Saturday, December 28, 2019
Term Papers on Sexual Orientation in Jail/Prison of LGBT People
Though LGBT (Lesbian, gay, bisexual and transgender) prisoners face challenges which other prisoners face, sexual orientation, prejudice and gender identity makes the challenges to be more difficult for them. Other human rights violations faced by LGBT persons include: physical and mental integrity rights, freedom of association and that of expression, laws that are discriminating and application of laws in a discriminatory manner (Forsyth et al, 2002). Though most of the unique challenges that LGBT prisoners face have not received extensive litigation, those that have already been litigated might receive a significant change, if the Supreme Court makes a decision that is relatively still. It becomes hard to make a prediction of the claims outcomes. The combination of the unpredictability, transphobia and homophobia may interfere with the decisions that juries and judges make, meaning that, when LGBT prisoners bring their claims in court, they face so many challenges (Kupers, 2010). This makes most of the LGBT prisoners to contact LGBT impact litigation organizations in order to find out whether the organizationââ¬â¢s lawyers would have the willingness to take their case especially if one wants to introduce new theories that are related to gender identity or sexual orientation (Haggerty, 2007). Transgender is a term that is used to refer to a broad spectrum of individuals who have different identity or lived experiences different to that which is typically associated with the one which is assigned when one is born (NCTE, 2011). It includes masculine women, cross dressers, feminine men, and persons experiencing intersex conditions, pre, post and non-operative transgendered people and persons who live partly or fully as a particular gender as opposed to what was assigned to them when they were born. Gender identity is a term that is used to describe the type of gender that one identifies as, be it the one assigned at birth or not (Haggerty, 2007). Discrimination and violence by both the government authorities and civilians against LGBT, has remained in most parts of the world. The accountability of the violence is directed to the perpetrators by the states, thus creating climate full of impunity (Smith, 2006). This is a violation of international standards of human rights, which call for the state to protect all its citizensââ¬â¢ human rights (Library Information and Research Service, 2006). Recent years have recorded violence patterns that include physical assault and murder that was particularly targeted to the gay and the transgender people in several countries. In most of the cases, the police did not bother to investigate, were complicit, or even did not hold the responsible ones accountable for their deeds (Smith, 2006). A double challenge that includes abuse and discrimination is faced by lesbians as a result of their sexual orientation and gender. Research done on correctional facilities on sexual abuse, has a consistent documentation that both women and men who are transgender individuals, those with heterosexual orientations and those with intersex conditions, have a high vulnerability to sexual abuse (NCTE, 2011). An example is a research done on Midwestern prisons sexual coercion, which documented that, LGBT inmates were represented in a disproportional manner among sexually victimized inmatesââ¬â¢ subgroup. The gay and bisexual men were 26 percent among the victimized men and the lesbian and bisexual women were 38 percent amongst the women. According to a research done by BJS (Bureau of Justice Statistics), sexual abuse vulnerability, is associated with certain characteristics which include gender identity and sexual orientation. The BJS youth in Juvenile facilities survey documented that in five non heterosexual youth, more than one reported of being sexually victimized by a facility staff or another youth. Almost a l ikelihood of ten times was reported by non-heterosexual youth as compared to heterosexual youth, of sexual abuse while in custody, by other youth (12.5% vs. 1.3%). County jails adult inmates in the same study confirmed that, being of another sexual orientation which is not heterosexual, made sexual orientation to increase significantly (Scribd, 2011). In other studies, transgender girls and women, show a high vulnerability to sexual abuse. This is more so when they are kept in the same facilities with boys and men. A study carried out in 2007 by Evidence Based Corrections of University of California showed that, among transgender inmates, sexual assault has more prevalence, with reports of sexual assault being 59%.à The study showed that, there was a higher likelihood of transgender victims than other victims to have experienced sexual assault on more than one occasion. The findings bring out the conclusion that, transgender people while compared to other populations which are relatively vulnerable, are perilously situated (Haggerty, 2007). This concern has led to the Correctional Health Care National Commission and the American Psychological Association to issue statements that recognize that there is a higher risk of transgender inmates to be abused and hence they should be protected. When LGBT people are sexually abused, their basic human rights are violated, the governmentââ¬â¢s obligation constitutionally to provide confinement conditions that are humane and safe is violated, and the successful transition likelihood of giving back into the community is impeded (Robinson, 2011).