Girish Sharma - Academia.edu (original) (raw)
Papers by Girish Sharma
Advances in intelligent systems and computing, Sep 30, 2020
Journal of Applied Geochemistry, 2016
The radiometric analysis of grab and channel samples of Lower Mahadek sandstone of Pongtung area ... more The radiometric analysis of grab and channel samples of Lower Mahadek sandstone of Pongtung area in the Pynursla Plateau have indicated presence of high uranium concentration though gamma ray logging of exploratory boreholes does not show significant results. To address this anomalous behavior between surface and subsurface data, statistical analyses of grab, channel and subsurface samples were carried out. The results indicate presence of thorium bearing minerals in Lower Mahadek sandstone and basement granites and confirm the subsurface continuation of three different geological formations.
ACM Transactions on Knowledge Discovery From Data, Mar 9, 2022
Data analysis involves the deployment of sophisticated approaches from data mining methods, infor... more Data analysis involves the deployment of sophisticated approaches from data mining methods, information theory, and artificial intelligence in various fields like tourism, hospitality, and so on for the extraction of knowledge from the gathered and preprocessed data. In tourism, pattern analysis or data analysis using classification is significant for finding the patterns that represent new and potentially useful information or knowledge about the destination and other data. Several data mining techniques are introduced for the classification of data or patterns. However, overfitting, less accuracy, local minima, sensitive to noise are the drawbacks in some existing data mining classification methods. To overcome these challenges, Support vector machine with Red deer optimization (SVM-RDO) based data mining strategy is proposed in this article. Extended Kalman filter (EKF) is utilized in the first phase, i.e., data cleaning to remove the noise and missing values from the input data. Mantaray foraging algorithm (MaFA) is used in the data selection phase, in which the significant data are selected for the further process to reduce the computational complexity. The final phase is the classification, in which SVM-RDO is proposed to access the useful pattern from the selected data. PYTHON is the implementation tool used for the experiment of the proposed model. The experimental analysis is done to show the efficacy of the proposed work. From the experimental results, the proposed SVM-RDO achieved better accuracy, precision, recall, and F1 score than the existing methods for the tourism dataset. Thus, it is showed the effectiveness of the proposed SVM-RDO for pattern analysis.
2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), 2015
In this paper, we propose model driven software development and Security Performance Framework Mo... more In this paper, we propose model driven software development and Security Performance Framework Model to maintain the balance between security and performance for web applications. We know the large scale enterprise web applications are naturally complex and rigid to maintain. To deal with this complexity of web applications, we propose OMG's UML modeling language for forward engineering and SPF based software engineering practices to improve the performance of web applications. Model driven development approaches focus on software automation with generators that translate models into code. One of the major difficulties in developing web applications with object-oriented modeling is to translate a designed model into code that satisfies required real-time performance. We propose a method of automatic code synthesis ensuring that the synthesized code to be efficient enough to use the minimal amount of resources such as CPU time and memory. For implementation of Security Performanc...
Physical Review B, 2019
Dirac semimetals (DSM) and Weyl semimetal (WSM) fall under the generic class of three-dimensional... more Dirac semimetals (DSM) and Weyl semimetal (WSM) fall under the generic class of three-dimensional solids, which follow relativistic energy-momentum relation k = vF |k| at low energies. Such a linear dispersion when regularized on a lattice can lead to remarkable properties such as the anomalous Hall effect, presence of Fermi surface arcs, positive longitudinal magnetoconductance, and dynamic chiral magnetic effect. The last two properties arise due to the manifestation of chiral anomaly in these semimetals, which refers to the nonconservation of chiral charge in the presence of electromagnetic gauge fields. Here, we propose the planar Nernst effect, or transverse thermopower, as another consequence of chiral anomaly, which should occur in both Dirac and Weyl semimetals. We analytically calculate the planar Nernst coefficient for DSMs (type-I and type-II) and also WSMs (type-I and type-II), using a quasi-classical Boltzmann formalism. The planar Nernst effect manifests in a configuration when the applied temperature gradient, magnetic field, and the measured voltage are all co-planar, and is of distinct origin when compared to the anomalous and conventional Nernst effects. Our findings, specifically a 3D map of the planar Nernst coefficient in type-I Dirac semimetals (Na3Bi, Cd3As2 etc) and type-II DSM (PdTe2, VAI3 etc), can be verified experimentally by an in-situ 3D double-axis rotation extracting the full 4π solid angular dependence of the Nernst coefficient.
