Role of Antivirus in Enhancing Performances of Android Device - A Brief Review

Dr. Bhaskar V. Patil, Mr. Abhijit A. Patil; JECET; March 2018 - May 2018; Sec. B; Vol.7. No.2, 180-186.; [DOI: 10.24214/jecet.B.7.2.18086]

Abstract

Android has the biggest market share among all Smartphone operating sys-tem. The number of devices running with the Android operating system has been on the rise. By the end of 2012, it will account for nearly half of the world's Smartphone market. Along with its growth, the importance of security has also risen. Security is one of the main concerns for Smartphone users today. As the power and features of Smartphone’s increase, so has their vulnerability for attacks by viruses etc. Perhaps android is more secured operating system than any other Smartphone operating sys-tem today. Android has very few restrictions for developer, increases the security risk for end users. Android antivirus apps remain one of the most popular types of appli-cations on Android. Some people either like having that extra security or just want to be extra cautious just in case and there is nothing wrong with that. In this list, we will check out the best antivirus Android apps and anti-malware apps on Android. The ef-ficacies of these applications have not been empirically established. This research pa-per highlights classification of malware for android, prevention and detection tech-niques for android smartphone.

Case Study and Performance Analysis of AutoDock VS AutoDock Vina for Stable Drug Design

Ayan Chatterjee, Dr. Uttam Kumar Roy, Dr. Dinesh Haldar; JECET; March 2018 - May 2018; Sec. B; Vol.7. No.2, 157-179.; [DOI: 10.24214/jecet.B.7.2.15779]

Abstract

Computational Drug Design is an important & focused area of research as it reduces conventional research deadline and cost. Here we have considered structure based drug design approach where we have recognized a protein target and ligand prediction that will suitably fit there like a lock & key mechanism. The main aim of drug design is to develop or search a stable drug that cures disease with minimal cost and time with better stability. Different docking strategies are considered to make it more efficient with evolutionary approaches. The problems can be classified as optimization problems with NP Completeness. Recently scientists are applying bio-informatics in protein 3-D structure prediction which is more convenient than conventional 2-D structure prediction as 3-D structure of a protein helps in protein classification, prediction of functions for uncharacterized proteins, interaction with other macromolecules, Interactions with small ligands like metal ions, nucleotides, substrates, cofactors and inhibitors, enzyme mechanism, structure based drug development, understanding of different boding, predicting active site for targeted therapy like cancer, experimental evidence for transmembrane domains. Here, we have done bioinformatics tool based study on docking and completed performance analysis of AutoDock vs AutoDock Vina on Streptococcus bacterial protein.

A General Study On Cyber Security And Its Challenges: A Review

Ravinder Madhan, Sompal, Vikas Sheoran, Anshul; JECET; March 2018 - May 2018; Sec. B; Vol.7. No.2, 145-156.; [DOI: 10.24214/jecet.B.7.2.14556]

Abstract

Internet is a strength to today’s world. The excessive use of Internet can be the risk. Cyber Security and Cyber Crime are not new terms in this cyber oriented e-world. Internet provides the sufficient opportunities and facilities which permits the users to work efficiently and comfortably. But every coin has two faces. Present century would be century of Internet and its Services. The easily accessibility of Internet make it’s vulnerable to attack. After some decades, cyberspace can be used as platform by the antisocial elements of the society for the unethical work. That’s why it would be better and beneficial for us to maintain cyber security. So that Cyber Criminals could not be successful in their destructive goals. And in case of any cyber mishap, computer forensic department can collect evidence and forensic essence. The tools being used by the Cyber Intelligence against the cyber criminals are like hard disk, processor, DRAM and by internet connection. Mostly it is found that a government organization does not have enough knowledge of cyber security system. In the past, they believe that it is responsibility of local police to take action against these types of crimes. Even the police Intelligences Services were unaware of the new mode for the crimes. Although it is difficult to make perfect secure system due to the new advancement of IT every day. But we can upgrade our IT Intelligence and Services to provide the better Security. Awareness among the common users can lead to provide a new secure Cyber System. In this paper we would provide the interpretation of cyber security and little description of it.

A New Fractal Image Compression technique using Genetic Algorithm

S.Mohamed Azath Baik , Dr.A.Nagarajan; JECET; March 2018 - May 2018; Sec. B; Vol.7. No.2, 138-144.; [DOI: 10.24214/jecet.B.7.2.13844]

Abstract

Fractal compression is a lossy compression method for digital images, based on fractals. The method is best suited for textures and natural images, relying on the fact that parts of an image often resemble other parts of the same image. Fractal algorithms convert these parts into mathematical data called "fractal codes" which are used to recreate the encoded image. With fractal compression, encoding is extremely computationally expensive because of the search used to find the self-similarities. Decoding however, is quite fast. The main idea of fractal compression is to exploit local self-similarity in images. This permits a self-referential description of image data to be yielded, which shows a typical fractal structure when decoded. This type of redundancy is not exploited by tradition image coders and this is one of the motivations for fractal image coding. The main objective of this paper is to improve the encoding time and provides higher compression ratio with help of thresholding function.

A Review on Analyzing Various Log Files Using Hadoop

Prof. L.K. Vishwamitra, Vijay Singh Pawar; JECET; March 2018 - May 2018; Sec. B; Vol.7. No.2, 133-137.; [DOI: 10.24214/jecet.B.7.2.13337.]

Abstract

Web usage mining is application of data mining techniques to discover usage patterns from web data, in order to better serve the needs of web based applications. The user access log files present very significant information about a web server. This paper is concerned with the in-depth analysis of Web Log Data of website to find information about a web site, top errors, potential visitors of the site etc. which help system administrator and Web designer to improve their system by determining occurred systems errors, corrupted and broken links by using web using mining. Now a days due to increase on internet user logs files are also increase rapidly. Processing this explosive growth of log files using relational database technology has been facing a bottle neck. To analyze such large datasets we need parallel processing system and reliable data storage mechanism.. In this paper we present the hadoop framework for storing and processing large log files.