November 2020 MITS6005 Big Data Research Report Copyright © 2020 VIT, All Rights Reserved. 2 MITS6005 Research Report Research Report Weightage: 10% Submission deadline: Session 9 The purpose of...

1 answer below »
i need a best and quality task ontime.
and please this solution file should be under this three:
General Instructions
Report Writing Guidelines
Rubrics for MITS6005 Research Report


thnx



November 2020 MITS6005 Big Data Research Report Copyright © 2020 VIT, All Rights Reserved. 2 MITS6005 Research Report Research Report Weightage: 10% Submission deadline: Session 9 The purpose of assessment is to assess students on the following Learning Outcomes: LO2: Expertly apply techniques to perform big data query manipulation, evaluate various data storage option and type of aggregated data modelling. Through a critical study, choose an appropriate storage model based on the application requirements for processing large amounts of structured and unstructured data. LO4: Carry out research on emerging Big Data technologies to evolve models/solutions such as configurable and executable compute jobs on top of using distributed and shared memory architecture and Resilient Distributed Data Sets (RDDs). Objective(s):- This assessment expects the student to submit a critique report on a research article related to a Big Data and its current trend technologies. This assessment is designed to improve student presentation skills and to give students experience in researching a topic and writing a report/Critique report relevant to the Unit of Study subject matter. The research articles would be tasked to explore further research trends relevant to the unit content. As further research findings evolve the unit lecturer may supplement or substitute these to keep the research delivery current and updated. For this component you will prepare a report/critique on an academic paper related to Big data or big data technologies, Big data analytics, Big data security etc. The paper you select must be directly relevant to one of these major topics. The paper can be from any academic conference or other relevant Journal or online sources such as Google Scholar, Academic department repositories etc. The topic and the related paper need not be later than 2013-14. The selected paper title with their URL may be uploaded on discussions in Moodle for other students as a reference and to avoid duplicity. Note: popular magazine articles, web sites and blogs are not academic sources. Copyright © 2020 VIT, All Rights Reserved. 3 MITS6005 Research Report General Instructions 1. All students must select a different paper. The paper must be approved by your instructor or tutor before proceeding. In case two students are wanting to report on the same paper, the first who emails the instructor with their choice will be allocated that paper (provided it is acceptable). 2. Your writing should be clear and concise and be in your own words. 3. The report should be written in appropriate business language so that your analysis and discussion have an objective tone. 4. The report must be in the range of 1,500-2,500 words in length excluding references. 5. The referencing style must follow the IEEE referencing style. Report Writing Guidelines 1. The principal sentence or two of your report need to contain the author’s proposal, or focal idea, expressed in your own words. 2. Do not use personal pronouns (I, we, your etc). You are summarizing the article and not critiquing the article 3. Do not write the same sentence as in the article. Rephrase to highlight the general idea. Do not repeat sentences from the article. 4. Identify the main argument or research question of the article. Mention the main aspects of the work in your own words 5. Discuss the methodology (tools/methods) used to derive to the conclusion. However, the methodology used need not be discussed in detail (only the main idea). 6. Write the conclusion derived by the user by the article. Do not forget to mention the research question/ argument of the author to effectively conclude the paper. 7. Make sure your summary covers the main objective, research question, the conclusions/results, and how those results were achieved. Submission Guidelines Copyright © 2020 VIT, All Rights Reserved. 4 MITS6005 Research Report • Follow the links in Moodle to upload your report on or before the deadline. The report must be submitted on the LMS in the respective link i.e. MITS6005 Research report - (Melbourne/Sydney). • The student should upload the file in the respective links on time on/before the due date set by the lecturer in the due week. • Late penalty applies on late submission, 10% per day would be deducted. • Incidence of plagiarism will be penalized. Marking Guide: 50 Marks (scale to 10%) Rubrics for MITS6005 Research Report Task Description Marks Proper selection of the title Selection of the title related to the unit and in context with the requirement 5 Structure/organi zation of the report The structure of the report is logical and student. The report is well organized, has a clear introduction, body and conclusion. 5 Introduction Clear and succinct summary with highlights and major key points of the paper are mentioned in the introduction. 10 Criticism Clear understanding of the author’s interpretation and implication of the results. Strength and weaknesses related to the article are addressed properly. 15 Grammar and spelling check The student has almost no grammatical errors or typos. 5 Conclusion Clear and explicit arguments with appropriate conclusion of the report 10
Answered 16 days AfterApr 08, 2021MITS6005

