Papers by Prof. M. U. Bokhari

Testing Effort Dependent Delayed S-shaped Software Reliability Growth Model with Imperfect Debugging
In software development process, testing is one of the most important aspects and hence, software... more In software development process, testing is one of the most important aspects and hence, software reliably is very important factor of software systems. In the last four decades many software reliability growth model based on non-homogeneous Poisson process (NHPP) have been developed which incorporates testing effort function. However, the previous models are quite helpful for software engineers/ developers and commonly applicable in the industries and research institution. Still more testing-effort functions are required to incorporate into software reliability growth model. In this paper, we develop delayed S-shaped software reliability growth model with imperfect debugging which incorporates new modified Weibull testing–effort function (NMWTEF). We estimate the testing effort model parameters by least square and S-shaped software reliability growth parameters by maximum likelihood estimation techniques. We also present confidence interval of the software reliability growth parame...
International Journal of Information Technology and Computer Science, 2014
This paper discusses about the significance of selecting right requirements management tools. It'... more This paper discusses about the significance of selecting right requirements management tools. It's no secret that poorly understood user requirements and uncontrolled scope creep to many software project failures. Many of the application development professionals buy wrong tools for the wrong reasons. To avoid purchasing the more complex and expensive tool, the organization needs to be realistic about the particular problem for which they opt. Software development organizations are improving the methods, they use to gather, analyze, trace, document, prioritize and manage their requirements. This paper considers four leading Requirements Management tools; Analyst Pro, CORE, Cradle and Caliber RM, the focus is to select the appropriate tool according to their capabilities and customers need.
Object oriented design and development has become popular in today's software development environ... more Object oriented design and development has become popular in today's software development environment. As development of object oriented software is raising security problem is also increasing. The software security focuses on the effort and cost spent in lateral phases is much greater than the initial phase of software development process. It is understandable that most of the software is not well designed with respect to security concern. Therefore, to secure the software after deployment is not only costlier but difficult too. The aim of the paper is to study better way of design consideration to secure the object oriented software and discuss the tools which are required for the secure software development. This paper will provide an opportunity to understand the requirement for developing a technique at design phase.
Big Data for Cloud Based E-Iearning System
The aim of this paper is to highlight the combine effect of synchronous as well as asynchronous i... more The aim of this paper is to highlight the combine effect of synchronous as well as asynchronous in E-learning environment. Both type of learning have importance in different scenario. Not one of them can fulfill whole requirement individually. Synchronous training is done in real-time with a live instructor facilitating the training. Everyone logs in at a set time and can communicate directly with the instructor and with each other. It lasts for a set amount of time- from a single session to several weeks, months or even years. Asynchronous is e-learning in the more traditional sense of the word. It involves self-paced learning, CD-ROM-based, Network-based, Intranet-based or Internet-based. It may include access to instructors through on-line bulletin boards, on-line discussion groups and e-mail.
BSF-128 : A New Synchronous Stream Cipher Design
The main aim of this paper is to introduce a new synchronous stream cipher based on128 bit key le... more The main aim of this paper is to introduce a new synchronous stream cipher based on128 bit key length. The new proposed design is named “BSF-128” and is primarily based on a Non Linear Feedback Shift Register (NFSR), a Feedback with Carry Shift Register (FCSR) and an S-Box.
A Comparative Study on Lightweight Cryptography
The traditional cryptosystem only fulfills the requirements of desktop computing epoch. Renewable... more The traditional cryptosystem only fulfills the requirements of desktop computing epoch. Renewable lightweight cryptography algorithms are developing to beat the constraints of traditional cryptosystem, which provide tradeoff among cipher sort, attack immune, key size, plaintext length, and performance. The implementation of LWC algorithms is carried out on retaining in the mind that it will be implemented in minimal power consumption, fewer area requirement and also enough efficiency so it turns out to be ideal for such a resource confine devices such as RFID tags and wireless sensor node. In this, we are trying to emerge with frequent LWC algorithms which are grouped into stream cipher, block cipher, and hybrid model, and also reveal them, at the last a comparison is conducted on the effective parameters.
An effective model for big data analytics
2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016
As the amount of data is increasing with the enormous amount we have entered into a new era of da... more As the amount of data is increasing with the enormous amount we have entered into a new era of data and the term coined for this is `Big Data'. From the knowledge point of view this huge amount of data is of great importance and it requires super large computing powers to analyze process and derive meaningful conclusions. The term big data is applicable to all the information that can no longer be handled using traditional means. It is interesting to see this challenge in terms of big data being faced by the organizations today. In this paper we have focused on various dimensions of Big Data and we have proposed a model for the management and analysis of Big Data.
International Journal of Engineering and Advanced Technology, 2019
Nowadays security has become a great concern in the field of computer science and information tec... more Nowadays security has become a great concern in the field of computer science and information technology. In order to protect data from unintended users and to achieve a desirable level of security, several cryptographic algorithms based on various technology have been proposed. Linear Feedback Shift Register (LFSR) may play an important role in the design of such cryptographic algorithms. LFSR based cryptographic algorithms are often lightweight in nature and are more suitable for resource constraining devices. In this paper we present a detailed analysis of LFSR and design of LFSR to implement cryptographic algorithms.
International Journal of Computer Applications, 2012
Stream Ciphers are one of the most important cryptographic techniques for data security due to it... more Stream Ciphers are one of the most important cryptographic techniques for data security due to its efficiency in terms of resources and speed. This study aims to provide a comprehensive survey that summarizes the existing cryptanalysis techniques for stream ciphers. It will also facilitate the security analysis of the existing stream ciphers and provide an opportunity to understand the requirements for developing a secure and efficient stream cipher design.

Web-Based GIS Softwares and It’s Applications : A Comparative study
Due to the improved performance of computer systems, Geographical information systems (GIS) are b... more Due to the improved performance of computer systems, Geographical information systems (GIS) are becoming more usual. As the time passes web-based GIS are becoming more and more important. Some of the GIS software’s are available free of cost also. Most information available in the world is available on the internet. World Wide Web (www) is a useful tool for gathering and manipulating the useful data and information. It is secure also we only share that information which we want to share and the remaining will be hidden from the others. In this paper, we are elaborating the web-based GIS software tools that are used in the development of a complete and complex real-life GIS application in the analysis, design and implementation. We describe characteristics of these web-based GIS software tools helpful to understand better and to develop different type of GIS based application software’s.
Web based Requirements Management Tools

Requirement is the foundation of the entire software development life cycle. With proper requirem... more Requirement is the foundation of the entire software development life cycle. With proper requirement management a project can deliver the right solution on time and within budget. Requirement elicitation, requirement specification, and requirement validation are important to assure the quality of requirement documentations. All these three activities can be better analyzed by the software requirement tools. There are a number of software requirement tools available both commercial and freely downloadable, which provide a variety and quality of software requirement documentation. In addition, as the vulnerabilities of software increase, system needs an additional requirement for the security aspect which protects the software from vulnerability and makes software more reliable. This paper provide a comparative study of requirement tools showing trends in the use of methodology for gathering, analyzing, specifying and validating the software requirements and the result presented in th...
E-learning can provide a learning environment without the boundaries limit of time and location. ... more E-learning can provide a learning environment without the boundaries limit of time and location. Our previous assumption for teaching and learning is Pen, Paper, Blackboard, and a class room but now we have lots of different technologies which change the view of learning concepts and put striking effect on teaching and learning through which teaching and learning can be made more effective, powerful and easily accessible. Here we have defined some of the tools and technologies through their use teacher can provide interactive and challenging learning. These are the Course Management System (Moodle, Joomla, OLAT, JOJO CMS), Interactive Board (eBeam, SMART boards) and SmartPen
Software Tools Required to Develop GIS Applications: An Overview
2012 Second International Conference on Advanced Computing & Communication Technologies, 2012
Due to the improved performance of computer systems, Geographic information systems (GIS) are bec... more Due to the improved performance of computer systems, Geographic information systems (GIS) are becoming more usual. In this paper, we are elaborating the software tools that are used in the development of a complete and complex real-life GIS application in the analysis, design and implementation. We describe characteristics of these software tools helpful to understand better and to develop different