à If the commissionââ¬â¢s standards are implemented, the safety of the people has a potential to be improved, this includes the LGBT people, who have an involvement in the justice system. In order to fight sexual abuse among LGBT, the officials of correctional facilities should ensure that, a zero tolerance approach to any kind of sexual abuse is observed as well as clear protocols are put in place in order for an occurrence of sexual abuse to be responded to effectively (Forsyth et al, 2002). These provisions can be of more importance to LGBT individuals who are more vulnerable to sexual abuse since any reports they make of being sexually abused are treated with minimum seriousn ess as compared to those of non LGBT inmates and an appropriate response is not given (Smith, 2006). Correctional officials should also appropriately coordinate with outside entities, in order to promote reporting of such cases, investigation and sexual abuse prosecution in their facilities. When employees, contractors, volunteers and inmates are trained and educated, they get the knowledge of preventing, detecting and responding to sexual abuse incidents (Robinson, 2011). A well crafted and comprehensive training is important when it comes to fostering people to understand better, correct the misconceptions related to LGBT persons and assist staff and inmates with the right strategies in order to improve the safety of LGBT (Library Information and Research Service, 2006). à When training the staff, effective and professional communication strategies with inmates are important. Correctional facilities should also ensure that, screening for sexual victimization and abuse risk, as well as residentsââ¬â¢ assessment and placement is done. This is to make sure that each personââ¬â¢s particular victimization risk is known by the facilities, and that every inmateââ¬â¢s genital status, or gender identity or sexual orientation, does not make the person to be more subjected to conditions that are more punitive (Human Rights Watch Stern, 2008). Due to high vulnerability of sexual abuse to LGBT inmates, there should be a bisexual sexual orientation or gay inclusion and gender nonconformance for instance, intersex identity or transgender in the male inmates screening criteria for victimization risk in adult jails and prisons (Robinson, 2011). Since during screening some of the LGBT individuals may opt not to reveal their gender identity and sexual orientation, the inmatesââ¬â¢ vulnerability self perception in the female and male inmates screening should be included. Another importance of sexual victimization and abuse risk screening and residents assessment and placement, is to prohibit vulnerable segregation of inmates except on temporary basis or only as a last resort, and also the equal access requirement to services and programs, cannot receive more emphasis (Resnik, 1982). The specific requirement in sexual victimization and abuse risk screening is that LGBT and other inmates who are gender nonconforming should not be placed in specific units, facilities or wings on the sole basis of genital status, sexual orientation or gender identity. This will help in prevention of LGBT inmatesââ¬â¢ segregation (Congress, 1998). The LGBT involuntary segregation and that of other inmates who are gender nonconforming, denies them the access they need to services, programs and the ability of moving around the facility in a manner that they are supposed to, and thus this leads to punishment. It is harmful and unjust to punish people as a resul t of their vulnerable status; it makes the LGBT inmates to be more biased and also gives a discouragement in receiving honest responses during question screening (Smith, 2006). Another way that officials in correctional facilities can beat LGBT sexual abuse is by addressing the reporting and official response standards (Scribd, 2011). The reasons why inmates refuse to report cases of sexual abuse are; they wonââ¬â¢t be taken seriously, they might not be kept confidential, and/ or they wonââ¬â¢t result in positive consequences which are tangible (Human Rights Watch, 2010).à For LGBT individuals, the above concerns are truer as they are presumed wrongly, as sexual abuse instigators and as persons who do not deserve credit from the assault reports. Investigations and discipline standards should also be introduced in order to ensure that all abuse allegations that include reports by anonymous or third party are investigated fully and that there is proper handling of substantiated allegations in the criminal and administrative proceedings. Perpetrators who normally target to abuse LGBT inmates most of the time act with impunity (Miller et al, 2010).The provision of the discipline and investigations standards will make it able for LGBT inmatesââ¬â¢ sexual abuse cases to be treated with seriousness as any other sexual abuse would be. In order to assist staffââ¬â¢ identify the victimization risk of an