Physical review letters, Jan 27, 2017
In condensed matter physics, the term "chiral anomaly" implies the violation of the sep... more In condensed matter physics, the term "chiral anomaly" implies the violation of the separate number conservation laws of Weyl fermions of different chiralities in the presence of parallel electric and magnetic fields. One effect of the chiral anomaly in the recently discovered Dirac and Weyl semimetals is a positive longitudinal magnetoconductance. Here we show that chiral anomaly and nontrivial Berry curvature effects engender another striking effect in Weyl semimetals, the planar Hall effect (PHE). Remarkably, the PHE manifests itself when the applied current, magnetic field, and the induced transverse "Hall" voltage all lie in the same plane, precisely in a configuration in which the conventional Hall effect vanishes. In this work we treat the PHE quasiclassically, and predict specific experimental signatures for type-I and type-II Weyl semimetals that can be directly checked in experiments.
International Journal of Intelligent Systems and Applications, 2017
This research paper propose experimental support to secure Round Trip Engineering and use of secu... more This research paper propose experimental support to secure Round Trip Engineering and use of security performance flexib ility trusted operating systems for the designing of secure web applications. In this research paper, for security concern, we suggest use of trusted operating systems as a platform to run these web applications. In this regard, a nu mber of trusted operating systems like Argus, Trusted Solaris, and Virtual Vault have been developed by various companies to handle the increasing need of security. For improving the performance o f same web applications, we observe that all security checks in a Trusted Operating System are not necessary. As per our suggestion, various unnecessary security checks can be skipped by admin istrator, so that system perfo rmance o f these web applications can improve. These unnecessary security checks, system calls and operations can be easily identified at the time o f requirement elicitation and Requirement Engineering. For examp le, as we know, the popular web servers deal with public information. In this web applicat ion, the need for security checks during reads from disk seems like a waste of CPU cycles. On the other hand the real security need for servers seems to be of the write accesses. This research paper aims to support the efficiency of object-oriented class-based programming and object oriented modeling in secure software development.
Physical Review B, 2017
In the presence of parallel electric and magnetic fields, the violation of separate number conser... more In the presence of parallel electric and magnetic fields, the violation of separate number conservation laws for the three dimensional left and right handed Weyl fermions is known as the chiral anomaly. The recent discovery of Weyl and Dirac semimetals has paved the way for experimentally testing the effects of chiral anomaly via magneto-transport measurements, since chiral anomaly can lead to negative longitudinal magneto-resistance (LMR) while the transverse magneto-resistance remains positive. More recently, a type-II Weyl semimetal (WSM) phase has been proposed, where the nodal points possess a finite density of states due to the touching between electron-and hole-pockets. It has been suggested that the main difference between the two types of WSMs (type-I and type-II) is that in the latter, chiral anomaly induced negative LMR (positive longitudinal magnetoconductance) is strongly anisotropic, vanishing when the applied magnetic field is perpendicular to the direction of tilt of Weyl fermion cones in a type-II WSM. We analyze chiral anomaly in a type-II WSM in quasiclassical Boltzmann framework, and find that the chiral anomaly induced positive longitudinal magnetoconductivity is present along any arbitrary direction. Thus, our results are pertinent for uncovering transport signatures of type II WSMs in different candidate materials.
Journal of Global Research in Computer Science, Jul 25, 2014
The concept of cloud computing has been prevailing in minds of every people, business as well as ... more The concept of cloud computing has been prevailing in minds of every people, business as well as scientific organizations. The hype of cloud is at high pace. Technology has become so advanced that most operating systems are compatible to work with cloud providers because cloud computing is based on pay per usage and market oriented policy. They provide facilities and easy accessibility to users for accessing resources in multiple environments. In this paper, various aspects of cloud computing and its applications are presented. The paper also presents pros and cons of ANEKA-one of .NET application framework to develop cloud computing platform in multiple virtual environment as well as physical environment. It is compatible with Windows and Linux both. It describes various programming models that convert applications into cloud application thus enabling ANEKA cloud infrastructure in system. ANEKA is proven to be one of scalable and reliable technologies in cloud terminology.
