scispace - formally typeset
Search or ask a question

Showing papers by "Jaypee Institute of Information Technology published in 2022"


Journal ArticleDOI
TL;DR: This research addresses the creation and detection of fake reviews, and shows that a machine classifier can accomplish this goal near-perfectly, whereas human raters exhibit significantly lower accuracy and agreement than the tested algorithms.

70 citations


Journal ArticleDOI
TL;DR: In this article, the authors used self-report measures to examine the connection between mindfulness, self-efficacy, anxiety, depression, and stress, and found that mindfulness was positively linked to selfefficacy while it was negatively related to anxiety, stress and depression.

16 citations


Journal ArticleDOI
TL;DR: A review of pro-oxidants and their clinical significance as cancer therapies providing revolutionary approaches is presented in this paper, where the authors exemplify pro-oxyidants (natural/synthetic/repurposed drugs).

14 citations


Journal ArticleDOI
TL;DR: In this paper , a review of the quantum identity authentication (QIA) protocols is presented, with specific attention to the causal connection involved in their development and their relative merits and demerits are analyzed.
Abstract: Secure communication has achieved a new dimension with the advent of the schemes of quantum key distribution (QKD) as in contrast with classical cryptography, quantum cryptography can provide unconditional security. However, a successful implementation of a scheme for QKD requires identity authentication as a prerequisite. A security loophole in the identity authentication scheme may lead to the vulnerability of the entire secure communication scheme. Consequently, identity authentication is extremely important, and in the last three decades several schemes for identity authentication using quantum resources have been proposed. The chronological development of these protocols, which are now referred to as quantum identity authentication (QIA) protocols, is briefly reviewed here with specific attention to the causal connection involved in their development. The existing protocols are classified on the basis of the required quantum resources, and their relative merits and demerits are analyzed. Further, in the process of the classification of the protocols for QIA, it is observed that the existing protocols can also be classified in a few groups based on the inherent computational tasks used to design the protocols. Realization of these symmetries has led to the possibility of designing a set of new protocols for quantum identity authentication, which are based on the existing schemes for the secure computational and communication tasks. The security of such protocols is also critically analyzed.

6 citations


Journal ArticleDOI
06 Jan 2022-Silicon
TL;DR: In this paper , a junction-free electrostatically doped tunnel field effect transistor (JF-ED-TFET) based biosensor for label-free biosensing applications was proposed and simulated.
Abstract: The electrostatic doping technique has a remarkable ability to reduce random dopant fluctuations (RDFs), fabrication complexity and high thermal budget requirement in the fabrication process of nano-scale devices. In this paper, for the first time it has been propose and simulated a junction-free electrostatically doped tunnel field-effect transistor (JF-ED-TFET) based biosensor for label-free biosensing applications. The dielectric modulation concept has been used to sense biomolecules using a nano-cavity incorporated within the gate oxide layer near to the source end. The sensing response of the JF-ED-TFET biosensor has been analyzed in terms of the electric field, energy band and transfer characteristic and sensitivity in terms of ON-current, ION/IOFF ratio and subthreshold swing. The sensitivity of the biosensor has been investigated based on practical challenges such as different filling factors and step-profiles generated from the steric hindrance. The effect of temperate and nano-cavity dimension variations on device performance has been also analyzed. In this work, various types of biomolecules such as Streptavidin (k = 2.1), Ferro-cytochrome c (k = 4.7), keratin (k = 8) and Gelatin (k = 12) has been considered for the performance investigation.

5 citations


Journal ArticleDOI
TL;DR: In this paper , a first-order universal filter structure supporting current mode operation is proposed, which utilizes an extra-X second-generation current conveyor as an active building block and employs a grounded resistor and a grounded capacitor as passive components.
Abstract: A novel first-order universal filter structure supporting current mode operation is proposed in this paper. The filter has a single active building block based realization and utilizes an extra-X second-generation current conveyor as an active building block. Additionally, the proposed circuit employs a grounded resistor and a grounded capacitor as passive components. The circuit has the ability to deliver the all-pass, high-pass, and low-pass functionalities simultaneously without meeting any passive components matching constraint. High output impedance and load insensitive outputs are other remarkable signal processing features offered by the proposed filter structure. Theoretical behavior of the proposed filter is described by presenting ideal, non-ideal, parasitic, and stability analyses. Additionally, the resistorless variant of the proposed filter is also shown to impart the tunability feature. Personal simulation program with integrated circuit emphasis (PSPICE) simulation results are presented to verify the theoretically described performance of the proposed universal filter. Complementary metal oxide semiconductor (CMOS) realization of extra-X second-generation current conveyor is utilized for the purpose of simulations, therefore, the filter is CMOS compatible.