inmate, health care both medically and mentally should be given (Loue, 2008). Mental and medical health care also protects inmates from burdens and financial incentives which are not due through ensuring that they receive for free, emergency, mental and medical health care. These provisions also ensure that victimsââ¬â¢ responsive services are in the same level as those offered in the community. They are also important as LGBT inmates may be more comfortable while they tell a medical or a mental staff about a certain abuse or an abuse fear and hence the basic care level should be accessible to sexual abuse survivors in the community (Loue, 2008). In order to improve prevention, detection, practices, response policies and training, agencies should collect information and review it not leaving behind the incident based and the aggregate information (Resnik, 1982). The standards of data collection and review, help agencies to identify victimization patterns, learn from problems which have occurred in the past and improve LGBT protections and other inmates who are vulnerable. Due to the high risk of sexual abuse to LGBT inmates, they need to be given more supervision that would make them feel more protected other than punished (Miller et al, 2010). This is by observing them continuously by both sight and sound. Supervision does not mean camera over reliance but the use of cost effective and appropriate technology on the feasibility assessment and plan basis that accounts for the financial limitations of an individualââ¬â¢s jurisdictionsââ¬â¢. Using this flexible approach is different to using local expertise and analysis therefore it would impose fewer expenses on facilities (Messinger Morrow, 2006). According to the survey conducted by BJS, most sexual abuse is conducted by the opposite sex staff members showing the need of minimizing the contact that inmates haveà physically with the opposite sex staff.à Instead of limiting the cross gender supervision in every area that the inmates perform bodily functions or undress, actual viewing of the opposite gender inmates should be prohibited only exceptional to emergencies or in circumstances that are unforeseen or extraordinary (Human Rights Watch, 2010). This is contrary to some corrections officials concerns, as the requirements require low cost solutions, which do not require additional hiring and which abide to the employment law. The BJS study showed that cross gender sexual abuse by the staff, was high in menââ¬â¢s facilities and so its important to put these basic measures in both the menââ¬â¢s and womenââ¬â¢s institutions as well. To avoid viewing inmates as they conduct their bodily duties, opposite gender off icials should make announcements before they make an entrance to the dormitory area (Messinger Morrow, 2006). Towels can also be provided for the inmates so that while in the toileting and showering areas, basic privacy can be allowed without security compromise.à While conducting intrusive searches which demand physical contact or bodily exposure, limitation to areas that act as contraband potential contact points, should be done. Staff should not be allowed to carry out pat searches anywhere in the facility but they should be done at the right places as this will reduce contraband confiscation (Human Rights Watch Stern, 2008). When the cross gender basic limitations of viewing and searching are observed, the LGBT inmates and other inmates who are vulnerable are protected from sexual abuse by staff. Since the corrections culture is pervaded by transphobia and homophobia, it is good to conduct outside review (Kupers, 2010). This is vital in LGBT inmates and residents protection.à A sound oversight that is done by an independent entity that is qualified can identify the problems which are systemic at the same time offering solutions which are effective (Congress, 1998). When the oversight monitoring is done in a proper manner, a facilityââ¬â¢s safety credible objective assessment can be provided; this is by problems identification which may be apparently ready to an independent monitor as compared to an official who works in the detention system. In case the systems do not meet the required standards, then they are held accountable; another advantage of having outside monitoring (Human Rights Watch, 2010). It is also important to have judicial oversight. In case the officials do fail the LGBT inmatesââ¬â¢ protection from being sexually abused, the victims should be able t o access the judiciary without facing the procedural and unrealistic requirements barriers (Smith, 2006). Every individual whether LGBT or straight has his or her own human rights. The state should therefore look into these rights to avoid violation. References Congress. (1998). Congressional Record, V. 144, Pt. 13, July 31, 1998 to September 8, 1998. Washington D.C, DC: Government Printing Office. Forsyth, C. J., Evans, R. D., Foster, D. B. (2002). An Analysis of Inmate Explanations for Lesbian Relationships in Prison. Retrieved from http://www.yorku.ca/irjs/Archives/F20/F204.pdf on July 22. Haggerty, G. E. (2007). A companion to lesbian, gay, bisexual, transgender, and queer studies. Hoboken, NJ: John Wiley and Sons. Human Rights Watch (Organization)., Stern Jessica.