JECET : Journal of Environmental Science, Computer Science and Engineering & Technology. E-ISSN : 2278-179X

      JECET : Journal of Environmental Science, Computer Science and Engineering & Technology

Research Papers in Comp Science

A Review on Optimizing Hadoop Mapreduce Performance

Amit Dubey, Shilpa Tripathi

Hadoop has become a key component of big data, and gained more and more support. Since the companies and people will recognized the potential of hadoop framework, many companies will working on hadoop to enhance the performance of mapreduce framework. Hadoop MapReduce is a popular framework for distributed storage and processing of large datasets and is used for big data analytics. Mapreduce comes with various configuration parameters which play an important role in optimizing hadoop mapreduce performance. Default values of these parameters do not result in good performance and therefore it is important to tune them. In this paper we proposed that there are more than 100 configuration parameters in mapreduce framework which plays an important role in enhanching a mapreduce performance.

Population in India: Suitability of Logistic, Modified Exponential and Second Degree Parabolic Curves

Biswajit Das , Dhritikesh Chakrabarty and Manash Pratim Kashyap

There exist innumerable situations/problems where it is required to represent a set of numerical data on a pair of variables by different a suitable mathematical curve. In some of these situations/problems it is required to represent a set of numerical data by a mathematical curve containing three parameters. Second Degree Parabolic curve, Modified Exponential curve and Logistic curve are such curves containing three parameters. For a set of numerical data, one curve is suitable to represent the data. The suitability of these three curves has been studied, in the current study, in the case of the total population in India. This paper is based on the findings of this study.

Multi-Objective Bi-Level Programming for Environmental Constrained Electric Power Generation and Dispatch via Genetic Algorithm

Papun Biswas, Tuhin Subhra Das

This article presents how multi-objective bi-level programming (MOBLP) in a hierarchical structure can be efficiently used for modeling and solving environmental-economic power generation and dispatch (EEPGDD) problems through Fuzzy Goal Programming (FGP) based on genetic algorithm (GA) in a thermal power system operation and planning horizon. In MOBLP formulation, first the objectives associated with environmental and economic power generation are considered two optimization problems at two individual hierarchical levels ( top level and bottom level ) with the control of more than one objective, that are inherent to the problem each level. Then, the optimization problems of both the levels are described fuzzily to accommodate the impression arises for optimizing them simultaneously in the decision situation. In the model formulation, the concept of membership functions in fuzzy sets for measuring the achievement of highest membership value (unity) of the defined fuzzy goals in FGP formulation to the extent possible by minimising under-deviational variables associated with membership goals defined for them on the basis of their weights of importance is considered. Actually, the modeling aspects of FGP are used here to incorporate various uncertainties arises in generation of power and dispatch to various locations. In the solution process, a GA scheme is used in the framework of FGP model in an iterative manner to reach a satisfactory decision on the basis of needs in society in uncertain environment. The GA scheme is employed at two different stages. At the first stage, individual optimal decisions of objectives are determined for fuzzy goal description of them. At the second stage evaluation of goal achievement function to arrive at the highest membership value of the fuzzy goals in the order of hierarchical of optimizing them in the decision situation. The effective use of the approach is tested on the standard IEEE 6-Generator 30-Bus System

A Review on Analyzing Various Log Files Using Hadoop

Prof. L.K. Vishwamitra, Vijay Singh Pawar

Web usage mining is application of data mining techniques to discover usage patterns from web data, in order to better serve the needs of web based applications. The user access log files present very significant information about a web server. This paper is concerned with the in-depth analysis of Web Log Data of website to find information about a web site, top errors, potential visitors of the site etc. which help system administrator and Web designer to improve their system by determining occurred systems errors, corrupted and broken links by using web using mining. Now a days due to increase on internet user logs files are also increase rapidly. Processing this explosive growth of log files using relational database technology has been facing a bottle neck. To analyze such large datasets we need parallel processing system and reliable data storage mechanism.. In this paper we present the hadoop framework for storing and processing large log files.

