Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

Create Different Tables to Analyse Your Work Features. The numbers of these tables are based on How many groups you classified to collect your project Factors. The main goal of this table is to figure out the performance of different image pre-processing method in MRI, and PET images normalization, image registration, and standard deviation noise due to several kinds of factors criterial. Statistical Parametric Mapping is widely used in the image pre-processing part, which could segment and normalize MRI, and PET images into a standard size. It improving the images analysis efficiency due to the standard size image with high performance in image analysis section.

Discuss the Thresholding could operates well, during there are many constraints in segmentation and it also can adjust the rates of spread of clusters. Regions of interest (ROIs) is the key elements for diagnosing early Alzheimer’s disease. So the performance in segmentation part could dramatically affect the results.Tissue probability map(TPM) could consider the voxel location more specifically to help find the meaningful objects from images.

Table 1

 

Table Name

Goal of this Table

 

Big data application on cloud computing

 

This particular table will help the readers to understand the security challenges that most of the big and medium companies are facing in these current days. Through the help of big data application many security issues could be resolved. This particular table i have created to make clarify the steps those must be followed for implementing big data solution in the cloud platform. 

Input for this Table

Output of this Table

Results Discussion Place the Table Here

 

Data management

Support to different data types

 

With the help of the big data tool the users would be able to get a unified platform so that all the stored data can be managed accurately.

Big data application has the ability to support multiple data types including vulnerability flow, logs etc.

Among two of these approaches the most suitable approach is to identify the data management systems accurately

The Created Table

Segments

Reliability

Locate accuracy

Cost

Accuracy

Rate of errors

Cloud security approach

 High

High

High

High

Data management tool identification

N/A

Average

N/A

Average

Cloud security issues

Average

Low

High

High

Big data tools

High

High

Average  

High

Big data application issues

Low

Low

High  

High

Table 2

Table Name

Goal of this Table

 

Development of big data analytics security platform

 

The goal of this table is to identify the necessary big data factors those are helpful to protect information stored in the cloud storage. After considering the security analytics platform the essential benefits of the tool would be clear.

 

Input for this Table

Output of this Table

Results Discussion Place the Table Here

Data ingestion

Compliance reporting

Whatever data get stored to the storage is allowed to create their clone as backup. Even after different internet disaster also these kinds of data could be retrieved from the storage easily.

 

 

In order to tie up to the best security practices big data helpful and it also helps to serve compliance purposes.

From these two different solutions data ingestion mainly for the scalable data stands the beneficial one. It helps to track the continuous changing points of the servers, network and other components as well.

However, due to lack of understandings on the security issues might raise serious issues.

Firewall, DMZ and proper data backup storage are the techniques to be followed for resolving these issues.

The Created Table

Factors

Reliability

Locate accuracy

Cost

Accuracy

Rate of errors

Big data analytical tool  

 High

High

High

High

Operational efficiency

High  

Average

High

Average

Productivity

Average

Low

High

High

Revenue based opportunities

High

High

Average  

High

Benefits of enterprises

Low

Low

High  

High

Table 3

Table Name

Goal of this Table

 

Application of Hadoop tool in cloud platform

The goal of the big data tool is to address different issues associated to the cloud platform and after analysing those issues the developers would be able to create protection mechanism to secure the data store in the cloud storage through keeping the focus on privacy, regulatory, availability etc.

 

Input for this Table

Output of this Table

Results Discussion Place the Table Here

Cloud computing

PageRank algorithm

In order to virtualize the data storage the cloud computing and big data both are very much helpful.  It would reduce the overall capital cost and the rate of technical barriers will also be reduced.

 

Based on the user priority the users could be ranked through the help of this application.

From these two applications the most suitable on is to use the PageRank algorithm so that the users can efficiently use the application based upon the subscription details.

However, due to improper data ownership and agreement level issues, the users might face challenges over the application.