(2008). These everyday humiliations: violence against lesbians, bisexual women, and transgender men in Kyrgyzstan. Washington D.C, DC: Human Rights Watch. Human Rights Watch. (2010). World Report 2011: United States. Retrieved from http://www.hrw.org/en/world-report-2011/united-states on July 22. Kupers, T. A. (2010). The Role of Misogyny and Homophobia in prison Sexual Abuse. 18 UCLA Womenââ¬â¢s L. J. Vol.107. Library Information and Research Service. (2006). The Middle East, abstracts and index, Part 4. Northumberland, PA: Northumberland Press. Loue, S. (2008). Health issues confronting minority men who have sex with men. Columbus, GA: Springer.à à à à Messinger, L., Morrow, D. F. (2006). Case studies on sexual orientation and gender expression in social work practice. New York, NY: Columbia University Press. Miller, A. M., Rose man, M. J., Friedman, C. (2010). Sexual Health and Human Rights: United States Canada. Retrieved from http://www.ichrp.org/files/papers/178/140_Miller_Roseman_Friedman_uscan_2010.pdf on July 22. NCTE. (2011). Advancing Transgender Equality. Retrieved from http://transgenderequality.wordpress.com/ à on July 22. Resnik, J. (1982). Womenââ¬â¢s Prisons and Menââ¬â¢s Prisons. Should prisoners be classified by sex? Review of Policy Research. Volume 2, Issue 2, 246-252, November 1982. Robinson, R. K. (2011). Masculinity as Prison: Race, Sexual Identity and Incarceration. Retrieved from http://docs.google.com/viewer?a=vq=cache:eeM-s7ahzYIJ:www.law.yale.edu/documents/pdf/Intellectual_Life/Liman_Workshop_Spring_2011_Syllabus_Updated_4_25_11.pdf+masculinity+as+prison:+racesexual+identity+and+incarceration+by+Russellhl=engl=kepid=blsrcid=ADGEESiY7-3k2N7SPLClZdt0EytlGv-W8wvYtrmTAWHOlTnPJ6ZlEJdLSjX0RO9QlThQYEehgKhB9QxFZuf4c8nCBMfKyCVizUwnvfiQYofmcWzi-T5rSk9u81Y33ssS_Am4yKU7owrWsig=AHIEtbTyfu3TSHfCawKjPrCkTMPqGaBWvw on July 22. Scribd. (2011). National Standards To Prevent, Detect, and Respond to Prison Rape.à https://www.scribd.com/document/54225566/National-Standards-To-Prevent-Detect-and-Respond-to-Prison-Rape on July 22. Smith, B. V. (2006). Rethinking Prison Sex: Self Expression and Safety. Columbia Journal of Gender and Law, Vol. 15, p. 185.
Friday, December 20, 2019
The Gravitational Slingshot Essay - 1567 Words
The Gravitational Slingshot The gravitational slingshot is a way that scientists have truly harnessed the gravitational pull of a planet by using it to launch satellites and other useful projectiles towards their desired locations. This method was developed through the use of Newtons Laws of Gravity and Keplers Laws of Planetary Motion. When these ideas of gravity and the shape of a planets orbit were brought together piece by piece, this new theory changed how a projectile traveling through space could simply cross an orbital pattern, which would in turn change the path of the moving object. The change in the path accelerates the object at a higher rate and sends it speeding off in its proper direction. The gravitationalâ⬠¦show more contentâ⬠¦Kepler established the Laws of Planetary Motion. The first Law states that the orbit of every planet is an ellipse with the Sun at one of the two foci. The second law states that a line joining a planet and the Sun sweeps out equal areas during equal intervals of time. And the final Law tells that the square of the orbital period of a planet is directly proportional to the cube of the semi-major axis of its orbit. Keplers Laws also come into play with the use of the gravitational slingshot, because Kepler believed that the orbit that a planet takes around another body follows an elliptical pattern, instead of traveling in a perfect circle. Of course each planet has a specific elliptical orbit, just as humans have different fingerprints to identify them. Before launching their equipment into space, each planet must have its pattern identified to ensure accurate results for the launch. This knowledge helps scientists identify where the ellipses are in relation to the paths of orbit so that they can launch satellites in the proper direct, at the proper time, with the proper velocity. Combining both of these sets of theories together has lead the way to the effect we know as the gravitational slingshot effect. Today, the gravity assist effect is used extremely often by NASA and the Air Force. It is the most fuel efficient, naturally occurring ââ¬Å"boosterâ⬠inShow MoreRelatedShort Story1289 Words à |à 6 Pagesdata in Johnnaââ¬â¢s density and gravitational force data from his space telescope. I did the calculation. Itââ¬â¢s coming right towards us.â⬠ââ¬Å"What! How!?â⬠ââ¬Å"This object is denser and bigger that we thought and based on the calculations of Jupiterââ¬â¢s gravitational pull and the density of the objectâ⬠¦.It is heading towards us.â⬠ââ¬Å"Shit!. How much time do we have to stop it?