Papers by Rajeev G Vishwakarma

In object oriented standard the analysis and design events are performed to produce models like a... more In object oriented standard the analysis and design events are performed to produce models like analysis model, use case model and design model. These models are developed using Unified Modeling Language abbreviated as UML. Visual modeling using UML is the part of unified software development process. The wholeness or fullness of documenting requirement engineering models like use case model, result in a better quality software product. If we miss anything or commit any mistake in use case model it may transmit to analysis phase. Further there are chances that the same bug is propagated to design, testing and so on until deployment. The cost of eradicating bugs in testing is very pricier than that of its removal in the starting phase or model. It is therefore very necessary to verify what model we are developing and after the model making process is verified it is necessary to validate the model; that is to declare that the model we have made is correct. In this paper we have investigated the verification of the process of modeling in object oriented paradigm and the validation of the models. This workout makes certain that we are working on the precise models to yield correct product from quality point of view. We have prepared the software metrics based on FI/LI/PI/NI approach of CMMI to evaluate the UML models.

Zenodo (CERN European Organization for Nuclear Research), Apr 9, 2021
The Object constraints can be described as the expressions that are used to insert important data... more The Object constraints can be described as the expressions that are used to insert important data in object oriented models. The Object Management Group founded a worldwide standard for object-oriented analysis and design artifacts specifically the diagrams. The specification and standard, known as the Unified Modeling Language, comprises model diagrams and the allied and associated semantics. Unified Modeling Language is meant for modeling and, the Object Constraint Language is the specification and standard for specifying expressions. These expressions add essential, crucial and critical information to object-oriented models and other object modeling workproducts. In Unified Software Development Process we have analysis & Design discipline to have complete architecture and design of the system. Analysis & Design discipline is followed by implementation discipline. The activities of the implementation phase are mainly captured in construction phase. In unified software development life cycle the expressions in the design model are forward engineered to produce or generate the source code. The source code that is generated depends a lot on the platform and the technology that are selected for the software development. We have investigated how the expressions are developed and incorporated in the models in an electronic business solution. Further object constraint language is used to form the expressions that are attached to the object oriented model and artifacts. Then models are forward engineered to generate the code. In a nutshell we produce code from abstract, models or diagrams making use of object constraints language that is to achieve round trip engineering format between model and code. In this paper we have generated expressions from object constraint perspective for a reward point system as applied to a customer in ebusiness. We have also evolved the Context Definition, Initial Values & Derivation Rules, Query Operations, Attributes and Operations in this regard.

Advances in intelligent systems and computing, 2013
The Object constraints can be described as the expressions that are used to insert important data... more The Object constraints can be described as the expressions that are used to insert important data in object oriented models. The Object Management Group founded a worldwide standard for object-oriented analysis and design artifacts specifically the diagrams. The specification and standard, known as the Unified Modeling Language, comprises model diagrams and the allied and associated semantics. Unified Modeling Language is meant for modeling and, the Object Constraint Language is the specification and standard for specifying expressions. These expressions add essential, crucial and critical information to object-oriented models and other object modeling workproducts. In Unified Software Development Process we have analysis & Design discipline to have complete architecture and design of the system. Analysis & Design discipline is followed by implementation discipline. The activities of the implementation phase are mainly captured in construction phase. In unified software development life cycle the expressions in the design model are forward engineered to produce or generate the source code. The source code that is generated depends a lot on the platform and the technology that are selected for the software development. We have investigated how the expressions are developed and incorporated in the models in an electronic business solution. Further object constraint language is used to form the expressions that are attached to the object oriented model and artifacts. Then models are forward engineered to generate the code. In a nutshell we produce code from abstract, models or diagrams making use of object constraints language that is to achieve round trip engineering format between model and code. In this paper we have generated expressions from object constraint perspective for a reward point system as applied to a customer in e-business. We have also evolved the Context Definition, Initial Values & Derivation Rules, Query Operations, Attributes and Operations in this regard.
International journal of computer and communication technology, Apr 1, 2013
The Technological intervention in field of Computer Science and Information Technology has made i... more The Technological intervention in field of Computer Science and Information Technology has made it possible to access medical records of Individuals electronically. Electronic Health Records systems which are distributed and need to be interoperable too. Important Business drivers for such kind of high level of interoperability introduce unique citizen ID. Though citizen have access to data from central repository and they can directly communicate with health care providers, but when it comes to security and confidentiality, technology fails to meet the requirements. In this paper we suggest a framework for authentication and authorization of Electronic medical Records System in consideration .It will help to build An Secure-Privacy Protected Electronic medical Record System.