We study the problem of a random Gaussian vector field given that a particular real quadratic for... more We study the problem of a random Gaussian vector field given that a particular real quadratic form Q is arbitrarily large. We prove that in such a case the Gaussian field is primarily governed by the fundamental eigenmode of a particular operator. As a good check of our proposition we use it to re-derive the result of Adler dealing with the structure of field in the vicinity of a high local maxima. We have also applied our result to an incompressible homogeneous Gaussian random flow in the limit of large local helicity and calculate the structure of the flow.
International Journal of Computer Applications, 2014
Working in cloud environment and accessing its services is fascinating task. It is one of modern ... more Working in cloud environment and accessing its services is fascinating task. It is one of modern technological areas to work upon it for development of nation and increase economy rate. The paper deals with improving desktop cloud computing services with the help of technique called Memory Virtualization. Since virtualization is efficient to extent scalability of typical desktop-as-a-service and make it suitable for Wide Area Network (WAN's) environments. Desktop-as-a-Service (DaaS) in cloud computing means that user can access its own desktop services as well as services of other desktops located on remote servers. Memory virtualization not only works with virtual memory but it also maps physical memory instructions to actual machine memory. The instructions stored in machine memory are checked with incoming user client requests. Similar matched queries will result in generation of data using one of recovery techniques called Shadow Paging Technique. Data is produced and stored in remote cloud environment where user can access the data to perform their tasks. The proposed systematic model for accessing desktop services is shown in following paper by using memory virtualization technique. A comparison is also made between paravirtualization technique and memory virtualization technique that gives solution in favor of memory virtualization technique.
International Journal of Computer Applications, 2013
Most of the data ware house project fails to meet the business requirements and business goals be... more Most of the data ware house project fails to meet the business requirements and business goals because of the improper requirement engineering phase. The chaos all through the development of requirements evolves due to disparity between users and developers resulting in project devastations and terminations. Building a data warehouse is a very challenging task. Data warehouse quality depends on the quality of its requirement engineering models. Agent orientation is emerging as a unique paradigm for constructing Data ware house. Agent oriented systems are expected to be more powerful, more flexible, and more robust than conventional software systems. In this paper the detail discussion of agent oriented methodology used in early as well as late requirement elicitation. The proposed approach is illustrated through an case study of the general banking system for which Data Ware house is to be built to support decisional goals.
International Journal of Modern Education and Computer Science, 2015
In this paper we will propose model driven software development and Security Performance Framewor... more In this paper we will propose model driven software development and Security Performance Framework (SPF) Model to maintain the balance between security and performance for web applications. We propose that all security in a Trusted Operating System is not necessary. Some non-essential security checks can be skipped to increase system performance. These non essential security checks can be identified in any web application. For implementation of this Security Performance framework based trusted operating system, we propose object oriented based Code generation through forward engineering. This involves generating source code of web application from one or more Object oriented Rational Rose model. The novel integration of security engineering with model-driven software expansion approach has varied advantages. To maintain security in various applications like Ecommerce, Banking, Marketplace services, Advertising, Auctions, Comparison shopping, Mobile commerce Payment, Ticketing, Online insurance policy management, we have to use high secured operating systems. In this regard a number of trusted operating systems like Argus, Trusted Solaris, and Virtual Vault have been developed by various companies to handle the increasing need of security. Due to high security reason these operating systems are being used in defense. But still these secure operating systems have limited scope in commercial sector due to lower performance; actually this security will come at a cost. This paper analyzes UML-based software development solutions for SPF to manage the security, performance and modeling for web applications.
