Papers by Karanjeet Kahlon

Aspect oriented software development is a relatively new type of development that simplifies main... more Aspect oriented software development is a relatively new type of development that simplifies maintenance and increases usability of software. It is a new technique to support separation of concerns in software development. In aspect-oriented (AO) systems, the basic components are aspects and classes. Aspect Oriented models introduce new characteristics to use cases and class diagrams to account for their uniqueness. This helps bridge the gap between the currently used models and those that support Aspect oriented software development. Aspect oriented software development is an exciting new angle on software development that can serve as a good alternative to traditional models. Separation of concerns is a basic engineering principle that is also at the core of object-oriented analysis and design methods in the context of the Unified Modeling Language (UML). The UML gives the designer a rich, but somehow disorganized, set of views on her model as well as many features, such as design pattern occurrences, and also allowing her to add nonfunctional information to a model. Aspect-oriented concepts are applied to manage the multitude of design constraints. During the earlier stages, the research related with AOSD was focused at the implementation or codification level. In this paper, we describe a UML-based design notation to model the main concepts of aspects, their behavior, and their relationships with the base system through an example. The notation uses UML's class, collaboration, state and activity diagrams, to which it adds few new elements to model pointcut specification, pointcut activation, and the aspects' internal behavior. And for that we present various UML diagrams through an example to include aspects during the design phase.

Allocation of data or fragments in distributed database is a critical design issue and requires t... more Allocation of data or fragments in distributed database is a critical design issue and requires the most effort. It has the greater impact on the quality of the final solution and hence the operational efficiency of the system. Performance of the distributed database system is heavily dependent on allocation of data among the different sites over the network. The static allocation provides only the limited response to the change in workload. So, choosing an appropriate technique for allocation in the distributed database system is an important design issue. In this paper, a new dynamic data allocation algorithm for non-replicated distributed database system has been proposed. The proposed algorithm reallocates data with respect to the changing data access patterns with time constraint. This algorithm will decrease the movement of data over the network and also improve the overall performance of the system.
This paper presents some advances towards the quantitative evaluation of design attributes of obj... more This paper presents some advances towards the quantitative evaluation of design attributes of object oriented software systems. We believe that these attributes can express the quality of internal structure, thus being strongly correlated with quality characteristics like analyzability, changeability, stability and testabilility, which are important to software developers and maintainers. In order to measure the Object Oriented design characteristics, a suite of metrics have been adopted. A motivation behind the metrics suite is the coverage of the basic structural mechanisms as encapsulation, inheritance, polymorphism, reusability, Data hiding and message-passing. Data was collected from a project based on object oriented paradigms to calculate the metrics, which was developed using a sequential life cycle model.

A Parallel system is collection of tightly coupled processors typically of the same type. In the ... more A Parallel system is collection of tightly coupled processors typically of the same type. In the present study, loosely coupled personal computers in a workgroup over the Intranet are going to be used. Though, networked machines are having different types of processors with varying clock speed yet computing on the networked machines are becoming very popular to solve both data intensive and compute intensive scientific problems due to the demand for higher performance and lower cost. Usually computational intensive areas have been referred to as scientific processing viz. linear algebra, information retrieval etc. One of the driving forces behind this shift is the availability of portable robust software to utilize and manage a network of PC's. As more and more organizations have high-speed local area networks interconnecting many general-purpose desktop PC's, the combined computational resources may exceed the power of a single high performance parallel computer. Such a design of distributed memory architecture using message passing interface between cooperative tasks within a parallel application is also called parallel system with loosely coupled processors. Since different tools and techniques are available to utilize and manage a network of PCs. It is believed that an efficient and affordable model of distributed parallel system based on the networked machines can be created with the use of these portable robust softwares and standardization of distributed parallel computing on network of PCs can be done. In this paper, we studied the behavior of parametric TCP/IP and optimize the communication among the networked machines keeping in view latency and communication load on bandwidth.
Parallel processing is an efficient form of information processing system, which emphasizes the e... more Parallel processing is an efficient form of information processing system, which emphasizes the exploitation of concurrent events in the computing process. To achieve parallel processing it's required to develop more capable and cost-effective systems. In order to operate more efficiently a network is required to provide low latency and be able to handle large amount of traffic. Multistage Interconnection Network (1) plays a vital role on the performance of these multiprocessor systems. This paper introduces an irregular class of fault tolerant Multistage Interconnection Network (MINs) named as New Four Tree (NFT) Network. A NFT network can provide a "full access" capacity in presence of multiple faults. Performance measures show that NFT achieve a significant improvement over other popular existing irregular MINs like FT (7) (20), QT (19) and MFT (20).