Springer eBooks, 2012
In this paper we have investigated the unified process workflow from analysis and design perspect... more In this paper we have investigated the unified process workflow from analysis and design perspectives of software development life cycle. There are particular well defined roles to perform the life cycle activities. All these activities are streamed up in a typical capability pattern called workflow. When these activities are performed we need some artifacts as inputs. After the activities are done we receive some output artifacts. We have developed software process and software artifact metrics for the major artifacts and process of analysis and design workflow. We have suggested some metrics pertaining to the input and output artifacts. The metrics that we developed are for analysis and design process, software architecture document artifact, and design model artifact. Also we investigated how to quantify the artifact checklist items and make a decision about the quality for different attributes of the process and artifacts, and finally deciding upon the overall quality.
Object constraints can be described as the expressions that are used to insert important data in ... more Object constraints can be described as the expressions that are used to insert important data in object oriented models. The Object Management Group founded a worldwide standard for object-oriented analysis and design artifacts specifically the diagrams. The specification and standard, known as the Unified Modeling Language, comprises model diagrams and the allied and associated semantics. Unified Modeling Language is meant
Zenodo (CERN European Organization for Nuclear Research), Feb 28, 2023

Zenodo (CERN European Organization for Nuclear Research), Apr 7, 2021
In object oriented standard the analysis and design events are performed to produce models like a... more In object oriented standard the analysis and design events are performed to produce models like analysis model, use case model and design model. These models are developed using Unified Modeling Language abbreviated as UML. Visual modeling using UML is the part of unified software development process. The wholeness or fullness of documenting requirement engineering models like use case model, result in a better quality software product. If we miss anything or commit any mistake in use case model it may transmit to analysis phase. Further there are chances that the same bug is propagated to design, testing and so on until deployment. The cost of eradicating bugs in testing is very pricier than that of its removal in the starting phase or model. It is therefore very necessary to verify what model we are developing and after the model making process is verified it is necessary to validate the model; that is to declare that the model we have made is correct. In this paper we have investigated the verification of the process of modeling in object oriented paradigm and the validation of the models. This workout makes certain that we are working on the precise models to yield correct product from quality point of view. We have prepared the software metrics based on FI/LI/PI/NI approach of CMMI to evaluate the UML models.

International Journal of Engineering and Manufacturing
Aspect Oriented Software Development (AOSD) has been considered one of the most promising abstrac... more Aspect Oriented Software Development (AOSD) has been considered one of the most promising abstractions to make software structure more maintainable and configurable. It also helps to overcome two big issues of current object oriented programming principles, to reduce the problem of code tangling and code scattering. Aspect Oriented Programming (AOP) has been focused largely in the implementation/coding phase. But nowadays the AOP has been matured enough to turn into AOSD, as it the main objective of separation of concerns right through the process of software development. In this paper we deal with the impact of aspect in development of software especially in designing aspect with Unified Modelling Language (UML). We propose visual models to incorporate aspect and aspectual constructs as an UML metamodel approach and new extensions to UML. The proposed language aspect oriented design modelling language (AODML) is an extension for aspect modelling into existing UML specifications. This paper allows designers to specify and realize aspects in the design and implementation phase explicitly. The proposed visual models, supports Aspect, aspectual components and its association with base components i.e. classes to be incorporated into UML. AODML motivates designer to get benefited to develop the system using AOSD paradigm. It allows to model aspects in design diagrams so that it can be implemented in any AOP language effectively.

2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC)
In Aspect Oriented Software Development (AOSD) has been considered one of the most promising abst... more In Aspect Oriented Software Development (AOSD) has been considered one of the most promising abstractions to make software structure more maintainable and configurable. It also helps to overcome two big issues of current object oriented programming principles, to reduce the problem of code tangling and code scattering. Aspect Oriented Programming (AOP) has been focused largely in the implementation/ specifications. This will allow software developers to identify, specify and realize aspects in the coding phase. But nowadays the AOP has been matured enough to turn into AOSD, as it the main objective of separation of concerns right through the process of software development. In this paper we deal with the impact of aspect in development of software especially in requirements engineering phase. We propose visual models to incorporate aspect as an extension to Unified Modeling Language (UML) without breaking current UML specifications. Proposal is made as new extensions for aspect modelling into existing UML design and implementation phase explicitly. The proposed visual models, supports Aspect and its related components to be incorporated into UML use case model at abstract level as well as at architectural level. Aspect Oriented Use case model is an approach which allows designers extends and compiles Aspects into design models.

The World Wide interoperability for microwave access (WiMAX) technology support to the flexible c... more The World Wide interoperability for microwave access (WiMAX) technology support to the flexible channel sizes and different countries use different channel it depends on the rule and regulation of countries and their environment. The WiMAX network asymmetry is largely depends on DL:UL ratio. This paper investigates the effect of channel bandwidth in WiMAX network with network asymmetry using TCP New Reno. The performance of WiMAX network is evaluating by varying MAC layer parameter such as channel size, DL:UL ratio and other operating parameter such as downloading traffic (number of downloading wireless nodes). The performance of WiMAX network is measured in terms of throughput, goodput and number of packets drop. Index Terms— Downlink (DL), Goodput , IEEE 802.16, Medium access control (MAC), OFDM, Packet drop , Subscriber Stations (SSs), Transmission Control Protocol (TCP), Throughput, Uplink (UL) and World Wide interoperability for microwave access (WiMAX).

