II-Sem-BIG DATA ANALYTICS
II-Sem-BIG DATA ANALYTICS
II-Sem-BIG DATA ANALYTICS
CREDITS: 3
OBJECTIVE:
To understand the computational approaches to big data analytics
To understand the various search methods and visualization techniques
To learn to use various techniques for mining data stream
To understand the applications using Map Reduce Concepts.
UNIT IV - FRAMEWORKS 9
Applications on Big Data Using Pig and Hive – Data processing operators in Pig – Hive
services – HiveQL – Querying Data in Hive - fundamentals of HBase and ZooKeeper -
IBM InfoSphereBigInsights and Streams.
REFERENCES:
1. Frank J Ohlhorst, “Big Data Analytics: Turning Big Data into Big Money”, Wiley and
SAS Business Series, 2013.
2. Colleen Mccue, “Data Mining and Predictive Analysis: Intelligence Gathering and
Crime Analysis”, Elsevier, Second Edition, 2015.
3. Michael Berthold, David J. Hand, “Intelligent Data Analysis”, Springer, Second
Edition, 2007.
4. AnandRajaraman and Jeffrey David Ullman, “Mining of Massive Datasets”,
Cambridge University Press, 2014.
5. Bill Franks, “Taming the Big Data Tidal Wave: Finding Opportunities in Huge Data
Streams with Advanced Analytics”, Wiley and SAS Business Series, 2012.
6. Paul Zikopoulos, Chris Eaton “Understanding Big Data: Analytics for Enterprise
Class Hadoop and Streaming Data”, McGraw Hill, 2012.
7. Paul Zikopoulos, Dirk de Roos, Krishnan Parasuraman, Thomas Deutsch , James
Giles, David Corrigan, “Harness the Power of Big data - The big data platform”,
McGraw Hill, McGraw-Hill Osborne Media, 2012.
8. Glenn J. Myatt, “Making Sense of Data I: A Practical Guide to Exploratory Data
Analysis and Data Mining”, John Wiley & Sons, Second Edition, 2014.
9. Pete Warden, “Big Data Glossary”, O‟Reilly, 2011.
10. Jiawei Han, Micheline Kamber “Data Mining Concepts and Techniques”, Elsevier,
Third Edition, 2011.
11. Tom White “Hadoop: The Definitive Guide” Third Edition, O’reilly Media, 2012
12. William Stallings, “Crpyptography and Network security: Principles and Practices”,
Pearson/PHI, 5th Edition, 2010.
13. Mark Talabis, Robert McPherson, I Miyamoto and Jason Martin, “Information
Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big
Data”,Syngress Media, U.S., 2014.