Answer To: November 2020 MITS6005 Big Data Research Report Copyright © 2020 VIT, All Rights Reserved. 2...

Neha answered on Apr 15 2021
142 Votes
BIG DATA: SECURITY ISSUES, CHALLENGES AND FUTURE SCOPE
INTRODUCTION
Big data can be defined as a collective storm which is referred to the data breaches large in size and complex which makes it difficult to process the data using conventional data management system and the basic software techniques. But the big data values are more important instead of ignoring it. The data turns into the big data whenever individual data is not able to matter a lot for the o
rganization and only a large collection of the data can be used for performing analysis over it. There are many technologies which can be used to analyse the big data and they can deliver the insights for enabling the organization to take decisions in the critical development areas like natural disaster prediction, energy management, health care and economic productivity. The big data term was introduced in 1998 for the first time by John Mashey in the Silicon Graphics. The first book was written by Weiss and Indrukya and this book was published in 1998. There are many advantages of having big data in industry, but it also has a negative side which makes it difficult for the organization to completely rely on it. The privacy and security are the major issues in big data because it has high velocity, large variety and huge volume. The data can be in different formats and it can be collected from different sources. It can be collected from inter cloud migration, data acquisition from the streaming data and large-scale cloud infrastructure. When we are working with the large-scale cloud infrastructure then it provides different software platforms across the multiple computers connected over network and it increases the whole region for the attack over entire system. There are many challenges which are related with the privacy and security of cloud computing and this report will explain the reason for the same.
ISSUES AND CHALLENGES IN BIG DATA
There are different types of issues and challenges which are related with the characteristics of big data. The first one is the data volume. Whenever we think about the data volume then the first issue is related with the storage of the data. As the volume of data will increase, we will need more space pause storing the data efficiently as it would also increase the amount of space. It is not compulsory that we will need huge volume of the data to be retrieved at the first speed to get the results from them. There are many other factors which needs to be looked after like the network, cost of sharing the data whether it is in house or cloud or even the bandwidth needs to be considered. As the volume of the data will increase it will also increase the value for the data record decrease its proportion to the richness, quality, age, time. The social networking sites are resulting in the production of the data which has the size of terabyte every day. Such volume of the data will be very difficult to be handled with the help of traditional databases.
Another concern is the data velocity. The computer systems are resulting in more and more data which can be analytical and operational, and the data is increasing in the speed and also the number of consumers is growing for this data. There are people who want all of this data and they also want to get results for the trending high velocity data as soon as possible. The high velocity data can be the 1,000,000 of rules of the data present in data set for every sector. The traditional database system is not able to perform all the analytics on this data due to the large volume and the constant motion in the data. The data which is generated by the action of the human beings and the devices life website clickstream data, Twitter feeds which can't be collected due to the state-of-the-art technology and the log files is large in size and can’t be handled.
Another concern is the data variety. The data can come in different formations like the updates, images and the messages over social media sites, cell phones data, GPS signal from the sensors and there are many other ways. Most of these sources of the big data are virtually new or instead they are old as per the networking sites for example the information from the social media networks like that Twitter was launched in 2006 and Facebook was launched in 2004. The mobile devices and the smartphones are also belonging to the same category. These devices are ubiquitous for the traditional databases for storing the corporate information until they are ill suited for the data. Most of these data are unveiled common ways I and unstructured switch needs more rigorous techniques for taking important...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here