Create Different Tables to Analyse Your Work Features. The numbers of these tables are based on How many groups you classified to collect your project Factors. The main goal of this table is to figure out the performance of different image pre-processing method in MRI, and PET images normalization, image registration, and standard deviation noise due to several kinds of factors criterial. Statistical Parametric Mapping is widely used in the image pre-processing part, which could segment and normalize MRI, and PET images into a standard size. It improving the images analysis efficiency due to the standard size image with high performance in image analysis section.
Discuss the Thresholding could operates well, during there are many constraints in segmentation and it also can adjust the rates of spread of clusters. Regions of interest (ROIs) is the key elements for diagnosing early Alzheimer’s disease. So the performance in segmentation part could dramatically affect the results.Tissue probability map(TPM) could consider the voxel location more specifically to help find the meaningful objects from images.
Table 1 |
|||||||||||||||||||||||||||||||||||
Table Name |
Goal of this Table |
||||||||||||||||||||||||||||||||||
Big data application on cloud computing |
This particular table will help the readers to understand the security challenges that most of the big and medium companies are facing in these current days. Through the help of big data application many security issues could be resolved. This particular table i have created to make clarify the steps those must be followed for implementing big data solution in the cloud platform. |
||||||||||||||||||||||||||||||||||
Input for this Table |
Output of this Table |
Results Discussion Place the Table Here |
|||||||||||||||||||||||||||||||||
Data management Support to different data types |
With the help of the big data tool the users would be able to get a unified platform so that all the stored data can be managed accurately. Big data application has the ability to support multiple data types including vulnerability flow, logs etc. |
Among two of these approaches the most suitable approach is to identify the data management systems accurately |
|||||||||||||||||||||||||||||||||
The Created Table |
|||||||||||||||||||||||||||||||||||
|
Table 2 |
|||||||||||||||||||||||||||||||||||
Table Name |
Goal of this Table |
||||||||||||||||||||||||||||||||||
Development of big data analytics security platform
|
The goal of this table is to identify the necessary big data factors those are helpful to protect information stored in the cloud storage. After considering the security analytics platform the essential benefits of the tool would be clear.
|
||||||||||||||||||||||||||||||||||
Input for this Table |
Output of this Table |
Results Discussion Place the Table Here |
|||||||||||||||||||||||||||||||||
Data ingestion Compliance reporting |
Whatever data get stored to the storage is allowed to create their clone as backup. Even after different internet disaster also these kinds of data could be retrieved from the storage easily.
In order to tie up to the best security practices big data helpful and it also helps to serve compliance purposes. |
From these two different solutions data ingestion mainly for the scalable data stands the beneficial one. It helps to track the continuous changing points of the servers, network and other components as well. However, due to lack of understandings on the security issues might raise serious issues. Firewall, DMZ and proper data backup storage are the techniques to be followed for resolving these issues. |
|||||||||||||||||||||||||||||||||
The Created Table |
|||||||||||||||||||||||||||||||||||
|
Table 3 |
|||||||||||||||||||||||||||||||||||||||||||||
Table Name |
Goal of this Table |
||||||||||||||||||||||||||||||||||||||||||||
Application of Hadoop tool in cloud platform |
The goal of the big data tool is to address different issues associated to the cloud platform and after analysing those issues the developers would be able to create protection mechanism to secure the data store in the cloud storage through keeping the focus on privacy, regulatory, availability etc.
|
||||||||||||||||||||||||||||||||||||||||||||
Input for this Table |
Output of this Table |
Results Discussion Place the Table Here |
|||||||||||||||||||||||||||||||||||||||||||
Cloud computing PageRank algorithm |
In order to virtualize the data storage the cloud computing and big data both are very much helpful. It would reduce the overall capital cost and the rate of technical barriers will also be reduced.
