Agile_software_development
[3]. https://www.inflectra.com/ideas/whitepaper/introduction%20to%20agile%20development%20methods.aspx
[4]. http://www.inflectra.com/Agile-Software-Development.aspx
[5]. www.scrum.org