- In the past decade, supercomputing has witnessed a paradigm shift from massively parallel super... more - In the past decade, supercomputing has witnessed a paradigm shift from massively parallel supercomputers to network computers. Though dedicated high end supercomputers still have their place in the market yet combined unused CPU cycles of desktop PCs available in the campus network can form comparable virtual supercomputers. Consequently, Parallel Processing in a network of PCs are attracted a boost of attention and becoming one of the most promising areas of large scale scientific computing. In this paper, we are presenting Grid-enabled PC Cluster (GPCC), exhibiting low latency and bandwidth scalable sub-communication system. The design of the GPCC is such that it keeps in view the socket buffer size of local and non-local nodes in the network environment. The design is relatively easy to use, inexpensive to apply and extremely accurate. The highly accurate results provided by TCP/IP ping-pong were coupled with parallel matrix multiplication benchmark. Parallel Matrix Multiplicat...

Reliability and path length analysis of irregular fault tolerant multistage interconnection network
ACM SIGARCH Computer Architecture News, 2010
ABSTRACT In this paper reliability and path length analysis of irregular Multistage Interconnecti... more ABSTRACT In this paper reliability and path length analysis of irregular Multistage Interconnection Networks have been presented. We have examined FT(Four Tree)[8],MFT(Modified Four Tree)[2],NFT(New Four Tree)[4],IFT(improved Four Tree)[5],IASN(Irregular Augmented Shuffle)[14] and IIASN(Improved Irregular Augmented Shuffle)[3] networks in which the number of switches in each stage are different in numbers and also have express links[11]. Using upper and lower bounds[7][13][15] for larger networks, the reliability[9] in terms of mean time to failure of all these networks are evaluated and compared with each other. Each source is connected to destination with one or multiple paths with varying path lengths in a network. The path length analysis of all these networks is also analyzed in this paper. A path length[8] algorithm for IIASN network is also propose

Testability Analysis of Aspect Oriented Software
International Journal of Computer Theory and Engineering, 2010
ABSTRACT Design for testability is an important issue in software engineering. Measuring and asse... more ABSTRACT Design for testability is an important issue in software engineering. Measuring and assessing the testability during the analysis or development phase of software engineering would help in planning testing activities. Testability becomes crucial in case of Aspect oriented software system (AOS), where control flows are generally distributed over the whole architecture because of the static structure and dynamic behavior of Aspect. This paper presents a generic and extensible measurement framework for Aspect oriented software testability. We identify a set of design attributes that are helpful to measure the testability of AOS. The goal of this framework is to provide structured guidance for facilitating empirical research on testability and point out parts of the design that need to be improved to reduce the final testing effort.
An Adaptive Weight Calculation based Bandwidth Allocation Scheme for IEEE 802.16 Networks
Journal of Emerging Technologies in Web Intelligence, 2014
ABSTRACT

Egyptian Informatics Journal, 2014
IEEE 802.16 standard has been proposed to support wide-range wireless broadband access. It is bas... more IEEE 802.16 standard has been proposed to support wide-range wireless broadband access. It is based on a common medium access control (MAC) protocol compliance with several physical layer specifications and operates in two modes Point-to-multipoint (PMP) and mesh mode. Physical layer specifications and MAC protocol signaling are already well defined for the standard. But, scheduling policies for IEEE 802.16 have been left as open issue to be explored by equipment manufactures. The objective of this survey is to investigate scheduling issues to ensure quality of service (QoS) support for WiMAX networks. Design issues for the development of schedulers have been presented. Classification and characteristics of various techniques based on their fundamental working principle are considered and summarized. Impact-able future issues in the area of QoS support for WiMAX have also been discussed.
Cluster Algorithm using Distributed Processing for Human Protein Function Prediction
International Journal of Applied Information Systems, 2012
Nonreplicated Static Data Allocation in Distributed Databases Using Biogeography-Based Optimization
Chinese Journal of Engineering, 2014
Effectiveness of refactoring metrics model to identify smelly and error prone classes in open source software
ACM SIGSOFT Software Engineering Notes, 2012
ABSTRACT