The WiMAX technology support to different cyclic prefix, modulation coding scheme, frame duration... more The WiMAX technology support to different cyclic prefix, modulation coding scheme, frame duration, simultaneous two way data transfer and propagation model. The WiMAX network asymmetry is largely depends on DL: UL ratio. This paper investigates the effect of Cyclic Prefix, Modulation Coding Scheme, Frame Duration, Two way transfer and Propagation model in WiMAX network with network asymmetry using TCP New Reno. The performance of WiMAX network is evaluating by varying MAC layer parameter such as cyclic prefix, modulation coding scheme, frame duration, DL: UL ratio and physical layer parameter such as propagation model and full duplex mode of data transfer and other operating parameter such as downloading traffic (number of downloading and uploading wireless nodes) and these parameters really affect the performance of WiMAX network. The performance of WiMAX network is measured in terms of throughput, goodput and number of packets drop.
International Journal of Wireless and Mobile Computing, 2016
WiMAX technology has features to support different MAC and physical layer parameters. The WiMAX n... more WiMAX technology has features to support different MAC and physical layer parameters. The WiMAX network asymmetry largely depends on DL:UL ratio. The performance of TCP Vegas in WiMAX network asymmetry is evaluated by varying MAC and physical layer parameters such as channel bandwidth, cyclic prefix, modulation coding scheme, frame duration, DL:UL ratio, propagation model, full duplex mode of data transfer and other operating parameters such as downloading traffic, and these parameters really affect the performance of TCP Vegas in WiMAX network. In this paper, the performance of WiMAX network is evaluated in terms of throughput, goodput and number of packets dropped.
2015 International Conference on Computer, Communication and Control (IC4), 2015
WiMAX technology supports to different MAC and Physical Layer parameters. The performance of TCP ... more WiMAX technology supports to different MAC and Physical Layer parameters. The performance of TCP Linux in WiMAX network is analyzed by varying MAC layer and Physical layer parameter such as channel bandwidth, cyclic prefix, modulation coding scheme, frame duration, DL: UL ratio, propagation model, full duplex mode of data transfer and other operating parameter such as downloading traffic. These parameters really affect the performance of TCP Linux in WiMAX network in case of network asymmetry. The WiMAX network asymmetry is largely depends on DL: UL ratio. The performance of WiMAX network is analyzed using three performance metrics such as throughput, goodput and number of packets dropped. This paper also gives the optimal parameters for MAC and Physical layer to enhance the data rate.
Energy consumption is a major issue in the wide deployment of Voice-over-IP (VoIP) over IEEE 802.... more Energy consumption is a major issue in the wide deployment of Voice-over-IP (VoIP) over IEEE 802.11 wireless LAN. This energy can be conserves by staying in sleep mode during VoIP call over WLAN. To this end, researchers have conducted extensive simulation and analytical studies to determine the consumed energy during VoIP call in different WLANs. These previous works, however, assume

Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, 2012
In Public key cryptography a message is sent after applying the digital signature and encryption ... more In Public key cryptography a message is sent after applying the digital signature and encryption techniques by the sender. These techniques are used so that the message properties such as confidentiality, integrity and unforgeability are maintained and the non-repudiation can be ensured at the receiving end. The digital signatures and encryption mechanisms can be combined to form a single logical step called Signcryption. In this paper a Signcryption scheme is suggested which is based on Elliptic Curve Cryptography (ECC) with an authentication technique of generating true random number from image for the authenticity of the valid message. The scheme provides additional security and authentication features which include the property of forward secrecy, public verifiability authenticity and counter steps. The proposed scheme provides better performance aspect for the security feature provided; compared to the traditional Signature-then-Encryption schemes based on ECC.
2014 Conference on IT in Business, Industry and Government (CSIBIG), 2014
A mobile ad-hoc network (MANET) is a self starting dynamic network comprising of mobile nodes tha... more A mobile ad-hoc network (MANET) is a self starting dynamic network comprising of mobile nodes that is connected through a wireless medium forming rapidly changing topologies. MANET is infrastructure less and can be set up anytime, anywhere. This paper presents comparison of protocol properties of MANET reactive routing protocols and analyzed them with respect to different number of nodes. The reactive routing protocols considered are AODV and DSR. The comparisons among these routing protocols are based on protocol property parameters such as End-to-End Delay, Packet delivery ratio with respect to different number of nodes.
2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies, 2011
Indian economy is mainly based on agriculture. The most important parameter for the agriculture i... more Indian economy is mainly based on agriculture. The most important parameter for the agriculture is timely and sufficient supply of water. Most of the farmers are dependent on electric water pumps for irrigation which demands electricity. The frequent, intermittent, low voltage supply of power to the agriculture sector has caused problems to the farmers who are spending their time monitoring
International Journal of Computer Applications, 2012
This paper present the comparison between the various available algorithms on the basis of their ... more This paper present the comparison between the various available algorithms on the basis of their structure, assumptions and the main thing is complexity. We compare the algorithms with our proposed one. We take the message complexity of various algorithms from previous papers. And calculate the message complexity for our newly define approach, and compare the calculated complexity with all the available algorithms complexity. The result shows that our proposed approach is more efficient than the previous approaches also it has less no of message passing during communication.
Uploads
Papers by Rajeev G Vishwakarma