â⬠ââ¬Å"Ummâ⬠¦.the object already exited Jupiterââ¬â¢s gravitational field and its gravitational pull has made it slingshot towards us faster than beforeRead MoreRelativity Essay1956 Words à |à 8 Pages Picture two cars, traveling in the same direction at the same rate, Car Aââ¬â¢s driver has a slingshot while Car Bââ¬â¢s driver has a laser pointer. At the exact same instant both fire in the direction of travel. If you were to measure the speed of the projectile that was fired from the slingshot it would measure v+vââ¬â¢ where v= the velocity of the car and vââ¬â¢= the velocity the projectile would have if the slingshot were at rest relative to the observer. However this is not the same for the beam of light firedRead MoreSolar System Formation Essay1857 Words à |à 8 Pageswith the area of higher mass at the center. Due to the inverse square law of gravity, the gravitational pull of the center mass only increased as the radius of the nebula shrank. The small er the nebula became the more dense and hot the center turned. Three distinct things happened as the nebula decreased in size: One, Due to the properties of conservation of energy, as the cloud shrunk the gravitational potential energy of the particles within transformed into thermal energy; two, due to conservationRead MoreLeadership on Apollo 13 Essays749 Words à |à 3 Pagesso-called explosion sent Apollo 13 spinning away from the Earth at 2,000 miles per hour, 75 percent of the way to the moon. In order to get the astronauts back to the Earths atmosphere would be to utilize the moons gravitational pull and send them back towards home, like a slingshot. However, this procedure would require three days, and this demanded more oxygen and electricity than the crew had available to them. Eugene Gene Kranz, head of this flight mission, although looking on in horrorRead MoreEssay on Human Factors in Long-Duration Spaceflight1162 Words à |à 5 Pagesfactors challenges the crew will face, describe why they are so dangerous, and finally, iden tify ways to mitigate these challenges. The first challenge in a long-duration spaceflight is almost immediately apparent after lift-off, leaving the gravitational pull of Earth, and entering a micro gravity environment. Weightlessness can have several different impacts on the human body. Astronauts who orbit the Earth on the International Space Station (ISS) already experience these effects, and thoseRead MorePhysics Of Kicking A Soccer Ball1353 Words à |à 6 Pagessequence . The soccer ball won t ricochet much, yet the tennis ball will get the active vitality from both itself and the soccer ball and will blast upwards. This slingshot impact is even utilized by researchers to build the pace of satellites by having them just about slam into a major planet ââ¬â utilizing the planet s gravitational draw. Does Size/Weight Matter When Striking a Ball It is normally imagined that the bigger or taller a soccer player is, the harder they will kick. This is most certainlyRead MoreMeteors8010 Words à |à 33 Pagesa dense belt of such asteroids outside the orbit of the planet Mars, called the Asteroid Belt. Asteroids are huge in size and their lengths can number to kilometers! Once in a while, small pieces of rock or dust, come into range of Earths gravitational pull and fall on Earth as shooting stars. An asteroid dislodged from its trajectory and falling on Earth is also called a meteorite. However, an asteroid being huge in size, causes a cataclysmic explosion on Earth on impact. Origin Meteor andRead MoreMovie Review : Apollo 132667 Words à |à 11 PagesMission Control was split on what to do. Some thought it would be best to turn around immediately, while others thought this was too risky because the engines were likely damages, and that they should instead go around the moon using the gravitational pull to slingshot the LEM to Earth. However, there were problems with this approach also, the LEM was built to land on the moon with two men inside it, not support three men for an extended period of time. It was eventually decided that the best route would
Thursday, December 12, 2019
Gods Purpose for My Life free essay sample
To truly understand oneââ¬â¢s purpose in life he must look at the talents God has given to him in a particular field of study and comprehend how that occupation can be used to the glorification of God. The collection of this information isnââ¬â¢t always easy and usually requires a myriad of ââ¬Å"talksâ⬠with God in the form of daily Bible reading and prayer. I like to think God has given me a great mind for physiology and due to my interest in physiology and willingness to help those who need it I believe that God has called me to the medical profession. Much of my childhood I was exposed to natural medicines and I believe that God pre-ordained me to be placed in such an environment so I could use the information Iââ¬â¢ve accumulated to get a head start and peak my interest in the field of medicine. We will write a custom essay sample on Gods Purpose for My Life or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page In high school I worked at a natural alternative medicine store and it filled me joy every time I could recommend a product with no side effects to a sick customer. While working in that store it was amazing feeling to see how grateful people were to get a product that would relieve their ailments while not having to worry about any side effects. The way natural medicine is looked down on is the main problem with the medical profession, most medical professionals say that there is no real evidence that natural medicine is an effective form of treatment. I disagree and contend that considering Godââ¬â¢s hatred of seeing his creatures suffer God