The Journey of Big Data: 3 V’s to 32 V’s
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2016, Vol 5, Issue 3
Abstract
Every engineering and science field facing “big” data problem. Big data is one of emerging field in data science research. Different people can do as many different things with big data. So in this paper we tried to present the voyage of big data in vivid by means of describing definitions, challenges and trends in big data field. Big data is often described using 3 parameters. i.e. volume, velocity and variety.(3V’s).the implantation of big data is also one of the problem .i.e. storing , managing and retrieving. As the journey of big data goes, the field is spread to each and every discipline of science and technology. So the describing parameters are also increased to 9 and more (32 V’s).so there is a need for analysis of big data. Since big data analytics is evolved. So in this paper we touch some of the guidelines for big data analytics. On brief in this paper we tried to focus the journey of big data from its inception.
Authors and Affiliations
Velivela Gopinath, Dr S Krishna Rao, Challa Yallmmanda, K Purna Prakash
One-to-Many Data Linkage By One-Class Clustering Tree
Data linkage is the task of identifying different entries that refer to the same entity across different data sources. The goal of the data linkage task is joining data sets that do not share a common identifier. Data...
A Robust Real-Time Computer System for Automatic Target Tracking
A novel system for long term tracking of object in video is built on tracking learning and detection (TLD) approach. This framework explicitly decomposes the long term tracking task in to tracking, learning and detec...
Dos Attack Detection System Using Anomaly Based Technique In Interconnected Systems
Denial-of-service (dos) attacks are one kind of violent and threatening invasive behaviour to online servers. Dos attacks harshly humiliate the ease of use of a victim, which can be a host, a router, or an entire net...
A Survey Of Intrusion Detection Mechanisms In Multitier Web Applications
Today the usage of computer for web applications is increasing day by day. Most of the transactions such as banking, travel etc are done through web. So the targets of attacks towards web applications are also increa...
Secure Data Storage And Retrieve From Cloud Networking With Multiple Encrypt System
The proposed work is to characterize cloud structural engineering with designed samba stockpiling what's more cryptographic encryption systems. The cloud structural engineering sent with samba stockpiling uses workin...