Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Girish Sharma is active.

Publication


Featured researches published by Girish Sharma.


International Journal of Computer Applications | 2011

A New Approach for Finding the various Optimal Variable Ordering to Generate the Binary Decision Diagrams (BDD) of a Computer Communication Network

Manoj Singhal; Girish Sharma; R. K. Chauhan

In this paper we have adopted a new approach for finding the various optimal ordering to generate the binary decision diagrams of a computer communication network. We have shown that these binary decision diagrams are of minimum size and take same time to generate. If two binary decision diagrams have the same size and representing the same Boolean function, then these binary decision diagrams are known as dual binary decision diagrams, because they are dual of each other. We have also shown that the reliability obtained from these dual binary decision diagrams is equal by applying Shannon’s decomposition.


International Journal of Computer Applications | 2014

Forward Engineering based Implementation of TOS in Social Networking

Nitish Pathak; Girish Sharma; Brij Mohan Singh

present generation of youth begins the day with the Facebook or other social website. Hundreds of millions of people all over the world make use of social websites, Internet portals, blogs, Wikis, etc. These sites such as MySpace, Facebook and YouTube have the essential features and equipped with the necessary computing facilities to keep gigantic online communities get going with secure manner. Due to rapid growth of networking, use of social networking sites in day to day life, data sharing, computer security has made a vital part of computer research & development. For maintaining the security in various applications like E- commerce Online goods and services, Banking, Marketplace services Advertising, Auctions, Comparison shopping, Mobile commerce Payment, Ticketing, An electronic payment system (EPS),Online insurance policy management, we have to use high secured operating systems. In this regard a number of extremely secure operating systems i.e. Trusted Operating Systems like SELinux, Argus, Trusted Solaris, Virtual Vault have been developed by companies such as Argus-Systems Group, Hewlett-Packard, and Sun Microsystems to handle the increasing need of security. Normally, due to high security reason these operating systems are being used in defense. But still these secure operating systems have limited scope in commercial sector and are not popular in corporate due to lower performance; actually this security will come at a cost. In this paper we will propose SPF Model to maintain the balance between security and performance for these operating systems. This SPF model of TOS can be implement for various applications. For implementation of these SPF based trusted operating system we propose object oriented based Code generation i.e. forward engineering i.e. process of generating source code from one or more OO Rational Rose model for web application like social networking. In this research paper we will discuss the issues and UML-based software development solutions for SPF to manage the security, performance and modeling for Social networking sites.


International Journal of Computer Applications | 2014

Memory Virtualization Technique for Efficient Access of Data Resources in Cloud Environment

Pankaj Lathar; Yudhvir Singh; Girish Sharma

Working in cloud environment and accessing its services is fascinating task. It is one of modern technological areas to work upon it for development of nation and increase economy rate. The paper deals with improving desktop cloud computing services with the help of technique called Memory Virtualization. Since virtualization is efficient to extent scalability of typical desktop-as-a-service and make it suitable for Wide Area Network (WAN’s) environments. Desktop-as-a-Service (DaaS) in cloud computing means that user can access its own desktop services as well as services of other desktops located on remote servers. Memory virtualization not only works with virtual memory but it also maps physical memory instructions to actual machine memory. The instructions stored in machine memory are checked with incoming user client requests. Similar matched queries will result in generation of data using one of recovery techniques called Shadow Paging Technique. Data is produced and stored in remote cloud environment where user can access the data to perform their tasks. The proposed systematic model for accessing desktop services is shown in following paper by using memory virtualization technique. A comparison is also made between paravirtualization technique and memory virtualization technique that gives solution in favor of memory virtualization technique.


Archive | 2019

Trusted Operating System-Based Model-Driven Development of Secure Web Applications

Nitish Pathak; Girish Sharma; Brij Mohan Singh

This paper adds security engineering into an object-oriented model-driven software development for real-life Web applications. In this paper, we use mining patterns in Web applications. This research paper proposes a unified modeling language-based secure software maintenance procedure. The proposed method is applied for maintaining a large-scale software product and real-life product-line products. After modeling, we can implement and run this Web application, on SPF-based trusted operating systems. As we know, reverse engineering of old software is focused on the understanding of legacy program code without having proper software documentation. The extracted design information was used to implement a new version of the software program written in C++. For secure designing of Web applications, this paper proposes system security performance model for trusted operating system. For re-engineering and re-implementation process of Web applications, this paper proposes the model-driven round-trip engineering approach.