International Journal of System Assurance Engineering and Management, 2015
ABSTRACT This paper describes UML-based foundations for model driven architecture and forward eng... more ABSTRACT This paper describes UML-based foundations for model driven architecture and forward engineering of UML static models. In this paper, we propose an integrated environment for designing object-oriented enterprise models. In this projected process for Fast Prototyping, we design object models like use case diagram, sequence diagram, class diagram, etc. We use object-oriented conceptual modeling techniques to design and develop various applications like E-commerce, Banking, Comparison shopping, Ticketing, Online insurance policy management, product purchase system, etc. This paper suggests forward engineering to generate source code from object models through IBM Rational Rose software. This object oriented source code help software development team from analysis to maintenance phase as well as for round trip engineering. Due to high security concern, we have to use highly secure operating systems as a platform to run these web applications. In this regard, a number of trusted operating systems like Argus, Trusted Solaris, and Virtual Vault have been developed by various companies to handle the increasing need of security. The novel integration of security engineering with model-driven software expansion approach has various advantages. As we observe that all security checks in a Trusted Operating System is not necessary. Some non-essential security checks can be skipped by administrator to increase system performance. These non essential security checks can be easily identified at the time of requirement analysis. For example, the majority of web servers deal with pure public information. The majority of data on a web server is publicly readable and available to all users, but these users should not be capable to change the data on the web server. In this application, the need for security checks during reads from disk seems like a waste of CPU cycles. The real security need for web servers seems to be the security of write accesses, not read accesses. In this paper, we propose code generation, Class identification and Modeling for web applications through UML 2.0. Further we propose Security Performance flexibility model for the same to maintain the balance between security and performance for web applications.
Procedia - Social and Behavioral Sciences, 2013
Rising energy costs and increased awareness of emission problems in the production of Hot Mix Asp... more Rising energy costs and increased awareness of emission problems in the production of Hot Mix Asphalt (HMA) have brought attention to the potential benefits of Warm Mix Asphalt (WMA) in India. Warm-mix asphalt is the generic term for a variety of technologies that allow the producers of hot-mix asphalt pavement material to lower the temperatures at which the material is mixed and placed on the road. Crumb Rubber Modified Bitumen (CRMB) is a popular binder in India. CRMB is composed of bitumen binder and tyre rubber. Tyre rubber, at various percentages, is added to the binder, addition of tyre rubber into binder results in a new product, which requires higher mixing temperatures compared to the conventional one, as well as increased mixing time, so as to get the uniformity of the product. A laboratory study was conducted at CSIR-Central Road Research Institute (CRRI) to investigate, how a commercially available chemical additive can be used to bring down the mixing and compaction temperature of CRMB mix as compared to the hot mix CRMB. Four different temperature ranges were considered in this study viz 100 0 C to 105 0 C, 110 0 C to 115 0 C, 120 0 C to 125 0 C and 130 0 C to 135 0 C to determine the various performance characteristics. The CRMB bituminous mix was prepared in these four temperature ranges and various mix tests were carried out to indicate to how the lower production and compaction temperatures affect the properties and performance characteristics of the mixes. After the laboratory evaluation it was found that CRMB Warm mix can be successfully produced at temperature as low as 110 o C and can be compacted at 80-90 0 C as compared to CRMB hot mix (155 o C). Full scale performance study indicate that process is highly energy efficient and environment friendly, warm mixes After laboratory evaluation, a test track was successfully laid using low energy Crumb Rubber Modified Bitumen.
SSRN Electronic Journal, 2009
ABSTRACT In the past few years, peer-to-peer (P2P) networks have become an extremely popular mech... more ABSTRACT In the past few years, peer-to-peer (P2P) networks have become an extremely popular mechanism for large-scale content sharing. P2P systems have focused on specific application domains (e.g. music files, Video files) or on providing file system like capabilities. Now a days the tendency to place there data on global storage is increased. But successful implementation of conventional databases on the P2P systems is not yet reported. In this paper we have presented a hierarchical based data distribution scheme for the P2P networks. Simulation result shown that, database partitions may be placed on the peers with the availability factor more than 0.7 gives better results. Degradation index, throughput, utilization are all the parameters dependents on the availability factor.
Computers & Structures, 2013
The ability to invert large matrices quickly and accurately determines the effectiveness of a com... more The ability to invert large matrices quickly and accurately determines the effectiveness of a computational tool. Current literature suggests that time complexity of matrix inversion is 2 or higher. This paper redesigns the Gauss Jordan algorithm for matrix inversion on a CUDA platform to exploit the large scale parallelization feature of a massively multithreaded GPU. The algorithm is tested for various types of matrices and the performance metrics are studied and compared with CPU based parallel methods. We show that the time complexity of matrix inversion scales as n as long as n 2 threads can be supported by the GPU.
ABSTRACT Since more and more enterprises become dependent upon computer communication network or ... more ABSTRACT Since more and more enterprises become dependent upon computer communication network or networked computing applications particularly after the growth of local area network, wide area network and internet. Therefore failure of a single ...
