SlideShare a Scribd company logo
1 of 10
Role of Biometric in Reducing
the Size of Big Data
Manish Mathuria
Asst. Prof., Dept. of IT
Biyani Girls College, Jaipur
Contents
• Objective
• Introduction
• Need of Data Reduction
• 6Vs of Big Data
• Methodology
• Experiment and Result
• References
Objective
• The main objective the research is to analyze
the role of biometric in reducing the size of
big data.
Introduction
• Biometric devices are not only use for security but it is also use to
present personal identification. Everybody in this world have unique
biometric features, these biometric features provides the person
availability with the certain conditions.
• The digital world today is totally based on Authentication and
Authorization which sincerely need to focus on availability on time,
where growth in data tends to become Big Data.
• Unique Record entry in database no doubt reduces the duplicity but
still same attribute values are require to present again and again
for person identification.
• The Biometric Authentication is a solution to this problem, here the
multiple attributes like (Name, Father’s Name, Mother’s Name,
Hometown, etc.) values by single biometric feature like(Fingerprint,
Face Image, Iris Scan, etc).
Need for Data Reduction
• Big Data Systems include social media data aggregators
industrial senor networks, scientific experimental systems,
connected health, and several other application areas.
• The data collection from large-scale local and remote
sensing devices and networks, Internet-enabled data
streams, and/or devices, system and networks-logs bring
massively heterogeneous, multi format, aggregated, and
continuous big data stream.
• Effectively handling the big data stream to store, index,
and query the data sources for lateral data processing are
among the key challenges being address by researchers.
6 Vs of Big Data
• Volume: The data size characterizes the volume of big data.
• Velocity: The velocity of big data is determined by the frequency of data
streams which are entering in big data systems.
• Varity: It collects data stream from multiple data sources which produce
data streams in multiple formats.
• Veracity: The utility of big data systems increases when the data streams
are collected from reliable and trustworthy sources.
• Variability: Since all data sources in big data systems do not generate the
data streams with same speed and same quality.
• Value: The value property of big data defines the utility, usability, and
usefulness of big data systems.
Literature Review:
Big Data Reduction Method
• The research done by Muhammad Habib and Prem Prakash
Jayaraman, on “Big Data Reduction Methods”, gave this
idea to use Biometric in Reducing the size of Big Data.
• Data Reduction methods for big data vary from pure
dimension reduction technique to:
– compression based data reduction methods
– algorithms for preprocessing
– cluster-level data deduplication
– redundancy elimination
– implementation of network (graph) theory.
• The dimension reduction techniques are useful to handle
the heterogeneity and massiveness of big data by reducing
millions-variable data into manageble size.
Literature Review:
Big Data Challenges
• Shafagat Mahmudova form IIT published the
research titled ‘Big Data Challenges in Biometric
Technology’.
– The study provides information about big data and
advanced cloud technologies in the field of biometric
technology.
– The big data contain three types of High speed and
large volume of data:
• Structured Data: relational data
• Semi structured data: XML data
• Unstructured data: Word, PDF and others.
Literature Review:
Big Data with Biometric
• Through the use of Big Data Technologies, Japanese
developers began to apply the software to recognize
the person in the black lit of buyers of some stores,
who ware identified as thieves or complaints.
• The police in Tampa, Florida State use Big Data
Technology called Superbowl XXXV software to identify
criminals basing on the scanned image of face.
• Universities and airports in US also use Big Data in the
field of Biometric Technologies for the identification of
people, recognition with Big Data Technologies.[1]
• Lambda labs uses its Big Data Technology used for face
recognition software for Google Glass. [2]
References
1. “Big Data Challenges in Biometric Technology”,
Shafagat Mahmudova, IJEME. 2016.
2. “Deep Learning application and challenges in big data
analytics”, Chunyan Q. Wei Z.,Journal of Big Data,
USA, 2015.
3. “Big Data Reduction Methods: A Survey”, Muhammad
Habib, University of Malaya, Malaysia, Springer, 2016.
4. Cloud based Big Data Analytics Framework for Face
Recognition in Social Networks using Machine
Learning, Vinay A, Rituparna J, ISBCC, 2015.

More Related Content

What's hot

Sample Paper.doc.doc
Sample Paper.doc.docSample Paper.doc.doc
Sample Paper.doc.doc
butest
 

What's hot (17)

Dissemination Information Packages (DIPS) for Information Reuse
Dissemination Information Packages (DIPS) for Information Reuse Dissemination Information Packages (DIPS) for Information Reuse
Dissemination Information Packages (DIPS) for Information Reuse
 
Ijdbms
IjdbmsIjdbms
Ijdbms
 
Selection of Articles using Data Analytics for Behavioral Dissertation Resear...
Selection of Articles using Data Analytics for Behavioral Dissertation Resear...Selection of Articles using Data Analytics for Behavioral Dissertation Resear...
Selection of Articles using Data Analytics for Behavioral Dissertation Resear...
 
