{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T04:50:20Z","timestamp":1750913420268,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905099","type":"proceedings-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T12:17:16Z","timestamp":1472473036000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Big data and ICT applications"],"prefix":"10.1145","author":[{"given":"Rachita","family":"Misra","sequence":"first","affiliation":[{"name":"C. V. Raman College of Engineering, Bhubaneswar"}]},{"given":"Bijayalaxmi","family":"Panda","sequence":"additional","affiliation":[{"name":"C. V. Raman College of Engineering, Bhubaneswar"}]},{"given":"Mayank","family":"Tiwary","sequence":"additional","affiliation":[{"name":"C. V. Raman College of Engineering, Bhubaneswar"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2481244.2481246"},{"key":"e_1_3_2_1_2_1","unstructured":"http:\/\/www.etltools.net\/etl-tools-comparison.html retrieved on 14.11.2014  http:\/\/www.etltools.net\/etl-tools-comparison.html retrieved on 14.11.2014"},{"key":"e_1_3_2_1_3_1","unstructured":"Han J. Kamber M. and Pei. J. 2012 Data Mining concept and Techniques Elsevier.   Han J. Kamber M. and Pei. J. 2012 Data Mining concept and Techniques Elsevier."},{"key":"e_1_3_2_1_4_1","article-title":"Study on Big data with Data Mining","volume":"4","author":"Shobana V","year":"2015","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2481244.2481247"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2481244.2481248"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2481244.2481249"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2481244.2481250"},{"key":"e_1_3_2_1_9_1","unstructured":"Sahoo A. K. Sahoo K. S. and Tiwari M. 2014 GPU based Parsing and Searching of XML Document for Multimedia data using MapReduce Approach IEEE CALCON Kolkata  Sahoo A. K. Sahoo K. S. and Tiwari M. 2014 GPU based Parsing and Searching of XML Document for Multimedia data using MapReduce Approach IEEE CALCON Kolkata"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Sahoo A. K. Sahoo K. S. and Tiwari M. 2014 Signature based Malware Detection for Unstructured Data in Hadoop published in IEEE sponsored conference ICCDAC Bangalore.  Sahoo A. K. Sahoo K. S. and Tiwari M. 2014 Signature based Malware Detection for Unstructured Data in Hadoop published in IEEE sponsored conference ICCDAC Bangalore.","DOI":"10.1109\/ICAECC.2014.7002394"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Panigrahi C.R. Tiwari M Pati B. and Prasath R. 2014 Malware Detection in Big Data Using Fast Pattern Matching: A Hadoop based Comparison on GPU published in MIKE Ireland published in springer lncs  Panigrahi C.R. Tiwari M Pati B. and Prasath R. 2014 Malware Detection in Big Data Using Fast Pattern Matching: A Hadoop based Comparison on GPU published in MIKE Ireland published in springer lncs","DOI":"10.1007\/978-3-319-13817-6_39"},{"key":"e_1_3_2_1_12_1","unstructured":"Jaseena K.U. Julie M. David 2014 Issues challenges and solutions:big data mining: NeTCoM CSIT GRAPH-HOC SPTM - pp. 131--140.  Jaseena K.U. Julie M. David 2014 Issues challenges and solutions:big data mining: NeTCoM CSIT GRAPH-HOC SPTM - pp. 131--140."},{"key":"e_1_3_2_1_13_1","unstructured":"The role of big data for ICT monitoring and for development measuring the Information Society Report 2014 pp-173--212  The role of big data for ICT monitoring and for development measuring the Information Society Report 2014 pp-173--212"},{"volume-title":"ISSUE: 04","year":"2015","author":"Sin K.","key":"e_1_3_2_1_14_1"},{"first-page":"261","volume-title":"2013 International Conference on Cyber-Enabled distributed Computing and Knowledge Discovery (CyberC)","author":"Dennis A.","key":"e_1_3_2_1_15_1"},{"first-page":"131","volume-title":"IEEE CYBERNETICSCOM","author":"Ahrary A.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Kumar S. Toshniwal D. 2015A data mining framework to analyze road accident data journal of Big Data 2015 2:26  Kumar S. Toshniwal D. 2015A data mining framework to analyze road accident data journal of Big Data 2015 2:26","DOI":"10.1186\/s40537-015-0035-y"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bdr.2015.02.005"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bdr.2015.03.001"},{"key":"e_1_3_2_1_20_1","unstructured":"http:\/\/www.predictiveanalyticstoday.com\/bigdata-platforms-bigdata-analytics-software\/  http:\/\/www.predictiveanalyticstoday.com\/bigdata-platforms-bigdata-analytics-software\/"},{"key":"e_1_3_2_1_21_1","unstructured":"Ravi V. Advances in banking technology and management: Impact of ICT and CRM Institue for development and research in Banking technology.   