Based on the user priority the users could be ranked through the help of this application. |
From these two applications the most suitable on is to use the PageRank algorithm so that the users can efficiently use the application based upon the subscription details. However, due to improper data ownership and agreement level issues, the users might face challenges over the application. In order to resolve this issue proper big data tool should be selected |
|||||||||||||||||||||||||||||||||||||||||||
The Created Table |
|||||||||||||||||||||||||||||||||||||||||||||
|
Table 4 |
|||||||||||||||||||||||||||||||||||
Table Name |
Goal of this Table |
||||||||||||||||||||||||||||||||||
Big data tools
|
The goal of this table to identify the proper big data tool among many. If the developer fails to identify the accurate tool then it would lead the developer towards failure. In order to resolve this issue the exact tool must be selected so that proper application could run as per the security requirements.
|
||||||||||||||||||||||||||||||||||
Input for this Table |
Output of this Table |
Results Discussion Place the Table Here |
|||||||||||||||||||||||||||||||||
Hadoop tool Failure scenario |
With the help of big data Hadoop tool at petabyte scale both the multi structured and semi structured data processing become possible. The failure scenario act as a service and could allow the failed vulnerabilities |
Among these two different factors the most important factor is the application of Hadoop tool in cloud platform to secure the stored information in the server. The main limitation of this particular tool is it is very much expensive. Due to high expense many companies fail to adopt this tool |
|||||||||||||||||||||||||||||||||
The Created Table |
|||||||||||||||||||||||||||||||||||
|
Table 5 |
|||||||||||||||||||||||||||||||||||||||||||||
Table Name |
Goal of this Table |
||||||||||||||||||||||||||||||||||||||||||||
Protection mechanism against external attacks
|
The goal of this table is to identify different internet attacks and their respective solutions over phishing attack and DOS attack as well.
|
||||||||||||||||||||||||||||||||||||||||||||
Input for this Table |
Output of this Table |
Results Discussion Place the Table Here |
|||||||||||||||||||||||||||||||||||||||||||
Security from phishing attack Security from DOS attack |
With this technology the employees working for any company would be able to get to know more about social engineering and data theft DOS (Denial of Service) attack is the most dangerous attacks among all. However with the continuously developing internet of things devices the issues of cloud computing and big data started to getting resolved.
|
From these two attacks the developer must concentrate more on the denial of service attack as the rate of this particular attack is increasing every day. The scalability, availability, reliability of the storage gets enhanced after the implementation of this particular security approaches. Technical experts are needed to be hired to make them understood about the details of big data tools and its application |
|||||||||||||||||||||||||||||||||||||||||||
The Created Table |
|||||||||||||||||||||||||||||||||||||||||||||
|
Week 6_ Propose New Solution
- If you Propose Hybrid Solution
Chose the best latest solution in this work based on your analysis.
Chose another solution that has link with selected one that if you take it's features can solve the limitation in first one.
Current Solution 1 |
|||
Author Name and Published year |
System Components |
How is the System Work |
|
The rise of “big data” on cloud computing: Review and open research issues. Information Systems, Hashem, I. A., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Ullah Khan, S. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, 98-115. doi:10.1016/j.is.2014.07.006 |
With the help of the big data application the components those will be served accurately are as follows: Bid data based volume, values and varieties would be classified easily Different big data cloud platform are comprised in this solution The cloud computing service providers and industries are compared and reviewed accordingly. |
This particular application helps to define the different data types. Based upon the type of the information data are stored in the server and with due to appropriate security solution only the authorized users are able to access information from the server whenever needed. If any of the unauthenticated users tries to access data from the server then the access would be denied accordingly. Thus, it can be said that with this technology the amount of data gets enhanced with improved mechanism. Even based on the security challenges big data tools helps to mitigate those |
|
Features/Characteristics |
Advantages |
Limitations and Challenges |
|
Besides the identification of big data security challenges and platform threats this solution discussed about applicable solution as well. Even such solutions are also available those are quite unique in nature. |
· The compound nature of big data and its application level challenges are elaborated in this solution · Based on priority, the users are ranked thus the service providers will be able to get the ranking of the platform users · System virtualization is allowed and the failures in the vulnerabilities are also identified easily. |
· The Big data tools are very expensive in nature · If the data amount grows up then data classification become difficult and become also time consuming as well. · It never provides data ownership level agreements and data security issues as well · The chances of hacking increases as the web crawled faster
|
|
Diagram of this system |
|||
|
Current Solution 2 |
|||
Author Name and Published year |
System Components |
How is the System Work |
|
Intelligent cryptography approach for secure distributed big data storage in cloud computing
Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H. (2017). Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103-115. https://dx.doi.org/10.1016/j.ins.2016.09.005
|
This solution provides and increases the security awareness among the users and also allows the users to access distributed storage system whenever they needed. In addition to this the application of different technologies, such as cryptography, security aware efficient distributed storage are also evaluated in this solution. The solution has successfully served the intelligent usage of cryptography and distributed cloud services as well. |
This solution starts with the identification of the cryptography technology and then based upon the technology the related works are elaborated. At the end of the solution it provides different motivational examples as well. |
|
Features/Characteristics |
Advantages |
Limitations and Challenges |
|
The author has elaborated the details of intelligent cryptography technology with the distributed split file storage system as well. |
The needs of the new solution are elaborated with its proper features and disadvantages as well. |
The author has developed the details in brief and even the |
|
Diagram of this system |
|||
Created the Compatible Table and you found the compatibilities between these two solutions (you found links).
