Arkajit Datta | Vellore Institute of Technology (original) (raw)

Arkajit Datta

Uploads

Papers by Arkajit Datta

Research paper thumbnail of An Emerging Malware Analysis Techniques and Tools: A Comparative Analysis

The term Malware denotes malevolent software. This type of software is installed in the system wi... more The term Malware denotes malevolent software. This type of software is installed in the system without the awareness of its owner. This malicious software is being installed by the third party to steal, damage, corrupt the important and personal data of the user. The Malware writers have to get an upper edge in spreading their spiteful software such as – worms, trojan horses, spyware, viruses, rootkits, cookies, adware, and many more through the world of immense networking – the Internet. Antivirus vendors are receiving a thousand potentially malicious software every day which can affect the systems. Using Antivirus scanning (AVS) and firewalls to detect the malware is not enough as the malware writers are always way ahead creating numerous unsolvable and challenging threats for the computer society. This survey provides a rundown on the study of Malwares, tools, and techniques which can be useful to analyze malicious software, focusing on the online available malware analysis tools...

Research paper thumbnail of Pandemic Penetration: Factors for Measurement

SN Computer Science

The current Covid-19 Pandemic has thrown an immense challenge to the entire humanity. This pandem... more The current Covid-19 Pandemic has thrown an immense challenge to the entire humanity. This pandemic spread across the entire globe is causing physical, economical, political, psychological and social stress. World Health Organization (WHO) is giving advisories to the nations from time to time in handling the pandemic. Different countries and WHO are publishing various statistics like the number of infected patients, number of recovered patients and number of deaths daily. There is a necessity to devise a metric, which we refer as Pandemic Penetration Index (PPI), to find out the intensity of the pandemic's penetration in different countries. This metric will not only help the policy makers to formulate the pandemic handling plans, but also acts as an apt tool for international organizations such as WHO, to provide nation-specific advisories. The effectiveness of the metric will depend on various individual factors that are to be considered, its measurement and weightage assigned to individual factors. Objective of the current study is to explore, estimate and establish various essential constituent individual factors for deriving proper PPI value, based on the current COVID 19 data.

Research paper thumbnail of CSE2001 COMPUTER ARCHITECTURE AND ORGANIZATION L T P J C 3 0 0 0 3

Prerequisite Syllabus version v1.0 Course Objectives: 1. To acquaint students with the basic conc... more Prerequisite Syllabus version v1.0 Course Objectives: 1. To acquaint students with the basic concepts of fundamental component, architecture, register organization and performance metrics of a computer. 2. To impart the knowledge of data representation in binary and understand implementation of arithmetic algorithms in a typical computer. 3. To teach students how to describe machine capabilities and design an effective data path design for instruction execution. To introduce students to syntax and semantics of machine level programming. 4. To make students understand the importance of memory systems, IO interfacing techniques and external storage and their performance metrics for a typical computer. And explore various alternate techniques for improving the performance of a processor. Expected Course Outcome: 1. Differentiate Von Neumann, Harvard, and CISC and RISC architectures. Analyze the performance of machines with different capabilities. 2. Illustrate binary format for numerical and characters. Validate efficient algorithm for arithmetic operations. 3. Construct machine level program for given expression on n-address machine. Analyze and calculate memory traffic for a program execution. Design an efficient data path for an instruction format for a given architecture. 4. Explain the importance of hierarchical memory organization. Able to construct larger memories. Analyze and suggest efficient cache mapping technique and replacement algorithms for given design requirements. Demonstrate hamming code for error detection and correction. 5. Understand the need for an interface. Compare and contrast memory mapping and IO mapping techniques. Describe and Differentiate different modes of data transfer. Appraise the synchronous and asynchronous bus for performance and arbitration. 6. Understand the structure and read write mechanisms for different storage systems. Illustrate and suggest appropriate use of RAID levels. Assess the performance of IO and external storage systems. 7. Classify parallel machine models. Illustrate typical 6-stage pipeline for overlapped execution. Analyze the hazards and solutions.

