SlideShare a Scribd company logo
© 2015, IJCSE All Rights Reserved 120
International Journal of Computer Sciences and EngineeringInternational Journal of Computer Sciences and EngineeringInternational Journal of Computer Sciences and EngineeringInternational Journal of Computer Sciences and Engineering Open Access
Review Paper Volume-3, Issue-8 E-ISSN: 2347-2693
SSH: Shark Search Algorithm and Gray-Box Program with
Hadoop in Distributed Network
R.Indhunisha1*
and M.V.Srinath2
1*
Department of Computer Science, STET Women’s College, Mannargudi. Tamilnadu.
2
Director MCA, Research Advisor Department of Computer Science, STET Women’s College, Mannargudi
www.ijcseonline.org
Received: Jul /26/2015 Revised: Aug/06/2015 Accepted: Aug/23/2015 Published: Aug/30/ 2015
Abstract— Huge data is the term on the other hand an accumulation of data sets which are expansive also, complex, it contain
organized also, unorganized both sort of data. Data comes from everywhere, sensors utilized to gather climate information,
posts to social media sites, digital pictures also, and videos and so forth this data is known as enormous data. Useful data can be
extracted from this enormous data with the help of data mining. Data mining is a system on the other hand discovering
interesting designs as well as descriptive, understand capable models from expansive scale data. In this paper we overviewed
sorts of enormous data also, challenges in enormous data on the other hand future.
Keywords— Huge data, Data mining, Hace theorem,3V’s,Privacy
I. INTRODUCTION
The term 'Huge Data' showed up on the other hand initially
time in 1998 in a Silicon Graphics (SGI) slide deck by John
Mashey with the title of "Huge Data also, the NextWave of
InfraStress". Huge Data mining was exceptionally pertinent
from the beginning, as the initially book mentioning 'Huge
Data' is a data mining book that showed up too in 1998 by
Weiss also, Indrukya . However, the initially academic paper
with the words 'Huge Data' in the title showed up a bit later
in 2000 in a paper by Diebold .The origin of the term 'Huge
Data' is due to the truth that we are making a colossal sum of
data each day. Usama Fayyad in his invited talk at the KDD
BigMine‟ 12Workshop displayed amazing data numbers
about internet usage, among them the following: each day
Google has more than 1 billion questions per day, Twitter
has more than 250 million tweets per day, Facebook has
more than 800 million updates per day, also, YouTube has
more than 4 billion views per day. The data produced
nowadays is estimated in the request of zettabytes, also, it is
developing around 40% each year. A new expansive source
of data is going to be produced from versatile gadgets also,
enormous companies as Google, Apple, Facebook, Yahoo
are beginning to look carefully to this data to find helpful
designs to move forward client experience. “Huge data” is
pervasive, also, yet still the notion engenders confusion.
Huge data has been utilized to convey all sorts of concepts,
including: colossal amounts of data, social media analytics,
next era data administration capabilities, constant data, also,
much more. Whatever the label, associations are beginning
to understand also, investigate how to process also, break
down a vast array of data in new ways. In doing so, a small,
in any case developing bunch of pioneers is achieving
breakthrough business outcomes. In industries throughout
the world, executives recognize the need to learn more about
how to exploit enormous data. In any case despite what
seems like unrelenting media attention, it can be hard to find
in-depth data on what associations are really doing. So, we
sought to better understand, how associations view
enormous data – also, to what degree they are presently
utilizing it to benefit their businesses.
II. TYPES OF ENORMOUS INFORMATION AND
SOURCES
There are two sorts of enormous data: organized also,
unstructured.
Structured data are numbers also, words that can be
effectively categorized also, analyzed. These data are
produced by things like system sensors embedded in
electronic devices, smartphones, also, worldwide situating
structure (GPS) devices. Structured data too incorporate
things like sales figures, account balances, also, Tran’s
activity data.
Unorganized data incorporate more complex information,
such as client reviews from commercial websites, photos
also, other multimedia, also, comments on social organizing
sites. These data cannot effectively be separated into
classifications on the other hand broke down numerically.
“Unorganized enormous data is the things that humans are
saying,” says enormous data consulting firm vice president
Tony Jewitt of Plano, Texas. “It uses natural language.”
Investigation of unorganized data depends on keywords,
which permit customers to filter the data based on search
capable terms. The explosive advancement of the Web in
International Journal of Computer Sciences and Engineering Vol.-3(8), PP(120-124) Aug 2015, E-ISSN: 2347-2693
© 2015, IJCSE All Rights Reserved 121
later a long time implies that the assortment also, sum of
enormous data continue to grow. Much of that advancement
comes from unorganized data.
III. HACE THEOREM
Huge Data starts with large-volume, heterogeneous,
autonomous sources with circulated also, decentralized
control, also, seeks to investigate complex also, evolving
relationships among data. These qualities make it an
extreme challenge on the other hand discovering helpful
information from the Huge Data. In a naïve sense, we can
imagine that a number of blind men are attempting to size
up a giant Camel, which will be the Huge Data in this
context. The objective of each blind man is to draw a
picture (on the other hand conclusion) of the Camel
according to the part of data he collects amid the process.
Since each person’s view is constrained to his local region,
it is not surprising that the blind men will each close
independently that the camel “feels” like a rope, a hose, on
the other hand a wall, depending on the region each of them
is constrained to. To make the issue indeed more
complicated, let us expect that the camel is developing
rapidly also, its pose changes constantly, also, each blind
man might have his own (conceive capable unrelicapable
also, inaccurate) data sources that tell him about biased
information about the camel (e.g., one blind man might
trade his feeling about the camel with another blind man,
where the exchanged information is inherently biased).
Exploring the Huge Data in this situation is equivalent to
aggregating heterogeneous data from specific sources
(blind men) to help draw a best conceive capable picture to
uncover the genuine gesture of the camel in a constant
fashion. Indeed, this undertaking is not as simple as asking
each blind man to portray his feelings about the camel also,
at that point getting an expert to draw one single picture
with a consolidated view, concerning that each individual
might speak a specific language (heterogeneous also,
assorted data sources) also, they might indeed have
assurance concerns about the messages they deliberate in
the data trade process. The term Huge Data literally
concerns about data volumes, HACE theorem suggests that
the key qualities of the Huge Data are
A. Huge with heterogeneous also, assorted data sources:-
One of the crucial qualities of the Huge Data is the colossal
volume of data redisplayed by heterogeneous also, assorted
dimensionalities. This colossal volume of data comes from
different destinations like Twitter, Myspace, Orkut also,
LinkedIn etc.
B. Decentralized control:- Autonomous data sources with
circulated also, decentralized controls are a crucial
trademark of Huge Data applications. Being autonomous,
each data source is capable to generate also, gather data
without involving (on the other hand depending on) any
centralized control. This is comparable to the World Wide
Web (WWW) setting where each web server gives a certain
sum of data also, each server is capable to fully capacity
without necessarily depending on other servers.
C. Complex data also, information associations:-Multi
structure, multisource data is complex data, Examples of
complex data sorts are bills of materials, word handling
documents, maps, time-series, images also, video. Such
consolidated qualities recommend that Huge Data require a
“enormous mind” to consolidate data on the other hand
most extreme values.
IV. THREE V’S IN HUGE DATA
Doug Laney was the initially one talking about 3V‟s in
Huge Data Management
Volume: The sum of data. Maybe the trademark most
related with enormous data, volume alludes to the mass
amounts of data that associations are attempting to harness
to move forward decision-making over the enterprise. Data
volumes continue to increment at an unprecedented rate.
Variety: Different sorts of data also, data sources.
Assortment is about overseeing the complexity of multiple
data types, counting structured, semi-organized also,
unorganized data. Organizations need to integrate also,
break down data from a complex array of both conventional
also, non-conventional data sources, from inside also,
outside the enterprise. With the explosion of sensors, smart
gadgets also, social joint effort technologies, data is being
produced in countless forms, including: text, web data, and
tweets, audio, video, log files also, more. Velocity: Data in
motion. The speed at which data is created, processed also,
broke down continues to accelerate. Nowadays there are
two more V‟s Variability:- There are changes in the
structure of the data also, how customers need to interpret
that data. Value:- Business esteem that gives association a
compelling advantage, due to the capacity of making
decisions based in answering questions that were previously
considered beyond reach.
V. INFORMATION MINING FOR ENORMOUS DATA
Generally, data mining (in some cases Cal driven data on the
other hand information discovery) is the process of
analyzing data from specific perspectives also, summarizing
it into helpful data - data that can be utilized to increment
revenue, cuts costs, on the other hand both. Technically, data
International Journal of Computer Sciences and Engineering Vol.-3(8), PP(120-124) Aug 2015, E-ISSN: 2347-2693
© 2015, IJCSE All Rights Reserved 122
mining is the process of finding correlations on the other
hand designs among dozens of fields in expansive relational
database. Data mining as a term utilized on the other hand
the specific classes of six exercises on the other hand
assignments as follows:
• Classification
• Estimation
• Prediction
• Association rules
• Clustering
• Description
A. Classification
Grouping is a process of generalizing the data according to
specific instances. Several majon the other hand kinds of
classification calculations in data mining are Decision tree,
k-nearest neighbon the other hand classifier, Naive Bayes,
Apriori also, AdaBoost. Grouping comprises of examining
the features of a newly displayed object also, assigning to it
a preportrayed class. The classification undertaking is
portrayed by the well-portrayed classes, also, a training set
consisting of regrouped examples.
B. Estimation
Estimation deals with continuously valued outcomes. Given
some input data, we use estimation to come up with a esteem
on the other hand some obscure continuous variables such as
income, height on the other hand credit card balance.
C. Prediction
It’s a statement about the way things will happen in the
future , regularly in any case not always based on experience
on the other hand knowledge. Forecast might be a statement
in which some outcome is expected.
D. Association Rules
An association rule is a rule which implies certain
association relationships among a set of objects (such as
“occur together” on the other hand “one implies the other”)
in a database.
E. Clustering
Clustering can be considered the most critical unsupervised
learning problem; so, as each other issue of this kind, it deals
with finding a structure in a accumulation of unable driven
data.
VI. CHALLENGES IN ENORMOUS DATA
Meeting the challenges displayed by enormous data will be
difficult. The volume of data is already enormous also,
expanding each day. The velocity of its era also,
advancement is increasing, driven in part by the proliferation
of internet connected devices. Furthermore, the assortment
of data being produced is too expanding, also, organization’s
capacity to capture also, process this data is limited. Current
technology, architecture, and administration also,