Create another table to Reduce the limitation of selected best solution by getting the advantages of good features of compatible solutions.
Then propose new solution and show your contribution in it
NOTE: Check the guidelines that available for that.
Proposed work |
|||
Name your proposal system/method/tool/… |
Proposed System Components |
How is the proposed System Work |
|
Demchenko, Y., Turkmen, F., de Laat, C., Blanchet, C., & Loomis, C. (2016, July). Cloud based big data infrastructure: Architectural components and automated provisioning. In High Performance Computing & Simulation (HPCS), 2016 International Conference on (pp. 628-636). IEEE.
Tools: The tools that are applied in this hybrid solution includes registries, indexing, data search or data discovery, semantics and metadata. |
· Information gathering and registration · Information filtering and its classification accor5ding to the data types · Analysis of information with modelling and prediction · Delivery of data and visualization |
The four components elaborated are followed to accomplish the solution. starting from the data sources the information are required to reach the client’s data analytics application through filtering, analysis and visualization the lifecycle of big data application tool would be completed successfully. |
|
Features/Characteristics |
Advantages |
Limitations and Challenges |
|
The data models data structures and the data formats are also elaborated in this hybrid solution. With the help of proper digital right protection how the big data system compliances get completed are also elaborated in this solution. |
With the hybrid solution the HPC cluster is eventually modelled, For large data processing this particular tool is very much helpful Complex data processing and specified event processing also become easier with this application |
Platform automation can be done but how the transformations become possible are not elaborated in this solution. High expense of the application Time taking and with developing time the complexity increases |
|
Analyse your proposed solution |
Your Proposed work Discussion |
Expected Results of proposed solution |
|
It ensures the consistence security service provision and management ability It helps to export the NFS file system Batch system can be properly configured Bind utilities can be accessed |
The functionalities those are expected to be served by the solution are as follows: Multi cloud application and deployment become possible with this solution Proper workflow management also become possible with the API which is data centric in nature.
|
Positive |
|
Diagram of this system |
|||
|
If you Propose Universal Solution
Created the Compatible Table and find the compatibilities among solutions.
Create another table to Reduce the limitation of selected best solution by getting the advantages of good features of compatible solutions.
Then propose new solution and show your contribution in it
NOTE: Check the guidelines that available for that.