Ijdbms
IjdbmsIjdbms
Ijdbms
 
Ijdbms
IjdbmsIjdbms
Ijdbms
 
Ijdbms
IjdbmsIjdbms
Ijdbms
 
"Reproducibility from the Informatics Perspective"
"Reproducibility from the Informatics Perspective""Reproducibility from the Informatics Perspective"
"Reproducibility from the Informatics Perspective"
 
Ijdbms
IjdbmsIjdbms
Ijdbms
 
Ijdbms
IjdbmsIjdbms
Ijdbms
 
Sample Paper.doc.doc
Sample Paper.doc.docSample Paper.doc.doc
Sample Paper.doc.doc
 
Ijdbms
IjdbmsIjdbms
Ijdbms
 
Ijdbms
IjdbmsIjdbms
Ijdbms
 
from data to artificial intelligence, from laboratory to industry
from data to artificial intelligence, from laboratory to industryfrom data to artificial intelligence, from laboratory to industry
from data to artificial intelligence, from laboratory to industry
 
Ijdbms
IjdbmsIjdbms
Ijdbms
 
Linking Data to Publications through Citation and Virtual Archives
Linking Data to Publications through Citation and Virtual ArchivesLinking Data to Publications through Citation and Virtual Archives
Linking Data to Publications through Citation and Virtual Archives
 
Ijdbms
IjdbmsIjdbms
Ijdbms
 
International Journal of Database Management Systems (IJDBMS)
International Journal of Database Management Systems (IJDBMS)International Journal of Database Management Systems (IJDBMS)
International Journal of Database Management Systems (IJDBMS)
 

Similar to Role of Biometric in Reducing the Size of Big Data

Automating Data Science over a Human Genomics Knowledge Base
Automating Data Science over a Human Genomics Knowledge BaseAutomating Data Science over a Human Genomics Knowledge Base
Automating Data Science over a Human Genomics Knowledge Base
Vaticle
 

Similar to Role of Biometric in Reducing the Size of Big Data (20)

Bigdata and Hadoop with applications
Bigdata and Hadoop with applicationsBigdata and Hadoop with applications
Bigdata and Hadoop with applications
 
A Survey on Big Data Analytics
A Survey on Big Data AnalyticsA Survey on Big Data Analytics
A Survey on Big Data Analytics
 
Big data Mining
Big data MiningBig data Mining
Big data Mining
 
Data minig with Big data analysis
Data minig with Big data analysisData minig with Big data analysis
Data minig with Big data analysis
 
01-introduction.ppt the paper that you can unless you want to join me because...
01-introduction.ppt the paper that you can unless you want to join me because...01-introduction.ppt the paper that you can unless you want to join me because...
01-introduction.ppt the paper that you can unless you want to join me because...
 
BigData-Challenges.pptx
BigData-Challenges.pptxBigData-Challenges.pptx
BigData-Challenges.pptx
 
Big_Data.pptx
Big_Data.pptxBig_Data.pptx
Big_Data.pptx
 
20211011112936_PPT01-Introduction to Big Data.pptx
20211011112936_PPT01-Introduction to Big Data.pptx20211011112936_PPT01-Introduction to Big Data.pptx
20211011112936_PPT01-Introduction to Big Data.pptx
 
Puja(801),sanghamitra(819),surabhi(844)
Puja(801),sanghamitra(819),surabhi(844)Puja(801),sanghamitra(819),surabhi(844)
Puja(801),sanghamitra(819),surabhi(844)
 
Are you ready for BIG DATA?
Are you ready for BIG DATA?Are you ready for BIG DATA?
Are you ready for BIG DATA?
 
TOPIC.pptx
TOPIC.pptxTOPIC.pptx
TOPIC.pptx
 
Introduction to Big Data
Introduction to Big DataIntroduction to Big Data
Introduction to Big Data
 
predictive analysis and usage in procurement ppt 2017
predictive analysis and usage in procurement  ppt 2017predictive analysis and usage in procurement  ppt 2017
predictive analysis and usage in procurement ppt 2017
 
Introduction to Big Data
Introduction to Big DataIntroduction to Big Data
Introduction to Big Data
 
Big Data Challenges and solutions.pptx
 Big Data Challenges and solutions.pptx Big Data Challenges and solutions.pptx
Big Data Challenges and solutions.pptx
 