examination approaches are uncapable to cope with the flood
of data, also, associations will need to change the way they
think about, plan, govern, manage, process also, report on
data to realize the potential of enormous data.
A. Privacy, security also, trust
The Australian Government is committed to protecting the
assurance rights of its natives also, has recently
strengthened the Security Act (through the passing of the
Security Amendment (Enhancing Security Protection) Bill
2012) to enhance the assurance of also, set clearer
boundaries on the other hand use of individual information.
Government agencies, at the point when gathering on the
other hand overseeing natives data, are subject to a range of
authoritative controls, also, must comply with the a number
of acts also, regulations such as the Freedom of Data Act
(1982), the Archives Act(1983), the Telecommunications
Act (1997) ,the Electronic Transactions Act (1999), also,
the Intelligence Administrations Act(2001).
These authoritative instruments are outlined to keep up
open confidence in the government as a compelling also,
secure vault also, steward of citizen information. The use of
enormous data by government associations will not change
this; rather it might add an extra layer of complexity in
terms of overseeing data security risks. Huge data sources,
the transport also, deli exceptionally structures inside also,
over agencies, also, the end focuses on the other hand this
data will all become targets of interest on the other hand
hackers, both local also, international also, will need to be
protected. The open discharge of expansive machine-read
capable data sets, as part of the open government policy,
could potentially give an opportunity on the other hand
unfriendly state also, non-state actors to glean delicate
information, on the other hand make a mosaic of exploit
capable data from apparently innocuous data. This danger
will need to be understood also, carefully managed. The
potential esteem of enormous data is a capacity of the
number of relevant, disparate datasets that can be linked
also, analysed to uncover new patterns, trends also, insights.
Public trust in government associations is required before
natives will be capable to understalso, that such linking
also, examination can take place while protecting the
assurance rights of individuals.
B. Data administration also, sharing
International Journal of Computer Sciences and Engineering Vol.-3(8), PP(120-124) Aug 2015, E-ISSN: 2347-2693
© 2015, IJCSE All Rights Reserved 123
Accessible data is the lifeblood of a robust democracy also,
a productive economy.2 Government associations realise
that on the other hand data to have any esteem it needs to be
discoverable, open also, usable, also, the significance of
these necessities just increases as the discussion turns
towards enormous data. Government associations must
accomplish these necessities whilst still adhering to
assurance laws. The processes encompassing the way data
is collected, handled, utilised also, overseen by associations
will need to be aligned with all pertinent authoritative also,
regulatory instruments with a center on making the data
open on the other hand examination in a lawful,
controldriven also, meaningful way. Data too needs to be
accurate, complete also, timely in the event that it is to be
utilized to support complex examination also, choice
making. On the other hand these reasons, administration
also, governance center needs to be on making data open
also, open over government via standardised APIs, formats
also, metadata. Improved quality of data will produce
tangible advantages in terms of business intelligence, choice
making, sustain capable cost-savings also, productivity
improvements. The current trend towards open data also,
open government has seen a center on making data sets
open to the public, however these „open‟ initiatives need to
too put center on making data open, open also, standardized
inside also, between associations in such a way that permits
inter-administrative office use also, joint effort to the degree
made conceive capable by the assurance laws.
C. Technology also, analytical systems
The emergence of enormous data also, the potential to
undertake complex examination of exceptionally expansive
data sets is, essentially, a outcome of later progresses in the
innovation that permit this. On the off chance that enormous
data investigation is to be adopted by agencies, a expansive
sum of stress might be placed upon current ICT structures
also, arrangements which presently carry the load of
processing, analysing also, archiving data. Government
associations will need to oversee these new necessities
efficiently in request to deliver net advantages through the
adoption of new technologies.
VII. FORECAST TO THE FUTURE
There are numerous future critical challenges in Huge Data
administration also, analytics, that arise from the nature of
data: large, diverse, also, evolving. These are some of the
challenges that researchers also, practitioners will have to
bargain amid the next years:
A. Analytics Architecture:- It is not clear yet how an
optimal construction modeling of an investigation structures
should be to bargain with historic data also, with constant
data at the same time. An interesting proposal is the
Lambda construction modeling of Nathan Marz. The
Lambda Building design solves the issue of handling
arbitrary functions on arbitrary data in genuine time by
decomposing the issue into three layers: the batch layer, the
serving layer, also, the speed layer. It combines in the same
structure Hadoop on the other hand the batch layer, also,
Storm on the other hand the speed layer. The properties of
the structure are: robust also, fault tolerant, scalable,
general, extensible, permits ad hoc queries, minimal
maintenance, also, debuggable.
B. Statistical significance:- It is critical to accomplish huge
statistical results, also, not be foodriven by randomness.
AsEfron clarifies in his book about Large Scale Inference it
is simple to go wrong with colossal data sets also, thousands
of questions to answer at once.
C. Distributed mining:- Many data mining structures are
not trivial to paralyze. To have circulated versions of some
methods, a part of relook is required with practical also,
theoretical examination to give new methods.
D. Hidden Huge Data.:- Large amounts of helpful data are
getting lost since new data is largely untagged file based
also, unorganized data. The 2012 IDC study on Huge Data
clarifies that in 2012, 23% (643 exabytes) of the digital
universe would be helpful on the other hand Huge Data in
the event that tagged also, analyzed. However, presently
just 3% of the potentially helpful data is tagged, also,
indeed less is analyzed
VIII. CONCLUSION
Huge data is the term on the other hand an accumulation of
complex data sets, Data mining is an analytic process
outlined to investigate data (usually expansive sum of data-
typically business on the other hand market related-too
known as “enormous data”) in look of consistent designs
also, at that point to approve the findings by applying the
detected designs to new subsets of data. To support huge
data mining, high-execution handling plat frames are
required, which impose systematic designs to unleash the
full power of the Huge Data. We regard huge data as a
rising trend also, the need on the other hand huge data
mining is rising in all science also, engineering domains.
With Huge data technologies, we will hopefully be capable
to give most pertinent also, most exact social sensing
feedback to better understand also, our society at genuine
time.
ACKNOWLEDGEMENT
1
Mrs. R.INDHUNISHA, M.Phil Research Scholar, PG and
Research Department of Computer Science, STET
Women’s College, Mannargudi.
2
Dr. M.V.SRINATH MCA., Ph.D., Director MCA,
Research Advisor Department of Computer Science, STET
Women’s College, Mannargudi
REFERENCES
[1] Hessling, Hermann “[Keynote Speaker-2] Challenges
in Handling and Processing Huge Data” Published
International Journal of Computer Sciences and Engineering Vol.-3(8), PP(120-124) Aug 2015, E-ISSN: 2347-2693
© 2015, IJCSE All Rights Reserved 124
in:Artificial Intelligence, Modelling and Simulation
(AIMS), 2014 2nd International Conference on Date of
Conference: 18-20 Nov. 2014
[2] Yuan Ye ; Sch. of Bus. Inf. Manage., Shanghai Univ.
of Int. Bus. & Econ., Shanghai, China” A Data
Extraction Algorithm for Huge Data Visualization
Based on Computational Meshes” Published
in:Management of e-Commerce and e-Government
(ICMeCG), 2014 International Conference on Date of
Conference:Oct. 31 2014-Nov. 2 2014
[3] Feng Hu ; Wang, Guoyin “ Huge Data Mining Based
on Rough Set Theory and Granular Computing”
Published in: Web Intelligence and Intelligent Agent
Technology, 2008. WI-IAT '08. IEEE/WIC/ACM
International Conference on (Volume:3 )Date of
Conference:9-12 Dec. 2008
[4] Fazio, M. ; Fac. of Eng., Univ. of Messina, Messina,
Italy ; Paone, M. ; Puliafito, A. ; Villari, M. “Huge
amount of heterogeneous sensed data needs the cloud”
Published in: Systems, Signals and Devices (SSD),
2012 9th International Multi-Conference onDate of
Conference: 20-23 March 2012
[5] Chao-Tung Yang ; Dept. of Comput. Sci., Tung[12hai
Univ., Taichung, T"aiwan ; Wen-Chung Shih ; Guan-
Han Chen ; Shih-Chi Yu “Implementation of a Cloud
Computing Environment for Hiding Huge Amounts of
Data” Published in:Parallel and Distributed Processing
with Applications (ISPA), 2010 International
Symposium on Date of Conference: 6-9 Sept. 2010
[6] Wang, Guoyin ; Inst. of Comput. Sci. & Technol.,
Chongqing Univ. of Posts & Telecommun., Chongqing
Jun Hu ; Qinghua Zhang ; Xianquan Liu “Granular
computing based data mining in the views of rough set
and fuzzy set” Published in:Granular Computing, 2008.
GrC 2008. IEEE International Conference on Date of
Conference: 26-28 Aug. 2008
[7] Lei Xu ; Dept. of Electron. Eng., Tsinghua Univ.,
Beijing, China ; Chunxiao Jiang ; Jian Wang ; Jian
Yuan “Information Security in Big Data: Privacy and
Data Mining” Published in:Access, IEEE (Volume:2 )
Date of Publication :09 October 2014
[8] Shen Bin ; Ningbo Inst. of Technol., Zhejiang Univ.,
Ningbo, China ; Liu Yuan ; Wang Xiaoyi” Research on
data mining models for the internet of things”
Published in:Image Analysis and Signal Processing
(IASP), 2010 International Conference on Date of
Conference: 9-11 April 2010
[9] Refonaa, J. ; Dept. of Comput. Sci. & Engineeering,
Sathyabama Univ., Chennai, India ; Lakshmi,
M. ; Vivek, V. “Analysis and prediction of natural
disaster using spatial data mining technique” Published
in:Circuit, Power and Computing Technologies
(ICCPCT), 2015 International Conference on Date of
Conference:19-20 March 2015
[10]Nestorov, S. ; Dept. of Comput. Sci., Chicago Univ.,
IL, USA ; Jukic, N. “Ad-hoc association-rule mining
within the data warehouse” Published in System
Sciences, 2003. Proceedings of the 36th Annual Hawaii
International Conference on Date of Conference: 6-9
Jan. 2003
[11]Xindong Wu ; Sch. of Comput. Sci. & Inf. Eng., Hefei
Univ. of Technol., Hefei, China ; Xingquan
Zhu ; Gong-Qing Wu ; Wei Ding “Data mining with
big data” Published in: Knowledge and Data
Engineering, IEEE Transactions on (Volume:26
, Issue: 1 ) Date of Publication : 26 June 2013
[12]Wu, X. ; University of Vermont, Burlington ; Chen,
H. ; Wu,G. ; Liu,J. more authors “Knowledge
Engineering with Big Data” Published in Intelligent
Systems, IEEE (Volume:PP, Issue: 99 ) Date of
Publication : 13 July 2015
[13]Xiongyan Li ; State Key Lab. of Pet. Resource &
Prospecting, China Univ. of Pet., Beijing, China
; Hongqi Li ; HeXu ; ZhouJinyu more authors “Task-
driven data mining in the formation evaluation field”
Published in:Advanced Information Management and
Service (IMS), 2010 6th International Conference on
Date of Conference: Nov. 30 2010-Dec. 2 2010
[14]Zhang Yun ; Inst. of Comput. Sci., Northwestern
Polytech. Univ., Xi''an, China ; Li Weihua ; Chen Yang
“The Study of Multidimensional-Data Flow of
Fishbone Applied for Data Mining” Published in:
Software Engineering Research, Management and
Applications, 2009. SERA '09. 7th ACIS International
Conference on Date of Conference: 2-4 Dec. 2009
[15]Nirkhi, S. ; Dept. of Comput. Sci., G.H.Raisoni Coll. of
Eng., Nagpur, India “Potential use of Artificial Neural
Network in Data Mining” Published in Computer and
Automation Engineering (ICCAE), 2010 The 2nd
International Conference on (Volume:2 )Date of
Conference: 26-28 Feb. 2010