Advances in intelligent systems and computing, Sep 30, 2020
Journal of Applied Geochemistry, 2016
The radiometric analysis of grab and channel samples of Lower Mahadek sandstone of Pongtung area ... more The radiometric analysis of grab and channel samples of Lower Mahadek sandstone of Pongtung area in the Pynursla Plateau have indicated presence of high uranium concentration though gamma ray logging of exploratory boreholes does not show significant results. To address this anomalous behavior between surface and subsurface data, statistical analyses of grab, channel and subsurface samples were carried out. The results indicate presence of thorium bearing minerals in Lower Mahadek sandstone and basement granites and confirm the subsurface continuation of three different geological formations.
ACM Transactions on Knowledge Discovery From Data, Mar 9, 2022
Data analysis involves the deployment of sophisticated approaches from data mining methods, infor... more Data analysis involves the deployment of sophisticated approaches from data mining methods, information theory, and artificial intelligence in various fields like tourism, hospitality, and so on for the extraction of knowledge from the gathered and preprocessed data. In tourism, pattern analysis or data analysis using classification is significant for finding the patterns that represent new and potentially useful information or knowledge about the destination and other data. Several data mining techniques are introduced for the classification of data or patterns. However, overfitting, less accuracy, local minima, sensitive to noise are the drawbacks in some existing data mining classification methods. To overcome these challenges, Support vector machine with Red deer optimization (SVM-RDO) based data mining strategy is proposed in this article. Extended Kalman filter (EKF) is utilized in the first phase, i.e., data cleaning to remove the noise and missing values from the input data. Mantaray foraging algorithm (MaFA) is used in the data selection phase, in which the significant data are selected for the further process to reduce the computational complexity. The final phase is the classification, in which SVM-RDO is proposed to access the useful pattern from the selected data. PYTHON is the implementation tool used for the experiment of the proposed model. The experimental analysis is done to show the efficacy of the proposed work. From the experimental results, the proposed SVM-RDO achieved better accuracy, precision, recall, and F1 score than the existing methods for the tourism dataset. Thus, it is showed the effectiveness of the proposed SVM-RDO for pattern analysis.
2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), 2015
In this paper, we propose model driven software development and Security Performance Framework Mo... more In this paper, we propose model driven software development and Security Performance Framework Model to maintain the balance between security and performance for web applications. We know the large scale enterprise web applications are naturally complex and rigid to maintain. To deal with this complexity of web applications, we propose OMG's UML modeling language for forward engineering and SPF based software engineering practices to improve the performance of web applications. Model driven development approaches focus on software automation with generators that translate models into code. One of the major difficulties in developing web applications with object-oriented modeling is to translate a designed model into code that satisfies required real-time performance. We propose a method of automatic code synthesis ensuring that the synthesized code to be efficient enough to use the minimal amount of resources such as CPU time and memory. For implementation of Security Performanc...
Physical Review B, 2019
Dirac semimetals (DSM) and Weyl semimetal (WSM) fall under the generic class of three-dimensional... more Dirac semimetals (DSM) and Weyl semimetal (WSM) fall under the generic class of three-dimensional solids, which follow relativistic energy-momentum relation k = vF |k| at low energies. Such a linear dispersion when regularized on a lattice can lead to remarkable properties such as the anomalous Hall effect, presence of Fermi surface arcs, positive longitudinal magnetoconductance, and dynamic chiral magnetic effect. The last two properties arise due to the manifestation of chiral anomaly in these semimetals, which refers to the nonconservation of chiral charge in the presence of electromagnetic gauge fields. Here, we propose the planar Nernst effect, or transverse thermopower, as another consequence of chiral anomaly, which should occur in both Dirac and Weyl semimetals. We analytically calculate the planar Nernst coefficient for DSMs (type-I and type-II) and also WSMs (type-I and type-II), using a quasi-classical Boltzmann formalism. The planar Nernst effect manifests in a configuration when the applied temperature gradient, magnetic field, and the measured voltage are all co-planar, and is of distinct origin when compared to the anomalous and conventional Nernst effects. Our findings, specifically a 3D map of the planar Nernst coefficient in type-I Dirac semimetals (Na3Bi, Cd3As2 etc) and type-II DSM (PdTe2, VAI3 etc), can be verified experimentally by an in-situ 3D double-axis rotation extracting the full 4π solid angular dependence of the Nernst coefficient.
