THE VALUE OF DATA BLENDING PROVIDED BY LANDMARK’S CORPORATE DATA STORE™

Author(s):  
Sumaryo Sumaryo
Keyword(s):  
Author(s):  
Vivek Raich ◽  
Pankaj Maurya

in the time of the Information Technology, the big data store is going on. Due to which, Huge amounts of data are available for decision makers, and this has resulted in the progress of information technology and its wide growth in many areas of business, engineering, medical, and scientific studies. Big data means that the size which is bigger in size, but there are several types, which are not easy to handle, technology is required to handle it. Due to continuous increase in the data in this way, it is important to study and manage these datasets by adjusting the requirements so that the necessary information can be obtained.The aim of this paper is to analyze some of the analytic methods and tools. Which can be applied to large data. In addition, the application of Big Data has been analyzed, using the Decision Maker working on big data and using enlightened information for different applications.


2014 ◽  
Vol 556-562 ◽  
pp. 2940-2943
Author(s):  
Wei Dai ◽  
Gang Xie ◽  
Bai Qin Zhao

The gas alarms based on sensors are widely used, but there are still some limitations. By design a gas real time monitoring system, the gas alarms within a certain range transport collected data to a remote computer via wired or wireless method. Remote computer can monitoring the gas environment by receiving and monitoring alarms’ collected data. In order to ensure system’s reliability, transmission mechanism based on handshake is used. Data compression technology also included to reduce the storage space required by data store.


2019 ◽  
Vol 214 ◽  
pp. 07016 ◽  
Author(s):  
Tian Yan ◽  
Shan Zeng ◽  
Mengyao Qi ◽  
Qingbao Hu ◽  
Fazhi Qi

To improve hardware utilization and save manpower in system maintenance, most of the web services in IHEP have been migrated to a private cloud build upon OpenStack. However, cyber security attacks becomes a serious threats to the cloud progressively. Therefore, a cyber security detection and monitoring system is deployed for this cloud platform. This system collects various security related logs as data sources, and processes them in a framework composed of open source data store, analysis and visualization tools. With this system, security incidents and events can be handled in time and rapid response can be taken to protect cloud platform against cyber security threats.


2020 ◽  
Vol 1 (1) ◽  
pp. 23-26
Author(s):  
Siti Zulaikha ◽  
Martaleli Bettiza ◽  
Nola Ritha

Data on the rainfall is compelling to study as it becomes one of the major factors affecting the weather in a certain region and various aspects of life as well. Generally, predicting rainfall is performed by analyzing data in the past in certain methods. Rainfall is prone to follow repeated pattern in sequence of time. The utilization of big data mining is expected to result in any valuable information that used to be unrevealed in the big data store. Some methods used in data mining are Apriori Algorithm and Improved Apriori Algorithm. Improved Apriori itself is to represent the database in the form of matrix to describe its relation in the database. Data used in this research is the rainfall factor in 2016 in Tanjungpinang city. Based on the test of Improved Apriori Algorithm, it was found out that the relation of the rainfall and weather factors utilizing 2 item sets, that is, if the temperature is low (24,0 - 26,0), the humidity is high (85 - 100), then the rainfall is mild. If the temperature is low (24,0 - 26,0), the light intensity is low (0 – 3), then the rainfall is heavy, and 3 item sets if the temperature is low (24,0 - 26,0), the humidity is high (85 - 100), the sun light intensity is low (0-3), then the rainfall is medium.


Author(s):  
Chandrakala B M ◽  
S C Lingareddy

<p>In recent days, data sharing has provided the flexibility to share the data, store the data, and perform operation on data virtually as well as cost effectively. Data sharing in cloud is one of the feature, which is being popular and widely accepted. However, the concern here is to ensure the data security and this has led the researcher to research in this area. To provide the security several Proxy re-encryption scheme has been introduced, however all these method lacks of efficiency. Hence In this paper, we propose a scheme known as ALBC (Adaptive Lattice Based Cryptography), this scheme follows the two phase i.e. encryption and Re-encryption. Encryption phase has few algorithms such as Key_Gen, Enc, Dec. Similarly ALBC Re-Enc has five algorithm i.e. Key_Gen, Key_ReGen,  Enc, Re-Enc, Dec. our algorithm not only provides the security but also solves the problem of RL(Ring-learning) with errors problems. In order to evaluate, our algorithm is compared with the existing model in terms of encryption time, decryption time, re-encryption time, key generation  and key regeneration by varying the various key size. When we observe the comparative analysis, it is observed that our algorithm outperforms the existing algorithm.</p>


2021 ◽  
Vol 4 ◽  
pp. 1-5
Author(s):  
Bárbara Cubillos ◽  
Ángela Ortíz ◽  
Germán Aguilera ◽  
Sergio Rozas ◽  
Claudio Reyes ◽  
...  

Abstract. The digital cartographic coverage at 1:25,000 that the Military Geographic Institute is creating has been worked on using international standards, so that it constitutes a standardized and interoperable tool, for the various areas of activity in Chile. In this context, the ISO TC 211 standards and the TDS (Topographic Data Store) data model developed by the National Geospatial-Intelligence Agency (NGA) are being used.Apart from using these standards, efforts have been aimed, from an early stage, at the determination of the quality of this product, starting this process with the study for a methodology to measure Positional Accuracy. The method defined conforms to the NSSDA test; for this, points measured in the terrain especially for this control are used, also the elimination of points that are out of range under the Chauvenet Criteria. Finally, the positional accuracy is declared in the metadata.


2020 ◽  
Vol 31 (1) ◽  
pp. 41
Author(s):  
Ansam Sabah Bader ◽  
Shaymaa Hameed ◽  
Maisa’a Abid Ali K.

Securing information has been the most significant process for communication and data store. Orderly to secure information such as data authentication,  data integrity, and confidentiality must be verified based on algorithms of cryptography. Where, the most important part of any encryption algorithms is the key which specifies if the system is strong enough or not. The proposal of this paper is a new method to generate keys based on two kinds of chaos theory in order to improve the security of cryptographic algorithms. The base of this proposal is to investigate a new method for generating random numbers by using the 3D Lorenz system and 2D Henon map. The newly generated keys have successfully passed the National Institute of Standards and Technology (NIST) statistical test suite


Author(s):  
Maria Massri ◽  
◽  
Philippe Raipin ◽  
Pierre Meye

Sign in / Sign up

Export Citation Format

Share Document