More Related Content

What's hot

Big data unit i
Big data unit iBig data unit i
Big data unit i
Navjot Kaur
 
Semantic Web Investigation within Big Data Context
Semantic Web Investigation within Big Data ContextSemantic Web Investigation within Big Data Context
Semantic Web Investigation within Big Data Context
Murad Daryousse
 
Overcomming Big Data Mining Challenges for Revolutionary Breakthroughs in Com...
Overcomming Big Data Mining Challenges for Revolutionary Breakthroughs in Com...Overcomming Big Data Mining Challenges for Revolutionary Breakthroughs in Com...
Overcomming Big Data Mining Challenges for Revolutionary Breakthroughs in Com...
AnthonyOtuonye
 
BigData
BigDataBigData
BigData
Viveka Sharma
 
Big data survey
Big data surveyBig data survey
Big data survey
Ezhilarasan Elumalai
 
Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...
Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...
Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...Katie Whipkey
 
Big data for the next generation of event companies
Big data for the next generation of event companiesBig data for the next generation of event companies
Big data for the next generation of event companies
Raj Anand
 
Data Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research OpportunitiesData Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research Opportunities
Kathirvel Ayyaswamy
 
History of Big Data
History of Big DataHistory of Big Data
History of Big Data
HEXANIKA
 
Big data march2016 ipsos mori
Big data march2016 ipsos moriBig data march2016 ipsos mori
Big data march2016 ipsos mori
Chris Guthrie
 
06. 9534 14985-1-ed b edit dhyan
06. 9534 14985-1-ed b edit dhyan06. 9534 14985-1-ed b edit dhyan
06. 9534 14985-1-ed b edit dhyan
IAESIJEECS
 
Information Management: Evolution or Revolution?
Information Management: Evolution or Revolution?Information Management: Evolution or Revolution?
Information Management: Evolution or Revolution?
Collabor8now Ltd
 
Big Data Ethics
Big Data EthicsBig Data Ethics
Big Data Ethics
Nael Radwan
 
Big Data Paper
Big Data PaperBig Data Paper
Big Data Paper
Andile Ngcaba
 
Data science.chapter-1,2,3
Data science.chapter-1,2,3Data science.chapter-1,2,3
Data science.chapter-1,2,3
varshakumar21
 
Big Data - Big Deal? - Edison's Academic Paper in SMU
Big Data - Big Deal? - Edison's Academic Paper in SMUBig Data - Big Deal? - Edison's Academic Paper in SMU
Big Data - Big Deal? - Edison's Academic Paper in SMU
Edison Lim Jun Hao
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
MrsSSumathiIT
 
A Review Paper on Big Data: Technologies, Tools and Trends
A Review Paper on Big Data: Technologies, Tools and TrendsA Review Paper on Big Data: Technologies, Tools and Trends
A Review Paper on Big Data: Technologies, Tools and Trends
IRJET Journal
 

What's hot (20)

Big data unit i
Big data unit iBig data unit i
Big data unit i
 
Semantic Web Investigation within Big Data Context
Semantic Web Investigation within Big Data ContextSemantic Web Investigation within Big Data Context
Semantic Web Investigation within Big Data Context
 
Overcomming Big Data Mining Challenges for Revolutionary Breakthroughs in Com...
Overcomming Big Data Mining Challenges for Revolutionary Breakthroughs in Com...Overcomming Big Data Mining Challenges for Revolutionary Breakthroughs in Com...
Overcomming Big Data Mining Challenges for Revolutionary Breakthroughs in Com...
 
