Blog


data flow diagram word count problem

Hadoop and Word Count | Hadoop Distributed File System

Hadoop is an Apache open source framework written in Java that allows distributed processing of large datasets across clusters of computers using simple programming models. A Hadoop frame-worked application works in an environment that provides distributed storage and computation across clusters of computers. Hadoop is designed to scale up from a single server to thousands of machines, each offering local computation and storage. Hadoop Architecture...

Read More


Cloud and Fog computing

Fog computing vs Cloud computing

Cloud Computing, is defined as a group of computers and servers connected together over the Internet to form a network. Today, as many enterprises and large organizations are beginning to adopt the Internet of Things, the need for large amounts of data to be accessed more quickly, and locally, is ever-growing. This is where the concept of “Fog Computing” comes to play. Fog Computing, or “fogging”, is...

Read More


International Journal of Engineering Inventions (IJEI) 

International Journal of Engineering Inventions (IJEI) Call For Paper (October 2017) International Journal of Engineering Inventions (IJEI) is peer reviewed International Journal. IJEI publish original research articles, review articles and technical notes. IJEI offers worldwide indexing to all published papers with IJEI. The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.


Text Mining

Text Mining

What is Text Mining? Use of computational techniques to extract high-quality information from text Extract and discover knowledge hidden in text automatically KDD definition: “discovery by computer of new previously unknown information, by automatically extracting information from a usually large amount of different unstructured textual resources” Text Mining Categories Document Categorization (Supervised Learning) Document Clustering/Organization (Unsupervised Learning) Summarization (keywords, indices, etc) Visualization (word cloud, maps)...

Read More


Call for paper : IJET

Submit Your Article to editorIJETjournal@gmail.com Call for paper October 2017        IJET- International Journal of Engineering and Techniques invited all areas of Science, Engineering and Technology , Previously Published Papers in Conferences, Scholarly Journal , Original Research Papers, Survey Papers, Case Studies and Academic or Scholarly Articles are cordially invited to submit papers for the upcoming Edition October – 2017 Click here to download the Copyrights Form and Paper Template ...

Read More


Mobile Computing vs Green Computing

Computing means any goal-oriented activity requiring, benefiting from, or creating computers. Thus, computing includes designing and building hardware and software systems for a wide range of purposes; processing, structuring, and managing various kinds of information; doing scientific studies using computers; making computer systems behave intelligently; creating and using communications and entertainment media; finding and gathering information relevant to any particular purpose. GREEN COMPUTING Green computing...

Read More


Data Mining Tools

Data Mining Tools

Data mining has a wide number of applications ranging from marketing and advertising of goods, services or products, artificial intelligence research, biological sciences, crime investigations to high-level government intelligence. Due to its widespread use and complexity involved in building data mining applications, a large number of Data mining tools have been developed over decades. Every tool has its own advantages and disadvantages. Within data mining,...

Read More


Cloud security issues

CLOUD COMPUTING SECURITY ISSUES, CHALLENGES AND SOLUTION

THREATS IN CLOUD COMPUTING Threats Cloud computing faces just as much security threats that are currently found in the existing computing platforms, networks, intranets, internets in enterprises. These threats, risk vulnerabilities come in various forms. The Cloud Security Alliance (Cloud Computing Alliance, 2010) did a research on the threats facing cloud computing and it identified the flowing major threats: Failures in Provider Security Attacks by...

Read More


Page 23 of 24« First...10...2021222324