Arup Abhinna Acharya

ORCID: 0000-0002-2528-4228
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Testing and Debugging Techniques
  • Software Reliability and Analysis Research
  • IPv6, Mobility, Handover, Networks, Security
  • Software Engineering Research
  • Software System Performance and Reliability
  • Advanced Malware Detection Techniques
  • Mobile Agent-Based Network Management
  • Spam and Phishing Detection
  • Network Security and Intrusion Detection
  • Network Traffic and Congestion Control
  • Software-Defined Networks and 5G
  • Mobile Ad Hoc Networks
  • Wireless Networks and Protocols
  • Wireless Communication Networks Research
  • Advanced Optical Network Technologies
  • Advanced Software Engineering Methodologies
  • Network Packet Processing and Optimization
  • Opportunistic and Delay-Tolerant Networks
  • VLSI and Analog Circuit Testing
  • Formal Methods in Verification
  • Misinformation and Its Impacts
  • Sentiment Analysis and Opinion Mining
  • Energy Efficient Wireless Sensor Networks
  • Security and Verification in Computing
  • Web Application Security Vulnerabilities

KIIT University
2015-2024

Odisha University of Agriculture and Technology
2022

Odisha University of Technology and Research
2022

Weatherford College
2022

IBM (United States)
2001-2014

Lancaster University
2013

Carnegie Mellon University
2013

Microsoft Research (United Kingdom)
2013

University of Duisburg-Essen
2013

IBM Research - Thomas J. Watson Research Center
2005-2006

Application-level protocol abstraction is required to support seamless mobility in next-generation heterogeneous wireless networks. Session initiation (SIP) provides the for multimedia applications such However, handoff procedure with SIP suffers from undesirable delay and hence packet loss some cases, which detrimental like voice over IP (VoIP) or streaming video that demand stringent quality of service (QoS) requirements. In this article we present a SIP-based architecture supports soft...

10.1109/mnet.2006.1607890 article EN IEEE Network 2006-03-01

This paper deals with multicasting in an internetwork mobile hosts, particularly regard to mobile-IP and distance vector multicast routing (DVMRP) protocols. When the source of a datagram is host (MH), may not reach all group members which addressed, including other hosts. static includes member receive datagrams one cell but another. Further when MH enters contains no same group, will experience delay before it starts receiving addressed that group. Mobility between campuses result...

10.1109/infcom.1996.497879 article EN 2002-12-23

The overwhelming growth and popularity of web motivated the cyber attackers to develop fraudulent sites execute numerous attacking strategies trick user revealing sensitive information, installing malware automatically through drive-by-download attack, stealing identity money etc. Most are spreading compromised URL (Uniform Resource Locator) it greatly influences internet performance. Blacklisting approach is adopted mitigate these issues, but demerits this unable identify zero-day patterns...

10.1016/j.procs.2023.01.145 article EN Procedia Computer Science 2023-01-01

Application-level protocol abstraction is required to support seamless mobility in next generation heterogeneous wireless networks. Session initiation (SIP) provides such an providing However, the handoff procedure with SIP suffers from undesirable delay and hence packet loss for some cases, which detrimental applications as voice over IP (VoIP) or streaming video stringent quality of service (QoS) requirements. In this paper, we propose a based architecture that supports soft centric...

10.1109/percom.2005.40 article EN 2005-04-01

Testing concurrency is difficult yet important. Because of arbitrary interference concurrent objects, test case explosion becomes a major problem in testing systems. Synchronization and Deadlock being the two key features systems make systematic tedious task. In this paper we present novel approach generating cases for with help UML Sequence Diagram. Our consists transferring Diagram into Concurrent Composite Graph (CCG). The CCG traversed by an effective graph traversing technique like BFS...

10.1109/icectech.2011.5941581 article EN 2011-04-01

Crowdsourced video often provides engaging and diverse perspectives not captured by professional videographers. Broad appeal of user-uploaded has been widely confirmed: freely distributed on YouTube, subscription Vimeo, to peers Facebook/Google+. Unfortunately, user-generated multimedia can be difficult organize; these services depend manual "tagging" or machine-mineable viewer comments. While indexing effective for popular, well-established videos, newer content may poorly searchable; live...

