A Study on The Big Data Characteristics

Authors

  • BhagyaRekha Kalukurthi  Sr.Software Engineer, CA Technologies Pvt.Ltd (India), India

Keywords:

Data Mining, Big Data, Processing Framework

Abstract

Big Data mining is the ability of drawing out beneficial details from these large datasets or streams of data, that as a result of its volume, irregularity, and rate, it was not feasible before to do it. The Big Data difficulty is becoming one of one of the most exciting opportunities for the following years. We offer in this problem, a broad review of the topic, its current condition, dispute, as well as projection to the future. This paper reviews the big data processing framework for complex and evolving relationships.

References

  1. Alam et al. 2012, Md. Hijbul Alam, JongWoo Ha, SangKeun Lee, Unique methods to creeping vital web pages early, Knowledge and also Details Equipment, December 2012, Quantity 33, Concern 3, pp 707-734
  2. Aral S. and Pedestrian D. 2012, Recognizing prominent as well as vulnerable participants of socials media, Science, vol.337, pp.337-341.
  3. Machanavajjhala as well as Reiter 2012, Ashwin Machanavajjhala, Jerome P. Reiter: Big privacy: safeguarding privacy in big data. ACM Crossroads, 19( 1 ): 20-23, 2012.
  4. Banerjee and also Agarwal 2012, Soumya Banerjee, Nitin Agarwal, Analyzing cumulative actions from blog sites making use of swarm intelligence, Understanding as well as Info Equipment, December 2012, Volume 33, Issue 3, pp 523-547
  5. Sugandhi Maheshwaram, “A Comprehensive Review on the Implementation of Big Data Solutions”, International Journal of Information Technology and Management Vol. XI, Issue No. XVII, 2016
  6. Sudheer Kumar Shriramoju, "Access Control and Density Based Notion of Clusters", International Journal of Scientific Research in Science and Technology (IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 1 Issue 3, pp. 215-220, July-August 2015.
  7. Sudheer Kumar Shriramoju, “Security Level Access Error Leading to Inference and Mining Sequential Patterns”, International Journal of Scientific Research in Science, Engineering and Technology, Volume 2, Issue 4, July-August 2016
  8. Sudheer Kumar Shriramoju, “An Overview on Database Vulnerability and Mining Changes from Data Streams”, International Journal of Information Technology and Management, Vol. VII, Issue No. IX, August-2014
  9. Sudheer Kumar Shriramoju, “Integrating Information from Heterogeneous Data Sources and Row Level Security”, Journal of Advances and Scholarly Researches in Allied Education, Vol. IV, Issue No. VIII, October-2012
  10. Sudheer Kumar Shriramoju,, “A Review on Database Security and Advantages of Database Management System”, Journal of Advances in Science and Technology, Vol. V, Issue No. X, August-2013
  11. Malyadri. K, “An Overview towards the Different Types of Security Attacks", International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, Issue 8, August 2014
  12. Malyadri. K, “Security Threats, Security Vulnerabilities and Advance Network Security Policies”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 2, Issue 9, September 2013
  13. Malyadri. K, “Need for Key Management in Cloud and Comparison of Various Encryption Algorithm”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology , volume 1, issue 1, July-August 2016

Downloads

Published

2016-08-30

Issue

Section

Research Articles

How to Cite

[1]
BhagyaRekha Kalukurthi, " A Study on The Big Data Characteristics, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 1, Issue 1, pp.139-144, July-August-2016.