Survey and Analysis of Current End-user Data Analytics Tool Support

Author(s):  
Hourieh Khalajzadeh ◽  
Mohamed Abdelrazek ◽  
John Grundy ◽  
John G. Hosking ◽  
Qiang He
Author(s):  
Hourieh Khalajzadeh ◽  
Mohamed Abdelrazek ◽  
John Grundy ◽  
John Hosking ◽  
Qiang He

Author(s):  
Hourieh Khalajzadeh ◽  
Andrew J. Simmons ◽  
Mohamed Abdelrazek ◽  
John Grundy ◽  
John Hosking ◽  
...  

2011 ◽  
Vol 52-54 ◽  
pp. 713-716
Author(s):  
Xiao Ying Gan ◽  
Bin Liu

Based on the TNC architecture, using a trusted network of repair techniques in the trusted network access scenario does not meet the requirements of integrity verification solution for end users. Put forward a credible fix the overall network design, reliable model restoration and repair services, network workflow. The system is in need of restoration to provide safe and reliable repair end-user data transmission, providing a humane, reasonable repair services to ensure the credibility of fixed network and the isolation effect of the terminal to be repaired and strengthened the security of fixed server. Realized the classification of various types of repair resources management, restoration of resources in ensuring the transfer of fast, reliable, based on the performance with a certain extension.


2018 ◽  
Vol 7 (3.12) ◽  
pp. 239
Author(s):  
Chitransh Rajesh ◽  
Yash Jain ◽  
J Jayapradha

Data Analytics is the process of analyzing unprocessed data to draw conclusions by studying and inspecting various patterns in the data. Several algorithms and conceptual methods are often followed to derive legit and accurate results. Efficient data handling is important for interactive visualization of data sets. Considering recent researches and analytical theories on column-oriented Database Management System, we are developing a new data engine using R and Tableau to predict airport trends. The engine uses Univariate datasets (Example, Perth Airport Passenger Movement Dataset, and Newark Airport Cargo Stats Dataset) to analyze and predict accurate trends. Data analyzing and prediction is done with the implementation of Time Series Analysis and respective ARIMA Models for respective modules. Development of modules is done using RStudio whereas Tableau is used for interactive visualization and end-user report generation. The Airport Trends Analytics Engine is an integral part of R and Tableau 10.4 and is optimized for use on desktop and server environments.  


2018 ◽  
Vol 9 (3) ◽  
pp. 383-395 ◽  
Author(s):  
Jianlong Zhou ◽  
Syed Z. Arshad ◽  
Xiuying Wang ◽  
Zhidong Li ◽  
Dagan Feng ◽  
...  

Online Review ◽  
1992 ◽  
Vol 16 (5) ◽  
pp. 323-330
Author(s):  
Richard Poynder
Keyword(s):  
End User ◽  

Author(s):  
Kashif Ali Dahri ◽  
Muhammad Saleem Vighio ◽  
Baqar Ali Zardari

The Internet is not safe anymore, malware can be discovered anywhere on the Internet. The risk of malware has increased also due to the increasing popularity and use of Smartphones and their underlying cost-free applications. With its great market share, the Android operating system has become a prime target for malware developers. When an Android phone is injected with a malware, it may result in compromising the privacy of the user by stealing sensitive and private information like contacts, ids, passwords, photos, call records, and so on. Compared to any other Android-based application category, games are the most preferred zone for attackers, due to the high interest of users in game applications. When an end user downloads a game, which is injected with malicious code, user data is infected without bringing in the knowledge of the user. Though, there still are not sufficient protection mechanisms or guidelines stated for end user against Android malware, this study offers a novel approach to detect Android malware in order to ensure the safe usage of Android applications. The advantage of this approach is its ability to utilize Android manifest files for the detection of malware. The availability of manifest file in every Android application makes this approach applicable to all Android applications. It can also be considered as a lightweight method for malware detection, and its efficiency is experimentally confirmed by testing and comparing the results of 50 Android games samples. Experiments are carried out using the Android Package Kit (APK) tools, and based on the experiments, different kinds of malware identification and prevention guidelines have been proposed for the safe and secure usage of the Android operating system.


Author(s):  
Akashdeep Bhardwaj

With more and more organizations working on the cloud over unsecure internet, sharing files and emails and saving them on cloud storage imperative. Securing the end user sensitive data in transit has thus started to get maximum priority to protect it from Cloud company staff, hackers and data thieves. In this study, an attempt is made to review the research of end user data security. There is an urgent need for solutions for end users' data protection, privacy and during the times when migrating from one Cloud service provider to other. This chapter identifies end user data challenges and issues on cloud and presents use of Public Key Cryptography, Multi Factor Authentication and use of Cloud Aware applications as possible solutions.


2018 ◽  
Vol 10 (10) ◽  
pp. 98
Author(s):  
Prakash Hardaha ◽  
Shailendra Singh

Due to the exponential growth of the data and its services, visiting multiple webs/apps by a user raises three issues—(1) consumption of extra bytes; (2) time killing process of surfing inside the webs/apps; (3) tedious task of remembering address of webs/apps with their credentials. The data mashup is a set of techniques and user-friendly approaches which not only resolves above issues but also allows ordinary user to fetch required data from multiple disparate data sources and to create the integrated view in his defined digital place. In this paper, we have proposed an extension of existing REST protocol called Structured Data REST (SDRest) protocol and user-friendly novel approach which allows even ordinary users to develop end to end data mashup, using the innovative concept of Structured Data Mashup Box (SDMB) and One Time Configuration (OTC)-Any Time Access (ATA) models. Our implementation shows that pre-mashup configuration can easily be performed by an ordinary user and an integrated user interface view of end user data mashup can be created without any technical knowledge or programming. We have also evaluated the proposed work by comparing it with some of the related works and found that the proposed work has developed user friendly configurable approach using the current state of the art techniques to involve not only the ordinary user but also the mashup service provider and the data service provider to develop public, private and hybrid data mashup.


Sign in / Sign up

Export Citation Format

Share Document