Sabuzima Nayak

Sabuzima Nayak
National Institute of Technology, Silchar | NIT Silchar · Department of Computer Science and Engineering

Master of Technology

About

53
Publications
18,377
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
318
Citations
Citations since 2017
53 Research Items
318 Citations
2017201820192020202120222023020406080100
2017201820192020202120222023020406080100
2017201820192020202120222023020406080100
2017201820192020202120222023020406080100
Introduction
Sabuzima Nayak is a research scholar in the Department of Computer Science & Engineering, National Institute of Technology Silchar, Assam-788010, India. Her research interest is Bioinformatics, Bloom Filter, Big Data and Distributed System. She has published numerous papers in reputed journal, conferences and books.

Publications

Publications (53)
Article
Edge technology aims to bring cloud resources (specifically, the computation, storage, and network) to the closed proximity of the edge devices, i.e., smart devices where the data are produced and consumed. Embedding computing and application in edge devices lead to emerging of two new concepts in edge technology: edge computing and edge analytics....
Preprint
Full-text available
Intrusion detection is an essential process to identify malicious incidents and continuously alert the many users of the Internet of Things (IoT). The constant monitoring of events generated from more than millions of devices connected to the IoT and the extensive analysis of every event based on predefined security policies consumes enormous resou...
Chapter
Currently, the focus of wireless science is gradually moving toward 6G communication technology. The goals of 6G are high; however, it is a necessity to make many applications a reality. This paper analyzes the required suggested targets that must be taken to establish the 6G network effectively and efficiently. In addition, the paper also presents...
Chapter
A specific disease does not have a unique treatment because hundreds of factors influence a person’s health. Thus, determining an effective and efficient treatment or medication for the patient requires a complex decision-making process. In the decision-making process, various personnel such as industry, experts, clinicians, or patients are involve...
Article
Full-text available
The 6G communication network will be a sixth-sense next-generation communication network, which will increase the worthiness of the intelligent Internet of Things. With the advent of various fields of artificial intelligence, 6G will create enormous possibilities, that is, Augmentation of Human Intelligence, Internet of Everything, Quality of Exper...
Conference Paper
Cloud computing is an excellent alternative to desk computing. Cloud computing technology has a massive number of users as they provide a range of scalability, trustworthiness, and high performance with comparatively low cost. As cloud computing is growing day by day, the energy use in the cloud is also increasing. There is also a need for energy u...
Chapter
6G communication technology is a revolutionary technology that will revolutionize many technologies and applications. It will be true artificial intelligence (AI)-driven and will be operated at intelligent space. 6G communication technology promises high quality of services (QoS) and high quality of experiences (QoE). 6G communication technology wi...
Chapter
Today's digital era is facing an enormous obstacle called Big data. Every digital device is producing a huge volume of data. The exponential increment of the number of digital devices is leading to an exponential increment of generated data. One of the domains of Big data is Big graph, for instance, DNA structure. Currently, Bioinformatics is focus...
Patent
Full-text available
The present disclosure relates to a method and system for generating a truly random number for conventional computing devices. The present disclosure proposed a new method for the generator of truly random number, wherein the algorithm is called "Ran do". The proposed algorithm used Clock CPU for bit generation and murmur and xx Hash string has fu...
Book
Bloom Filter: A Data Structure for Computer Networking, Big Data, Cloud Computing, Internet of Things, Bioinformatics, and Beyond focuses on both the theory and practice of the most emerging areas for Bloom filter application, including Big Data, Cloud Computing, Internet of Things, and Bioinformatics. Sections provide in-depth insights on structur...
Preprint
Full-text available
Big Graph is a graph having thousands of vertices and hundreds of thousands of edges. The study of graphs is crucial because the interlinkage among the vertices provides various insights and uncovers the hidden truth developed due to their relationship. The graph processing has non-linear time complexity. The overwhelming number of vertices and edg...
Preprint
Full-text available
Edge technology aims to bring Cloud resources (specifically, the compute, storage, and network) to the closed proximity of the Edge devices, i.e., smart devices where the data are produced and consumed. Embedding computing and application in Edge devices lead to emerging of two new concepts in Edge technology, namely, Edge computing and Edge analyt...
Preprint
Full-text available
Bloom Filter is a probabilistic data structure for the membership query, and it has been intensely experimented in various fields to reduce memory consumption and enhance a system's performance. Bloom Filter is classified into two key categories: counting Bloom Filter (CBF), and non-counting Bloom Filter. CBF has a higher false positive probability...
Article
Today is the era of smart devices. Through smart devices, people remain connected with each other across the globe. But, it led the current Internet towards scalability issues. Therefore, leaving IP-based Internet behind, the world is moving to the Future Internet Architecture, called Named Data Networking (NDN). Currently, the number of nodes conn...
Preprint
Full-text available