Physical review letters, Jan 27, 2017
In condensed matter physics, the term "chiral anomaly" implies the violation of the sep... more In condensed matter physics, the term "chiral anomaly" implies the violation of the separate number conservation laws of Weyl fermions of different chiralities in the presence of parallel electric and magnetic fields. One effect of the chiral anomaly in the recently discovered Dirac and Weyl semimetals is a positive longitudinal magnetoconductance. Here we show that chiral anomaly and nontrivial Berry curvature effects engender another striking effect in Weyl semimetals, the planar Hall effect (PHE). Remarkably, the PHE manifests itself when the applied current, magnetic field, and the induced transverse "Hall" voltage all lie in the same plane, precisely in a configuration in which the conventional Hall effect vanishes. In this work we treat the PHE quasiclassically, and predict specific experimental signatures for type-I and type-II Weyl semimetals that can be directly checked in experiments.
International Journal of Intelligent Systems and Applications, 2017
This research paper propose experimental support to secure Round Trip Engineering and use of secu... more This research paper propose experimental support to secure Round Trip Engineering and use of security performance flexib ility trusted operating systems for the designing of secure web applications. In this research paper, for security concern, we suggest use of trusted operating systems as a platform to run these web applications. In this regard, a nu mber of trusted operating systems like Argus, Trusted Solaris, and Virtual Vault have been developed by various companies to handle the increasing need of security. For improving the performance o f same web applications, we observe that all security checks in a Trusted Operating System are not necessary. As per our suggestion, various unnecessary security checks can be skipped by admin istrator, so that system perfo rmance o f these web applications can improve. These unnecessary security checks, system calls and operations can be easily identified at the time o f requirement elicitation and Requirement Engineering. For examp le, as we know, the popular web servers deal with public information. In this web applicat ion, the need for security checks during reads from disk seems like a waste of CPU cycles. On the other hand the real security need for servers seems to be of the write accesses. This research paper aims to support the efficiency of object-oriented class-based programming and object oriented modeling in secure software development.
Physical Review B, 2017
In the presence of parallel electric and magnetic fields, the violation of separate number conser... more In the presence of parallel electric and magnetic fields, the violation of separate number conservation laws for the three dimensional left and right handed Weyl fermions is known as the chiral anomaly. The recent discovery of Weyl and Dirac semimetals has paved the way for experimentally testing the effects of chiral anomaly via magneto-transport measurements, since chiral anomaly can lead to negative longitudinal magneto-resistance (LMR) while the transverse magneto-resistance remains positive. More recently, a type-II Weyl semimetal (WSM) phase has been proposed, where the nodal points possess a finite density of states due to the touching between electron-and hole-pockets. It has been suggested that the main difference between the two types of WSMs (type-I and type-II) is that in the latter, chiral anomaly induced negative LMR (positive longitudinal magnetoconductance) is strongly anisotropic, vanishing when the applied magnetic field is perpendicular to the direction of tilt of Weyl fermion cones in a type-II WSM. We analyze chiral anomaly in a type-II WSM in quasiclassical Boltzmann framework, and find that the chiral anomaly induced positive longitudinal magnetoconductivity is present along any arbitrary direction. Thus, our results are pertinent for uncovering transport signatures of type II WSMs in different candidate materials.
Journal of Global Research in Computer Science, Jul 25, 2014
The concept of cloud computing has been prevailing in minds of every people, business as well as ... more The concept of cloud computing has been prevailing in minds of every people, business as well as scientific organizations. The hype of cloud is at high pace. Technology has become so advanced that most operating systems are compatible to work with cloud providers because cloud computing is based on pay per usage and market oriented policy. They provide facilities and easy accessibility to users for accessing resources in multiple environments. In this paper, various aspects of cloud computing and its applications are presented. The paper also presents pros and cons of ANEKA-one of .NET application framework to develop cloud computing platform in multiple virtual environment as well as physical environment. It is compatible with Windows and Linux both. It describes various programming models that convert applications into cloud application thus enabling ANEKA cloud infrastructure in system. ANEKA is proven to be one of scalable and reliable technologies in cloud terminology.