BigData
BigDataBigData
BigData
 
Big data
Big data Big data
Big data
 
Big data survey
Big data surveyBig data survey
Big data survey
 
Intro dm
Intro dmIntro dm
Intro dm
 
Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...
Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...
Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...
 
Big data for the next generation of event companies
Big data for the next generation of event companiesBig data for the next generation of event companies
Big data for the next generation of event companies
 
Data Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research OpportunitiesData Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research Opportunities
 
History of Big Data
History of Big DataHistory of Big Data
History of Big Data
 
Big data march2016 ipsos mori
Big data march2016 ipsos moriBig data march2016 ipsos mori
Big data march2016 ipsos mori
 
06. 9534 14985-1-ed b edit dhyan
06. 9534 14985-1-ed b edit dhyan06. 9534 14985-1-ed b edit dhyan
06. 9534 14985-1-ed b edit dhyan
 
Information Management: Evolution or Revolution?
Information Management: Evolution or Revolution?Information Management: Evolution or Revolution?
Information Management: Evolution or Revolution?
 
Big Data Ethics
Big Data EthicsBig Data Ethics
Big Data Ethics
 
Big Data Paper
Big Data PaperBig Data Paper
Big Data Paper
 
Data science.chapter-1,2,3
Data science.chapter-1,2,3Data science.chapter-1,2,3
Data science.chapter-1,2,3
 
Big Data - Big Deal? - Edison's Academic Paper in SMU
Big Data - Big Deal? - Edison's Academic Paper in SMUBig Data - Big Deal? - Edison's Academic Paper in SMU
Big Data - Big Deal? - Edison's Academic Paper in SMU
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
A Review Paper on Big Data: Technologies, Tools and Trends
A Review Paper on Big Data: Technologies, Tools and TrendsA Review Paper on Big Data: Technologies, Tools and Trends
A Review Paper on Big Data: Technologies, Tools and Trends
 

Viewers also liked

14 ijcse-01234
14 ijcse-0123414 ijcse-01234
14 ijcse-01234
Shivlal Mewada
 
Oh Old
Oh OldOh Old
Oh Old
Yumin Huang
 
Disco duro jancel
Disco duro jancelDisco duro jancel
Disco duro jancel
Gustavo Juarez
 
Leadership
Leadership Leadership
Leadership
cataram manisha
 
Diseñemos hoy el futuro de los RRHH
Diseñemos hoy el futuro de los RRHHDiseñemos hoy el futuro de los RRHH
Diseñemos hoy el futuro de los RRHH
Prisma
 
[WEBINARIO] Pegando el salto en SEM
[WEBINARIO] Pegando el salto en SEM[WEBINARIO] Pegando el salto en SEM
[WEBINARIO] Pegando el salto en SEM
OM Latam
 
Resume - AKRUTI GANGWAL
Resume - AKRUTI GANGWALResume - AKRUTI GANGWAL
Resume - AKRUTI GANGWALakruti gangwal
 
Nelson si kecil yang suka baca
Nelson si kecil yang suka bacaNelson si kecil yang suka baca
Nelson si kecil yang suka baca
gozali_adel
 
Developing an Anaplan roadmap beyond P&L planning: Red Robin’s Anaplan journe...
Developing an Anaplan roadmap beyond P&L planning: Red Robin’s Anaplan journe...Developing an Anaplan roadmap beyond P&L planning: Red Robin’s Anaplan journe...
Developing an Anaplan roadmap beyond P&L planning: Red Robin’s Anaplan journe...
Anaplan
 
Jelly Bean Little and the Rice Pudding Thieves
Jelly Bean Little and the Rice Pudding ThievesJelly Bean Little and the Rice Pudding Thieves
Jelly Bean Little and the Rice Pudding Thieves
John Macdonald
 
Trade Promotion Management
Trade Promotion ManagementTrade Promotion Management
Trade Promotion Management
Dhiren Gala
 
Gestion des ressources humaines
Gestion des ressources humainesGestion des ressources humaines
Gestion des ressources humaines
Independant Contract & Claim Manager
 
Autism: The Challenges and Opportunities
Autism: The Challenges and OpportunitiesAutism: The Challenges and Opportunities
Autism: The Challenges and Opportunities
mckenln
 
Kelly Jones- Exercise and Health conference
Kelly Jones-  Exercise and Health conferenceKelly Jones-  Exercise and Health conference
Kelly Jones- Exercise and Health conference
mckenln
 
Art for all, art from all 藝術無障礙:散播非視覺美學種子
Art for all, art from all 藝術無障礙:散播非視覺美學種子Art for all, art from all 藝術無障礙:散播非視覺美學種子
Art for all, art from all 藝術無障礙:散播非視覺美學種子
Hsin-Yi Chao
 

Viewers also liked (15)

14 ijcse-01234
14 ijcse-0123414 ijcse-01234
14 ijcse-01234
 
Oh Old
Oh OldOh Old
Oh Old
 
Disco duro jancel
Disco duro jancelDisco duro jancel
Disco duro jancel
 
Leadership
Leadership Leadership
Leadership
 
Diseñemos hoy el futuro de los RRHH
Diseñemos hoy el futuro de los RRHHDiseñemos hoy el futuro de los RRHH
Diseñemos hoy el futuro de los RRHH
 
[WEBINARIO] Pegando el salto en SEM
[WEBINARIO] Pegando el salto en SEM[WEBINARIO] Pegando el salto en SEM
[WEBINARIO] Pegando el salto en SEM
 
Resume - AKRUTI GANGWAL
Resume - AKRUTI GANGWALResume - AKRUTI GANGWAL
Resume - AKRUTI GANGWAL
 
Nelson si kecil yang suka baca
Nelson si kecil yang suka bacaNelson si kecil yang suka baca
Nelson si kecil yang suka baca
 
Developing an Anaplan roadmap beyond P&L planning: Red Robin’s Anaplan journe...
Developing an Anaplan roadmap beyond P&L planning: Red Robin’s Anaplan journe...Developing an Anaplan roadmap beyond P&L planning: Red Robin’s Anaplan journe...
Developing an Anaplan roadmap beyond P&L planning: Red Robin’s Anaplan journe...
 
Jelly Bean Little and the Rice Pudding Thieves
Jelly Bean Little and the Rice Pudding ThievesJelly Bean Little and the Rice Pudding Thieves
Jelly Bean Little and the Rice Pudding Thieves
 
Trade Promotion Management
Trade Promotion ManagementTrade Promotion Management
Trade Promotion Management
 
Gestion des ressources humaines
Gestion des ressources humainesGestion des ressources humaines
Gestion des ressources humaines
 
Autism: The Challenges and Opportunities
Autism: The Challenges and OpportunitiesAutism: The Challenges and Opportunities
Autism: The Challenges and Opportunities
 
Kelly Jones- Exercise and Health conference
Kelly Jones-  Exercise and Health conferenceKelly Jones-  Exercise and Health conference
Kelly Jones- Exercise and Health conference
 
Art for all, art from all 藝術無障礙:散播非視覺美學種子
Art for all, art from all 藝術無障礙:散播非視覺美學種子Art for all, art from all 藝術無障礙:散播非視覺美學種子
Art for all, art from all 藝術無障礙:散播非視覺美學種子
 

Similar to 23 ijcse-01238-1indhunisha

Introduction to big data – convergences.
Introduction to big data – convergences.Introduction to big data – convergences.
Introduction to big data – convergences.
saranya270513
 