would not have placed us on this world without a way to care for ourselves naturally. Since so much money and time goes into becoming certified in the medical profession the monetary income is very important as well. Although I enjoy helping people with their medical needs foremost I also volunteer for food drives and housing projects to help others with their physical needs, if a person could not land a job suited to help other people while making enough income to live off of a hobby in volunteering would suffice well enough. The idea of study or travelling abroad is very enticing to me because I have always been interested in and wanted to experience other cultures. Since the world is in such a state of despair it would be my greatest aspiration to become registered and take my medical practice to other countries where such treatment is not readily available all the while witnessing to the lost so that they might have the hope and peace that my Savior provides for me. To uproot from the American society and embrace a culture in which the people are incredibly thankful for what we see as the insignificant things. God has given me two incredible, and loving parents who are both grounded in natural medicine so it was easy for me pick up on and because my interest in medicine began. I have not totally figured out what profession in the medical field I desire whether doctor, dentist, or pharmacist but I know God will lead me on the right path if I leave it in his hands. Since I was young I have always been a taller and more muscular than most of my friends so I always thought I would have a physically demanding job because it is all I really knew up until high school. This is all just speculation on my part but I feel like that is where God is calling me, to be completely sure will require much more prayer and meditation. Whatever Godââ¬â¢s plan for my life is I know I will be able to thrive in it with Godââ¬â¢s help, and I will willingly accept.
Wednesday, December 4, 2019
Briefing Paper Marking Guide - Big Data
Introduction In this briefing paper, the ICT topic Big Data will be reviewed from literatures. Big data is the new IT buzzword that refers to the voluminous data processed in different business processes in different industries around us. There is explosive growth of the volume of structured and unstructured data in last decades. In the early days of implementation of information technology in different kind of organizations had implemented databases for working with data related to their business processes, but in last few years, emergence of social media and ecommerce have accelerated the growth of data outside organization and from individuals. For example, over social media like Facebook, people uploads and shares heavy volumes of images, texts, videos from different parts of the world at the same time their location details, machine details etc. are also being circulated. Analysis of these type of data reveals several interesting information about peoples lifestyles, choices etc. and busines ses are very interesting for these type of information. Working with these kind of data using typical database management software and information technologies is difficult. Big data and technologies have given rise of a new dimension in this case. It covers all technologies that helps to address the volume and complexities of these voluminous data. (Madden, 2012) In this briefing paper, it will discuss about the technology, current research and trends on big data in details. The Problem As, it has been already told that, processing of volumes of structured and unstructured data, using traditional database management systems or data processing systems were difficult. This was the problem that led to the invention of big data concept and related technologies. (Madden, 2012) There is common confusion around the term big data, that is, whether it refers to technology or volume of data. When vendors use the term big data they generally refers to the technologies like processes and tools that helps in working with volumes of data efficiently. So, the term encompasses any collection of complex and larger data set that is difficult to handle by typical database management or data processing applications. It also covers up the collection of tools to support processing of such data through different kind of operations like searching, curation, sharing, transfer, storage, visualization etc. (Zikopoulos, 2011) Bid Data: Characteristics There are some characteristics of a dataset that makes it a Big data data set. Those characteristics are, A. Volume Volume refers to the quantity of data, generated from a process or system. The potential and value of a dataset is directly proportional to its volume. This characteristic is the first criteria to classify a dataset as big data or not. Even this concept has been reflected on the term Big data itself. (Marz Warren, 2014) B. Velocity This characteristic is related to the rate of generation of data or how fast data is getting generated or processed to provide desired outcome. C. Variety Big data takes data from heterogeneous sources into consideration while processing the same. Variety in data sets helps to analyze it from different aspects and in deriving different