We study the problem of a random Gaussian vector field given that a particular real quadratic for... more We study the problem of a random Gaussian vector field given that a particular real quadratic form Q is arbitrarily large. We prove that in such a case the Gaussian field is primarily governed by the fundamental eigenmode of a particular operator. As a good check of our proposition we use it to re-derive the result of Adler dealing with the structure of field in the vicinity of a high local maxima. We have also applied our result to an incompressible homogeneous Gaussian random flow in the limit of large local helicity and calculate the structure of the flow.
International Journal of Computer Applications, 2014
Working in cloud environment and accessing its services is fascinating task. It is one of modern ... more Working in cloud environment and accessing its services is fascinating task. It is one of modern technological areas to work upon it for development of nation and increase economy rate. The paper deals with improving desktop cloud computing services with the help of technique called Memory Virtualization. Since virtualization is efficient to extent scalability of typical desktop-as-a-service and make it suitable for Wide Area Network (WAN's) environments. Desktop-as-a-Service (DaaS) in cloud computing means that user can access its own desktop services as well as services of other desktops located on remote servers. Memory virtualization not only works with virtual memory but it also maps physical memory instructions to actual machine memory. The instructions stored in machine memory are checked with incoming user client requests. Similar matched queries will result in generation of data using one of recovery techniques called Shadow Paging Technique. Data is produced and stored in remote cloud environment where user can access the data to perform their tasks. The proposed systematic model for accessing desktop services is shown in following paper by using memory virtualization technique. A comparison is also made between paravirtualization technique and memory virtualization technique that gives solution in favor of memory virtualization technique.
International Journal of Computer Applications, 2013
Most of the data ware house project fails to meet the business requirements and business goals be... more Most of the data ware house project fails to meet the business requirements and business goals because of the improper requirement engineering phase. The chaos all through the development of requirements evolves due to disparity between users and developers resulting in project devastations and terminations. Building a data warehouse is a very challenging task. Data warehouse quality depends on the quality of its requirement engineering models. Agent orientation is emerging as a unique paradigm for constructing Data ware house. Agent oriented systems are expected to be more powerful, more flexible, and more robust than conventional software systems. In this paper the detail discussion of agent oriented methodology used in early as well as late requirement elicitation. The proposed approach is illustrated through an case study of the general banking system for which Data Ware house is to be built to support decisional goals.
International Journal of Modern Education and Computer Science, 2015
In this paper we will propose model driven software development and Security Performance Framewor... more In this paper we will propose model driven software development and Security Performance Framework (SPF) Model to maintain the balance between security and performance for web applications. We propose that all security in a Trusted Operating System is not necessary. Some non-essential security checks can be skipped to increase system performance. These non essential security checks can be identified in any web application. For implementation of this Security Performance framework based trusted operating system, we propose object oriented based Code generation through forward engineering. This involves generating source code of web application from one or more Object oriented Rational Rose model. The novel integration of security engineering with model-driven software expansion approach has varied advantages. To maintain security in various applications like Ecommerce, Banking, Marketplace services, Advertising, Auctions, Comparison shopping, Mobile commerce Payment, Ticketing, Online insurance policy management, we have to use high secured operating systems. In this regard a number of trusted operating systems like Argus, Trusted Solaris, and Virtual Vault have been developed by various companies to handle the increasing need of security. Due to high security reason these operating systems are being used in defense. But still these secure operating systems have limited scope in commercial sector due to lower performance; actually this security will come at a cost. This paper analyzes UML-based software development solutions for SPF to manage the security, performance and modeling for web applications.
