A Study on Big Data analysis Environment
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 11
Abstract
The use of electronics to implement IT solutions has generally known about big data since recent century. IT was use full for compute a vast applications for implementing business processes, its value intention has always became the ability to handle large amounts of data more efficiently, and more accurately than human beings. The purpose of this paper is to implement the performance and measure the capacity of big data solutions, which must be taken into account for such solutions to be viable. This paper gives an overview of big data and the benefits that it offers, describes the performance and capacity aspects which helps to create big data solutions, and suggests what to be done to implement bigdata in future technology .
Authors and Affiliations
Varaprasad. Sabbithi| Assoc.Prof, Dept of ECE, Srinivasa Institute of Engineering and Technology, Amalapuram, JNTUK, A.P, India, Dr. John Mathew Rapaka| Professor, Dept.of.CSE, Srinivasa Institute of Engineering and Technology, Amalapuram, JNTUK, A.P, India
Strong Location and Data Privacy with User Unlinkability In Geo Location Based Services
Increasing smart phone usage in the world apple and android providing lots of apps for mobile users. Geosocial applications provide location services to provide social interface to the physical world. Due to lack of p...
Hybrid active Power filter for power conditioning by using Space Vector Modulation controller
Active power filters are widely used in power systems due to their advantages to maintain power quality. In this paper, presents a control method for hybrid active power filter using Space Vector Pulse Width Modulatio...
A Survey of Fourth Generation Technologies in Cellular Networks
The improvement of broadband remote get to advances as of late was the consequence of developing interest for versatile Internet and remote interactive media applications. Portable correspondence assumes a most vital...
Efficient IP Trace back Mechanism for Identifying IP Spoofers
is well known that aggressors or spoofers may utilize fake source IP address to hide their genuine areas from victims. So, to catch these spoofers a number of techniques for tracing IP address have been proposed .But...
Assessing Software Reliability Using Exponential Imperfect Debugging Model
Software reliability is one of the most important characteristics of software quality. As the usage of software reliability is growing rapidly, accessing the software reliability is a critical task in development of...