outcomes. D. Veracity Veracity of data sets refers to the captured quality of those. Veracity of a dataset plays significant role in the accuracy of the outcomes from analysis of the data sets. (Zikopoulos, 2011) E. Variability Variability refers to the levels on inconsistencies present in the data and that show up any time during processing. This may be problematic for data analysts. F. Complexity Managing the processing of big data, is a complex process by itself. It becomes more complex when data comes from heterogeneous sources and larger in volume. These kind of data is needed to be interlinked, correlated and connected. Otherwise it is difficult to work on these data. Big Data: Technologies Computation power and storage for larger datasets are not a serious problem now a days. Advancement in electronics and digital technologies have made these solutions more efficient, easily available and cheaper. This has helped in emergence of big data. There is a paradigm shift from computer architecture to the mechanisms in data processing. There is a growing demand for data mining and analysis applications for big data. (Barlow, 2013) There are wide range of tools and technologies that supports the concept of big data and analysis, processing of the same. There are technologies like crowdsourcing, A/B testing, data fusion etc. along with machine learning, natural language processing, time series analysis, integration, simulation, genetic algorithms, signal processing, visualization etc. Tensors are the representative of multidimensional big data. Tensor based technologies and computation methods like multi- linear sub space learning helps in this case. Other than that there are database related technologies, parallel processing support, search based application, distributed file systems and databases, data mining, cloud computing etc. and Internet that supports big data revolution. There are big data analytics that processes the big data and helps in finding out different patters out of it. These patterns gives critical insights into data sets. Storage is an important issue for big data. A proposed solution is distributed and shared storage. Storage area network or SANs, Networked Area storage or NAS etc. come into these categories. However, big data practitioners are not quite interested in these solutions. There are RDBMS based storage solutions for big data that is capable of storing petabytes of data. (Madden, 2012) All these technologies supports big data in analysis of data from web, analysis of network monitoring logs, click stream analysis etc. There are data science applications like simulations for massive scale analysis of data, deployment of sensors etc. Parallel database systems like Vertica, Teradta, Greenplum etc. are powerful but expensive and hard to administer. There are lack of fault tolerance levels in case of longer queries. Hadoop is a popular big data technology accepted worldwide. (Roebuck, 2011) Big Data: Process There are number of phases in data processing in big data. Those are explained as, 1. Data Acquisition Big data takes data that are evolving from different industries and scientific researches, demographics, social media and ecommerce. However, all data is not equally important for a particular goal so after collecting data, it will be filtered. Data are collected from systems, social media and numerous sources. There can be operational or transactional data, structured and unstructured data. When it comes to big data them all types of data irrespective or format and type are collected. Later on these data are filtered and compressed before processing. The most challenging part of data acquisition is, filtering out the unnecessary data. It must be done in a way so that useful information dont get discarded. Data science deals with numerous issues that helps to define different filters to ensure, accuracy and relevancy of collected data. (Marz Warren, 2014) For streaming data from online sources, it is not always possible to store and process those data to filter those later on. Rather it needs an on the fly approach to work on such streamlines of data from web. There are online data analytics applications and systems that helps in filtering and collected data from online streaming data. Next big challenge in to create metadata from acquired data. This is not easy. Meta data should give details about the sources and structure of data. There are metadata acquisition systems that can automatically record metadata without any human intervention. However, there are lots of things to do with metadata after recording those correctly. There is a pipeline for analysis of big data. Metadata is required in every stage of the pipeline. Thus acquisition of data refers to the collection of technologies, tools and processes of collecting data, filtering it and recording metadata of data at the same time without storing and processing data every time. 2. Cleaning and Extraction of information Data analysis needs some level of uniformity of data. Thus, after acquiring data, it is needed to be cleaned and ready for processing. Data analysis will require data in correct formant otherwise the results of the analysis will not be accurate and effective. It needs an information extraction