Arun Misra

Arun Misra
  • National Dairy Research Institute

About

31
Publications
4,264
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
494
Citations
Introduction
Current institution
National Dairy Research Institute

Publications

Publications (31)
Conference Paper
Vehicular Ad hoc Networks (VANETs) is a subclass of Mobile Ad hoc Networks where moving nodes are vehicles that move with very high speed on roads. The continuous availability of the network for efficient and reliable communication is the major challenge in vehicular networks due its dynamic topology. The network gets partitioned due to the high sp...
Conference Paper
Full-text available
Introduction: About 60 percent of the world's pasture land (about 2.2 million sq km), just less than half the world's usable surface is covered by grazing systems. These are distributed between arid, semi arid and sub humid, humid, temperate and tropical highlands zones. This supports about 360 million cattle (half of which are in the humid savanna...
Article
A dynamic version of Environmental Adaption Method (EAM) is proposed in this paper. Environmental Adaption Method for Dynamic Environment (EAMD) is an improvement over EAM, which works in dynamic environment with real valued parameters. Unlike EAM the theory of this algorithm is based on adaption of species in dynamic environment which gradually be...
Conference Paper
The methods of searching optimal solutions are distinct in different evolutionary algorithms. Some of them do search by exploiting whereas others do by exploring the whole search space. For example Genetic Algorithm (GA) is good in exploitation whereas the Environmental Adaption Method (EAM) performs well in exploring the whole search space. Indivi...
Article
Full-text available
Change in any software application seems to be very simple when someone demands it, but the complexity of the task appears during implementation phase. Change implementation is acceptable when it includes the requested functionality as well as improves and preserves the quality of software. Complexity is an important issue for software development...
Article
Full-text available
AODV-MR (on-demand routing protocol with multi-radio extension) has been designed to support multi-radio interfaces; it uses more than one interface of the same mesh router or gateways for broadcasting duplicated control packets (i.e., RREQ, RRER, and HELLO message) or to rebroadcast it. We have modified AODV-MR, by allocating one interface in a dy...
Chapter
Dynamic Host Configuration Protocol(DHCP) allows the terminals to have IP address for their introduction in to the network. In this paper, a secure DHCP system is proposed, not only for user authentication but also for addressing the other security issues like confidentiality, integrity and privacy. Proposed S-DHCP, makes use of the users legitimat...
Article
For many years, load balancing in distributed computing environment has been researched to enhance and optimize the scalability of the entire system. Although numerous works have been proposed on the issues of process migration and load balancing, a comprehensive approach still misses out on various fronts. An effort has been made in the present wo...
Article
IEEE LTSA framework for e-Learning provides a template that may be used for digital distance learning. However, with the advent of newer and faster communication technologies, the concept of on-line learning and evaluation came into being. Most of these systems are operating in an environment of distributed system. On-line learning expanded the ear...
Conference Paper
Trust management systems are the robust architectural frameworks for allowing authorization to resources of a distributed computing environment that could be cluster and grid based extendible to peer to peer paradigm. A policy driven methodology is adopted in cluster based architecture in order to provide control to remotely accessible resources. T...
Conference Paper
In context-aware system, components are dynamically adapted without requiring system to restart, in response to all possible changes in the execution environment. Existing approaches to make such a system more vigorous and safe, are both brittle and time intense. A approach has been devised for dynamic adaptation, to automate the component integrat...
Article
Due to the constant change in technology, lack of standardization, difficulties of changes and absence of distributed architecture, the business value of legacy systems have become weaker. We cannot undermine the importance of legacy systems because some of their functions are too valuable to be discarded and too expensive to reproduce. The softwar...
Article
In this paper, an agent-based open and adaptive system development process has been proposed which continuously change and evolve to meet new requirements. The proposed methodology is based on a model-based technique that provides a specific model for the type of information to be gathered and uses this model to drive the domain specific analysis p...
Conference Paper
The current business environment has become still more demanding in which organizations are under increasing pressure not only to increase revenue but also to respond quickly to changing market conditions. These organizations shall only be successful if they transform themselves and adapt on demand businesses paradigm. There is constant demand for...
Conference Paper