Unit No2 Introduction to big data.pdf
Unit No2 Introduction to big data.pdfUnit No2 Introduction to big data.pdf
Unit No2 Introduction to big data.pdf
Ranjeet Bhalshankar
 
Smart Data Module 1 introduction to big and smart data
Smart Data Module 1 introduction to big and smart dataSmart Data Module 1 introduction to big and smart data
Smart Data Module 1 introduction to big and smart data
caniceconsulting
 
UNIT 1 -BIG DATA ANALYTICS Full.pdf
UNIT 1 -BIG DATA ANALYTICS Full.pdfUNIT 1 -BIG DATA ANALYTICS Full.pdf
UNIT 1 -BIG DATA ANALYTICS Full.pdf
vvpadhu
 
Notes from the Observation Deck // A Data Revolution
Notes from the Observation Deck // A Data Revolution Notes from the Observation Deck // A Data Revolution
Notes from the Observation Deck // A Data Revolution
gngeorge
 
Data Mining in the World of BIG Data-A Survey
Data Mining in the World of BIG Data-A SurveyData Mining in the World of BIG Data-A Survey
Data Mining in the World of BIG Data-A Survey
Editor IJCATR
 
Policy paper need for focussed big data & analytics skillset building throu...
Policy  paper  need for focussed big data & analytics skillset building throu...Policy  paper  need for focussed big data & analytics skillset building throu...
Policy paper need for focussed big data & analytics skillset building throu...
Ritesh Shrivastava
 
An Encyclopedic Overview Of Big Data Analytics
An Encyclopedic Overview Of Big Data AnalyticsAn Encyclopedic Overview Of Big Data Analytics
An Encyclopedic Overview Of Big Data Analytics
Audrey Britton
 
big-data.pdf
big-data.pdfbig-data.pdf
big-data.pdf
aditi276464
 
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Arab Federation for Digital Economy
 
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
IJERDJOURNAL
 
Big data lecture notes
Big data lecture notesBig data lecture notes
Big data lecture notes
Mohit Saini
 
Unit III.pdf
Unit III.pdfUnit III.pdf
Unit III.pdf
PreethaSuresh2
 
Introduction to Big Data
Introduction to Big DataIntroduction to Big Data
Introduction to Big Data
Akshata Humbe
 
Big Data World
Big Data WorldBig Data World
Big Data World
Hossein Zahed
 
Analysis on big data concepts and applications
Analysis on big data concepts and applicationsAnalysis on big data concepts and applications
Analysis on big data concepts and applications
IJARIIT
 
Communications of the Association for Information SystemsV.docx
Communications of the Association for Information SystemsV.docxCommunications of the Association for Information SystemsV.docx
Communications of the Association for Information SystemsV.docx
monicafrancis71118
 
Big data and development
Big data and developmentBig data and development
Big data and development
Simone Sala
 
big-datagroup6-150317090053-conversion-gate01.pdf
big-datagroup6-150317090053-conversion-gate01.pdfbig-datagroup6-150317090053-conversion-gate01.pdf
big-datagroup6-150317090053-conversion-gate01.pdf
VirajSaud
 

Similar to 23 ijcse-01238-1indhunisha (20)

Introduction to big data – convergences.
Introduction to big data – convergences.Introduction to big data – convergences.
Introduction to big data – convergences.
 
Unit No2 Introduction to big data.pdf
Unit No2 Introduction to big data.pdfUnit No2 Introduction to big data.pdf
Unit No2 Introduction to big data.pdf
 
Smart Data Module 1 introduction to big and smart data
Smart Data Module 1 introduction to big and smart dataSmart Data Module 1 introduction to big and smart data
Smart Data Module 1 introduction to big and smart data
 
UNIT 1 -BIG DATA ANALYTICS Full.pdf
UNIT 1 -BIG DATA ANALYTICS Full.pdfUNIT 1 -BIG DATA ANALYTICS Full.pdf
UNIT 1 -BIG DATA ANALYTICS Full.pdf
 
data, big data, open data
data, big data, open datadata, big data, open data
data, big data, open data
 
Notes from the Observation Deck // A Data Revolution
Notes from the Observation Deck // A Data Revolution Notes from the Observation Deck // A Data Revolution
Notes from the Observation Deck // A Data Revolution
 
Data Mining in the World of BIG Data-A Survey
Data Mining in the World of BIG Data-A SurveyData Mining in the World of BIG Data-A Survey
Data Mining in the World of BIG Data-A Survey
 
Policy paper need for focussed big data & analytics skillset building throu...
Policy  paper  need for focussed big data & analytics skillset building throu...Policy  paper  need for focussed big data & analytics skillset building throu...
Policy paper need for focussed big data & analytics skillset building throu...
 
An Encyclopedic Overview Of Big Data Analytics
An Encyclopedic Overview Of Big Data AnalyticsAn Encyclopedic Overview Of Big Data Analytics
An Encyclopedic Overview Of Big Data Analytics
 
big-data.pdf
big-data.pdfbig-data.pdf
big-data.pdf
 
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
 
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
 
Big data lecture notes
Big data lecture notesBig data lecture notes
Big data lecture notes
 
Unit III.pdf
Unit III.pdfUnit III.pdf
Unit III.pdf
 
Introduction to Big Data
Introduction to Big DataIntroduction to Big Data
Introduction to Big Data
 
Big Data World
Big Data WorldBig Data World
Big Data World
 
Analysis on big data concepts and applications
Analysis on big data concepts and applicationsAnalysis on big data concepts and applications
Analysis on big data concepts and applications
 
Communications of the Association for Information SystemsV.docx
Communications of the Association for Information SystemsV.docxCommunications of the Association for Information SystemsV.docx
Communications of the Association for Information SystemsV.docx
 
Big data and development
Big data and developmentBig data and development
Big data and development
 
big-datagroup6-150317090053-conversion-gate01.pdf
big-datagroup6-150317090053-conversion-gate01.pdfbig-datagroup6-150317090053-conversion-gate01.pdf
big-datagroup6-150317090053-conversion-gate01.pdf
 

More from Shivlal Mewada

31 ijcse-01238-9 vetrikodi
31 ijcse-01238-9 vetrikodi31 ijcse-01238-9 vetrikodi
31 ijcse-01238-9 vetrikodi
Shivlal Mewada
 
30 ijcse-01238-8 thangaponu
30 ijcse-01238-8 thangaponu30 ijcse-01238-8 thangaponu
30 ijcse-01238-8 thangaponu
Shivlal Mewada
 
29 ijcse-01238-7 sumathi
29 ijcse-01238-7 sumathi29 ijcse-01238-7 sumathi
29 ijcse-01238-7 sumathi
Shivlal Mewada
 
28 ijcse-01238-6 sowmiya
28 ijcse-01238-6 sowmiya28 ijcse-01238-6 sowmiya
28 ijcse-01238-6 sowmiya
Shivlal Mewada
 
27 ijcse-01238-5 sivaranjani
27 ijcse-01238-5 sivaranjani27 ijcse-01238-5 sivaranjani
27 ijcse-01238-5 sivaranjani
Shivlal Mewada
 
26 ijcse-01238-4 sinthuja
26 ijcse-01238-4 sinthuja26 ijcse-01238-4 sinthuja
26 ijcse-01238-4 sinthuja
Shivlal Mewada
 
25 ijcse-01238-3 saratha
25 ijcse-01238-3 saratha25 ijcse-01238-3 saratha
25 ijcse-01238-3 saratha
Shivlal Mewada
 
24 ijcse-01238-2 manohari
24 ijcse-01238-2 manohari24 ijcse-01238-2 manohari
24 ijcse-01238-2 manohari
Shivlal Mewada
 
22 ijcse-01208
22 ijcse-0120822 ijcse-01208
22 ijcse-01208
Shivlal Mewada
 
21 ijcse-01230
21 ijcse-0123021 ijcse-01230
21 ijcse-01230
Shivlal Mewada
 
20 ijcse-01225-3
20 ijcse-01225-320 ijcse-01225-3
20 ijcse-01225-3
Shivlal Mewada
 