process that will bring out the required information from the piles of data from heterogeneous sources. Then it should present the extracted data in a structured form. The process is technically challenging. For example, there are data like images and videos. Extracting information from these formats of data and presenting the same in structured format are really hard. A common misconception is, big data always provides truth. This is not the case all the time. The truthfulness of big data and analysis depends on these extraction steps. It depends on how effectively truth is getting extracted from raw data. There are different constraints on valid data and error models that are well recognized. However, till now there are many domain of big data where these constraints are still not available. 3. Integration, Aggregation and Representation of Data It has been already discussed that data comes from different heterogeneous sources. Those are no structured and in right format even. It is not possible to acquire and clean data then store the same in data repositories. There are processes like integration, aggregation of those data and then representing those in the right format to sore and process in future. Data analysis is a complex process. For large scale data analysis it is needed to have effective analysis and the process should be automated. In data analysis process, different semantics and data structures are needed to be expressed in correct formats that are readable by computers and can be resolved by robots. Data integration is important and there are additional works for making the data error free using automated system. There are different alternative solutions for storing data other than databases. Each of these alternatives have its own advantages and disadvantages. Designing database or correct storage solution is needed to be done very carefully. There are many decision making tools to provide assistance in designing databases. 4. Processing of Query, data modeling and analysis of data Making query in traditional databases and processing of query in big data, are fundamentally different. Big data contain volumes of dynamic, interrelated, heterogeneous data. These forms larger networks of interrelated data. There are higher level of data redundancy. These redundancies can be explored through validation, crosschecking etc. There are inherent clusters and these clusters reveals relationships among collections of data. (Roebuck, 2011) Data mining is a related topic here. It required, cleaned, integrated, trustworthy, easily accessible and effective data that can help in declarative query through data mining interfaces and computing environments. Big data supports provisions of interactive data analysis in real time applications. Scaling of complex queries is also supported. However, there is a problem with analysis of big data. That is lack of co- ordination in the systems that stores data, support SQL queries and analytics for performing non-SQL data processing, for example statistical analysis, data mining etc. 5. Interpretation Obtaining only results from analysis is not enough. It needs to explain or provide enough explanatory details about those results so that someone can interpret the results from analysis. There are visualizations used in this case. (Marz Warren, 2014) Challenges in Big data There are number of challenges in big data. Some of those are already explained in related contexts. Still, most prevailing challenges are, Heterogeneous sources and nature of data. Incompleteness in data. Problem with effective cleaning and extraction of data. Scale and volume of data. Timeliness of data. Privacy of data. (ene Polonetsky, 2013) Human collaboration needed in certain phases and lack of it in some cases. Lack of suitable and effective system architecture for big data only. Conclusion In this briefing paper, there is a discussion on an emerging topic in ICT, called big data. After the introduction, there is the problem statement that had given rise to the concept of big data. In the sub sequent sections there are discussions on different characteristics, technology etc. related to big data, finally a detailed description of processes in processing of big data. In the end there is a summary of challenges in big data. References Barlow, M., 2013. Real-Time Big Data Analytics: Emerging Architecture. s.l.:O'Reilly Media, Inc.. Boyd, D. Crawford, K., 2011. Six Provocations for Big Data, s.l.: SSRN. ene, O. Polonetsky, J., 2013. Big Data for All: Privacy and User Control in the Age of Analytics. Northwestern Journal of Technology and Intellectual Property , XI(5). Leskovec, J., Rajaraman, A. Ullman, J. D., 2014. Mining of Massive Datasets. s.l.:Cambridge University Press. Madden, S., 2012. From Databases to Big Data. IEEE Computer Society, 16(3), pp. 4-6. Marz, N. Warren, J., 2014. Big Data: Principles and Best Practices of Scalable Realtime Data Systems. s.l.:Manning Publications Company. Roebuck, K., 2011. Storing and Managing Big Data - NoSQL, Hadoop and More: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors. s.l.:Emereo Pty Limited. Zikopoulos, P., 2011. Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data. s.l.:McGraw Hill Professional.
Subscribe to:
Posts (Atom)