Ravi V. Advances in banking technology and management: Impact of ICT and CRM Institue for development and research in Banking technology."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Lee W. J. Lee. Y. J. and Kim. H. K. 2003 Discovering Temporal Relation Rules Mining from Interval Data EurAsia-ICT2002   Lee W. J. Lee. Y. J. and Kim. H. K. 2003 Discovering Temporal Relation Rules Mining from Interval Data EurAsia-ICT2002","DOI":"10.1007\/3-540-36087-5_7"},{"key":"e_1_3_2_1_23_1","unstructured":"http:\/\/edtechreview.in\/trends-insights\/insights\/959-advantages-of-using-ict-in-learning-teaching-processes  http:\/\/edtechreview.in\/trends-insights\/insights\/959-advantages-of-using-ict-in-learning-teaching-processes"},{"key":"e_1_3_2_1_24_1","unstructured":"Hara N. 2008. Students' perspectives in a web-based distance education course.  Hara N. 2008. Students' perspectives in a web-based distance education course."},{"key":"e_1_3_2_1_25_1","unstructured":"Mungania P. (2003). The seven e-learning barriers facing employees:  Mungania P. (2003). The seven e-learning barriers facing employees:"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/08923640109527081"},{"key":"e_1_3_2_1_27_1","unstructured":"Saurabh A. Ghogare P. and Monga M. 2015 \"E-Agriculture\" Introduction and Figuration of its Application 2015 Volume 5 Issue 1 International Journal of Advanced Research in Computer Science and Software Engineering)  Saurabh A. Ghogare P. and Monga M. 2015 \"E-Agriculture\" Introduction and Figuration of its Application 2015 Volume 5 Issue 1 International Journal of Advanced Research in Computer Science and Software Engineering)"},{"volume-title":"A2013","year":"2013","author":"Ludena R.D.A.","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Ochiai H.; Ishizuka H.; Kawakami Y.; Esaki H. 2010 \"A field experience on DTN-based sensor data gathering in agricultural scenarios \" in Sensors 2010 IEEE vol. no. pp. 955--958 1-4 Nov. 2010.  Ochiai H.; Ishizuka H.; Kawakami Y.; Esaki H. 2010 \"A field experience on DTN-based sensor data gathering in agricultural scenarios \" in Sensors 2010 IEEE vol. no. pp. 955--958 1-4 Nov. 2010.","DOI":"10.1109\/ICSENS.2010.5690899"},{"key":"e_1_3_2_1_30_1","first-page":"1","volume-title":"7th IEEE Conference on Polymers and Adhesives in Microelectronics and Photonics. PORTABLE-POLYTRONIC","author":"Kristensen M.D.","year":"2008"},{"key":"e_1_3_2_1_31_1","unstructured":"Using ICT to Improve Traffic Management VICTORIAN GOVERNMENT PRINTER June 2014 PP No 332 Session 2010-14)  Using ICT to Improve Traffic Management VICTORIAN GOVERNMENT PRINTER June 2014 PP No 332 Session 2010-14)"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2014.6"},{"issue":"99","key":"e_1_3_2_1_33_1","first-page":"1","article-title":"Assessment of the Suitability of Fog Computing in the Context of Internet of Things,\" in Cloud Computing","author":"Sarkar S.","year":"2015","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2015.47"},{"key":"e_1_3_2_1_35_1","unstructured":"Panigrahi C. R. Tiwari M. Pati. B. and Das H. \"Big Data and Cyber Foraging: Future Scope and Challenges by Techniques and Environments for Big Data Analysis visualized in SpringerLink  Panigrahi C. R. Tiwari M. Pati. B. and Das H. \"Big Data and Cyber Foraging: Future Scope and Challenges by Techniques and Environments for Big Data Analysis visualized in SpringerLink"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905099","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905099","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:54:02Z","timestamp":1750222442000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905099"}},"subtitle":["A study"],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":35,"alternative-id":["10.1145\/2905055.2905099","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905099","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}