Research paper thumbnail of In Praise of Computer Organization and Design: The Hardware/ Software Interface, Fifth Edition

Research paper thumbnail of An Emerging Malware Analysis Techniques and Tools: A Comparative Analysis

The term Malware denotes malevolent software. This type of software is installed in the system wi... more The term Malware denotes malevolent software. This type of software is installed in the system without the awareness of its owner. This malicious software is being installed by the third party to steal, damage, corrupt the important and personal data of the user. The Malware writers have to get an upper edge in spreading their spiteful software such as – worms, trojan horses, spyware, viruses, rootkits, cookies, adware, and many more through the world of immense networking – the Internet. Antivirus vendors are receiving a thousand potentially malicious software every day which can affect the systems. Using Antivirus scanning (AVS) and firewalls to detect the malware is not enough as the malware writers are always way ahead creating numerous unsolvable and challenging threats for the computer society. This survey provides a rundown on the study of Malwares, tools, and techniques which can be useful to analyze malicious software, focusing on the online available malware analysis tools...

Research paper thumbnail of Pandemic Penetration: Factors for Measurement

SN Computer Science

The current Covid-19 Pandemic has thrown an immense challenge to the entire humanity. This pandem... more The current Covid-19 Pandemic has thrown an immense challenge to the entire humanity. This pandemic spread across the entire globe is causing physical, economical, political, psychological and social stress. World Health Organization (WHO) is giving advisories to the nations from time to time in handling the pandemic. Different countries and WHO are publishing various statistics like the number of infected patients, number of recovered patients and number of deaths daily. There is a necessity to devise a metric, which we refer as Pandemic Penetration Index (PPI), to find out the intensity of the pandemic's penetration in different countries. This metric will not only help the policy makers to formulate the pandemic handling plans, but also acts as an apt tool for international organizations such as WHO, to provide nation-specific advisories. The effectiveness of the metric will depend on various individual factors that are to be considered, its measurement and weightage assigned to individual factors. Objective of the current study is to explore, estimate and establish various essential constituent individual factors for deriving proper PPI value, based on the current COVID 19 data.

Research paper thumbnail of CSE2001 COMPUTER ARCHITECTURE AND ORGANIZATION L T P J C 3 0 0 0 3

Prerequisite Syllabus version v1.0 Course Objectives: 1. To acquaint students with the basic conc... more Prerequisite Syllabus version v1.0 Course Objectives: 1. To acquaint students with the basic concepts of fundamental component, architecture, register organization and performance metrics of a computer. 2. To impart the knowledge of data representation in binary and understand implementation of arithmetic algorithms in a typical computer. 3. To teach students how to describe machine capabilities and design an effective data path design for instruction execution. To introduce students to syntax and semantics of machine level programming. 4. To make students understand the importance of memory systems, IO interfacing techniques and external storage and their performance metrics for a typical computer. And explore various alternate techniques for improving the performance of a processor. Expected Course Outcome: 1. Differentiate Von Neumann, Harvard, and CISC and RISC architectures. Analyze the performance of machines with different capabilities. 2. Illustrate binary format for numerical and characters. Validate efficient algorithm for arithmetic operations. 3. Construct machine level program for given expression on n-address machine. Analyze and calculate memory traffic for a program execution. Design an efficient data path for an instruction format for a given architecture. 4. Explain the importance of hierarchical memory organization. Able to construct larger memories. Analyze and suggest efficient cache mapping technique and replacement algorithms for given design requirements. Demonstrate hamming code for error detection and correction. 5. Understand the need for an interface. Compare and contrast memory mapping and IO mapping techniques. Describe and Differentiate different modes of data transfer. Appraise the synchronous and asynchronous bus for performance and arbitration. 6. Understand the structure and read write mechanisms for different storage systems. Illustrate and suggest appropriate use of RAID levels. Assess the performance of IO and external storage systems. 7. Classify parallel machine models. Illustrate typical 6-stage pipeline for overlapped execution. Analyze the hazards and solutions.

Research paper thumbnail of In Praise of Computer Organization and Design: The Hardware/ Software Interface, Fifth Edition

Log In