Veena Bharti - Academia.edu (original) (raw)

Papers by Veena Bharti

Research paper thumbnail of Protocol Modelling and Validation Using Coloured Petri Nets

The paper deals with the issue of the verification of communication protocols based on integratio... more The paper deals with the issue of the verification of communication protocols based on integration of formal methods chosen (coloured Petri nets). A method is proposed, that uses the coloured petri net for protocol specification, and transformation rules for a translation of the specification into a Petri net while preserving the semantics of the specification. Coloured Petri nets are well-known formal method for their analytical power to deal with a problem of protocol verification: invariant, reach ability, deadlock and liveness analysis. Elements of theory behind the method are sketched in a short way. The method is illuminated by an example: RSVP Resource Reservation Protocol.

Research paper thumbnail of CPN Modeling of Network Protocol

Telecommunications and Radio Engineering, 2018

Research paper thumbnail of Smart System Using IoT to Protect the Kitchen From Fire

International Journal of Distributed Artificial Intelligence

This paper examines the new viewpoints that have evolved as a result of the advent of internet of... more This paper examines the new viewpoints that have evolved as a result of the advent of internet of things (IoT) in the kitchen. Companies are now exploring how internal knowledge and skillsets relate to the new technical needs that evolving digital environment entails; and they are learning more about IoT and connected products going through internal research. Accordingly, they hope to rely on the internet of things to keep kitchens safe. Cooking leads to cause of house fires and fire injuries. The bulk of the fires in the building started in the kitchens of the units. Three elements are required to start and maintain a fire. The human body is made up of these three elements: fuel, heat, and oxygen. Fire safety measures includes protect building from damage and death. An IoT-based system detects CO2 and Methane (CH4) levels in the environment and kitchen, as well as temperature. It has the ability to prevent accidents and save lives and property. When sensor data is synced, an IoT-ba...

Research paper thumbnail of Modelling of RSVP Protocol using Coloured Petri Net

The main formal technique used for RSVP specification and verification is CPNs. In this paper, th... more The main formal technique used for RSVP specification and verification is CPNs. In this paper, their functionality is described briefly by using RSVP without giving any formal definitions. The paper gives an informal introduction to the components, dynamic behaviour, occurrence and enabling mechanism of RSVP using CPNs.

Research paper thumbnail of Protocol Modelling and Validation Using Coloured Petri Nets

The paper deals with the issue of the verification of communication protocols based on integratio... more The paper deals with the issue of the verification of communication protocols based on integration of formal methods chosen (coloured Petri nets). A method is proposed, that uses the coloured petri net for protocol specification, and transformation rules for a translation of the specification into a Petri net while preserving the semantics of the specification. Coloured Petri nets are well-known formal method for their analytical power to deal with a problem of protocol verification: invariant, reach ability, deadlock and liveness analysis. Elements of theory behind the method are sketched in a short way. The method is illuminated by an example: RSVP Resource Reservation Protocol.

Research paper thumbnail of Survey of Network Protocol Verification Techniques

In the world of designing network protocols, verification is a crucial step to eliminate weakness... more In the world of designing network protocols, verification is a crucial step to eliminate weaknesses and inaccuracies of effective network protocols. There are many models and tools to verify network protocols, including, Finite State Machines (FSM), Colored Petri Nets (CP-Nets), Temporal Logic, Predicate Logic, Estelle Specification, Path based Approach etc. This paper presents a survey of various techniques for verifying correctness properties of communications protocol

Research paper thumbnail of Protocol Modelling and Validation Using Coloured Petri Nets

The paper deals with the issue of the verification of communication protocols based on integratio... more The paper deals with the issue of the verification of communication protocols based on integration of formal methods chosen (coloured Petri nets). A method is proposed, that uses the coloured petri net for protocol specification, and transformation rules for a translation of the specification into a Petri net while preserving the semantics of the specification. Coloured Petri nets are well-known formal method for their analytical power to deal with a problem of protocol verification: invariant, reach ability, deadlock and liveness analysis. Elements of theory behind the method are sketched in a short way. The method is illuminated by an example: RSVP Resource Reservation Protocol.

Research paper thumbnail of CPN Modeling of Network Protocol

Telecommunications and Radio Engineering, 2018

Research paper thumbnail of Smart System Using IoT to Protect the Kitchen From Fire

International Journal of Distributed Artificial Intelligence

This paper examines the new viewpoints that have evolved as a result of the advent of internet of... more This paper examines the new viewpoints that have evolved as a result of the advent of internet of things (IoT) in the kitchen. Companies are now exploring how internal knowledge and skillsets relate to the new technical needs that evolving digital environment entails; and they are learning more about IoT and connected products going through internal research. Accordingly, they hope to rely on the internet of things to keep kitchens safe. Cooking leads to cause of house fires and fire injuries. The bulk of the fires in the building started in the kitchens of the units. Three elements are required to start and maintain a fire. The human body is made up of these three elements: fuel, heat, and oxygen. Fire safety measures includes protect building from damage and death. An IoT-based system detects CO2 and Methane (CH4) levels in the environment and kitchen, as well as temperature. It has the ability to prevent accidents and save lives and property. When sensor data is synced, an IoT-ba...

Research paper thumbnail of Modelling of RSVP Protocol using Coloured Petri Net

The main formal technique used for RSVP specification and verification is CPNs. In this paper, th... more The main formal technique used for RSVP specification and verification is CPNs. In this paper, their functionality is described briefly by using RSVP without giving any formal definitions. The paper gives an informal introduction to the components, dynamic behaviour, occurrence and enabling mechanism of RSVP using CPNs.

Research paper thumbnail of Protocol Modelling and Validation Using Coloured Petri Nets

The paper deals with the issue of the verification of communication protocols based on integratio... more The paper deals with the issue of the verification of communication protocols based on integration of formal methods chosen (coloured Petri nets). A method is proposed, that uses the coloured petri net for protocol specification, and transformation rules for a translation of the specification into a Petri net while preserving the semantics of the specification. Coloured Petri nets are well-known formal method for their analytical power to deal with a problem of protocol verification: invariant, reach ability, deadlock and liveness analysis. Elements of theory behind the method are sketched in a short way. The method is illuminated by an example: RSVP Resource Reservation Protocol.

Research paper thumbnail of Survey of Network Protocol Verification Techniques

In the world of designing network protocols, verification is a crucial step to eliminate weakness... more In the world of designing network protocols, verification is a crucial step to eliminate weaknesses and inaccuracies of effective network protocols. There are many models and tools to verify network protocols, including, Finite State Machines (FSM), Colored Petri Nets (CP-Nets), Temporal Logic, Predicate Logic, Estelle Specification, Path based Approach etc. This paper presents a survey of various techniques for verifying correctness properties of communications protocol