3 citations


Journal ArticleDOI
TL;DR: In this article, the reliability of GaN/ZrO2 (Gallium Nitride/Zirconium dioxide) interfacial layer defects on 8-nm GaN-SOI-FinFET was evaluated.
Abstract: This work presents, the reliability of GaN/ZrO2 (Gallium Nitride/Zirconium dioxide) interfacial layer defects on 8-nm Gallium Nitride (GaN) Silicon-on-Insulator (SOI) FinFET (GaN-SOI-FinFET). Positive, negative, and neutral interface trap charges are considered in all the results and simultaneously compared with SOI-FinFET with an 8-nm gate length for the evaluation of device reliability. It is found that the proposed device is more immune to interfacial trap defects and reflected in terms of drain current (Id), device efficiency (gm/Id), transconductance (gm), subthreshold slope (SS), electric field, surface potential, and threshold voltage at an ultra-low voltage (VDS = 0.1 V). Further, the performance degradation of GaN-SOI-FinFET is calculated by various linearity figures of merits (FOMs) such as higher-order transconductance coefficients (gm2 and gm3), voltage, and current intercept points (VIP2, VIP3, and IIP3). Moreover, device reliability is also performed by evaluating intermodulation and harmonic distortions (IMD3, HD2, and HD3). The proposed device shows better reliability in the presence of interfacial traps and paves the way for high-performance low power, high linearity, and lesser harmonic distortions performance for RFIC design.

3 citations


Journal ArticleDOI
TL;DR: In this article , the authors investigated the impact of temperature variations ranging from 300 to 450k on the DC, analog/radio frequency, and linearity performance of dual material stack gate oxide-source dielectric pocket-tunnel-field-effect transistor (DMSGO-SDP-TFET).
Abstract: The variation of the temperature-dependent performance of an electronic device is one of the major concerns in predicting the actual electrical characteristics of the device as the bandgap of semiconducting material varies with temperature. Therefore, in this article, we investigate impact of temperature variations ranging from 300 to 450K on the DC, analog/ radio frequency, and linearity performance of dual material stack gate oxide-source dielectric pocket-tunnel-field-effect transistor (DMSGO-SDP-TFET). In this regard, a technology computer-aided design simulator is used to analyze DC, and analog/radio-frequency performance parameters, such as carrier concentration, energy band variation, band-to-band tunneling rate, $$I_\mathrm{DS}-V_\mathrm{GS}$$ characteristics, transconductance ( $$g_{m}$$ ), cut off frequency ( $$f_{T}$$ ), gain-bandwidth product, maximum oscillating frequency ( $$f_{\max }$$ ), transconductance frequency product, and transit time ( $$\tau $$ ) considering the impact of temperature variations. Furthermore, linearity parameters, such as third-order transconductance ( $$g_{m3}$$ ), third-order voltage intercept point (VIP3), third-order input-interception point (IIP3), and intermodulation distortion (IMD3) are also analyzed with temperature variations as these performance parameters are significant for linear and analog/radio-frequency applications. Moreover, the performance of the proposed DMSGO-SDP-TFET is compared with the conventional dual-material stack gate oxide-tunnel-field-effect transistor (DMSGO-TFET). From the comparative analysis, in terms of percentage per kelvin, the DMSGO-SDP-TFET demonstrates lesser sensitivity towards temperature variation. Hence, the proposed DMSGO-SDP-TFET is a suitable candidate for low-power switching, and biosensing applications at elevated temperatures as compared to conventional DMSGO-TFETs.

3 citations


Journal ArticleDOI
TL;DR: In this paper , a semi-automated dependency based collaborative requirement prioritization approach (CDBR) is presented, which uses linguistic values, execute-before-after (EBA) relation among requirements and machine learning algorithm to minimize the difference of opinion between stakeholders and developers.

3 citations


Journal ArticleDOI
TL;DR: The obtained secrecy rate results of the mixed RF/FSO relaying scheme suggest that the presence of eavesdropper and hardware impairment at the relay impacts the ASR offered by the system significantly.

