Data Mining with Big Data: It’s Issues and Challenges
Swati Namdev1
Section:Review Paper, Product Type: Journal Paper
Volume-7 ,
Issue-1 , Page no. 862-864, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.862864
Online published on Jan 31, 2019
Copyright © Swati Namdev . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Swati Namdev, “Data Mining with Big Data: It’s Issues and Challenges,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.862-864, 2019.
MLA Style Citation: Swati Namdev "Data Mining with Big Data: It’s Issues and Challenges." International Journal of Computer Sciences and Engineering 7.1 (2019): 862-864.
APA Style Citation: Swati Namdev, (2019). Data Mining with Big Data: It’s Issues and Challenges. International Journal of Computer Sciences and Engineering, 7(1), 862-864.
BibTex Style Citation:
@article{Namdev_2019,
author = {Swati Namdev},
title = {Data Mining with Big Data: It’s Issues and Challenges},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {7},
Issue = {1},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {862-864},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3598},
doi = {https://doi.org/10.26438/ijcse/v7i1.862864}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i1.862864}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3598
TI - Data Mining with Big Data: It’s Issues and Challenges
T2 - International Journal of Computer Sciences and Engineering
AU - Swati Namdev
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 862-864
IS - 1
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
617 | 461 downloads | 194 downloads |
Abstract
Big Data could be a new term wont to determine the datasets that because of their large size and complexity. Big Data are currently speedily increasing altogether science and engineering domains, as well as physical, biological and medical specialty sciences. Big Data processing is that the capability of extracting helpful data from these large datasets or streams of data, that because of its volume, variability, and velocity, it absolutely was unfeasible before to try to to it. The Big data challenge is turning into one in every of the foremost exciting opportunities for the following years. This paper includes the knowledge concerning what is Big Data, Data Mining, Data Mining with Big Data, Challenging issues and its related work.
Key-Words / Index Term
Big Data, Data mining, Datasets, Data Mining Algorithms
References
[1] C. Wang, S.S.M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy- Preserving Public Auditing for Secure Cloud Storage” IEEE Trans. Computers, vol. 62, no. 2, pp. 362-375, Feb. 2013.
[2] X. Wu and S. Zhang, “Synthesizing High-Frequency Rules from Different Data Sources,” IEEE Trans. Knowledge and Data Eng., vol. 15, no. 2, pp. 353-367, Mar./Apr. 2003.
[3] X. Wu, C. Zhang, and S. Zhang, “Database Classification for Multi-Database Mining,” Information Systems,vol. 30, no. 1, pp. 71- 88, 2005
[4] K. Su, H. Huang, X. Wu, and S. Zhang, “A Logical Framework for Identifying Quality Knowledge from Different Data Sources,” Decision Support Systems, vol. 42, no. 3, pp. 1673-1683, 2006.
[5] E.Y. Chang, H. Bai, and K. Zhu, “Parallel Algorithms for Mining Large-Scale Rich-Media Data,” Proc. 17th ACM Int’l Conf. Multimedia, (MM ’09,) pp. 917-918, 2009.
[6] D. Howe et al., “Big Data: The Future of Biocuration,” Nature, vol. 455, pp. 47-50, Sept. 2008.
[7] A. Labrinidis and H. Jagadish, “Challenges and Opportunities with Big Data,” Proc. VLDB Endowment, vol. 5, no. 12, 2032-2033, 2012.
[8] Y. Lindell and B. Pinkas, “Privacy Preserving Data Mining,” J. Cryptology, vol. 15, no. 3, pp. 177-206, 2002.