Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Overview of Big Data Processing with Fuzzy Set Techniques

Author : Anil Kumar Saga 1

Date of Publication :7th February 2018

Abstract: In the period of big data, these are looking with high velocity and tremendous volume of data with multifaceted structures. Fuzzy sets have utilized to big data processing because of its capacities to speak to and measure parts of vulnerability. A few creative methodologies inside the structure of the "Granular Computing" have been applied. To condense the present commitments and present a viewpoint of further advancements, this review tends to three viewpoints: (1) it audit the ongoing investigations from two unmistakable perspectives. The primary perspective spotlights on what sorts of techniques of fuzzy set have been embraced. It recognizes clear patterns with regards to the use of the fuzzy sets in the big data processing. Another perspective spotlights on the clarification of the advantages of the fuzzy sets in the big data issues. It examine why and when fuzzy sets operate in these issues. (2) It present a basic survey of the current issues and talk about the present difficulties of the big data that could be possibly and somewhat illuminated in the structure of the fuzzy sets. (3) Dependent on certain standards, it surmise the potential patterns of employing fuzzy sets in the big data processing. It stress that some progressively refined enlargements of the fuzzy sets and its combinations with different apparatuses could provide a novel promising preparing environment

Reference :

    1. H. Wang, Z. Xu, and W. Pedrycz, “An overview on the roles of fuzzy set techniques in big data processing: Trends, challenges and opportunities,” KnowledgeBased Syst., 2017, doi: 10.1016/j.knosys.2016.11.008.
    2. J. Ding, V. Tarokh, and Y. Yang, “Model Selection Techniques: An Overview,” IEEE Signal Process. Mag., 2018, doi: 10.1109/MSP.2018.2867638. [3] B. Novikov, N. Vassilieva, and A. Yarygina, “Querying big data,” 2012, doi: 10.1145/2383276.2383278
    3. A. Drosou, I. Kalamaras, S. Papadopoulos, and D. Tzovaras, “An enhanced Graph Analytics Platform (GAP) providing insight in Big Network Data,” J. Innov. Digit. Ecosyst., 2016, doi: 10.1016/j.jides.2016.10.005.
    4. J. C. Mellor, M. A. Stone, and J. Keane, “Application of Data Mining to ‘Big Data’ Acquired in Audiology: Principles and Potential,” Trends Hear., 2018, doi: 10.1177/2331216518776817.
    5. V. Kreinovich and R. Ouncharoen, “Fuzzy (and Interval) techniques in the age of big data: An overview with applications to environmental science, geosciences, engineering, and medicine,” Int. J. Uncertainty, Fuzziness Knowlege-Based Syst., 2015, doi: 10.1142/S0218488515400061
    6. G. Vargas-Solar, J. A. Espinosa-Oviedo, and J. L. Zechinelli-Martini, “Big continuous data: Dealing with velocity by composing event streams,” in Big Data Concepts, Theories, and Applications, 2016.
    7. J. K.U., “A SURVEY ON DEEP LEARNING TECHNIQUES FOR BIG DATA IN BIOMETRICS,” Int. J. Adv. Res. Comput. Sci., 2018, doi: 10.26483/ijarcs.v9i1.5136.
    8. 37–41. http://doi.org/10.1037/a0022390 Tuma J. M. & Pratt J. M. (1982). Clinical child psychology practice and training: A survey. ldots of Clinical Child & Adolescent Psychology 137(August 2012) et al., Detecting diseases in medical prescriptions using data mining tools and combining techniques. 2016.
    9. M. Verma, “Overview of Hadoop in Remote Sensing Image Processing with Various Algorithms and Techniques in Cloud,” 2016.
    10. S. S. Agrawal, A. Devi, R. Wason, and P. Bansal, Speech and Language Processing for Human-Machine Communications. 2018.
    11. Prachi Dewal, Gagandeep Singh Narula and Vishal Jain, “Detection and Prevention of Black Hole Attacks in Cluster based Wireless Sensor Networks”, 10th INDIACom; INDIACom-2016, 3rd 2016 International Conference on “Computing for Sustainable Global Development”, 16th – 18th March, 2016 having ISBN No. 978- 9-3805-4421-2, page no. 3399 to 3403.
    12. Prachi Dewal, Gagandeep Singh Narula, Anupam Baliyan and Vishal Jain, “Security Attacks in Wireless Sensor Networks: A Survey”, CSI-2015; 50th Golden Jubilee Annual Convention on “Digital Life”, held on 02nd to 05th December, 2015 at New Delhi, published by the Springer under ICT Based Innovations, Advances in Intelligent Systems and Computing having ISBN 978-981-10-6602-3.
    13. Ishleen Kaur, Gagandeep Singh Narula and Vishal Jain, “Identification and Analysis of Software Quality Estimators for Prediction of Fault Prone Modules”, INDIACom2017, 4th 2017 International Conference on “Computing for Sustainable Global Development”.
    14. RS Venkatesh, PK Reejeesh, S Balamurugan, S Charanyaa, “Further More Investigations on Evolution of Approaches for Cloud Security”, International Journal of Innovative Research in Computer and Communication Engineering , Vol. 3, Issue 1, January 2015
    15. K Deepika, N Naveen Prasad, S Balamurugan, S Charanyaa, “Survey on Security on Cloud Computing by Trusted Computer Strategy”, International Journal of Innovative Research in Computer and Communication Engineering, 2015
    16. P Durga, S Jeevitha, A Poomalai, M Sowmiya, S Balamurugan, “Aspect Oriented Strategy to model the Examination Management Systems”, International Journal of Innovative Research in Science, Engineering and Technology , Vol. 4, Issue 2, February 2015

Recent Article