3 citations


Journal ArticleDOI
TL;DR: In this paper , a semi-quantum sealed-bid auction protocol is proposed, where the bidders do not have quantum resources but they can perform classical operations on the quantum states.
Abstract: A family of existing protocols for quantum sealed-bid auction is critically analyzed, and it is shown that they are vulnerable under several attacks (e.g., the participant's and non-participant's attacks as well as the collusion attack of participants) and some of the claims made in these works are not correct. We obtained the bounds on the success probability of an eavesdropper in accessing the sealed-bids. Further, realizing the role of secure sealed-bid auction in the reduction of corruption, a new protocol for sealed-bid auction is proposed which is semi-quantum in nature, where the bidders do not have quantum resources but they can perform classical operations on the quantum states. The security of the proposed protocol is established against a set of attacks, and thus it is established that the proposed protocol is free from the vulnerabilities reported here in the context of the existing protocols.

Journal ArticleDOI
TL;DR: In this paper , a new divergence measure for belief functions that is nonnegative, symmetric, and satisfies the triangle inequality is developed. But, it yields counterintuitive results in case of highly conflicting evidence.
Abstract: Information fusion in uncertain and complex environments is highly challenging. Dempster–Shafer (D-S) evidence theory has been successfully applied by various researchers in multi-sensor data fusion. However, it yields counterintuitive results in case of highly conflicting evidence. In this paper, we have developed a new divergence measure for belief functions that is nonnegative, symmetric, and satisfies the triangle inequality. Using the developed divergence measure, an algorithm for combining distinct basic probability assignments (BPAs) has been discussed and applied in target recognition systems and classification problems.

Journal ArticleDOI
TL;DR: In this paper , the impact of ICT in teaching software engineering course with design-based learning (DBL) and Project-based Learning (PBL) is demonstrated, and the results show a positive influence of integration of DBL and PBL in reducing industry gaps with improved student performance, engagement, and learning through designed PBL activities.
Abstract: Contribution: This article demonstrates the impact of today’s Information and Communication Technologies (ICT) in teaching software engineering (SE) course with design-based learning (DBL) and project-based learning (PBL). The results show a positive influence of integration of DBL and PBL in reducing industry gaps with improved student performance, engagement, and learning through designed PBL activities. Background: For an engineering graduate analysis, design, thinking, and validation of complex systems interactions is a desirable skill to support sustainability goals. A restructuring in delivery of the course through interactive lecture time and more project-based activities can improve students’ engagement, performance, and overall achievement in attaining desirable program learning outcomes (LOs). Intended Outcome: The objective is to provide student learning with an experience on how to apply critical thinking and creativity to specify, design, and validate software systems by focusing on challenges faced in the software industry. Application Design: Google classroom was used to conduct interactive class and tutorial sessions, design various PBL activities, exchange information, and work in teams. Throughout the semester, all learning and practice modules of the course were linked sequentially with intermediate milestones. Findings: The results show a positive outcome in helping students in attaining the knowledge, and understanding of both theoretical and practical concepts. These findings are based on academic results, PBL activities, and two anonymous surveys. The findings of statistical analysis suggest a positive influence of DBL and PBL in SE course to meet industry challenges, expectations, and overall course and program LOs.

Book ChapterDOI
01 Jan 2022
TL;DR: In this article, the authors proposed a QoS-aware task offloading strategy using a novel nature-inspired optimization algorithm, known as the Smart Flower Optimization Algorithm (SFOA), which takes into account the QoS parameters such as the task deadlines and budget constraints in selection of appropriate fog nodes where computation tasks can be offloaded.
Abstract: Fog computing is gaining rapid acceptance as a distributed computing paradigm that brings cloud-like services near the end devices. It enhances the computation capabilities of mobile nodes and IoT (Internet of Things) devices by providing compute and storage capabilities similar to the cloud but at a lower latency and using lesser bandwidth. Additional advantages of fog computing include its support for node mobility, context awareness, reliability and scalability. Due to its multiple benefits, fog computing is used for offloading tasks from applications executing on end devices. This allows faster execution of applications using the capabilities of fog nodes. However, the task offloading problem in the fog environment is challenging due to the dynamic nature of fog environment and multiple QoS (Quality of Service) parameters dependent on the application being executed. Therefore, the chapter proposes a QoS-aware task offloading strategy using a novel nature-inspired optimization algorithm, known as the Smart Flower Optimization Algorithm (SFOA). The proposed strategy takes into account the QoS parameters such as the task deadlines and budget constraints in selection of appropriate fog nodes where computation tasks can be offloaded. The proposed strategy has been simulated and the results have verified the efficacy of the strategy.