Load balancing in distributed computing environment enhances the availability and scalability of entire system. The computational paradigm has shifted dramatically from standalone computing, C/S computing, distributed computing to cluster computing paradigm. Although numerous works has been done on the issue of process migration and load balancing,...
Article
The main focus of this research is on Component Based Software Engineering (CBSE) and reliable generic connectors for the software components. An attempt has been made to describe n-tier architecture; in particular, data access architecture in a component based application. Having established this, an attempt has also been made to evaluate it again...
Article
Software Testing is an important process of software development that is performed to support and enhance reliability and quality of the software. It consist of estimating testing effort, selecting suitable test team, designing test cases, executing the software with those test cases and examining the results produced by those executions. Studies i...
Conference Paper
The basic principle in designing digital circuit hovers around reducing the required hardware thus reducing the cost too. To achieve this, we use Boolean expression that helps in obtaining minimum number of terms and does not contain any redundant pairs. The conventional methods for the minimization of the Boolean expressions are K-Map method and t...
Article
The rapid growth of the Internet in the recent past has encouraged global deployment of work by an increasing number of organizations around the world, and they are now in a better position to outsource their IT functions to specialist vendors. With the passage of time, we find more and more software systems moving into the maintenance phase. Such...
Article
Understanding the software system is known as program comprehension and is a cognitive process. This cognitive process is the driving force behind creation of software that is easier to understand i.e. has lower cognitive complexity, because essentially it is the natural intelligence of human brain that describes the comprehensibility of software....
Article
Web engineering is a mix of scientific, engineering, management and cognitive principles that are used to create web based software applications. In order to successfully build large and complex web based applications, web developers and practitioners should adopt a disciplined development process in order to achieve the desired goals. It is by far...
Conference Paper
This paper makes an attempt to propose cognitive software development model and demonstrate that the software development lifecycle should also be constrained by the laws of cognitive informatics. An attempt has also been made to frame cognitive complexity metrics for all the phases of cognitive software development process
Article
Software lifecycle management is a complex phenomenon with each stage posing its unique technical and other challenges. Maintenance and enhancement of software brings in its own share of complexities to this phase. While uncertainties associated with software baseline in themselves pose a huge challenge in planning and estimation of maintenance act...
Article
Software metrics provide a quantitative basis for the development and validation of models of software development process. Information gained from metrics is used in managing the development process in order to improve the reliability and quality of software product. The software metric is used to estimate various parameters of software developmen...
Article
Cognitive information complexity measure is based on cognitive informatics, which helps in comprehending the software characteristics. For any complexity measure to be robust, Weyuker properties must be satisfied to qualify as good and comprehensive one. In this paper, an attempt has also been made to evaluate cognitive information complexity measu...
Article
Most discipline of science have their own method of investigation built on foundation that is empirical and verifiable. Cognitive Informatics is no different. Cognitive Informatics is a field that studies internal information processing mechanism of the human brain and its application in software coding and computing. This paper attempts to empiric...
Conference Paper
IT outsourcing, which commenced as a cost reduction operation, has now become an essential parameter for measuring the operational efficiency of an organization. An increasing number of operational IT systems are moving into the maintenance phase, becoming potential candidates for outsourcing. Human and organizational factors, typical to maintenanc...
Conference Paper
In this paper, an attempt has been made to evaluate cognitive information complexity measure (CICM) terms of nine Weyuker properties. It has been found that all the nine properties have been satisfied by CICM and hence establishes cognitive information complexity measure based on information contained in the software as a robust and well-structured...
Article
As the information technology industry gains maturity, the number of software systems having moved into maintenance is rapidly growing. Often these systems are also potential candidates for outsourcing. However, adequate information regarding size, complexity, reliability, maintainability etc. of these systems is often missing. This makes the task...

Network

Cited By