Data mining in cloud computing
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 3
Abstract
Data Mining is a process of extracting potentially useful information from raw Data, so as to improve the quality of the information service. With the rapid development of the Internet, the size of the data has increased from KB level to TB even PB level; The object of data mining is also more and more complicated, so the data mining algorithm need to be more efficient. Cloud computing can provide infrastructure to massive and complex data of data mining, as well as new Challenging issues for data mining of cloud computing research are emerged. This paper introduces the basic concept of cloud computing and data mining firstly, and sketches out how data mining is used in cloud computing; Then summarizes the research of parallel programming mode especially analyses the Map-reduce programming model and it's development platform-Hadoop; finally, overviews efficient mass data mining algorithm base parallel programining service based on the cloud computing.
Authors and Affiliations
Snehal Govind Tagalpallewar, Prof. Prajakta Chapke
A Review Paper on Cryptography for Data Security
Cryptography is the technique with which we can convert the message into secret text which is not understandable to unauthorized users. It is the technique for hiding data and information from unauthorized users. When w...
Fingerprint Compression Based On Online Dictionary Learning and Orthogonal Matching Pursuit
A new fingerprint compression technique based on the concept of sparse representation is introduced. Given a set of fingerprint patches, an over complete dictionary is constructed and the patches are represented as a sp...
Cloud Computing Challenges and Its Models
The cloud computing is the fastest growing concept in research and industry. The ‘Cloud’ represents the internet and it related to several technologies and the convergence of various technologies has emerged to be call...
Authentication Anonymous Secure On Demand Routing Protocol Using Vanets
When an oversized variety of beacons arrive in a very short time, vehicles are at risk of computation-based Denial of Service attacks that excessive signature verification exhausts their procedure resources. We tend to...
Implementation of HDLC Protocol Using Verilog
A protocol is required to transmit data successfully over any network and also to manage the flow at which data is transmitted. HDLC protocol is the high-level data link control protocol established by International Org...