Book ChapterDOI
01 Jan 2022
TL;DR: In this article, the authors presented a model to analyze the trend of the coronavirus and developed specialized deep learning models, including multi-perceptron and autoencoders for trend prediction with better accuracy.
Abstract: Coronavirus is a respiratory disease which is produced by the virus SARS-CoV-2. The symptoms of the coronavirus include flu, sore throat, common cold, cough, fatigue, and shortness of oxygen in the body. COVID-19 is a pandemic that spreads across the world. In this paper, we presented a model to analyze the trend of the coronavirus. We used artificial intelligence analytics including linear regression, support vector machine, auto regressive integrated moving average, and long short-term memory methods on the real data of coronavirus by using Python 3.0 (Jupyter Notebook). The prediction shows cumulated trend prediction of confirmed cases. Linear regression and ARIMA model give the best results with maximum accuracy (98% and 99.87% respectively) and performed better with existing to counter parts. Later, we will develop specialized deep learning models, including multi-perceptron and autoencoders for trend prediction with better accuracy.

Journal ArticleDOI
TL;DR: In this paper , a 45-year-old diabetic female presented with severe bilateral, progressive ptosis since 10 years and had no history of trauma, diurnal variability, diplopia, muscular weakness, or easy fatigability.
Abstract: Kearns–Sayre syndrome (KSS) is a rare mitochondrial cytopathy first described by Kearns and Sayre at Mayo Clinic in 1958.[1] The characteristic triad of this rare disease is total external ophthalmoplegia, bilateral atypical pigmentary retinopathy, and cardiac conduction defects.[2] A 45-year-old diabetic female presented with severe bilateral, progressive ptosis since 10 years. There was no history of trauma, diurnal variability, diplopia, muscular weakness, or easy fatigability. Her best corrected visual acuity was 20/30, N6 in both eyes. On ocular examination, there was restricted ocular movement in all gazes, with chin elevation and poor Bell’s phenomenon [Fig. 1]. Fundus examination revealed areas of retinal pigment epithelial (RPE) defects in the posterior pole and the periphery [Fig. 2a and b]. Humphrey visual field analysis demonstrated changes corresponding with RPE defects in both eyes, and ERG was subnormal. Magnetic resonance imaging scan of brain and orbit showed no significant abnormality. Physical examination revealed no cardiac conduction abnormalities. Patient was a known case of hyperparathyroidism. A levator palpebrae superioris muscle biopsy was taken under local anesthesia. Microscopic examination with modified Gomori trichrome staining revealed characteristic “ragged red fibers” [Fig. 3] which has been postulated to be accumulated abnormal mitochondria below the plasma membrane of the muscle fiber.[3]Figure 1: Photograph showing severe bilateral ptosisFigure 2: Fundus photograph (montage) of right (a) and left eye (b) showing pigmentary retinopathy changes involving posterior pole and the peripheryFigure 3: Showing microscopic appearance of red ragged fibers stained as irregular and intensely red subsarcolemmal zones with modified Gomori trichrome stainDiscussion KSS presents during the second decade of life.[2] Diabetes mellitus in KSS has been reported due to mutations in mitochondrial DNA that contributes to islet cell development in pancreas. Hence, genetic testing is important, especially when there is a family history of any mitochondrial disease.[4] It is commonly believed that patients with KSS do not survive beyond early adulthood.[5] Herein, we report an unusual presentation of KSS in a 45-year-old female, that disputes the commonly held beliefs about patients with KSS. Therefore, the role of an ophthalmologist is important as they may detect the disease association in majority of these patients. Declaration of patient consent The authors certify that they have obtained all appropriate patient consent forms. In the form the patient(s) has/have given his/her/their consent for his/her/their images and other clinical information to be reported in the journal. The patients understand that their names and initials will not be published and due efforts will be made to conceal their identity, but anonymity cannot be guaranteed. Financial support and sponsorship Nil. Conflicts of interest There are no conflicts of interest.