19 ijcse-01227
19 ijcse-0122719 ijcse-01227
19 ijcse-01227
Shivlal Mewada
 
18 ijcse-01232
18 ijcse-0123218 ijcse-01232
18 ijcse-01232
Shivlal Mewada
 
16 ijcse-01237
16 ijcse-0123716 ijcse-01237
16 ijcse-01237
Shivlal Mewada
 
15 ijcse-01236
15 ijcse-0123615 ijcse-01236
15 ijcse-01236
Shivlal Mewada
 
13 ijcse-01233
13 ijcse-0123313 ijcse-01233
13 ijcse-01233
Shivlal Mewada
 
12 ijcse-01224
12 ijcse-0122412 ijcse-01224
12 ijcse-01224
Shivlal Mewada
 
11 ijcse-01219
11 ijcse-0121911 ijcse-01219
11 ijcse-01219
Shivlal Mewada
 
9 ijcse-01223
9 ijcse-012239 ijcse-01223
9 ijcse-01223
Shivlal Mewada
 
8 ijcse-01235
8 ijcse-012358 ijcse-01235
8 ijcse-01235
Shivlal Mewada
 

More from Shivlal Mewada (20)

31 ijcse-01238-9 vetrikodi
31 ijcse-01238-9 vetrikodi31 ijcse-01238-9 vetrikodi
31 ijcse-01238-9 vetrikodi
 
30 ijcse-01238-8 thangaponu
30 ijcse-01238-8 thangaponu30 ijcse-01238-8 thangaponu
30 ijcse-01238-8 thangaponu
 
29 ijcse-01238-7 sumathi
29 ijcse-01238-7 sumathi29 ijcse-01238-7 sumathi
29 ijcse-01238-7 sumathi
 
28 ijcse-01238-6 sowmiya
28 ijcse-01238-6 sowmiya28 ijcse-01238-6 sowmiya
28 ijcse-01238-6 sowmiya
 
27 ijcse-01238-5 sivaranjani
27 ijcse-01238-5 sivaranjani27 ijcse-01238-5 sivaranjani
27 ijcse-01238-5 sivaranjani
 
26 ijcse-01238-4 sinthuja
26 ijcse-01238-4 sinthuja26 ijcse-01238-4 sinthuja
26 ijcse-01238-4 sinthuja
 
25 ijcse-01238-3 saratha
25 ijcse-01238-3 saratha25 ijcse-01238-3 saratha
25 ijcse-01238-3 saratha
 
24 ijcse-01238-2 manohari
24 ijcse-01238-2 manohari24 ijcse-01238-2 manohari
24 ijcse-01238-2 manohari
 
22 ijcse-01208
22 ijcse-0120822 ijcse-01208
22 ijcse-01208
 
21 ijcse-01230
21 ijcse-0123021 ijcse-01230
21 ijcse-01230
 
20 ijcse-01225-3
20 ijcse-01225-320 ijcse-01225-3
20 ijcse-01225-3
 
19 ijcse-01227
19 ijcse-0122719 ijcse-01227
19 ijcse-01227
 
18 ijcse-01232
18 ijcse-0123218 ijcse-01232
18 ijcse-01232
 
16 ijcse-01237
16 ijcse-0123716 ijcse-01237
16 ijcse-01237
 
15 ijcse-01236
15 ijcse-0123615 ijcse-01236
15 ijcse-01236
 
13 ijcse-01233
13 ijcse-0123313 ijcse-01233
13 ijcse-01233
 
12 ijcse-01224
12 ijcse-0122412 ijcse-01224
12 ijcse-01224
 
11 ijcse-01219
11 ijcse-0121911 ijcse-01219
11 ijcse-01219
 
9 ijcse-01223
9 ijcse-012239 ijcse-01223
9 ijcse-01223
 
8 ijcse-01235
8 ijcse-012358 ijcse-01235
8 ijcse-01235
 

Recently uploaded

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 

Recently uploaded (20)