In order to resolve this issue proper big data tool should be selected

The Created Table

Factors

Reliability

Locate accuracy

Cost

Accuracy

Rate of errors

Available project budget

 High

Medium

High

High

 Hadoop distribution usage

High  

Lower

High

Average

Productivity

Average

Low

High

High

Nature of the data  

High

High

Average  

High

Available programming skills

Low

Low

High  

High

Operating system

High

Low

Average

High

Virtualization features

High

Low

High

Medium

 

Table 4

 

Table Name

Goal of this Table

Big data tools

 

The goal of this table to identify the proper big data tool among many. If the developer fails to identify the accurate tool then it would lead the developer towards failure. In order to resolve this issue the exact tool must be selected so that proper application could run as per the security requirements.

 

Input for this Table

Output of this Table

Results Discussion Place the Table Here

Hadoop tool

Failure scenario

With the help of big data Hadoop tool at petabyte scale both the multi structured and semi structured data processing become possible.

The failure scenario act as a service and could allow the failed vulnerabilities

Among these two different factors the most important factor is the application of Hadoop tool in cloud platform to secure the stored information in the server.

The main limitation of this particular tool is it is very much expensive. Due to high expense many companies fail to adopt this tool

The Created Table

Factors

Reliability

Locate accuracy

Cost

Accuracy

Rate of errors

Timely

 High

Medium

High

High

 Better analytics

High  

Lower

High

Average

Vast amount of data management

Average

Low

High

High

Insight

High

High

Average  

High

Decision making

Low

Low

High  

High

Table 5

Table Name

Goal of this Table

Protection mechanism against external attacks

 

The goal of this table is to identify different internet attacks and their respective solutions over phishing attack and DOS attack as well.

 

Input for this Table

Output of this Table

Results Discussion Place the Table Here

Security from phishing attack

Security from DOS attack

With this technology the employees working for any company would be able to get to know more about social engineering and data theft

DOS (Denial of Service) attack is the most dangerous attacks among all. However with the continuously developing internet of things devices the issues of cloud computing and big data started to getting resolved.

 

From these two attacks the developer must concentrate more on the denial of service attack as the rate of this particular attack is increasing every day.

The scalability, availability, reliability of the storage gets enhanced after the implementation of this particular security approaches.

Technical experts are needed to be hired to make them understood about the details of big data tools and its application

The Created Table

Factors

Reliability

Locate accuracy

Cost

Accuracy

Rate of errors

Protecting data mechanism

 High

Medium

High

High

 Encryption mechanism

High  

Lower

High

Average

SSL/TLS

Average

Low

High

High

TLS/SSL

High

High

Average  

High

Password redaction

Low

Low

High  

High

TLS protection  

High

Low

Average

High

Data redaction

High

Low

High

Medium

 Week 6_ Propose New Solution

  1. If you Propose Hybrid Solution

Chose the best latest solution in this work based on your analysis.

Chose another solution that has link with selected one that if you take it's features can solve the limitation in first one.

Current Solution 1

 

Author Name and Published year

System Components

How is the System Work

The rise of “big data” on      cloud computing: Review and open research issues. Information Systems

Hashem, I. A., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Ullah Khan, S. (2015). The rise of “big data” on      cloud computing: Review and open research issues. Information Systems, 47, 98-115. doi:10.1016/j.is.2014.07.006

With the help of the big data application the components those will be served accurately are as follows:

Bid data based volume, values and varieties would be classified easily

Different big data cloud platform are comprised in this solution

The cloud computing service providers and industries are compared and reviewed accordingly.

This particular application helps to define the different data types. Based upon the type of the information data are stored in the server and with due to appropriate security solution only the authorized users are able to access information from the server whenever needed. If any of the unauthenticated users tries to access data from the server then the access would be denied accordingly. Thus, it can be said that with this technology the amount of data gets enhanced with improved mechanism.

Even based on the security challenges big data tools helps to mitigate those

Features/Characteristics

Advantages

Limitations and Challenges

Besides the identification of big data security challenges and platform threats this solution discussed about applicable solution as well. Even such solutions are also available those are quite unique in nature.

· The compound nature of big data and its application level challenges are elaborated in this solution

· Based on priority, the users are ranked thus the service providers will be able to get the ranking of the platform users

· System virtualization is allowed and the failures in the vulnerabilities are also identified easily.

· The Big data tools are very expensive in nature

· If the data amount grows up then data classification become difficult and become also time consuming as well.

