2019
DOI: 10.1186/s40537-019-0275-3
|View full text |Cite
|
Sign up to set email alerts
|

A novel approach for big data processing using message passing interface based on memory mapping

Abstract: The analysis and processing of big data are one of the most important challenges that researchers are working on to find the best approaches to handle it with high performance, low cost and high accuracy. In this paper, a novel approach for big data processing and management was proposed that differed from the existing ones; the proposed method employs not only the memory space to reads and handle big data, it also uses space of memory-mapped extended from memory storage. From a methodological viewpoint, the n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 37 publications
(32 reference statements)
0
5
0
Order By: Relevance
“… Variety: occasionally, data come from various sources and in diverse forms, such as structured, unstructured, and semi-structured data [24]. As a result, it is vital to have systems that can handle various data models while preserving performance [25].  Veracity: it indicates the quality of data to be analyzed.…”
Section: B Big Datamentioning
confidence: 99%
“… Variety: occasionally, data come from various sources and in diverse forms, such as structured, unstructured, and semi-structured data [24]. As a result, it is vital to have systems that can handle various data models while preserving performance [25].  Veracity: it indicates the quality of data to be analyzed.…”
Section: B Big Datamentioning
confidence: 99%
“…Intrusion detection techniques ensure the security of a network through monitoring, detecting, and responding to attacks. The major concern of an IDS is to identify both internal and external network threats [19] [12]. In a common way, an IDS can be said to consist of hardware components which require compatible software to be run [20] [13].…”
Section: Intrusion Detection Systemmentioning
confidence: 99%
“…From the computational perspective, the GHA [16,17] is beneficial because it can solve eigenvalue problems using iterative methods which requires no direct covariance matrix computation. This is more significant when there are many attributes in a given set [18,19]. Oja and Karhunen [16] demonstrated an incremental solution to finding the first eigenvector from data arriving in the form of serial data items presented as vectors [7,20].…”
Section: Generalized Hebbian Algorithm (Gha)mentioning
confidence: 99%
“…This data is streaming everywhere through multiple devices, which are part of the Internet of Things (IoT). It includes sensors' data, devices that produce a massive amount of data [1], vehicles [2], phones and machines [3], social media, cyber-physical systems [4], business…”
Section: Introductionmentioning
confidence: 99%