- Software Testing and Debugging Techniques
- Software Reliability and Analysis Research
- IPv6, Mobility, Handover, Networks, Security
- Software Engineering Research
- Software System Performance and Reliability
- Advanced Malware Detection Techniques
- Mobile Agent-Based Network Management
- Spam and Phishing Detection
- Network Security and Intrusion Detection
- Network Traffic and Congestion Control
- Software-Defined Networks and 5G
- Mobile Ad Hoc Networks
- Wireless Networks and Protocols
- Wireless Communication Networks Research
- Advanced Optical Network Technologies
- Advanced Software Engineering Methodologies
- Network Packet Processing and Optimization
- Opportunistic and Delay-Tolerant Networks
- VLSI and Analog Circuit Testing
- Formal Methods in Verification
- Misinformation and Its Impacts
- Sentiment Analysis and Opinion Mining
- Energy Efficient Wireless Sensor Networks
- Security and Verification in Computing
- Web Application Security Vulnerabilities
KIIT University
2015-2024
Odisha University of Agriculture and Technology
2022
Odisha University of Technology and Research
2022
Weatherford College
2022
IBM (United States)
2001-2014
Lancaster University
2013
Carnegie Mellon University
2013
Microsoft Research (United Kingdom)
2013
University of Duisburg-Essen
2013
IBM Research - Thomas J. Watson Research Center
2005-2006
Application-level protocol abstraction is required to support seamless mobility in next-generation heterogeneous wireless networks. Session initiation (SIP) provides the for multimedia applications such However, handoff procedure with SIP suffers from undesirable delay and hence packet loss some cases, which detrimental like voice over IP (VoIP) or streaming video that demand stringent quality of service (QoS) requirements. In this article we present a SIP-based architecture supports soft...
This paper deals with multicasting in an internetwork mobile hosts, particularly regard to mobile-IP and distance vector multicast routing (DVMRP) protocols. When the source of a datagram is host (MH), may not reach all group members which addressed, including other hosts. static includes member receive datagrams one cell but another. Further when MH enters contains no same group, will experience delay before it starts receiving addressed that group. Mobility between campuses result...
The overwhelming growth and popularity of web motivated the cyber attackers to develop fraudulent sites execute numerous attacking strategies trick user revealing sensitive information, installing malware automatically through drive-by-download attack, stealing identity money etc. Most are spreading compromised URL (Uniform Resource Locator) it greatly influences internet performance. Blacklisting approach is adopted mitigate these issues, but demerits this unable identify zero-day patterns...
Application-level protocol abstraction is required to support seamless mobility in next generation heterogeneous wireless networks. Session initiation (SIP) provides such an providing However, the handoff procedure with SIP suffers from undesirable delay and hence packet loss for some cases, which detrimental applications as voice over IP (VoIP) or streaming video stringent quality of service (QoS) requirements. In this paper, we propose a based architecture that supports soft centric...
Testing concurrency is difficult yet important. Because of arbitrary interference concurrent objects, test case explosion becomes a major problem in testing systems. Synchronization and Deadlock being the two key features systems make systematic tedious task. In this paper we present novel approach generating cases for with help UML Sequence Diagram. Our consists transferring Diagram into Concurrent Composite Graph (CCG). The CCG traversed by an effective graph traversing technique like BFS...
Crowdsourced video often provides engaging and diverse perspectives not captured by professional videographers. Broad appeal of user-uploaded has been widely confirmed: freely distributed on YouTube, subscription Vimeo, to peers Facebook/Google+. Unfortunately, user-generated multimedia can be difficult organize; these services depend manual "tagging" or machine-mineable viewer comments. While indexing effective for popular, well-established videos, newer content may poorly searchable; live...
Regression testing is the process of a modified system using old test suite. As suite size large, retesting consumes large amount time and computing resources. This issue software systems can be handled good case prioritization technique. A technique schedules cases for execution so that with higher priority executed before lower priority. The objective to detect fault as early possible debuggers begin their work earlier. In this paper we propose new prioritize perform regression Component...
With the growth of IoT, a vast number devices are connected to web. Consequently, both users and susceptible deception by intruders through malicious links leading disclosure personal information. Hence, it is essential identify suspicious URLs before accessing them. While numerous researchers have proposed several URL detection approaches, machine learning-based technique stands out as particularly effective because its ability detect zero-day attacks; however, success depends on type...
Energy consumption is an important aspect of the energy management system. Over past few decades, it has been recorded that there a drastic increase in global use. As result, every country develops different approaches to reducing sectors. Recently deep learning models are most effective field prediction. For estimating power consumption, this work employs LSTM model identify accurate pattern time series data. After trained, finally put examine future trend. Applying standard hourly data...
One of the major security threats that public cloud computing platforms face today is active virtual machine instances are visible and accessible via internet, which allows hackers to carry out several types attacks such as Denial Service (DoS) intrusion over along durations increases probabilities successful penetration. Security logs failed attempts attest real threat intensity duration these. Most systems running on not hardened withstand persistent long attacks. It only dangerous but...
With the exponential growth in size and complexity of softwares, testing activity is no more limited to phase SDLC (Software Development Life Cycle). Testing process has been made iterative incremental Object Oriented development scenario. This leads increase effort time required for as well explosion test case. But when it comes regression testing, additional issue case retesting which further increasing time. So a suitable prioritization technique should be used address these issues. In...
A growing class of applications, including VoIP, IM and presence, are enabled by the session initiation protocol (SIP). Requests in SIP typically traverse through multiple proxies. The availability proxies offers flexibility to distribute proxy functionality across several nodes. In particular, after experimentally demonstrating that resource consumption maintaining state is significant, we define problem distribution nodes when goal increase overall call throughput. We first formulate this...
A wireless ATM system consists of a core network infrastructure that provides mobility support to end terminals and access link. This article outlines two schemes for supporting IP in this network. In the first scheme, location management handoff is integrated within signaling control framework ("mobile ATM"), transparently supported at layer by mobile underneath. second approach, protocol stack directly executed on switches (without an intermediate stack) using switching technique called...
Large-scale, predictive social analytics have proven effective. Over the last decade, research and industrial efforts understood potential value of inferences based on online behavior analysis, sentiment mining, influence epidemic spread, etc. The majority these efforts, however, are not yet designed with realtime responsiveness as a first-order requirement. Typical systems perform post-mortem analysis volumes historical data validate their “predictions” against already-occurred events.We...
Multiplayer networked games are the trend of day. Receiving a major boost from various commercial ventures like Microsoft Xbox®[19] and Sony Playstation®[13], gaming industry is set to grow dramatically. These multiplayer allow geographically dispersed possibly distant players participate in single game. In order provide interaction amongst such environments, text messaging recently, real-time voice through VoIP used. However, interactions mostly out-of-band (not based on game contexts),...