International Journal of Data Mining And Emerging Technologies | 2014

C2MC: An Automated Tool of the Requirement Engineering Model for a Non Fading Data Warehouse

Sandeep Mathur; A K Soni; Girish Sharma

The requirement engineering model, CAGDI has been introduced and moved towards an object-oriented paradigm. The requirement modeling has been completed using the CAGDI model to develop the data ware house (DWH) for the banking system, and now it is converted into a software tool for implementation. In this paper, the implementation of the CAGDI model using a requirement elicitation form has been completed. Later on, this model was codified and a running software module was developed that stimulates the CAGDI model and generates the working software model for the same. These implementations produced a software tool named C2MC which stands for cluster creation and model comparison. The tool that has been developed can be applicable in cluster creation, listing the members of a cluster and comparing the AGDI model with the CAGDI to prove the valuables of CAGDI in terms of time and space complexity. This software tool can be used to achieve the automated CAGDI model. Thus, in this way, an automated requirement engineering model to develop the DWH for a banking system is achieved. The coding of C2MC has been done in the following two ways: a. object-based language and b. using structural language.


International Journal of Computer Applications | 2014

Client based Proactive Handoff in Heterogeneous Network

Santosh Kumar Shukla; Girish Sharma; Pooja Dubey

In the present scenario various wired and wireless networks are contributing in information access for different users. But as we are moving towards next generation, the communication is targeting for integration of these wired and wireless networks. Once a client obtains a global address from Internet gateway it is able to communicate with nodes in Internet or it is able to access information across Internet. Overall the client needs frequent mobility while communication. However due to improper handoff there is a serious problem of call drop when client moves from one location to another. Earlier only one network used to provide services to the client. This article specifies how integration of heterogeneous network can give better quality of service to the client. Therefore in this paper we propose a proactive handoff mechanism for clients under heterogeneous network


International Journal of Applied Research on Information Technology and Computing | 2014

Deriving Object-Oriented Taxonomy from the Requirement Engineering Model for a Non-Fading Data Warehouse

Sandeep Mathur; Anil Kumar Soni; Girish Sharma

Building a data warehouse (DWH) is a very challenging task. Most of the DWH projects fail to meet the business requirements and business goals because of the improper requirement engineering phase. The gap in between the development of requirements evolves due to disparity between the users and the developers, resulting in project devastation and terminations. DWH quality depends on the quality of its requirement engineering models. Agent orientation is emerging as a unique paradigm in requirement engineering for constructing DWH and maintaining the non-fading DWH property. Agent-oriented systems are expected to be more powerful, more flexible and more robust than conventional requirement elicitation models. The CAGDI stands for clustered agent-oriented decision information model, which has benefits over the agent goal decision information (AGDI) model and overcomes the short comings of the AGDI model. The model can be used in the early as well as in the late requirement elicitation. Object-oriented modelling is an important technique for database design because it organises system as a collection of interacting objects that combine data and behaviour. In this paper, the CAGDI model has been illustrated though the application of a banking system and at the end of the paper, the CAGDI model is given in the object-oriented paradigm in which the Unified Modelling Language UML diagrams, such as activity diagrams and sequential diagrams, have been discussed to prove the concept.


International Journal of Computer Applications | 2013

An Agent Oriented Approach of Requirement Engineering in Developing a Data Ware Houses for Banking System

Sandeep Mathur; Girish Sharma; A K Soni

of the data ware house project fails to meet the business requirements and business goals because of the improper requirement engineering phase. The chaos all through the development of requirements evolves due to disparity between users and developers resulting in project devastations and terminations. Building a data warehouse is a very challenging task. Data warehouse quality depends on the quality of its requirement engineering models. Agent orientation is emerging as a unique paradigm for constructing Data ware house. Agent oriented systems are expected to be more powerful, more flexible, and more robust than conventional software systems. In this paper the detail discussion of agent oriented methodology used in early as well as late requirement elicitation. The proposed approach is illustrated through an case study of the general banking system for which Data Ware house is to be built to support decisional goals.


International Journal of Modern Education and Computer Science | 2015

Experimental Analysis of SPF Based Secure Web Application

Nitish Pathak; Girish Sharma; Brij Mohan Singh


international conference on computing for sustainable global development | 2015

Designing of SPF based secure web application using forward engineering

Nitish Pathak; Brij Mohan Singh; Girish Sharma

Collaboration


Dive into the Girish Sharma's collaboration.

Top Co-Authors

Avatar

Brij Mohan Singh

College of Engineering Roorkee

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge