Kamlesh Dutta

Learn More
The testing of applications for mobile computing devices is cumbersome due to the bounded computational resources that these devices have and diversity in mobile environments. There are many different types of emulators that have been proposed and used nowadays for this purpose. But these emulators typically cannot emulate: actual network speed and(More)
Advancement in the area of software engineering, mobile computing together with web technologies have paved way for myriad range of applications, including good quality E-learning software’s, delivering online classes in real time to unlimited number of students across the world, on a personalized E-learning space for every student. These E-learning(More)
Accurate estimation of software development parameters such as effort, cost, and schedule is very important for effectively managing software development projects. Several software development effort estimation models have been developed in the last few decades. Determining, which is the best estimation model is difficult to decide for a software management(More)
Prediction of software development effort is the key task for the effective management of any software industry. The accuracy and reliability of prediction mechanisms is also important. Neural network based models are competitive to traditional regression and statistical models for software effort estimation. This comprehensive article, covers various(More)
Cloud Computing has changed the strategy of the way of providing different services to business and government agent as well as to sole users. Cloud Computing provides scalable and on demand services to users irrespective of their physical area. But this computing technology has many challenges. One of them is on demand resource allocation. In this paper a(More)
Wireless sensor network consists of a large number of resource constrained sensor nodes. These sensor nodes communicate over wireless medium to perform a variety of information processing functionality. Due to broadcast nature of wireless medium, security is one of the major concerns and overlapping sensing range of sensor nodes results in redundancy in(More)