Design Approach to Big data Systems in Developing and Maintaining the Information Security Systems
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract: Data is accumulating from almost all aspects of our everyday lives that it becomes huge and multistructuredand has hidden useful information. The challenges with Big Data include capture, curation, storage, search, sharing, transfer, analysis, and visualization. Big Data provides materials for mining hidden patterns to support innovation mostly by data mining. The interaction research with Big Data support methods for innovation is rare at present. Knowledge discovered by data mining is novel and quantitative. However, it still lacks a uniform knowledge management model to support the innovation process effectively. The fact shows that since there emergence, big data techniques are changing very fast. In this paper, developing and maintaining the informationsecurity system to illustrate how those big data systems evolve and also describes some key design factors and challenges for future big data systems. Proposed design generic systems that can provide near real-time analytic services for many netease applications, such as spam detection, game log analysis and social community mining. No solutions can address all big data problems, especially when data size keeps increasing, more complex user requirements need to handle, the emergence of new hardware violates the old design and the old system becomes too complicated for maintenance. We face a series of technical challenges that have not been well addressed by both academic community and industry.
Authors and Affiliations
Dr. Mani Sarma Vittapu
Enhancement in Decision Making with Improved Performance by Multiagent Learning Algorithms
Abstract:The output of the system is a sequence of actions in some applications. There is no such measure as the best action in any in-between state; an action is excellent if it is part of a good policy. A single action...
Analysis of Digital Image Splicing Detection
Abstract: The availability of photo manipulation software has made it unprecedentedly easy to manipulate images for malicious purposes. One of the most common forms of digital image or photographic manipulation ope...
Evaluation of Bitmap Index Compression using Data Pump in Oracle Database
Abstract: Bitmap index is most commonly used technique for efficient query processing and mostly in the Data warehouse environment. We review the existing technologies of Compression and introduce the bitmap index...
Dynamic and transparent seat allocation using QR Code in a Mobile Application
Abstract: Indian Railway is world’s largest human transport system which is currently dealing with a lot of problems, such as availability of confirming seat to waiting list passengers after its departure. Moreover, ther...
Mapping Procedural Modules To Storage
Majors in computer science accept structured programming as a subset of procedural programming paradigm and it is intended for complex system design and development. But as everyone is moving towards object orien...