Dharmender Singh Kushwaha
Motilal Nehru National Institute of Technology Allahabad
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Dharmender Singh Kushwaha.
ACM Sigsoft Software Engineering Notes | 2008
Dharmender Singh Kushwaha; Arun Kumar Misra
Software Testing is an important process of software development that is performed to support and enhance reliability and quality of the software. It consist of estimating testing effort, selecting suitable test team, designing test cases, executing the software with those test cases and examining the results produced by those executions. Studies indicate that more than fifty percent of the cost of software development is devoted to testing, with the percentage for testing critical software being even higher. Unless we can predict the testing effort and find efficient ways to perform effective testing, the percentage of development costs devoted to testing will increase significantly coupled with mismatch in project costing and development schedule. In order to estimate the testing effort, this paper makes an attempt to establish Cognitive Information Complexity Measure (CICM) as an appropriate estimation tool.
ACM Sigsoft Software Engineering Notes | 2006
Dharmender Singh Kushwaha; Arun Kumar Misra
Most discipline of science have their own method of investigation built on foundation that is empirical and verifiable. Cognitive Informatics is no different. Cognitive Informatics is a field that studies internal information processing mechanism of the human brain and its application in software coding and computing. This paper attempts to empirically demonstrate the amount of information contained in software and develops a concept of cognitive information complexity measure based on the information contained in the software. It is found that software with higher cognitive information complexity measure has more information units contained in it. Therefore cognitive information complexity measure can be used to understand the cognitive information complexity and the information coding efficiency of the software.
ACM Sigsoft Software Engineering Notes | 2006
Dharmender Singh Kushwaha; Arun Kumar Misra
Cognitive information complexity measure is based on cognitive informatics, which helps in comprehending the software characteristics. For any complexity measure to be robust, Weyuker properties must be satisfied to qualify as good and comprehensive one. In this paper, an attempt has also been made to evaluate cognitive information complexity measure in terms of nine Weyuker properties, through examples. It has been found that all the nine properties have been satisfied by cognitive information complexity measure and hence establishes cognitive information complexity measure based on information contained in the software as a robust and well-structured one.
international conference on autonomic and autonomous systems | 2008
Tarun Kumar Jain; Dharmender Singh Kushwaha; Arun Kumar Misra
The basic principle in designing digital circuit hovers around reducing the required hardware thus reducing the cost too. To achieve this, we use Boolean expression that helps in obtaining minimum number of terms and does not contain any redundant pairs. The conventional methods for the minimization of the Boolean expressions are K-Map method and the . The minimized expressions are used to design digital circuits. Since K-Map method gets exceedingly complex when the number of the variable exceed six, hence Quine-McCluskey tabulation method scores over this and is widely used .In the following paper we present optimized Quine- McCluskey method that reduces the run time complexity of the algorithm by proposing an efficient algorithm for determination of Prime Implicants.
The Journal of Object Technology | 2009
Shakti Mishra; Dharmender Singh Kushwaha; Arun Kumar Misra
Due to the constant change in technology, lack of standardization, difficulties of changes and absence of distributed architecture, the business value of legacy systems have become weaker. We cannot undermine the importance of legacy systems because some of their functions are too valuable to be discarded and too expensive to reproduce. The software industry and researchers have recently paid more attention towards the component based software development to enhance the productivity and accelerate time to market. Instead of re-implementing the business critical applications with-in time and resource constraints, the best option is Software Reengineering (SRE) with effective design and architecture which can make the system better for reusability and maintainability. The main motive behind the reengineering is integrating the legacy system with emerging technologies. To achieve these goals, we have proposed a systematic and concrete model named as Component Oriented Reverse Engineering (CORE). It aims to identify and develop reusable software components. By using the reverse engineering techniques; we can extract architectural information and services from legacy system and later on convert these services into components
ACM Sigsoft Software Engineering Notes | 2006
Dharmender Singh Kushwaha; Arun Kumar Misra
Understanding the software system is known as program comprehension and is a cognitive process. This cognitive process is the driving force behind creation of software that is easier to understand i.e. has lower cognitive complexity, because essentially it is the natural intelligence of human brain that describes the comprehensibility of software. The research area carrying out this study is cognitive informatics. This work has developed an improved cognitive information complexity measure (CICM) that is based on the amount of information contained in the software and encompasses all the major parameters that have a bearing on the difficulty of comprehension or cognitive complexity of software. It is also able to establish the relationship between cognitive complexity of a program and time taken to understand the program, thus mapping closely to the comprehension strategy of a person.