· It never provides data ownership level agreements and data security issues as well

· The chances of hacking increases as the web crawled faster

 

Diagram of this system

 

 

Current Solution 2

 

Author Name and Published year

System Components

How is the System Work

 Intelligent cryptography approach for secure distributed big data storage in cloud computing

 

 

Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H. (2017). Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103-115. https://dx.doi.org/10.1016/j.ins.2016.09.005

 

 

This solution provides and increases the security awareness among the users and also allows the users to access distributed storage system whenever they needed. In addition to this the application of different technologies, such as cryptography, security aware efficient distributed storage are also evaluated in this solution. The solution has successfully served the intelligent usage of cryptography and distributed cloud services as well.

This solution starts with the identification of the cryptography technology and then based upon the technology the related works are elaborated.  At the end of the solution it provides different motivational examples as well.

Features/Characteristics

Advantages

Limitations and Challenges

The author has elaborated the details of intelligent cryptography technology with the distributed split file storage system as well.

The needs of the new solution are elaborated with its proper features and disadvantages as well.

The author has developed the details in brief and even the

Diagram of this system

 

Created the Compatible Table and you found the compatibilities between these two solutions (you found links).

Create another table to Reduce the limitation of selected best solution by getting the advantages of good features of compatible solutions.

Then propose new solution and show your contribution in it

NOTE: Check the guidelines that available for that.

Proposed work

 

Name your proposal system/method/tool/…

Proposed System Components

How is the proposed System Work

Demchenko, Y., Turkmen, F., de Laat, C., Blanchet, C., & Loomis, C. (2016, July). Cloud based big data infrastructure: Architectural components and automated provisioning. In High Performance Computing & Simulation (HPCS), 2016 International Conference on (pp. 628-636). IEEE.

 

Tools: The tools that are applied in this hybrid solution includes registries, indexing, data search or data discovery, semantics and metadata. 

· Information gathering and registration

· Information filtering and its classification accor5ding to the data types

· Analysis of information with modelling and prediction  

· Delivery of data and visualization

The four components elaborated are followed to accomplish the solution.  starting from the data sources the information are required to reach the client’s data analytics application through filtering, analysis and visualization the lifecycle of big data application tool would be completed successfully.

Features/Characteristics

Advantages

Limitations and Challenges

The data models data structures and the data formats are also elaborated in this hybrid solution.

With the help of proper digital right protection how the big data system compliances get completed are also elaborated in this solution.

With the hybrid solution the HPC cluster is eventually modelled,

For large data processing this particular tool is very much helpful

Complex data processing and specified event processing also become easier  with this application 

Platform automation can be done but how the transformations become possible are not elaborated in this solution.

High expense of the application

Time taking and with developing time the complexity increases

Analyse your proposed solution

Your Proposed work Discussion

Expected Results of proposed solution

It ensures the consistence security service provision and management ability

It helps to export the NFS file system

Batch system can be properly configured

Bind utilities can be accessed

The functionalities those are expected to be served by the solution are as  follows:

Multi cloud application and deployment become possible with this solution

Proper workflow management also become possible with the API which is data centric in nature.

 

Positive

Diagram of this system

 

If you Propose Universal  Solution 

Created the Compatible Table and find the compatibilities among solutions.

Create another table to Reduce the limitation of selected best solution by getting the advantages of good features of compatible solutions.

Then propose new solution and show your contribution in it

NOTE: Check the guidelines that available for that.

Proposed work

 

Name your proposal system/method/tool/…

Proposed System Components

How is the proposed System Work

Yadav, D. S., & Doke, K. (2016). Mobile Cloud Computing Issues and Solution Framework.

The current applications of cloud computing and big data are facing several challenges those are needed to be mitigated completely for gaining competitive advantages and revenue parallelly.

The steps those should be followed for accomplishing the mobile based cloud based issues are as follows:

Access ability to the authorized users only

· Consideration of encryption and at the same time steganography

· Considering only the trusted third party

· Developing re encrypted proxy for the identity based encryption

· Authentication based upon certificates

· Consider incremental security model

· Development of security service admission model

Features/Characteristics

Advantages

Limitations and Challenges

The effective features of this newly developed hybrid model provides scalability, security, reliability and flexibility to the users.

