Complex Event Processing Framework for Big Data Applications

Author(s):  
Rentachintala Bhargavi
2017 ◽  
Vol 127 ◽  
pp. 217-236 ◽  
Author(s):  
Ioannis Flouris ◽  
Nikos Giatrakos ◽  
Antonios Deligiannakis ◽  
Minos Garofalakis ◽  
Michael Kamp ◽  
...  

Author(s):  
Jaume Ferrarons ◽  
Mulu Adhana ◽  
Carlos Colmenares ◽  
Sandra Pietrowska ◽  
Fadila Bentayeb ◽  
...  

2019 ◽  
Vol 92 ◽  
pp. 857-867 ◽  
Author(s):  
Dawei Jin ◽  
Si Shi ◽  
Yin Zhang ◽  
Haider Abbas ◽  
Tiong-Thye Goh

Author(s):  
Fehmida Mohamedali ◽  
Samia Oussena

Healthcare is a growth area for event processing applications. Computers and information systems have been used for collecting patient data in health care for over fifty years. However, progress towards a unified health care delivery system in the UK has been slow. Big Data, the Internet of Things (IoT) and Complex Event Processing (CEP) have the potential not only to deal with treatment areas of healthcare domain but also to redefine healthcare services. This study is intended to provide a broad overview of where in the health sector, the application of CEP is most used, the data sources that contribute to it and the types of event processing languages and techniques implemented. By systematic review of existing literature on the application of CEP techniques in Healthcare, a number of use cases have been identified to provide a detailed analysis of the most common used case(s), common data sources in use and highlight CEP query language types and techniques that have been considered.


2013 ◽  
Vol 791-793 ◽  
pp. 845-851
Author(s):  
Jing Xian Wan ◽  
Feng Ying He ◽  
Bin Liu ◽  
Shang Ping Zhong

Faced with the demand for real-time "big data" processing, the existing financial risk early warning systems are generally difficult to identify hidden risks in massive data information quickly and accurately. This paper introduces a complex event processing technology (CEP), proposes a method of real-time monitoring for "big data", establishes a monitoring model of unusual transactions, designs and realizes a system based on this model. The model contains data acquisition and encapsulation module, custom rules modeling module and results display module. Using real data of a security company to test the system, the results show that, it can identify hidden risks in unusual transactions accurately, and the speed of processing is improved significantly comparing with the system which is based on traditional database analysis method.


Sign in / Sign up

Export Citation Format

Share Document