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 

23 ijcse-01238-1indhunisha

  • 1. © 2015, IJCSE All Rights Reserved 120 International Journal of Computer Sciences and EngineeringInternational Journal of Computer Sciences and EngineeringInternational Journal of Computer Sciences and EngineeringInternational Journal of Computer Sciences and Engineering Open Access Review Paper Volume-3, Issue-8 E-ISSN: 2347-2693 SSH: Shark Search Algorithm and Gray-Box Program with Hadoop in Distributed Network R.Indhunisha1* and M.V.Srinath2 1* Department of Computer Science, STET Women’s College, Mannargudi. Tamilnadu. 2 Director MCA, Research Advisor Department of Computer Science, STET Women’s College, Mannargudi www.ijcseonline.org Received: Jul /26/2015 Revised: Aug/06/2015 Accepted: Aug/23/2015 Published: Aug/30/ 2015 Abstract— Huge data is the term on the other hand an accumulation of data sets which are expansive also, complex, it contain organized also, unorganized both sort of data. Data comes from everywhere, sensors utilized to gather climate information, posts to social media sites, digital pictures also, and videos and so forth this data is known as enormous data. Useful data can be extracted from this enormous data with the help of data mining. Data mining is a system on the other hand discovering interesting designs as well as descriptive, understand capable models from expansive scale data. In this paper we overviewed sorts of enormous data also, challenges in enormous data on the other hand future. Keywords— Huge data, Data mining, Hace theorem,3V’s,Privacy I. INTRODUCTION The term 'Huge Data' showed up on the other hand initially time in 1998 in a Silicon Graphics (SGI) slide deck by John Mashey with the title of "Huge Data also, the NextWave of InfraStress". Huge Data mining was exceptionally pertinent from the beginning, as the initially book mentioning 'Huge Data' is a data mining book that showed up too in 1998 by Weiss also, Indrukya . However, the initially academic paper with the words 'Huge Data' in the title showed up a bit later in 2000 in a paper by Diebold .The origin of the term 'Huge Data' is due to the truth that we are making a colossal sum of data each day. Usama Fayyad in his invited talk at the KDD BigMine‟ 12Workshop displayed amazing data numbers about internet usage, among them the following: each day Google has more than 1 billion questions per day, Twitter has more than 250 million tweets per day, Facebook has more than 800 million updates per day, also, YouTube has more than 4 billion views per day. The data produced nowadays is estimated in the request of zettabytes, also, it is developing around 40% each year. A new expansive source of data is going to be produced from versatile gadgets also, enormous companies as Google, Apple, Facebook, Yahoo are beginning to look carefully to this data to find helpful designs to move forward client experience. “Huge data” is pervasive, also, yet still the notion engenders confusion. Huge data has been utilized to convey all sorts of concepts, including: colossal amounts of data, social media analytics, next era data administration capabilities, constant data, also, much more. Whatever the label, associations are beginning to understand also, investigate how to process also, break down a vast array of data in new ways. In doing so, a small, in any case developing bunch of pioneers is achieving breakthrough business outcomes. In industries throughout the world, executives recognize the need to learn more about how to exploit enormous data. In any case despite what seems like unrelenting media attention, it can be hard to find in-depth data on what associations are really doing. So, we sought to better understand, how associations view enormous data – also, to what degree they are presently utilizing it to benefit their businesses. II. TYPES OF ENORMOUS INFORMATION AND SOURCES There are two sorts of enormous data: organized also, unstructured. Structured data are numbers also, words that can be effectively categorized also, analyzed. These data are produced by things like system sensors embedded in electronic devices, smartphones, also, worldwide situating structure (GPS) devices. Structured data too incorporate things like sales figures, account balances, also, Tran’s activity data. Unorganized data incorporate more complex information, such as client reviews from commercial websites, photos also, other multimedia, also, comments on social organizing sites. These data cannot effectively be separated into classifications on the other hand broke down numerically. “Unorganized enormous data is the things that humans are saying,” says enormous data consulting firm vice president Tony Jewitt of Plano, Texas. “It uses natural language.” Investigation of unorganized data depends on keywords, which permit customers to filter the data based on search capable terms. The explosive advancement of the Web in
  • 2. International Journal of Computer Sciences and Engineering Vol.-3(8), PP(120-124) Aug 2015, E-ISSN: 2347-2693 © 2015, IJCSE All Rights Reserved 121 later a long time implies that the assortment also, sum of enormous data continue to grow. Much of that advancement comes from unorganized data. III. HACE THEOREM Huge Data starts with large-volume, heterogeneous, autonomous sources with circulated also, decentralized control, also, seeks to investigate complex also, evolving relationships among data. These qualities make it an extreme challenge on the other hand discovering helpful information from the Huge Data. In a naïve sense, we can imagine that a number of blind men are attempting to size up a giant Camel, which will be the Huge Data in this context. The objective of each blind man is to draw a picture (on the other hand conclusion) of the Camel according to the part of data he collects amid the process. Since each person’s view is constrained to his local region, it is not surprising that the blind men will each close independently that the camel “feels” like a rope, a hose, on the other hand a wall, depending on the region each of them is constrained to. To make the issue indeed more complicated, let us expect that the camel is developing rapidly also, its pose changes constantly, also, each blind man might have his own (conceive capable unrelicapable also, inaccurate) data sources that tell him about biased information about the camel (e.g., one blind man might trade his feeling about the camel with another blind man, where the exchanged information is inherently biased). Exploring the Huge Data in this situation is equivalent to aggregating heterogeneous data from specific sources (blind men) to help draw a best conceive capable picture to uncover the genuine gesture of the camel in a constant fashion. Indeed, this undertaking is not as simple as asking each blind man to portray his feelings about the camel also, at that point getting an expert to draw one single picture with a consolidated view, concerning that each individual might speak a specific language (heterogeneous also, assorted data sources) also, they might indeed have assurance concerns about the messages they deliberate in the data trade process. The term Huge Data literally concerns about data volumes, HACE theorem suggests that the key qualities of the Huge Data are A. Huge with heterogeneous also, assorted data sources:- One of the crucial qualities of the Huge Data is the colossal volume of data redisplayed by heterogeneous also, assorted dimensionalities. This colossal volume of data comes from different destinations like Twitter, Myspace, Orkut also, LinkedIn etc. B. Decentralized control:- Autonomous data sources with circulated also, decentralized controls are a crucial trademark of Huge Data applications. Being autonomous, each data source is capable to generate also, gather data without involving (on the other hand depending on) any centralized control. This is comparable to the World Wide Web (WWW) setting where each web server gives a certain sum of data also, each server is capable to fully capacity without necessarily depending on other servers. C. Complex data also, information associations:-Multi structure, multisource data is complex data, Examples of complex data sorts are bills of materials, word handling documents, maps, time-series, images also, video. Such consolidated qualities recommend that Huge Data require a “enormous mind” to consolidate data on the other hand most extreme values. IV. THREE V’S IN HUGE DATA Doug Laney was the initially one talking about 3V‟s in Huge Data Management Volume: The sum of data. Maybe the trademark most related with enormous data, volume alludes to the mass amounts of data that associations are attempting to harness to move forward decision-making over the enterprise. Data volumes continue to increment at an unprecedented rate. Variety: Different sorts of data also, data sources. Assortment is about overseeing the complexity of multiple data types, counting structured, semi-organized also, unorganized data. Organizations need to integrate also, break down data from a complex array of both conventional also, non-conventional data sources, from inside also, outside the enterprise. With the explosion of sensors, smart gadgets also, social joint effort technologies, data is being produced in countless forms, including: text, web data, and tweets, audio, video, log files also, more. Velocity: Data in motion. The speed at which data is created, processed also, broke down continues to accelerate. Nowadays there are two more V‟s Variability:- There are changes in the structure of the data also, how customers need to interpret that data. Value:- Business esteem that gives association a compelling advantage, due to the capacity of making decisions based in answering questions that were previously considered beyond reach. V. INFORMATION MINING FOR ENORMOUS DATA Generally, data mining (in some cases Cal driven data on the other hand information discovery) is the process of analyzing data from specific perspectives also, summarizing it into helpful data - data that can be utilized to increment revenue, cuts costs, on the other hand both. Technically, data
  • 3. International Journal of Computer Sciences and Engineering Vol.-3(8), PP(120-124) Aug 2015, E-ISSN: 2347-2693 © 2015, IJCSE All Rights Reserved 122 mining is the process of finding correlations on the other hand designs among dozens of fields in expansive relational database. Data mining as a term utilized on the other hand the specific classes of six exercises on the other hand assignments as follows: • Classification • Estimation • Prediction • Association rules • Clustering • Description A. Classification Grouping is a process of generalizing the data according to specific instances. Several majon the other hand kinds of classification calculations in data mining are Decision tree, k-nearest neighbon the other hand classifier, Naive Bayes, Apriori also, AdaBoost. Grouping comprises of examining the features of a newly displayed object also, assigning to it a preportrayed class. The classification undertaking is portrayed by the well-portrayed classes, also, a training set consisting of regrouped examples. B. Estimation Estimation deals with continuously valued outcomes. Given some input data, we use estimation to come up with a esteem on the other hand some obscure continuous variables such as income, height on the other hand credit card balance. C. Prediction It’s a statement about the way things will happen in the future , regularly in any case not always based on experience on the other hand knowledge. Forecast might be a statement in which some outcome is expected. D. Association Rules An association rule is a rule which implies certain association relationships among a set of objects (such as “occur together” on the other hand “one implies the other”) in a database. E. Clustering Clustering can be considered the most critical unsupervised learning problem; so, as each other issue of this kind, it deals with finding a structure in a accumulation of unable driven data. VI. CHALLENGES IN ENORMOUS DATA Meeting the challenges displayed by enormous data will be difficult. The volume of data is already enormous also, expanding each day. The velocity of its era also, advancement is increasing, driven in part by the proliferation of internet connected devices. Furthermore, the assortment of data being produced is too expanding, also, organization’s capacity to capture also, process this data is