Research Paper | Computer Science & Engineering | India | Volume 6 Issue 1, January 2017
Internet of Things & Creation of the Fifth V of Big Data
Shaurya Shekhar
The Internet of Things (IoT) is a term widely used nowadays to refer to the development of an intrinsic network of objects and appliances with Internet connectivity, which allows them to send and receive data. All of this data can be collectively referred to as Big Data, which basically comprises of large data sets and can be analyzed computationally to reveal patterns and trends relating to human behavior and interactions. In addition to the existing 4 Vs of Big Data (namely Volume, Variety, Velocity and Veracity), we can then derive a fifth V, called Value, which will help in engineering products better suited for a wider group of customers. Thus, we create a loop by connecting IoT (for sourcing of data) to Big Data (collection of data) to creating value from it and then back to IoT (for designing products with better functionality and greater acceptance).
Keywords: Big Data, Database, Data Security, Information, Value, Veracity, Velocity
Edition: Volume 6 Issue 1, January 2017
Pages: 1363 - 1366
How to Cite this Article?
Shaurya Shekhar, "Internet of Things & Creation of the Fifth V of Big Data", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20164394, Volume 6 Issue 1, January 2017, 1363 - 1366
113 PDF Views | 92 PDF Downloads
Similar Articles with Keyword 'Big Data'
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016
Pages: 1345 - 1350Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks
Kapilesh S. Swami, Dr. P Sai Kiran
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2241 - 2244Backup Anomaly Identification with R and Hadoop
Ravindra Phule, Madhav Ingle
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017
Pages: 1363 - 1366Internet of Things & Creation of the Fifth V of Big Data
Shaurya Shekhar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1598 - 1602Information Acquisition Utilizing Parallel Rough Set and MapReduce from Big Information
Sachin Jadhav, Shubhangi Suryawanshi
Informative Article, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016
Pages: 1482 - 1485Overview of Big Data
Nivedita Manohar
Similar Articles with Keyword 'Database'
Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021
Pages: 61 - 70Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution
Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 886 - 889Survey on Algorithms Predicting Performance of Keyword Queries
Snehal Borole
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 823 - 826Survey Paper on Users Location Hiding In Geosocial Recommendation Applications
Mayura Phadnis, Kanchan Varpe
Research Paper, Computer Science & Engineering, Kenya, Volume 7 Issue 5, May 2018
Pages: 1409 - 1411Students Performance Prediction Using FP-Tree Data Mining Techniques
Eliakim Ombati Akama
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1165 - 1168Privacy Preserving Closed Frequent Pattern Mining
Anju Vijayan
Similar Articles with Keyword 'Data Security'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1833 - 1836A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing
Roshan M. Kawale, Bharti L. Dhote
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016
Pages: 1345 - 1350Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks
Kapilesh S. Swami, Dr. P Sai Kiran
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 2084 - 2088Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission
Shital Gawahale, Rekha Jadhav
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 1949 - 1953A Review: Data Security and Privacy Advancement Approach on Webos with Desktop-As-A-Service
Pooja Saini, Kanchan Narula
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017
Pages: 1363 - 1366Internet of Things & Creation of the Fifth V of Big Data
Shaurya Shekhar
Similar Articles with Keyword 'Information'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1375 - 1390A Survey of Thinning Techniques on Two Dimensional Binary Images
Moumita Sarkar, Santanu Chatterjee
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 700 - 705Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects
Kale Jyoti S
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1789 - 1791The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence
Vina Lomte, Saloni Shah
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Similar Articles with Keyword 'Value'
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 338 - 384Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm
Dr. Niju P. Joseph, Dr. Priyanka Surendran
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Research Paper, Computer Science & Engineering, Sweden, Volume 9 Issue 12, December 2020
Pages: 1137 - 1139Predicting Diabetes using Gradient Boosting is a Machine Learning Technique
Ali Adam Mohammad
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 315 - 318Cloud Computing - A Birds Eye View
S.Kalaiselvi, S.V.Revathi
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Similar Articles with Keyword 'Veracity'
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017
Pages: 1363 - 1366Internet of Things & Creation of the Fifth V of Big Data
Shaurya Shekhar
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017
Pages: 2088 - 2094Data Balancing Scheme for Multi-node Heterogeneous Hadoop Cluster
Indresh B. Rajwade, Er. Prateek Singh
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2913 - 2915Lightning Fast Distributed Machine Learning Framework
Madhu Sudhan H V
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 1, January 2014
Pages: 39 - 41Evaluation of Similarities Measure in Document Clustering
Hemalatha Immandhi
Similar Articles with Keyword 'Velocity'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1888 - 1891Lightning CEP - Joining on High Velocity Stream
Vikas Kale, Kishor Shedge
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2161 - 2168Vision Based Fire Flame Detection System Using Optical flow Features and Artificial Neural Network
Anila R. Kurup
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017
Pages: 1363 - 1366Internet of Things & Creation of the Fifth V of Big Data
Shaurya Shekhar
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016
Pages: 2111 - 2114An Efficient Clustering for Data Aggregation with Reliable Routing in WSN
Sneha Kamble, Tanuja S. Dhope
Informative Article, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2027 - 2029Speed-Constrained Multi-Objective PSO for Optimization of Problem
Prachi Gupta, Dr. Ramachandra Pujeri