2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS) 2018
DOI: 10.1109/iccons.2018.8662931
|View full text |Cite
|
Sign up to set email alerts
|

Use of Big Data Analytics in WASH Sector

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Datadriven decision-making, scientific discovery, and process optimization of WDN can be achieved with the help of Big data analytics [239]. Demand forecasting, water leak predictions, reservoir capacity prediction, reservoir water level predictions, queries, reports, visualization and interpretation, modeling and prediction, service improvement, and auditing and evaluation [240], [241] are the other outcomes of the data analytics for WDN system. The following are the major outcomes of WDN integrated with Big data analytics:…”
Section: ) Iot Cloud Planementioning
confidence: 99%
“…Datadriven decision-making, scientific discovery, and process optimization of WDN can be achieved with the help of Big data analytics [239]. Demand forecasting, water leak predictions, reservoir capacity prediction, reservoir water level predictions, queries, reports, visualization and interpretation, modeling and prediction, service improvement, and auditing and evaluation [240], [241] are the other outcomes of the data analytics for WDN system. The following are the major outcomes of WDN integrated with Big data analytics:…”
Section: ) Iot Cloud Planementioning
confidence: 99%
“…Among all of these characteristics, data size is the most distinctive feature of big data analytics compared to the other features [18]. The use of big data analytical tools and techniques [19] is very useful for identifying sensitive data, because they use parallel and distributed computing to process voluminous data [20]. To prevent unexpected event that may occur in future, security agencies must be one step ahead of terrorists [21].…”
Section: Introductionmentioning
confidence: 99%