Book ChapterDOI
01 Jan 2022
TL;DR: In this article, a 3, 5 and 7 layer CNN was used to classify OCT images into four classes, namely CNV, DME, drusen and normal, achieving an accuracy of 97.92%.
Abstract: Aim: Computer-aided diagnosis of retinopathy is a research hotspot in the field of medical image classification. Optical coherence tomography (OCT) is widely applied in the diagnosis of ocular diseases. In this study, we aim to classify the images into four classes, namely CNV, DME, drusen and normal. Methodology: In this study, we present the solution to classify the OCT images using simple baseline 3, 5 and 7 layer deep convolutional neural networks (CNNs). It also explores the effect of hyperparameters such as dropout, image size, batch normalisation, epochs and their relationships with the accuracy, sensitivity and specificity of the models. Results: The novelty of this study is that it does not use any pre-trained models and yet achieves desired results just by hyperparameter tuning and some clever observations. The best results were yielded by 5 layer model having hyperparameters image size 64 × 64, 30 epochs with dropout and batch normalisation achieving an accuracy of 97.92%. The biggest risk of overfitting in deep learning where multiple layered models are trained and tested and approaches of diminishing the overfitting effect has been discussed in detail.

Journal ArticleDOI
TL;DR: In this paper , the authors investigate the experiences of bankers about various financial inclusion initiatives through qualitative research design and highlight the issues of financial inclusion through a qualitative research and provide bankers' point of view on same.
Abstract: Bankers’ perception about various financial inclusion programs is a significant factor in successful implementation of financial inclusion initiatives. This study is aimed to investigate the experiences of bankers about various financial inclusion initiatives through qualitative research design. In-depth interviews of bank managers have been carried out in Ghaziabad district of India. The results indicate that shortage of staff in banks is a major challenge in Indian banking sector. Financial illiteracy and unawareness are the other challenges which are being addressed albeit through Financial Literacy initiatives of the Reserve Bank of India. Timely hiring of new staff in banks, their preparation and readiness for better decision making would certainly affect the situation of financial inclusion. The study is unique as it highlights the issues of financial inclusion through a qualitative research and provides bankers’ point of view on same.

OtherDOI
01 Jul 2022
TL;DR: In this article , the authors focus on the architecture along with the advantage of using SDN networking over traditional networking systems, and propose an open architecture of SDN broadly including the infrastructure layer, control layer, and application layer.
Abstract: In recent years, we have seen the rapid growth of software-defined networking (SDN) in development and production. In traditional networking systems, fixed dedicated network devices, such as switches, routers are used to control the network traffic. However, nonprogrammable feature, poor network security and performance drawback have created new challenges for future Internet-based information and communication system. The complexity in traditional networking makes the system difficult to reconfigure the network to counter faults, load and error. To overcome these issues, SDN is taking control over the traditional manually configured network to make proper utilization of physical network infrastructure. The aggregation of separate control plane and data plane allows network virtualization and dynamically programmable network configuration to improve the performance. The control plane is responsible for routing the data packet from source to destination. Similarly, the data plane is used for forwarding the packets that is also known as the forwarding plane. It is constructed on centralized network topologies that enable resource management. As a result, the network operator or service provider can manage and directly control their resources and network despite knowing any hardware technologies. It gives high flexibility, automation, service integration functionalities to accommodate innovative network designs. The SDN controller regulates the flow of control over the switches/routers to deploy intelligent networks. The open architecture of SDN broadly includes the infrastructure layer, control layer, and application layer. In this chapter, we focus on the architecture along with the advantage of using SDN networking over traditional networking systems.


Journal ArticleDOI
TL;DR: In this article , a review of target-based and cell-based screening of new anticancer drugs in the molecular targeting period is presented, which would help to incite an alteration from the preclinical screening of pragmatic compound-oriented to target-oriented drug selection.
Abstract: Anticancer drug development is a tedious process, requiring several in vitro, in vivo, and clinical studies. To avoid chemical toxicity in animals during an experiment, it is necessary to envisage toxic doses of screened drugs in vivo at different concentrations. Several in vitro and in vivo studies have been reported to discover the management of cancer.This study has focused on bringing together a wide range of in vivo and in vitro assay methods, developed to evaluate each hallmark feature of cancer.This review provides elaborated information about target-based and cell-based screening of new anticancer drugs in the molecular targeting period. This would help to incite an alteration from the preclinical screening of pragmatic compound-orientated to target-orientated drug selection.Selection methodologies for finding anticancer activity have importance for tumor-specific agents. In this study, advanced rationalization of the cell-based assay is explored along with broad applications of the cell-based methodologies considering other opportunities also.