limited. Current technology, architecture, and administration also, examination approaches are uncapable to cope with the flood of data, also, associations will need to change the way they think about, plan, govern, manage, process also, report on data to realize the potential of enormous data. A. Privacy, security also, trust The Australian Government is committed to protecting the assurance rights of its natives also, has recently strengthened the Security Act (through the passing of the Security Amendment (Enhancing Security Protection) Bill 2012) to enhance the assurance of also, set clearer boundaries on the other hand use of individual information. Government agencies, at the point when gathering on the other hand overseeing natives data, are subject to a range of authoritative controls, also, must comply with the a number of acts also, regulations such as the Freedom of Data Act (1982), the Archives Act(1983), the Telecommunications Act (1997) ,the Electronic Transactions Act (1999), also, the Intelligence Administrations Act(2001). These authoritative instruments are outlined to keep up open confidence in the government as a compelling also, secure vault also, steward of citizen information. The use of enormous data by government associations will not change this; rather it might add an extra layer of complexity in terms of overseeing data security risks. Huge data sources, the transport also, deli exceptionally structures inside also, over agencies, also, the end focuses on the other hand this data will all become targets of interest on the other hand hackers, both local also, international also, will need to be protected. The open discharge of expansive machine-read capable data sets, as part of the open government policy, could potentially give an opportunity on the other hand unfriendly state also, non-state actors to glean delicate information, on the other hand make a mosaic of exploit capable data from apparently innocuous data. This danger will need to be understood also, carefully managed. The potential esteem of enormous data is a capacity of the number of relevant, disparate datasets that can be linked also, analysed to uncover new patterns, trends also, insights. Public trust in government associations is required before natives will be capable to understalso, that such linking also, examination can take place while protecting the assurance rights of individuals. B. Data administration also, sharing
  • 4. International Journal of Computer Sciences and Engineering Vol.-3(8), PP(120-124) Aug 2015, E-ISSN: 2347-2693 © 2015, IJCSE All Rights Reserved 123 Accessible data is the lifeblood of a robust democracy also, a productive economy.2 Government associations realise that on the other hand data to have any esteem it needs to be discoverable, open also, usable, also, the significance of these necessities just increases as the discussion turns towards enormous data. Government associations must accomplish these necessities whilst still adhering to assurance laws. The processes encompassing the way data is collected, handled, utilised also, overseen by associations will need to be aligned with all pertinent authoritative also, regulatory instruments with a center on making the data open on the other hand examination in a lawful, controldriven also, meaningful way. Data too needs to be accurate, complete also, timely in the event that it is to be utilized to support complex examination also, choice making. On the other hand these reasons, administration also, governance center needs to be on making data open also, open over government via standardised APIs, formats also, metadata. Improved quality of data will produce tangible advantages in terms of business intelligence, choice making, sustain capable cost-savings also, productivity improvements. The current trend towards open data also, open government has seen a center on making data sets open to the public, however these „open‟ initiatives need to too put center on making data open, open also, standardized inside also, between associations in such a way that permits inter-administrative office use also, joint effort to the degree made conceive capable by the assurance laws. C. Technology also, analytical systems The emergence of enormous data also, the potential to undertake complex examination of exceptionally expansive data sets is, essentially, a outcome of later progresses in the innovation that permit this. On the off chance that enormous data investigation is to be adopted by agencies, a expansive sum of stress might be placed upon current ICT structures also, arrangements which presently carry the load of processing, analysing also, archiving data. Government associations will need to oversee these new necessities efficiently in request to deliver net advantages through the adoption of new technologies. VII. FORECAST TO THE FUTURE There are numerous future critical challenges in Huge Data administration also, analytics, that arise from the nature of data: large, diverse, also, evolving. These are some of the challenges that researchers also, practitioners will have to bargain amid the next years: A. Analytics Architecture:- It is not clear yet how an optimal construction modeling of an investigation structures should be to bargain with historic data also, with constant data at the same time. An interesting proposal is the Lambda construction modeling of Nathan Marz. The Lambda Building design solves the issue of handling arbitrary functions on arbitrary data in genuine time by decomposing the issue into three layers: the batch layer, the serving layer, also, the speed layer. It combines in the same structure Hadoop on the other hand the batch layer, also, Storm on the other hand the speed layer. The properties of the structure are: robust also, fault tolerant, scalable, general, extensible, permits ad hoc queries, minimal maintenance, also, debuggable. B. Statistical significance:- It is critical to accomplish huge statistical results, also, not be foodriven by randomness. AsEfron clarifies in his book about Large Scale Inference it is simple to go wrong with colossal data sets also, thousands of questions to answer at once. C. Distributed mining:- Many data mining structures are not trivial to paralyze. To have circulated versions of some methods, a part of relook is required with practical also, theoretical examination to give new methods. D. Hidden Huge Data.:- Large amounts of helpful data are getting lost since new data is largely untagged file based also, unorganized data. The 2012 IDC study on Huge Data clarifies that in 2012, 23% (643 exabytes) of the digital universe would be helpful on the other hand Huge Data in the event that tagged also, analyzed. However, presently just 3% of the potentially helpful data is tagged, also, indeed less is analyzed VIII. CONCLUSION Huge data is the term on the other hand an accumulation of complex data sets, Data mining is an analytic process outlined to investigate data (usually expansive sum of data- typically business on the other hand market related-too known as “enormous data”) in look of consistent designs also, at that point to approve the findings by applying the detected designs to new subsets of data. To support huge data mining, high-execution handling plat frames are required, which impose systematic designs to unleash the full power of the Huge Data. We regard huge data as a rising trend also, the need on the other hand huge data mining is rising in all science also, engineering domains. With Huge data technologies, we will hopefully be capable to give most pertinent also, most exact social sensing feedback to better understand also, our society at genuine time. ACKNOWLEDGEMENT 1 Mrs. R.INDHUNISHA, M.Phil Research Scholar, PG and Research Department of Computer Science, STET Women’s College, Mannargudi. 2 Dr. M.V.SRINATH MCA., Ph.D., Director MCA, Research Advisor Department of Computer Science, STET Women’s College, Mannargudi REFERENCES [1] Hessling, Hermann “[Keynote Speaker-2] Challenges in Handling and Processing Huge Data” Published
  • 5. International Journal of Computer Sciences and Engineering Vol.-3(8), PP(120-124) Aug 2015, E-ISSN: 2347-2693 © 2015, IJCSE All Rights Reserved 124 in:Artificial Intelligence, Modelling and Simulation (AIMS), 2014 2nd International Conference on Date of Conference: 18-20 Nov. 2014 [2] Yuan Ye ; Sch. of Bus. Inf. Manage., Shanghai Univ. of Int. Bus. & Econ., Shanghai, China” A Data Extraction Algorithm for Huge Data Visualization Based on Computational Meshes” Published in:Management of e-Commerce and e-Government (ICMeCG), 2014 International Conference on Date of Conference:Oct. 31 2014-Nov. 2 2014 [3] Feng Hu ; Wang, Guoyin “ Huge Data Mining Based on Rough Set Theory and Granular Computing” Published in: Web Intelligence and Intelligent Agent Technology, 2008. WI-IAT '08. IEEE/WIC/ACM International Conference on (Volume:3 )Date of Conference:9-12 Dec. 2008 [4] Fazio, M. ; Fac. of Eng., Univ. of Messina, Messina, Italy ; Paone, M. ; Puliafito, A. ; Villari, M. “Huge amount of heterogeneous sensed data needs the cloud” Published in: Systems, Signals and Devices (SSD), 2012 9th International Multi-Conference onDate of Conference: 20-23 March 2012 [5] Chao-Tung Yang ; Dept. of Comput. Sci., Tung[12hai Univ., Taichung, T"aiwan ; Wen-Chung Shih ; Guan- Han Chen ; Shih-Chi Yu “Implementation of a Cloud Computing Environment for Hiding Huge Amounts of Data” Published in:Parallel and Distributed Processing with Applications (ISPA), 2010 International Symposium on Date of Conference: 6-9 Sept. 2010 [6] Wang, Guoyin ; Inst. of Comput. Sci. & Technol., Chongqing Univ. of Posts & Telecommun., Chongqing Jun Hu ; Qinghua Zhang ; Xianquan Liu “Granular computing based data mining in the views of rough set and fuzzy set” Published in:Granular Computing, 2008. GrC 2008. IEEE International Conference on Date of Conference: 26-28 Aug. 2008 [7] Lei Xu ; Dept. of Electron. Eng., Tsinghua Univ., Beijing, China ; Chunxiao Jiang ; Jian Wang ; Jian Yuan “Information Security in Big Data: Privacy and Data Mining” Published in:Access, IEEE (Volume:2 ) Date of Publication :09 October 2014 [8] Shen Bin ; Ningbo Inst. of Technol., Zhejiang Univ., Ningbo, China ; Liu Yuan ; Wang Xiaoyi” Research on data mining models for the internet of things” Published in:Image Analysis and Signal Processing (IASP), 2010 International Conference on Date of Conference: 9-11 April 2010 [9] Refonaa, J. ; Dept. of Comput. Sci. & Engineeering, Sathyabama Univ., Chennai, India ; Lakshmi, M. ; Vivek, V. “Analysis and prediction of natural disaster using spatial data mining technique” Published in:Circuit, Power and Computing Technologies (ICCPCT), 2015 International Conference on Date of Conference:19-20 March 2015 [10]Nestorov, S. ; Dept. of Comput. Sci., Chicago Univ., IL, USA ; Jukic, N. “Ad-hoc association-rule mining within the data warehouse” Published in System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on Date of Conference: 6-9 Jan. 2003 [11]Xindong Wu ; Sch. of Comput. Sci. & Inf. Eng., Hefei Univ. of Technol., Hefei, China ; Xingquan Zhu ; Gong-Qing Wu ; Wei Ding “Data mining with big data” Published in: Knowledge and Data Engineering, IEEE Transactions on (Volume:26 , Issue: 1 ) Date of Publication : 26 June 2013 [12]Wu, X. ; University of Vermont, Burlington ; Chen, H. ; Wu,G. ; Liu,J. more authors “Knowledge Engineering with Big Data” Published in Intelligent Systems, IEEE (Volume:PP, Issue: 99 ) Date of Publication : 13 July 2015 [13]Xiongyan Li ; State Key Lab. of Pet. Resource & Prospecting, China Univ. of Pet., Beijing, China ; Hongqi Li ; HeXu ; ZhouJinyu more authors “Task- driven data mining in the formation evaluation field” Published in:Advanced Information Management and Service (IMS), 2010 6th International Conference on Date of Conference: Nov. 30 2010-Dec. 2 2010 [14]Zhang Yun ; Inst. of Comput. Sci., Northwestern Polytech. Univ., Xi''an, China ; Li Weihua ; Chen Yang “The Study of Multidimensional-Data Flow of Fishbone Applied for Data Mining” Published in: Software Engineering Research, Management and Applications, 2009. SERA '09. 7th ACIS International Conference on Date of Conference: 2-4 Dec. 2009 [15]Nirkhi, S. ; Dept. of Comput. Sci., G.H.Raisoni Coll. of Eng., Nagpur, India “Potential use of Artificial Neural Network in Data Mining” Published in Computer and Automation Engineering (ICCAE), 2010 The 2nd International Conference on (Volume:2 )Date of Conference: 26-28 Feb. 2010