ACM SIGSOFT Software Engineering Notes, 2011
To assist maintenance and evolution teams, work needs to be done at the onset of software develop... more To assist maintenance and evolution teams, work needs to be done at the onset of software development. One such facilitation is refactoring the code, making it easier to read, understand and maintain. Refactoring is done by identifying bad smell areas in the code. In this paper, based on empirical analysis, we develop a metrics model to identify smelly classes. The role of two new metrics (encapsulation and information hiding) is also investigated for identifying smelly and faulty classes in software code. This paper first presents a binary statistical analysis of the relationship between metrics and bad smells, the results of which show a significant relationship. Then, the metrics model (with significant metrics shortlisted from the binary analysis) for bad smell categorization (divided into five categories) is developed. To verify our model, we examine the open source Firefox system, which has a strong industrial usage. The results show that proposed metrics model for bad smell can predict faulty classes with high accuracy, but in the case of the categorized model not all categories of bad smells can adequately identified the faulty and smelly classes. Due to certain limitations of our study more experiments are required to generalize the results of bad smell and faulty class identification in software code.

International Journal of Computer Applications, 2010
Object oriented development has proved its worth in today's system because its design and develop... more Object oriented development has proved its worth in today's system because its design and development is better, reliable and easier to access than the traditional methodologies. Due to updated requirements and lack of documentation in old systems has provided a motivation to revamp the systems. Rebuilding or redesigning the same system is highly expensive. To overcome this problem reverse engineering of the system is used as most suitable alternative. Field of reverse engineering is expanding its horizon day by day; it requires reusability not only at code level but also at higher level which can measure the analysis results and original system. Reverse engineering, strategy has been developed to analyse and modeling the OO files by designing the translator. It models and measures the OO by using traditional metrics and new encapsulation metrics (Public Factor (PuF) & Private Factor (PrF)) essential for developing the good software. In this work we tried to refine metrics especially for object-oriented programming and set of these metrics has been defined.
International Journal of Computer Applications, 2013
In the internet, BGP is de-facto inter-domain routing protocol. It is unprotected against number ... more In the internet, BGP is de-facto inter-domain routing protocol. It is unprotected against number of attacks such as prefix hijacking and traffic interference. There have been many incidents of prefix hijacking on internet. To protect BGP against these kinds of attacks several mechanisms exist but they are not implemented fully because it requires cooperation among tens of thousands of independent ASes. This paper proposes two mechanisms which will show that safety can be achieved by implementing these mechanisms on small group of ASes.
Neural Network-A Novel Technique for Software Effort Estimation
International Journal of Computer Theory and Engineering, 2010
... Jaswinder Kaur is doing M.Tech. from department of Computer Science & Eng... more ... Jaswinder Kaur is doing M.Tech. from department of Computer Science & Engineering & IT of Baba Banda Singh Bahadur Engineering College, Fateh Garh Sahib, Punjab, India. ... JaswinderKaur, Satwinder Singh, Dr. Karanjeet Singh Kahlon, Pourush Bassi Page 2. ...

Journal of Computer Science, 2008
Parallel processing is an efficient form of information processing system, which emphasizes the e... more Parallel processing is an efficient form of information processing system, which emphasizes the exploitation of concurrent events in the computing process. To achieve parallel processing it's required to develop more capable and cost-effective systems. In order to operate more efficiently a network is required to provide low latency and be able to handle large amount of traffic. Multistage Interconnection Network [1] plays a vital role on the performance of these multiprocessor systems. This paper introduces an irregular class of fault tolerant Multistage Interconnection Network (MINs) named as New Four Tree (NFT) Network. A NFT network can provide a "full access" capacity in presence of multiple faults. Performance measures show that NFT achieve a significant improvement over other popular existing irregular MINs like FT [7] [20], QT [19] and MFT [20].
Comparative Performance Study of Improved Heap Sort Algorithm on Different Hardware
Journal of Computer Science, 2009
Abstract Problem statement: Several efficient algorithms were developed to cope with the popular ... more Abstract Problem statement: Several efficient algorithms were developed to cope with the popular task of sorting. Improved heap sort is a new variant of heap sort. Basic idea of new algorithm is similar to classical Heap sort algorithm but it builds heap in another way. The ...
Uploads
Papers by Karanjeet Kahlon