Proposed work |
|||
Name your proposal system/method/tool/… |
Proposed System Components |
How is the proposed System Work |
|
Yadav, D. S., & Doke, K. (2016). Mobile Cloud Computing Issues and Solution Framework. |
The current applications of cloud computing and big data are facing several challenges those are needed to be mitigated completely for gaining competitive advantages and revenue parallelly. |
The steps those should be followed for accomplishing the mobile based cloud based issues are as follows: Access ability to the authorized users only · Consideration of encryption and at the same time steganography · Considering only the trusted third party · Developing re encrypted proxy for the identity based encryption · Authentication based upon certificates · Consider incremental security model · Development of security service admission model |
|
Features/Characteristics |
Advantages |
Limitations and Challenges |
|
The effective features of this newly developed hybrid model provides scalability, security, reliability and flexibility to the users. |
It helps to show that the theoretical probabilities of the system are completely consistent. The multi tenant issues are expected to be mitigated completely with this . |
High expense Lack of experience technicians and engineers
|
|
Analyse your proposed solution |
Your Proposed work Discussion |
Expected Results of proposed solution |
|
The proposed hybrid model is the |
I think that these tools will help to resolve the issues associated to the cloud computing and big data tools |
Positive |
|
Diagram of this system |
|||
|
Week 7-to-Week 9_Implementing your Proposed Solution
Note: Chose the suitable tool to implement your proposed solution. This should be applied on BOTH Theoretical and Practical Projects
Version 1.0_ / / 2015 |
||||
Step 1 |
||||
Step Name |
Goal of this step |
Input you need to accomplish the goal |
||
Executive level sponsorship collecting |
After considering the basic requirements in this step proper sponsors in terms of platform suppliers are needed to be selected by the system administrators |
Analysis of the proposed project of cloud application. |
||
Process you need to work on the input to accomplish the goal |
The output (Result) of this stage |
Result Discussion |
||
Based on the application details the project time and scope should be highlighted. Accurate executive level sponsors are needed for the implementation of this step. |
It is expected that from this input the cloud computing technology based application would be able to gain |
After successful completion of this step the users would be able to gain service level agreement from the executive project sponsors |
||
Diagrams/Figures of Outputs |
||||
NA |
Version 2.0_ / / 2015 |
||||
Step 2 |
||||
Step Name |
Goal of this step |
Input you need to accomplish the goal |
||
Augment over rebuilding Step Name |
The goal of this step is to augment instead of rebuilding |
The executive data warehouse it required to be analysed properly |
||
Process you need to work on the input to accomplish the goal |
The output (Result) of this stage |
Result Discussion |
||
Additional data sources should be identified and prioritized. Then proper hub and spoke technologies should be determined. |
Few options should be evaluated at this stage so that the technical needs can be implemented |
With proper technology based identification the accurate big tool can be implemented for mitigating the issues of cloud platform |
||
Diagrams/Figures of Outputs |
||||
NA |
Version 3.0_ / / 2015 |
||||
Step 3 |
||||
Step Name |
Goal of this step |
Input you need to accomplish the goal |
||
Value positioning to consumers |
In this step the consumers should be prioritized based upon their requirements. It |
Analysing consumer’s requirement |
||
Process you need to work on the input to accomplish the goal |
The output (Result) of this stage |
Result Discussion |
||
The data sources are required to be connected to the consumers so that the needs can be accessed easily |
After successful completion of this step the challenges of big data can be mitigated absolutely from the existing cloud based system |
It is expected that after successful completion the consumers will be able to meet their expectations. |
||
Diagrams/Figures of Outputs |
||||
NA |
Version 4.0_ / / 2015 |
||||
Step 4 |
||||
Step Name |
Goal of this step |
Input you need to accomplish the goal |
||
Identification of drivers for change and innovation |
In this steps proper driving factors are needed to be identified so that the bid data tool can be implemented easily. |
For driving the big data application appropriately, different change and innovation factors are required to be identified. |
||
Process you need to work on the input to accomplish the goal |
The output (Result) of this stage |
Result Discussion |
||
Security components such as DMZ firewall and encryption algorithm should be analysed for securing the information set. |
It is expected that after successful implementation of this step the server security will be enhanced. |
With accurate big data tool the issues of cloud platform would be minimized so that without authentication none of the external users would be access data from the server. |
||
Diagrams/Figures of Outputs |
||||
NA |
Version 5.0_ / / 2015 |
||||
Step 5 |
||||
Step Name |
Goal of this step |
Input you need to accomplish the goal |
||
Implementation of big data Hadoop tool |
Goal is to analyse different big data tools and selecting the most appropriate one. |
Analysis of big data application tools |
||
Process you need to work on the input to accomplish the goal |