International Journal of System Assurance Engineering and Management, 2015
ABSTRACT This paper describes UML-based foundations for model driven architecture and forward eng... more ABSTRACT This paper describes UML-based foundations for model driven architecture and forward engineering of UML static models. In this paper, we propose an integrated environment for designing object-oriented enterprise models. In this projected process for Fast Prototyping, we design object models like use case diagram, sequence diagram, class diagram, etc. We use object-oriented conceptual modeling techniques to design and develop various applications like E-commerce, Banking, Comparison shopping, Ticketing, Online insurance policy management, product purchase system, etc. This paper suggests forward engineering to generate source code from object models through IBM Rational Rose software. This object oriented source code help software development team from analysis to maintenance phase as well as for round trip engineering. Due to high security concern, we have to use highly secure operating systems as a platform to run these web applications. In this regard, a number of trusted operating systems like Argus, Trusted Solaris, and Virtual Vault have been developed by various companies to handle the increasing need of security. The novel integration of security engineering with model-driven software expansion approach has various advantages. As we observe that all security checks in a Trusted Operating System is not necessary. Some non-essential security checks can be skipped by administrator to increase system performance. These non essential security checks can be easily identified at the time of requirement analysis. For example, the majority of web servers deal with pure public information. The majority of data on a web server is publicly readable and available to all users, but these users should not be capable to change the data on the web server. In this application, the need for security checks during reads from disk seems like a waste of CPU cycles. The real security need for web servers seems to be the security of write accesses, not read accesses. In this paper, we propose code generation, Class identification and Modeling for web applications through UML 2.0. Further we propose Security Performance flexibility model for the same to maintain the balance between security and performance for web applications.
Procedia - Social and Behavioral Sciences, 2013
Rising energy costs and increased awareness of emission problems in the production of Hot Mix Asp... more Rising energy costs and increased awareness of emission problems in the production of Hot Mix Asphalt (HMA) have brought attention to the potential benefits of Warm Mix Asphalt (WMA) in India. Warm-mix asphalt is the generic term for a variety of technologies that allow the producers of hot-mix asphalt pavement material to lower the temperatures at which the material is mixed and placed on the road. Crumb Rubber Modified Bitumen (CRMB) is a popular binder in India. CRMB is composed of bitumen binder and tyre rubber. Tyre rubber, at various percentages, is added to the binder, addition of tyre rubber into binder results in a new product, which requires higher mixing temperatures compared to the conventional one, as well as increased mixing time, so as to get the uniformity of the product. A laboratory study was conducted at CSIR-Central Road Research Institute (CRRI) to investigate, how a commercially available chemical additive can be used to bring down the mixing and compaction temperature of CRMB mix as compared to the hot mix CRMB. Four different temperature ranges were considered in this study viz 100 0 C to 105 0 C, 110 0 C to 115 0 C, 120 0 C to 125 0 C and 130 0 C to 135 0 C to determine the various performance characteristics. The CRMB bituminous mix was prepared in these four temperature ranges and various mix tests were carried out to indicate to how the lower production and compaction temperatures affect the properties and performance characteristics of the mixes. After the laboratory evaluation it was found that CRMB Warm mix can be successfully produced at temperature as low as 110 o C and can be compacted at 80-90 0 C as compared to CRMB hot mix (155 o C). Full scale performance study indicate that process is highly energy efficient and environment friendly, warm mixes After laboratory evaluation, a test track was successfully laid using low energy Crumb Rubber Modified Bitumen.
SSRN Electronic Journal, 2009
ABSTRACT In the past few years, peer-to-peer (P2P) networks have become an extremely popular mech... more ABSTRACT In the past few years, peer-to-peer (P2P) networks have become an extremely popular mechanism for large-scale content sharing. P2P systems have focused on specific application domains (e.g. music files, Video files) or on providing file system like capabilities. Now a days the tendency to place there data on global storage is increased. But successful implementation of conventional databases on the P2P systems is not yet reported. In this paper we have presented a hierarchical based data distribution scheme for the P2P networks. Simulation result shown that, database partitions may be placed on the peers with the availability factor more than 0.7 gives better results. Degradation index, throughput, utilization are all the parameters dependents on the availability factor.
Computers & Structures, 2013
The ability to invert large matrices quickly and accurately determines the effectiveness of a com... more The ability to invert large matrices quickly and accurately determines the effectiveness of a computational tool. Current literature suggests that time complexity of matrix inversion is 2 or higher. This paper redesigns the Gauss Jordan algorithm for matrix inversion on a CUDA platform to exploit the large scale parallelization feature of a massively multithreaded GPU. The algorithm is tested for various types of matrices and the performance metrics are studied and compared with CPU based parallel methods. We show that the time complexity of matrix inversion scales as n as long as n 2 threads can be supported by the GPU.
ABSTRACT Since more and more enterprises become dependent upon computer communication network or ... more ABSTRACT Since more and more enterprises become dependent upon computer communication network or networked computing applications particularly after the growth of local area network, wide area network and internet. Therefore failure of a single ...