Big data: concept, potentialities and vulnerabilities

F Almeida - Emerging Science Journal, 2018 - ijournalse.org
The evolution of information systems and the growth in the use of the Internet and social
networks has caused an explosion in the amount of available data relevant to the activities …

A survey on big data in financial sector

A Jaiswal, P Bagale - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
With the advancement of computing technology, there has been rapid increase in volume,
variety and velocity of data being produced, which is termed as Big Data. The Big data holds …

[PDF][PDF] Komparasi Kecepatan Hadoop MapReduce dan Apache Spark Dalam Mengolah Data Teks

C Wibawa, S Wirawan, M Mustikasari… - Jurnal Ilmiah …, 2022 - academia.edu
Istilah Big Data saat ini bukanlah hal yang baru lagi. Salah satu komponen Big Data adalah
jumlah data yang masif, yang membuat data tidak bisa diproses dengan cara-cara …

[PDF][PDF] An outlook on India's healthcare system with a medical case study and review on big data and its importance in healthcare

S Depuru, RR Kumar - Int. J. Sci. Res, 2016 - researchgate.net
In the present day world, data management has become an essential and integral part of
every organization and the volume of data is getting multiplied day by day at an alarming …

[PDF][PDF] Collaborative Mappers based on Coevolutionary Optimization Technique in MapReduce.

MR Ahmadi, D Maleki - International Journal of Information & …, 2022 - academia.edu
MapReduce algorithm inspired by the map and reduces functions commonly used in
functional programming. The use of this model is more beneficial when optimization of the …

Parallel Processing for Data Retrieval in Odoo Enterprise Resource Planning Reporting System

RAOA Eisa - 2021 - search.proquest.com
Abstract Reporting process in Enterprise Resource Planning (ERP) system plays an
important role, as different information from different processes can be merged to generate …

[PDF][PDF] Similarity Detection in Large Volume Data using Machine Learning Techniques

V Gopal, V Paul, MS Elayidom, S Gopalan - academia.edu
When unauthorized copying or stealing of intellectual properties of others happen, it is
called plagiarism. Two main approaches are used to counter this problem–external …

[PDF][PDF] Freight Audit using Mapreduce Framework for Big-data Application

N Francis, S Kurian - academia.edu
Freight audit is an emerging area of concern. The freight audit verification can be vulnerable
to process and human errors. The freight forwarders/freight carriers often make mistake in …

[引用][C] Work Force Management System Using Face Recognition

N Parveen - Turkish Journal of Computer and Mathematics …, 2021

[引用][C] 基于双重并行计算模型的TFIDF 算法

孙玉强, 巢碧霞 - 计算机工程与设计, 2016