international conference on computer and communication technology | 2010
Ashish Sharma; Dharmender Singh Kushwaha
The various complexity measure established so far are based on code and cognitive value of the software. It is established that a high quality SRS is pre requisite for high quality software, hence this work attempts to empirically demonstrate that the complexity of the code to be produced can be determined based on IEEE software requirement specification document (IEEE 830–1993). Considering the shortcoming of code based approaches, the proposed approach is able to compute the complexity of yet to be coded software immediately after freezing the requirement in SDLC (Software Development Life Cycle) process. Results obtained show that the complexity values are comparable with other established measures and hence the complexity of the software to be produced could be computed from SRS documents. Its validity is established by evaluating proposed measure against Weyuker properties.
ACM Sigsoft Software Engineering Notes | 2009
Ranjit Singh; Shakti Mishra; Dharmender Singh Kushwaha
The popularity of web services within the IT industry continuous to grow. Accessing web services from a small device is very com-mon these days. There are number of challenges to access a web services on mobile device due to its limited resources and the lack of bandwidth in its communication network. In Mobile devices, Synchronous web services are not feasible. It makes the user wait while each Web service processes requests and returns results. Asynchronous Web services invocation solves this performance issue and enhances the end user experience by increasing server efficiency. The architecture of asynchronous web services is con-trollable and monitor able. In order to enhance the efficiency of a mobile web services, we have created a bridge between telephony application and web application. We integrate the telecommunica-tion facility and asynchronous invocation of web services. It ex-poses telephony services as web services, so that web application can easily access telecommunication facilities through SMS messaging.
2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing | 2011
Sanjeev Pippal; Vishu Sharma; Shakti Mishra; Dharmender Singh Kushwaha
Software-as-a-Service (SaaS) is a service model for delivering application as cloud services over the internet on subscription basis to multiple clients. This has forced the use of shared databases termed as multitenant databases. Multitenancy refers to a technology where a single instance of application serves requests from multiple clients. The word Tenant refers to a single organization (eg. an Institution) or person. In our proposed approach, shared database shared schema approach has been proposed that offers larger number of tenants (Educational Institutions) per database server as the single database serves the database requirements of multiple Institutions. Authentication and authorization are prime requirements when dealing with multitenancy. Kerberos authentication protocol is used on the top of multitenant database for participating educational institution in a heterogeneous environment, where a tenant can also voluntarily participate in the data centre.
international conference on computer and communication technology | 2011
Sanjeev Pippal; Aruna Kumari; Dharmender Singh Kushwaha
Cloud services are generally deployed in dedicated machines within Data-center. A cloud using distributed services and voluntary resources to build up its data center, where storage and computational resources of participating individual machines are harnessed non-intrusively, providing security to resources, services and users are primary objectives. Authentication and authorization are keys to any security mechanism. In this paper, we have made an attempt to address the associated concerns through an authentication and authorization model for a cloud computing paradigm. The paper also describes an improvement over traditional Kerberos protocol to authenticate the users and to access the services and resources in cloud, such that offsets certain limitations of Kerberos.
Collaboration
Dive into the Dharmender Singh Kushwaha's collaboration.
Motilal Nehru National Institute of Technology Allahabad
View shared research outputsMotilal Nehru National Institute of Technology Allahabad
View shared research outputsMotilal Nehru National Institute of Technology Allahabad
View shared research outputsMotilal Nehru National Institute of Technology Allahabad
View shared research outputsMotilal Nehru National Institute of Technology Allahabad
View shared research outputsMotilal Nehru National Institute of Technology Allahabad
View shared research outputs