It helps to show that the theoretical probabilities of the system are completely consistent. The multi tenant issues are expected to be mitigated completely with this .

High expense

Lack of experience technicians and engineers

 

Analyse your proposed solution

Your Proposed work Discussion

Expected Results of proposed solution

The proposed hybrid model is the

I think that these tools will help to resolve the issues  associated to the cloud computing and big data tools

Positive

Diagram of this system

 

Week 7-to-Week 9_Implementing your Proposed Solution 

Note: Chose the suitable tool to implement your proposed solution. This should be applied on BOTH Theoretical and Practical Projects

Version 1.0_   /  / 2015

 

Step 1

 

Step Name

Goal of this step

Input you need to accomplish the goal

Executive level sponsorship collecting

After considering the basic requirements in this step proper sponsors in terms of platform suppliers are needed to be selected by the system administrators

Analysis of the proposed project of cloud application.

Process you need to work on the input to accomplish the goal

The output (Result) of this stage

Result Discussion

Based on the application details the project time and scope should be highlighted. Accurate executive level sponsors are needed for the implementation of this step.

It is expected that from this input the cloud computing technology based application would be able to gain

After successful completion of this step the users would be able to gain service level agreement from the executive project sponsors

Diagrams/Figures of Outputs

NA

Version 2.0_   /  / 2015

 

Step 2

 

Step Name

Goal of this step

Input you need to accomplish the goal

Augment over rebuilding Step Name

The goal of this step is to augment instead of rebuilding

The executive data warehouse it required to be analysed properly

Process you need to work on the input to accomplish the goal

The output (Result) of this stage

Result Discussion

Additional data sources should be identified and prioritized. Then proper hub and spoke technologies should be determined.

Few options should be evaluated at this stage so that the technical needs can be implemented

With proper technology based identification the accurate big tool can be implemented for mitigating the issues of cloud platform

Diagrams/Figures of Outputs

NA

Version 3.0_   /  / 2015

 

Step 3

 

Step Name

Goal of this step

Input you need to accomplish the goal

 Value positioning to consumers

 In this step the consumers should be prioritized based upon their requirements. It

Analysing consumer’s requirement

Process you need to work on the input to accomplish the goal

The output (Result) of this stage

Result Discussion

The data sources are required to be connected to the consumers so that the needs can be  accessed easily

After successful completion of this step the challenges of big data can be mitigated absolutely from the existing cloud based system

It is expected that after successful completion the consumers will be able to meet their expectations.

Diagrams/Figures of Outputs

NA

Version 4.0_   /  / 2015

 

Step 4

 

Step Name

Goal of this step

Input you need to accomplish the goal

Identification of drivers for change and innovation

In this steps proper driving factors are needed to be identified so that the bid data tool can be implemented easily.

For driving the big data application appropriately, different change and innovation factors are required to be identified.

Process you need to work on the input to accomplish the goal

The output (Result) of this stage

Result Discussion

Security components such as DMZ firewall and encryption algorithm should be analysed for securing the information set.

It is expected that after successful implementation of this step the server security will be enhanced.

With accurate big data tool the issues of cloud platform would be minimized so that without authentication none of the external users would be access data from the server.

Diagrams/Figures of Outputs

NA

Version 5.0_   /  / 2015

Step 5

 

Step Name

Goal of this step

Input you need to accomplish the goal

 

 Implementation of big data Hadoop tool

 Goal is to analyse different big data tools and selecting the most appropriate one.

Analysis of big data application tools

 

Process you need to work on the input to accomplish the goal

The output (Result) of this stage

Result Discussion

 

Failure to resilient is the step that must be accomplished in this phase.