A New Fractal Image Compression technique using Genetic Algorithm

S.Mohamed Azath Baik, Dr.A.Nagarajan

Fractal compression is a lossy compression method for digital images, based on fractals. The method is best suited for textures and natural images, relying on the fact that parts of an image often resemble other parts of the same image. Fractal algorithms convert these parts into mathematical data called "fractal codes" which are used to recreate the encoded image. With fractal compression, encoding is extremely computationally expensive because of the search used to find the self-similarities. Decoding however, is quite fast. The main idea of fractal compression is to exploit local self-similarity in images. This permits a self-referential description of image data to be yielded, which shows a typical fractal structure when decoded. This type of redundancy is not exploited by tradition image coders and this is one of the motivations for fractal image coding. The main objective of this paper is to improve the encoding time and provides higher compression ratio with help of thresholding function.

A General Study On Cyber Security And Its Challenges: A Review

Ravinder Madhan, Sompal, Vikas Sheoran, Anshul

Internet is a strength to today’s world. The excessive use of Internet can be the risk. Cyber Security and Cyber Crime are not new terms in this cyber oriented e-world. Internet provides the sufficient opportunities and facilities which permits the users to work efficiently and comfortably. But every coin has two faces. Present century would be century of Internet and its Services. The easily accessibility of Internet make it’s vulnerable to attack. After some decades, cyberspace can be used as platform by the antisocial elements of the society for the unethical work. That’s why it would be better and beneficial for us to maintain cyber security. So that Cyber Criminals could not be successful in their destructive goals. And in case of any cyber mishap, computer forensic department can collect evidence and forensic essence. The tools being used by the Cyber Intelligence against the cyber criminals are like hard disk, processor, DRAM and by internet connection. Mostly it is found that a government organization does not have enough knowledge of cyber security system. In the past, they believe that it is responsibility of local police to take action against these types of crimes. Even the police Intelligences Services were unaware of the new mode for the crimes. Although it is difficult to make perfect secure system due to the new advancement of IT every day. But we can upgrade our IT Intelligence and Services to provide the better Security .Awareness among the common users can lead to provide a new secure Cyber System. In this paper we would provide the interpretation of cyber security and little description of it.

Case Study and Performance Analysis of AutoDock VS AutoDock Vina for Stable Drug Design

Ayan Chatterjee , Dr. Uttam Kumar Roy, Dr. Dinesh Haldar

Computational Drug Design is an important & focused area of research as it reduces conventional research deadline and cost. Here we have considered structure based drug design approach where we have recognized a protein target and ligand prediction that will suitably fit there like a lock & key mechanism. The main aim of drug design is to develop or search a stable drug that cures disease with minimal cost and time with better stability. Different docking strategies are considered to make it more efficient with evolutionary approaches. The problems can be classified as optimization problems with NP Completeness. Recently scientists are applying bio-informatics in protein 3-D structure prediction which is more convenient than conventional 2-D structure prediction as 3-D structure of a protein helps in protein classification, prediction of functions for uncharacterized proteins, interaction with other macromolecules, Interactions with small ligands like metal ions, nucleotides, substrates, cofactors and inhibitors, enzyme mechanism, structure based drug development, understanding of different boding, predicting active site for targeted therapy like cancer, experimental evidence for transmembrane domains. Here, we have done bioinformatics tool based study on docking and completed performance analysis of AutoDock vs AutoDock Vina on Streptococcus bacterial protein.

Role of Antivirus in Enhancing Performances of Android Device - A Brief Review

Dr. Bhaskar V. Patil, Mr. Abhijit A. Patil

Android has the biggest market share among all Smartphone operating system. The number of devices running with the Android operating system has been on the rise. By the end of 2012, it will account for nearly half of the world's Smartphone market. Along with its growth, the importance of security has also risen. Security is one of the main concerns for Smartphone users today. As the power and features of Smartphone’s increase, so has their vulnerability for attacks by viruses etc. Perhaps android is more secured operating system than any other Smartphone operating system today. Android has very few restrictions for developer, increases the security risk for end users. Android antivirus apps remain one of the most popular types of applications on Android. Some people either like having that extra security or just want to be extra cautious just in case and there is nothing wrong with that. In this list, we will check out the best antivirus Android apps and anti-malware apps on Android. The efficacies of these applications have not been empirically established. This research paper highlights classification of malware for android, prevention and detection techniques for android smartphone.


Notifications

We are calling papers for Volume 7 and Issue 4 in all three sections.

Publication Charge

Payment via Paypal


Social Links

Facebook

Share