The output (Result) of this stage |
Result Discussion |
||
Failure to resilient is the step that must be accomplished in this phase. |
It would optimize the cloud security based issues |
The server flexibility, reliability and scalability will increase |
||
Diagrams/Figures of Outputs |
||||
NA |
Week 10_Evaluate your Proposed Solution
Create your table to evaluate your work with previous selected solutions
Proposed and Previous Work Comparison |
|||
<In this column you need to update it by also adding the factors you have used in "work evaluation table"> |
Previous Work_1 (Author Name and Publication Year) Hashem, I. A., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Ullah Khan, S. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, 98-115. doi:10.1016/j.is.2014.07.006
|
Previous Work_2 (Author Name and Publication Year)
Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H. (2017). Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103-115. https://dx.doi.org/10.1016/j.ins.2016.09.005 |
Proposed Work |
Work Goal |
To identify cloud platform issues and provide big data solution |
To identify big data solution |
To develop a Security Service Admission Model (SSAM) and Identity Based Encryption (IBE) |
System's Components |
With the help of the big data application the components those will be served accurately are as follows: Bid data based volume, values and varieties would be classified easily Different big data cloud platform are comprised in this solution The cloud computing service providers and industries are compared and reviewed accordingly. |
· This solution provides and increases the security awareness among the users and also allows the users to access distributed storage system whenever they needed. · In addition to this the application of different technologies, such as cryptography, security aware efficient distributed storage are also evaluated in this solution. · The solution has successfully served the intelligent usage of cryptography and distributed cloud services as well. |
· Mobile Computing, Mobile Cloud · Computing (MCC). · Security Service Admission Model (SSAM) and · Identity Based Encryption (IBE) |
System's Mechanism |
Virtualization |
Cryptography |
Encryption and steganography |
Features/Characteristics |
Besides the identification of big data security challenges and platform threats this solution discussed about applicable solution as well. Even such solutions are also available those are quite unique in nature. |
The author has elaborated the details of intelligent cryptography technology with the distributed split file storage system as well |
The effective features of this newly developed hybrid model provides scalability, security, reliability and flexibility to the users. |
Cost |
NA |
NA |
NA |
Speed |
High |
HIGH |
High |
Security |
Highly secured |
Secured |
Secured |
Performance |
Moderate |
High |
High |
Advantages |
· The compound nature of big data and its application level challenges are elaborated in this solution · Based on priority, the users are ranked thus the service providers will be able to get the ranking of the platform users · System virtualization is allowed and the failures in the vulnerabilities are also identified easily |
The needs of the new solution are elaborated with its proper features considering the available and suitable cryptographic solution |
It helps to show that the theoretical probabilities of the system are completely consistent. The multi tenant issues are expected to be mitigated completely with this |
Limitations/Disadvantages |
· The Big data tools are very expensive in nature · If the data amount grows up then data classification become difficult and become also time consuming as well. |
· The author has developed the details in brief · High time consuming · Costly solution |
Lack of experts High expense |
Platform |
Cloud computing |
Cloud computing |
Cloud computing |
Number of examples applied to each work |
2 |
2 |
2 |
Results |
Positive |
Positive |
Positive |
Results Discussion |
Positive |
Positive |
To develop a Security Service Admission Model (SSAM) and Identity Based Encryption (IBE) |
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). Analyzing The Performance Of Image Pre-Processing In MRI And PET Images Using Statistical Parametric Mapping In An Essay.. Retrieved from https://myassignmenthelp.com/free-samples/itc571-emerging-technologies-and-innovation/parametric-mapping.html.
"Analyzing The Performance Of Image Pre-Processing In MRI And PET Images Using Statistical Parametric Mapping In An Essay.." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/itc571-emerging-technologies-and-innovation/parametric-mapping.html.
My Assignment Help (2021) Analyzing The Performance Of Image Pre-Processing In MRI And PET Images Using Statistical Parametric Mapping In An Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/itc571-emerging-technologies-and-innovation/parametric-mapping.html
[Accessed 19 August 2024].
My Assignment Help. 'Analyzing The Performance Of Image Pre-Processing In MRI And PET Images Using Statistical Parametric Mapping In An Essay.' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/itc571-emerging-technologies-and-innovation/parametric-mapping.html> accessed 19 August 2024.
My Assignment Help. Analyzing The Performance Of Image Pre-Processing In MRI And PET Images Using Statistical Parametric Mapping In An Essay. [Internet]. My Assignment Help. 2021 [cited 19 August 2024]. Available from: https://myassignmenthelp.com/free-samples/itc571-emerging-technologies-and-innovation/parametric-mapping.html.