Malicious URL detection is an emerging research area due to continuous modernization of various systems, for instance, Edge Computing. In this article, we present a novel malicious URL detection technique, called deepBF (deep learning and Bloom Filter). deepBF is presented in two-fold. Firstly, we propose a learned Bloom Filter using 2-dimensional...
Chapter
Full-text available
Data generation and consumption is growing at an radical pace and will continue to grow as we step into the next decade. Efficient data storage and retrieval methods are in dire need. Moreover, the generated data is generally complex and multi categorical. Thus, Bloom Filter is an excellent choice for this scenario. Bloom Filter is a probabilistic...
Chapter
6G is a promising communication technology that will dominate the entire health market from 2030 onward. It will dominate not only health sector but also diverse sectors. It is expected that 6G will revolutionize many sectors including healthcare. Healthcare will be fully AI-driven and dependent on 6G communication technology, which will change our...
Article
Full-text available
In 2030, we are going to evidence the 6G mobile communication technology, which will enable the Internet of Everything. Yet 5G has to be experienced by people worldwide and B5G has to be developed; the researchers have already started planning, visioning, and gathering requirements of the 6G. Moreover, many countries have already initiated the rese...
Article
Full-text available
Emergency service is the most important research field for welfare of human kind. Some examples are ambulances and fire control truck. However, these conventional emergency services are not equipped with appropriate equipment to provide high QoS. For instance, conventional medical emergency services include ambulances with drivers and oxygen suppli...
Chapter
The Big Data, a massive amount of data, is the most popular buzzword and popular paradigm to change a game of any data-intensive field. The engagement of Big Data technology provides a new direction to an organization and the Big Data gives a vision to biomedical data engineering. Numerous data-intensive fields engage Big Data technology to achieve...
Article
A Bloom filter is a probabilistic data structure for approximate membership filtering. It is applied in diverse Network systems to enhance a system’s performance and reduce the memory consumption, for instance, Named-Data Networking, Software-Defined Networks, and Wireless Sensor Networking. Bloom filters consumes a tiny amount of RAM space to stor...
Preprint
Full-text available
6G communication technology is a revolutionary technology that will revolutionize many technologies and applications. Furthermore, it will be truly AI-driven and will carry on intelligent space. Hence, it will enable Internet of Everything (IoE) which will also impact many technologies and applications. 6G communication technology promises high Qua...
Preprint
Full-text available
6G is a promising communication technology that will dominate the entire health market from 2030 onward. It will dominate not only health sector but also diverse sectors. It is expected that 6G will revolutionize many sectors including healthcare. Healthcare will be fully AI-driven and dependent on 6G communication technology, which will change our...
Preprint
Full-text available
Big Data is defined as high volume of variety of data with an exponential data growth rate. Data are amalgamated to generate revenue, which results a large data silo. Data are the oils of modern IT industries. Therefore, the data are growing at an exponential pace. The access mechanism of these data silos are defined by metadata. The metadata are d...
Article
Full-text available
This paper presents the overview of the current trends of Big data against the computing scenario from different aspects. Some of the important aspect includes the Exascale, the computing power and the kind of applications which offer the Big data. This starts with the current computing hardware constraint against the need of the rising Big data ap...
Preprint
Full-text available
This paper presents the overview of the current trends of Big data against the computing scenario from different aspects. Some of the important aspect includes the Exascale, the computing power and the kind of applications which offer the Big data. This starts with the current computing hardware constraint against the need of the rising Big data ap...
Preprint
Full-text available
In 2030, we are going to evidence the 6G mobile communication technology, which will enable the Internet of Everything. Yet 5G has to be experienced by people and B5G has to be developed; the researchers have already started planning, visioning, and gathering requirements of the 6G. 6G promises to take everyone to a different era of technology. It...
Preprint
Full-text available
Today is the era of smart devices. Through the smart devices, people remain connected with systems across the globe even in mobile state. Hence, the current Internet is facing scalability issue. Therefore, leaving IP based Internet behind due to scalability, the world is moving to the Future Internet Architecture, called Named Data Networking (NDN)...
Chapter
The Cancer research is the utmost important research field nowadays for the well being of human being. Every year, thousands of people die in Cancer. Therefore, there is a high demand for Cancer research. The Cancer research requires both computing and medical knowledge. The Computer Scientists are engaged in Big Cancer Computing for storing, proce...
Chapter
IP address lookup is a crucial part of router in Computer Network. There are millions of IP addresses to be searched per second. Hence, it is immensely necessitated to enhance the performance of the IP address lookup. Therefore, this paper presents a novel approach of IP address lookup using 3D Bloom Filter, called ipBF. ipBF inherits the propertie...
Chapter