Big data Analytics
Big data AnalyticsBig data Analytics
Big data Analytics
 
Big data ppt
Big data pptBig data ppt
Big data ppt
 
Automating Data Science over a Human Genomics Knowledge Base
Automating Data Science over a Human Genomics Knowledge BaseAutomating Data Science over a Human Genomics Knowledge Base
Automating Data Science over a Human Genomics Knowledge Base
 
Big Data in Distributed Analytics,Cybersecurity And Digital Forensics
Big Data in Distributed Analytics,Cybersecurity And Digital ForensicsBig Data in Distributed Analytics,Cybersecurity And Digital Forensics
Big Data in Distributed Analytics,Cybersecurity And Digital Forensics
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 

Recently uploaded

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

Recently uploaded (20)

Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 

Role of Biometric in Reducing the Size of Big Data

  • 1. Role of Biometric in Reducing the Size of Big Data Manish Mathuria Asst. Prof., Dept. of IT Biyani Girls College, Jaipur
  • 2. Contents • Objective • Introduction • Need of Data Reduction • 6Vs of Big Data • Methodology • Experiment and Result • References
  • 3. Objective • The main objective the research is to analyze the role of biometric in reducing the size of big data.
  • 4. Introduction • Biometric devices are not only use for security but it is also use to present personal identification. Everybody in this world have unique biometric features, these biometric features provides the person availability with the certain conditions. • The digital world today is totally based on Authentication and Authorization which sincerely need to focus on availability on time, where growth in data tends to become Big Data. • Unique Record entry in database no doubt reduces the duplicity but still same attribute values are require to present again and again for person identification. • The Biometric Authentication is a solution to this problem, here the multiple attributes like (Name, Father’s Name, Mother’s Name, Hometown, etc.) values by single biometric feature like(Fingerprint, Face Image, Iris Scan, etc).
  • 5. Need for Data Reduction • Big Data Systems include social media data aggregators industrial senor networks, scientific experimental systems, connected health, and several other application areas. • The data collection from large-scale local and remote sensing devices and networks, Internet-enabled data streams, and/or devices, system and networks-logs bring massively heterogeneous, multi format, aggregated, and continuous big data stream. • Effectively handling the big data stream to store, index, and query the data sources for lateral data processing are among the key challenges being address by researchers.
  • 6. 6 Vs of Big Data • Volume: The data size characterizes the volume of big data. • Velocity: The velocity of big data is determined by the frequency of data streams which are entering in big data systems. • Varity: It collects data stream from multiple data sources which produce data streams in multiple formats. • Veracity: The utility of big data systems increases when the data streams are collected from reliable and trustworthy sources. • Variability: Since all data sources in big data systems do not generate the data streams with same speed and same quality. • Value: The value property of big data defines the utility, usability, and usefulness of big data systems.
  • 7. Literature Review: Big Data Reduction Method • The research done by Muhammad Habib and Prem Prakash Jayaraman, on “Big Data Reduction Methods”, gave this idea to use Biometric in Reducing the size of Big Data. • Data Reduction methods for big data vary from pure dimension reduction technique to: – compression based data reduction methods – algorithms for preprocessing – cluster-level data deduplication – redundancy elimination – implementation of network (graph) theory. • The dimension reduction techniques are useful to handle the heterogeneity and massiveness of big data by reducing millions-variable data into manageble size.
  • 8. Literature Review: Big Data Challenges • Shafagat Mahmudova form IIT published the research titled ‘Big Data Challenges in Biometric Technology’. – The study provides information about big data and advanced cloud technologies in the field of biometric technology. – The big data contain three types of High speed and large volume of data: • Structured Data: relational data • Semi structured data: XML data • Unstructured data: Word, PDF and others.
  • 9. Literature Review: Big Data with Biometric • Through the use of Big Data Technologies, Japanese developers began to apply the software to recognize the person in the black lit of buyers of some stores, who ware identified as thieves or complaints. • The police in Tampa, Florida State use Big Data Technology called Superbowl XXXV software to identify criminals basing on the scanned image of face. • Universities and airports in US also use Big Data in the field of Biometric Technologies for the identification of people, recognition with Big Data Technologies.[1] • Lambda labs uses its Big Data Technology used for face recognition software for Google Glass. [2]
  • 10. References 1. “Big Data Challenges in Biometric Technology”, Shafagat Mahmudova, IJEME. 2016. 2. “Deep Learning application and challenges in big data analytics”, Chunyan Q. Wei Z.,Journal of Big Data, USA, 2015. 3. “Big Data Reduction Methods: A Survey”, Muhammad Habib, University of Malaya, Malaysia, Springer, 2016. 4. Cloud based Big Data Analytics Framework for Face Recognition in Social Networks using Machine Learning, Vinay A, Rituparna J, ISBCC, 2015.