International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 106 | Views: 291

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015 | Popularity: 6.4 / 10


     

Backup Anomaly Identification with R and Hadoop

Ravindra Phule, Madhav Ingle


Abstract: In recent years big data has become something of a buzzword in business, computer science, information studies, information systems, statistics, and many other fields. As technology continues to advance, we constantly generate an ever-increasing amount of data. This growth does not differentiate between individuals and businesses, private or public sectors, institutions of learning and commercial entities. It is nigh universal and therefore warrants further study. Increasingly larger scale applications are generating an unprecedented amount of data. In order to exploit data mining techniques on collected backup job metadata, we integrate a big data analytics platform with the existing enterprise backup architecture. We build a scalable data mining platform to store, process, and perform advanced data mining techniques on the overall data set. We leverage open source tools to reduce the overall cost while preserving flexibility.


Keywords: Bigdata, Big data analytic, Hadoop, data analytics, knn, RHadoop, framework


Edition: Volume 4 Issue 7, July 2015


Pages: 2241 - 2244



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Ravindra Phule, Madhav Ingle, "Backup Anomaly Identification with R and Hadoop", International Journal of Science and Research (IJSR), Volume 4 Issue 7, July 2015, pp. 2241-2244, https://www.ijsr.net/getabstract.php?paperid=SUB157009, DOI: https://www.doi.org/10.21275/SUB157009



Similar Articles

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Informative Article, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1607 - 1610

Comprehensive Review on Automated Suspicious Activity Report Generation (SAR)

Ankur Mahida

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1605 - 1608

Personalized Information Generation

Ankit

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, Kazakhstan, Volume 13 Issue 11, November 2024

Pages: 1485 - 1488

Enhancing Recommendation Systems with Fuzzy Logic-Based Collaborative Filtering

Yernar Seitay

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1017 - 1020

Human Computer Interface for Physically Impaired

Aayush Bhansali, Shivani Vhatkar, Shamoil Arsiwala, Aditi Srivastava, M. K. Nivangune

Share this Article



Top