Yazar "Bhushan, Bharat" seçeneğine göre listele
Listeleniyor 1 - 4 / 4
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe Applications and Associated Challenges in Deployment of Software Defined Networking (SDN)(Springer Science and Business Media Deutschland GmbH, 2023) Baniya, Pashupati; Agrawal, Atul; Nand, Parma; Bhushan, Bharat; Hameed, Alaa Ali; Jamil, AkhtarSDN, a rising technology within the realm of Internet of Things (IoT), has been increasingly well-received in recent times. This article presents a summary of SDN along with its different elements, advantages, and difficulties. The paper aims to provide practical solutions for introducing OpenFlow into commercial routers without hardware modifications and extending the integration of OpenFlow with legacy control protocols and control planes. In addition, the paper presents a refactoring process for migrating traditional network applications to OpenFlow-based ones, focusing on the security challenges and techniques of open technologies like SDN, OpenROADM, and SDN-based Mobile Networks (SDMN). The document also examines the advantages and possible uses of SDMN in enhancing network adaptability, streamlining network administration, and bolstering network security. The article also discusses O-RAN network innovations and difficulties, such as AI and ML workflows that are made possible by the architecture and interfaces, security concerns, and, most importantly, standardization issues. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.Öğe Combining Text Information and Sentiment Dictionary for Sentiment Analysis on Twitter During COVID(Springer Science and Business Media Deutschland GmbH, 2024) Vidushi; Jain, Anshika; Shrivastava, Ajay Kumar; Bhushan, Bharat; Hameed, Alaa AliPresence of heterogenous huge data leads towards the ‘big data’ era. Recently, tweeter usage increased with unprecedented rate. Presence of social media like tweeter has broken the boundaries and touches the mountain in generating the unstructured data. It opened research gate with great opportunities for analyzing data and mining ‘valuable information’. Sentiment analysis is the most demanding, versatile research to know user viewpoint. Society current trend can be easily observed through social network websites. These opportunities bring challenges that leads to proliferation of tools. This research works to analyze sentiments using tweeter data using Hadoop technology. It explores the big data arduous tool called Hadoop. Further, it explains the need of Hadoop in present scenario and role of Hadoop in storing ample of data and analyzing it. Hadoop cluster, Hadoop Distributed File System (HDFS), and HIVE are also discussed in detail. The Dataset used in performing the experiment is presented. Moreover, this research explains thoroughly the implementation work and provide workflow. Next session provides the experimental results and analyzes of result. Finally, last session concludes the paper, its purpose, and how it can be used in upcoming research. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.Öğe CryptStego: Powerful Blend of Cryptography and Steganography for Securing Communications(Springer Science and Business Media Deutschland GmbH, 2024) Pandey, Shraiyash; Baniya, Pashupati; Nand, Parma; Hameed, Alaa Ali; Bhushan, Bharat; Jamil, AkhtarIn today’s era, security is one of the most critical issues in the development of electronic communications applications, especially when sending private data. The data may be encrypted with several algorithms; however, an extra layer of security can improve protection by a significant amount. Therefore, in this paper, we have developed an application, CryptStego, to secure data using two techniques, cryptography and steganography, to transmit data securely. The encryption of original data is executed using Blowfish algorithm, a cryptographic technique. Additionally, the encrypted data is hidden through using Least Significant Bit (LSB), a steganography technique. The implementation of both techniques offers an extensive level of security, since an intruder must firstly identify the encrypted text within the image to attain the encrypted text, then secondly to decrypt using the algorithm to obtain the original message. Therefore, any intruder must encounter multiple levels of security to obtain the original message from the cipher image. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.Öğe Cyber Threat Analysis and Mitigation in Emerging Information Technology (IT) Trends(Springer Science and Business Media Deutschland GmbH, 2024) Imam, Mohsin; Wajid, Mohd Anas; Bhushan, Bharat; Hameed, Alaa Ali; Jamil, AkhtarFor the information technology sector, cybersecurity is essential. One of the main issues in the modern world is sending information from one system to another without letting the information out. Online crimes, which are on the rise daily, are the first thing that comes to mind when we think about cyber security. Various governments and businesses are adopting a number of actions to stop these cybercrimes. A lot of individuals are still quite worried about cyber security after taking many safeguards. This study’s primary goal is to examine the difficulties that modern technology-based cyber security faces, especially in light of the rising acceptance of cutting-edge innovations like server less computing, blockchain, and artificial intelligence (AI). The aim of this paper is to give readers a good overview of the most recent cyber security trends, ethics, and strategies. This study focuses on the present state of cyber security and the steps that may be taken to address the rising dangers posed by modern technology through a thorough investigation of the existing literature and actual case studies. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.