It would optimize the cloud security based issues

The server  flexibility, reliability and scalability will increase

 

Diagrams/Figures of Outputs

 

NA

 

Week 10_Evaluate your Proposed Solution 

Create your table to evaluate your work with previous selected solutions

Proposed and Previous Work Comparison

 

  <In this column you need to update it by  also adding the factors you have used in "work evaluation table">

Previous Work_1 (Author Name and Publication Year)

Hashem, I. A., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Ullah Khan, S. (2015). The rise of “big data” on      cloud computing: Review and open research issues. Information Systems, 47, 98-115. doi:10.1016/j.is.2014.07.006

 

Previous Work_2 (Author Name and Publication Year)

 

Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H. (2017). Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103-115. https://dx.doi.org/10.1016/j.ins.2016.09.005

Proposed Work

Work Goal

To identify cloud platform issues and provide big data solution

To identify big data solution

To develop a Security Service Admission Model (SSAM) and Identity Based Encryption (IBE)

System's Components

With the help of the big data application the components those will be served accurately are as follows:

Bid data based volume, values and varieties would be classified easily

Different big data cloud platform are comprised in this solution

The cloud computing service providers and industries are compared and reviewed accordingly.

· This solution provides and increases the security awareness among the users and also allows the users to access distributed storage system whenever they needed.

· In addition to this the application of different technologies, such as cryptography, security aware efficient distributed storage are also evaluated in this solution.

· The solution has successfully served the intelligent usage of cryptography and distributed cloud services as well.

· Mobile Computing, Mobile Cloud

· Computing (MCC).

· Security Service Admission Model (SSAM) and

· Identity Based Encryption (IBE)

System's Mechanism

Virtualization

Cryptography

Encryption and steganography

Features/Characteristics

Besides the identification of big data security challenges and platform threats this solution discussed about applicable solution as well. Even such solutions are also available those are quite unique in nature.

The author has elaborated the details of intelligent cryptography technology with the distributed split file storage system as well

The effective features of this newly developed hybrid model provides scalability, security, reliability and flexibility to the users.

Cost

NA

NA

 NA

Speed

High

HIGH

High

Security

Highly secured  

Secured  

Secured

Performance

Moderate

High

High

Advantages

· The compound nature of big data and its application level challenges are elaborated in this solution

· Based on priority, the users are ranked thus the service providers will be able to get the ranking of the platform users

· System virtualization is allowed and the failures in the vulnerabilities are also identified easily

The needs of the new solution are elaborated with its proper features considering the available and suitable cryptographic solution

It helps to show that the theoretical probabilities of the system are completely consistent. The multi tenant issues are expected to be mitigated completely with this

Limitations/Disadvantages

· The Big data tools are very expensive in nature

· If the data amount grows up then data classification become difficult and become also time consuming as well.

· The author has developed the details in brief

· High time consuming

· Costly solution

Lack of experts

High expense

Platform

Cloud computing

Cloud computing

Cloud computing

Number of examples applied to each work

2

2

2

 Results

Positive

Positive

Positive

Results Discussion

Positive 

Positive

To develop a Security Service Admission Model (SSAM) and Identity Based Encryption (IBE)

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2021). Analyzing The Performance Of Image Pre-Processing In MRI And PET Images Using Statistical Parametric Mapping In An Essay.. Retrieved from https://myassignmenthelp.com/free-samples/itc571-emerging-technologies-and-innovation/parametric-mapping.html.

"Analyzing The Performance Of Image Pre-Processing In MRI And PET Images Using Statistical Parametric Mapping In An Essay.." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/itc571-emerging-technologies-and-innovation/parametric-mapping.html.

My Assignment Help (2021) Analyzing The Performance Of Image Pre-Processing In MRI And PET Images Using Statistical Parametric Mapping In An Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/itc571-emerging-technologies-and-innovation/parametric-mapping.html
[Accessed 22 December 2024].

My Assignment Help. 'Analyzing The Performance Of Image Pre-Processing In MRI And PET Images Using Statistical Parametric Mapping In An Essay.' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/itc571-emerging-technologies-and-innovation/parametric-mapping.html> accessed 22 December 2024.

My Assignment Help. Analyzing The Performance Of Image Pre-Processing In MRI And PET Images Using Statistical Parametric Mapping In An Essay. [Internet]. My Assignment Help. 2021 [cited 22 December 2024]. Available from: https://myassignmenthelp.com/free-samples/itc571-emerging-technologies-and-innovation/parametric-mapping.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
close