The replication system attracts many researchers to rethink of Patgiri, Ripon tactics of data Nayak, Sabuzima in the various devices, namely RAM and HDD/SSD. Dev, Dipayan advantages of a replication system are (a) parallelism, (b) data availability, (c) fault tolerance, (d) data recovery, and (e) failover. However, the replication system poses some...
Article
Bloom Filter is a data structure for membership query which is deployed in diverse research domains to boost up system’s performance and to lower on-chip memory consumption. However, there are still lacking of a high accuracy Bloom Filterwithoutcompromisingtheperformanceandmemoryspace. Moreover, the scalability causes more memory consumption as wel...
Conference Paper
A Bloom Filter (BF) is a probabilistic data structure for approximate membership filtering. Besides, the Bloom Filter is applied in diverse Network systems to enhance a system's performance and reduce the memory consumption, for instance, Named-Data Networking, Software-Defined Networks, and Wireless Sensor Networking. Bloom Filter consumes a tiny...
Article
The advancement of DNA Assembly techniques have greatly boosted up the Bioinformatics research and discovery. More precisely, DNA Assembly has achieved tremendous popularity due to the ability to decode the hidden information in the DNA. DNA Assembly is the process of finding the correct sequence of the nucleotide bases in DNA. The key challenges a...
Chapter
With the growth of the inter-connectivity of the world, Big Graph has become a popular emerging technology. For instance, social media (Facebook, Twitter). Prominent examples of Big Graph include social networks, biological network, graph mining, big knowledge graph, big web graphs and scholarly citation networks. A Big Graph consists of millions o...
Preprint
Cancer analysis and prediction is the utmost important research field for well-being of humankind. The Cancer data are analyzed and predicted using machine learning algorithms. Most of the researcher claims the accuracy of the predicted results within 99%. However, we show that machine learning algorithms can easily predict with an accuracy of 100%...
Preprint
Full-text available
Bloom Filter is a probabilistic membership data structure and it is excessively used data structure for membership query. Bloom Filter becomes the predominant data structure in approximate membership filtering. Bloom Filter extremely enhances the query response time, and the response time is very fast. Bloom filter (BF) is used to detect whether an...
Article
Full-text available
Bloom Filter is extensively deployed data structure in various applications and research domain since its inception. Bloom Filter is able to reduce the space consumption in an order of magnitude. Thus, Bloom Filter is used to keep information of a very large scale data. There are numerous variants of Bloom Filters available, however, scalability is...
Article
Bloom Filter is a data structure for membership filtering that is deployed in various domains to boost up the lookup performance and to lower the memory consumption. Bloom Filter has gained a massive popularity nowadays, and thus, it is deployed in diverse domains, namely, Big Data, Cloud Computing, Networking and Security, Bioinformatics, and IoT....
Article
Full-text available
Bloom filter is a probabilistic data structure to filter a membership of a set. Bloom filter returns "true" or "false" with an error tolerance depending on the presence of the element in the set. Bloom filter is used to boost up the performance of a system using small space overhead. It is extensively used since its inception. e Bloom filter has me...
Conference Paper
Full-text available
The Internet of Things (IoT) is the most promising and enabling technology to deal with modern lifestyle, business, farms, industries, organization, and environment. The advent of its technology, the implementation of smart city become a reality which is comprised of a) smart home, b) smart school, c) smart health care, d) smart transportation, e)...
Preprint
Full-text available
Distributed Denial-of-Service (DDoS) is a menace for service provider and prominent issue in network security. Defeating or defending the DDoS is a prime challenge. DDoS make a service unavailable for a certain time. This phenomenon harms the service providers, and hence, loss of business revenue. Therefore, DDoS is a grand challenge to defeat. The...
Conference Paper
Full-text available
Bloom Filter is a probabilistic membership data structure and it is the excessively used for membership query. Bloom Filter becomes the predominant data structure in approximate membership filtering. Bloom Filter extremely enhances the query response time, and the response time which is O(1) time complexity. Bloom filter (BF) is used to detect whet...
Conference Paper
Full-text available
Cancer analysis and prediction is the utmost important research field for well-being of humankind. The Cancer data are analyzed and predicted using machine learning algorithms. Most of the researcher claims the accuracy of the predicted results within 99%. However, we show that machine learning algorithms can easily predict with an accuracy of 100%...
Article
Full-text available
Distributed Denial-of-Service (DDoS) is a menace for service provider and prominent issue in network security. Defeating or defending the DDoS is a prime challenge. DDoS make a service unavailable for a certain time. This phenomenon harms the service providers, and hence, causes loss of business revenue. Therefore, DDoS is a grand challenge to defe...
Article
Full-text available
Big Data is the most popular emerging trends that becomes a blessing for human kinds and it is the necessity of day-today life. For example, Facebook. Every person involves with producing data either directly or indirectly. Thus, Big Data is a high volume of data with exponential growth rate that consists of a variety of data. Big Data touches all...

Questions

Question (1)
Question
I tried to find the difference but I think they are synonyms for the same technique (alignment of DNA fragment).

Network

Cited By