Applications of Big Data in Real World It's not what you know. It's what you do with what you know.

被引:0
|
作者
Khanduja, Vidhi [1 ]
Arora, Abhishek [1 ]
Garg, Sameer [1 ]
机构
[1] Univ Delhi, NetajiSubhas Inst Technol, Dept Comp Engn, New Delhi, India
来源
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA) | 2017年
关键词
Big Data; Data Analytics; Hadoop; YARN; Big Data Challenges; Applications; Stock market; Healthcare; Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Big Data is turning out to be useful in almost all real life scenarios. The meaningful analysis of the large amount of data (collected from installed sensors, cellular usage, CCTV etc.) is of prime importance in the current times. The purpose of big data analytics is to help companies/organisations make intelligent and informed decisions by utilising large volumes of transaction data which may be untapped by conventional business intelligence (BI) programs. In this paper, we discuss the significance of big data analytics and analyse the usefulness of big data in the varied fields like healthcare, security, understanding customer behaviour, and natural calamities. Big Data also found its application in high frequency stock trading based on history of stock prices, natural language processing of news, political decisions in an efficient way. We also discuss the challenges such as unfair usage of algorithms to trade, security and privacy issues relating to access control, storage etc. These important applications are leading us to take deep insights of large amounts of data.
引用
收藏
页码:159 / 163
页数:5
相关论文
共 50 条
  • [31] What Do You Think About Your Company's Leaks? A Survey on End-Users Perception Toward Data Leakage Mechanisms
    Bertrand, Yoann
    Boudaoud, Karima
    Riveill, Michel
    FRONTIERS IN BIG DATA, 2020, 8
  • [32] What Will Happen If I Tell You? Battered Latina Women's Experiences of Health Care
    Kelly, Ursula
    CANADIAN JOURNAL OF NURSING RESEARCH, 2006, 38 (04) : 78 - 95
  • [33] Your WiFi is leaking: What do your mobile apps gossip about you?
    Atkinson, John S.
    Mitchell, John E.
    Rio, Miguel
    Matich, George
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 546 - 557
  • [34] Big Geo Data: Standards and Best Practices An Introduction to OGC and ISO Big Data standards - and why you should know them
    Baumann, Peter
    2014 FIFTH INTERNATIONAL CONFERENCE ON COMPUTING FOR GEOSPATIAL RESEARCH AND APPLICATION (COM.GEO), 2014, : 127 - 128
  • [35] Public reporting of hospital quality data: What do referring physicians want to know?
    Geraedts, Max
    Hermeling, Peter
    Ortwein, Annette
    de Cruppe, Werner
    HEALTH POLICY, 2018, 122 (11) : 1177 - 1182
  • [36] Big Data and Predictive Analytics: What's New?
    Earley, Seth
    IT PROFESSIONAL, 2014, 16 (01) : 13 - 15
  • [37] User-friendly Manual Transfer of Authenticated Online Banking Transaction Data A Case Study that Applies the What You Enter Is What You Sign Transaction Authorization Information Scheme
    Kiljan, Sven
    Vranken, Harald
    van Eekelen, Marko
    SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4, 2016, : 259 - 270
  • [38] It's who you know: patient-sharing, quality, and costs of cancer survivorship care
    Pollack, Craig Evan
    Frick, Kevin D.
    Herbert, Robert J.
    Blackford, Amanda L.
    Neville, Bridget A.
    Wolff, Antonio C.
    Carducci, Michael A.
    Earle, Craig C.
    Snyder, Claire F.
    JOURNAL OF CANCER SURVIVORSHIP, 2014, 8 (02) : 156 - 166
  • [39] "It's so hard taking pills when you don't know what they're for": a qualitative study of patients' medicine taking behaviours and conceptualisation of medicines in the context of rheumatoid arthritis
    Kobue, Boitshoko
    Moch, Shirra
    Watermeyer, Jennifer
    BMC HEALTH SERVICES RESEARCH, 2017, 17
  • [40] Do You Hear What I Hear? Fingerprinting Smart Devices Through Embedded Acoustic Components
    Das, Anupam
    Borisov, Nikita
    Caesar, Matthew
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 441 - 452