10.1145/2517351.2517356 article EN 2013-10-22

Regression testing is the process of a modified system using old test suite. As suite size large, retesting consumes large amount time and computing resources. This issue software systems can be handled good case prioritization technique. A technique schedules cases for execution so that with higher priority executed before lower priority. The objective to detect fault as early possible debuggers begin their work earlier. In this paper we propose new prioritize perform regression Component...

10.1109/icectech.2011.5941719 article EN 2011-04-01

With the growth of IoT, a vast number devices are connected to web. Consequently, both users and susceptible deception by intruders through malicious links leading disclosure personal information. Hence, it is essential identify suspicious URLs before accessing them. While numerous researchers have proposed several URL detection approaches, machine learning-based technique stands out as particularly effective because its ability detect zero-day attacks; however, success depends on type...

10.1109/access.2024.3384840 article EN cc-by-nc-nd IEEE Access 2024-01-01

Energy consumption is an important aspect of the energy management system. Over past few decades, it has been recorded that there a drastic increase in global use. As result, every country develops different approaches to reducing sectors. Recently deep learning models are most effective field prediction. For estimating power consumption, this work employs LSTM model identify accurate pattern time series data. After trained, finally put examine future trend. Applying standard hourly data...

10.1109/assic60049.2024.10507898 article EN 2024-01-27

One of the major security threats that public cloud computing platforms face today is active virtual machine instances are visible and accessible via internet, which allows hackers to carry out several types attacks such as Denial Service (DoS) intrusion over along durations increases probabilities successful penetration. Security logs failed attempts attest real threat intensity duration these. Most systems running on not hardened withstand persistent long attacks. It only dangerous but...

10.1109/ic2e.2013.18 article EN 2013-03-01

With the exponential growth in size and complexity of softwares, testing activity is no more limited to phase SDLC (Software Development Life Cycle). Testing process has been made iterative incremental Object Oriented development scenario. This leads increase effort time required for as well explosion test case. But when it comes regression testing, additional issue case retesting which further increasing time. So a suitable prioritization technique should be used address these issues. In...

10.47893/ijcsi.2014.1177 article EN International Journal of Computer Science and Informatics 2014-10-01

A growing class of applications, including VoIP, IM and presence, are enabled by the session initiation protocol (SIP). Requests in SIP typically traverse through multiple proxies. The availability proxies offers flexibility to distribute proxy functionality across several nodes. In particular, after experimentally demonstrating that resource consumption maintaining state is significant, we define problem distribution nodes when goal increase overall call throughput. We first formulate this...

10.1109/icdcs.2008.42 article EN 2008-06-01

A wireless ATM system consists of a core network infrastructure that provides mobility support to end terminals and access link. This article outlines two schemes for supporting IP in this network. In the first scheme, location management handoff is integrated within signaling control framework ("mobile ATM"), transparently supported at layer by mobile underneath. second approach, protocol stack directly executed on switches (without an intermediate stack) using switching technique called...

10.1109/35.667420 article EN IEEE Communications Magazine 1998-04-01

Large-scale, predictive social analytics have proven effective. Over the last decade, research and industrial efforts understood potential value of inferences based on online behavior analysis, sentiment mining, influence epidemic spread, etc. The majority these efforts, however, are not yet designed with realtime responsiveness as a first-order requirement. Typical systems perform post-mortem analysis volumes historical data validate their “predictions” against already-occurred events.We...

10.1609/icwsm.v8i1.14504 article EN Proceedings of the International AAAI Conference on Web and Social Media 2014-05-16

Multiplayer networked games are the trend of day. Receiving a major boost from various commercial ventures like Microsoft Xbox®[19] and Sony Playstation®[13], gaming industry is set to grow dramatically. These multiplayer allow geographically dispersed possibly distant players participate in single game. In order provide interaction amongst such environments, text messaging recently, real-time voice through VoIP used. However, interactions mostly out-of-band (not based on game contexts),...

10.1145/1016540.1016546 article EN 2004-01-01
Coming Soon ...