Author
As an accomplished author, Varun has undertaken multiple best seller books in the domain
Books
Six international research publications and peer reviewer and evaluator at 100+ IEEE conferences in the domains of artificial intelligence, digital security, heuristic algorithms, and inter-process communications
Abstract: A software development life cycle model based on predicting and deciding maximum possible changes which can come in the time line of project completion has been proposed. The model makes it easy for developers to manage the constantly changing requirements and specifications. This model instead of focusing on people and resources focuses on architecture. It is not a replacement for Agile and other iterative models. It is addition of a new perspective of architecture to the existing software development life cycle methodologies.
Abstract: Open Mobile Gateway (OMG) will provide secure and controlled access to multiple Enterprise Applications via the Mobile Devices. OMG will comprise of Open Mobile Gateway Components (OMGC) which is deployed behind the firewall of the enterprise and Open Mobile Gateway Adaptors (OMGA) which is in front of the firewall. The OMGC will communicate with one or multiple enterprise application while the OMGA will be configured for communication with the Mobile Network Operator
Abstract: This research paper tries to bring a new concept of desktop advertising mechanism by synchronization it with running processes and data on users' side. This proposed approach works on basis of inter process communication interaction, scheduling, prioritization, desktop crawling and system calls. The running process status and data is fetched by proposed process, which will then seek relevant information from the remote ad server and display advertisements fetched based on keywords on user machine.
Abstract: The algorithm pertains to creation of a middle level message transmission mechanism between the highly sophisticated encryption technique and the messages transmitted by phonetic alphabet codes. The algorithm suggests two levels in the language with each level varying in complexity and advantages.
Abstract: A customized mechanism to detect, monitor and block the data packets according to the definitions submitted to the mechanism. The mechanism is robust easy to implement, maintain, update and enhance. The mechanism takes input as sample data packets which are to be blocked and checks those definitions with the data packets according to the protocols and algorithms which are a part of the mechanism.
Abstract: The algorithm pertains to creation of a middle level message transmission mechanism between the highly sophisticated encryption technique and the messages transmitted by phonetic alphabet codes. The algorithm suggests two levels in the language with each level varying in complexity and advantages.