Bokhari-WSD: Context Based Multimodal Word Sense Disambiguation
Word Sense Disambiguation (WSD) is one of the core challenging area for researchers since several... more Word Sense Disambiguation (WSD) is one of the core challenging area for researchers since several decades and it plays a crucial role in all natural language processing (NLP) applications viz. Information Retrieval, Information Extraction, Question Answering, Text Mining, Machine Translation etc. Researchers defined WSD as to identify the actual meaning of a word based on the context in which it occurs. Whereas in linguistic, context is defined as the text in which a word or passage appears and which helps ascertain its meaning. Hence, context of a word depends on different part of speech (POS) of a sentence i.e. Noun, Verb, pronoun, adjective and adverb. This paper proposes a novel approach for context based word sense disambiguation using soft sense disambiguation, map-reduce, knowledge based multimodal algorithm and WordNet.

Failure of wireless link is considered as one of popular challenges faced by Mobile Ad-Hoc Networ... more Failure of wireless link is considered as one of popular challenges faced by Mobile Ad-Hoc Networks (MANETs). Whereas this type of networks does not have any fixed routers or any pre-exist infrastructure. Also, every node is capable of movement and can be connected to other nodes dynamically. Therefore, the network topology will be changed frequently and unpredictably according to continuous interaction between nodes that simultaneously affect network topology in the basis of dynamic ad-hoc nature. This factor puts routing operation in critical area of research under mobile ad-hoc network field due to highly dynamic environment. To adapt this nature, MANETs demand new routing strategies to occupy these challenges. Thereafter, huge amount of protocols are proposed to argue with ad-hoc requirements. Thus, it is quite difficult to specify which protocols perform better under different mobile ad-hoc scenarios. This paper examines the prominent routing protocols that are designed for mob...
Bokhari-WSM: A Multimodal Lexical Word Sense Disambiguation
Word Sense Disambiguation (WSD) is one of the core challenging areas for researchers of both acad... more Word Sense Disambiguation (WSD) is one of the core challenging areas for researchers of both academia and industry since last few decades. It plays a crucial role in various natural language processing (NLP) applications viz. Information Retrieval, Information Extraction, Question Answering, Text Mining, Machine Translation etc. Besides single modal measures, multimodal or combination of measures also available in previous work. In this paper a multimodal WSD measure is proposed, that integrates the benefits of Wu & Palmer, Lesk and most frequent sense (MFS) measures. Experimental results on datasets Senseval-2 and Senseval-3 proves the proposed model Bokhari-WSM performs better than previous knowledge based lexical measures.
An Analysis of Linear Feedback Shift Registers in Stream Ciphers
Linear Feedback Shift Registers (LFSRs) have always received considerable attention in cryptograp... more Linear Feedback Shift Registers (LFSRs) have always received considerable attention in cryptography. Owing to the good statistical properties, large period and low implementation costs, LFSR have achieved wide acceptance in developing stream ciphers. This paper intends to present a self-contained and comprehensive analysis of linear feedback shift registers and their application in stream ciphers. This research focuses on analyzing the mechanism of an LFSR, the two implementation variations and various properties of LFSR, which play a vital role in stream cipher design. In the last section of this paper, we address the security aspect of LFSR based stream ciphers and different techniques to enhance it.
In software system development, security is a very crucial issue and is the demand of time in thi... more In software system development, security is a very crucial issue and is the demand of time in this connected world. But often engineers think after software development. Security should be given higher priority in software development life cycle. Considering security from early stages of life indicates good research and development. This paper mainly focuses on security activities involve in developing secure software"s. Identifying security risks and managing those risks based on spiral model. A new spiral model with Multilevel Security Spiral (MSS) has been proposed with security activities.
Uploads
Papers by Prof. M. U. Bokhari