Book ChapterDOI
01 Jan 2022
TL;DR: In this paper, a sinusoidal diffraction grating is used for designing a surface plasmon resonance (SPR) structure and the operation of the structure has been examined by using the wavelength-interrogation technique.
Abstract: In this paper, a sinusoidal diffraction grating is being used for designing a Surface Plasmon Resonance (SPR) structure. The operation of the structure has been examined by using the wavelength-interrogation technique. We have considered the reflected amplitude and absorption dip of the SPR response curve as design parameters for designing this structure. On the performance comparison of gold (Au)-based over silver (Ag)-based SPR structure, although the Ag-based SPR structure gives better results. Due to the poor chemical stability of silver, a thin film of gold is used over it which enhances the performance of the proposed bimetallic SPR structure. This can be used in bioscience for observing the variation of refractive index in an analyte.

Journal ArticleDOI
TL;DR: In this article , a novel steganography protocol using discrete modulation continuous variable quantum key distribution (QKD) was proposed to eliminate the threat of this detection-based attack.
Abstract: Steganography is the science of hiding and communicating a secret message by embedding it in an innocent looking text such that the eavesdropper is unaware of its existence. Previously, attempts were made to establish steganography using quantum key distribution (QKD). Recently, it has been shown that such protocols are vulnerable to a certain steganalysis attack that can detect the presence of the hidden message and suppress the entire communication. In this work, we elaborate on the vulnerabilities of the original protocol which make it insecure against this detection attack. Further, we propose a novel steganography protocol using discrete modulation continuous variable QKD that eliminates the threat of this detection-based attack. Deriving from the properties of our protocol, we also propose modifications in the original protocol to dispose of its vulnerabilities and make it insusceptible to steganalysis.

Book ChapterDOI
01 Jan 2022
TL;DR: In this paper , the concepts of microRNAs, their biogenesis, and their involvement in cardiovascular development and pathologies along with the various microRNA delivery methods are discussed and discussed in detail.
Abstract: Cardiovascular diseases (CVD) are a primary cause of mortality and morbidity around the globe. Although extensive advancement is witnessed in diagnosis, therapeutics, and projection of CVD, there is yet a critical need for novel therapeutic interventions to protect the heart from various stresses. Advancement in microRNAs next-generation technology has led to the identification of small noncoding microRNA during development and diseases. miR-1, miR-21, miR-29, miR-23a, miR-133, miR-195, miR-199a, miR-208, miR-210, miR-212/132, and miR-499 have been reported in cardiac context. This chapter discusses the concepts of microRNAs, their biogenesis, and involvement in cardiovascular development and pathologies along with the various microRNA delivery methods.

Journal ArticleDOI
TL;DR: In this article, the authors used two spatial filtering techniques: surface Laplacian (SL) and principal component analysis (PCA) to identify the source of emotion activity underneath the scalp.


OtherDOI
01 Jul 2022
TL;DR: In this paper , the authors have presented the network functions virtualization infrastructure (NFVI), virtual network functions (VNF), and NFV management and orchestration (M&O).
Abstract: Over the past few decades, computer networks have shown tremendous growth. The whole world relies on computer networks and technologies associated with them. The Internet has been a fast-growing technology. Today, all the aspects of our lives are done virtually. We work virtually, shop virtually, and educate virtually almost all our computing may be done virtually. The core technology behind it is the Internet and various computer networking technologies, which make it possible. Network virtualization itself has become a broad set of technologies for making it one of the most attractive topics in many academic communities. It offers commercial solutions to many industries through various business sectors. Virtualization also reduces storage space and electric power. Virtualization also provides simplified management because managing separate devices are not required. This chapter emphasizes on the following topics viz., working of different types of virtualizations, network functions virtualization (NFV), its benefit, and demerits. The architecture of NFV has been presented by introducing the network functions virtualization infrastructure (NFVI), virtual network functions (VNF), and NFV management and orchestration (M&O). Further, the works of the flow table, SDN applications, and research challenges for implementation of NFV are highlighted. Many SDN applications viz., adaptive routing, load balancing, and network maintenance have been depicted in this chapter. In addition to this, how SDN could be applied for cloud computing and IoT are also presented.