A STUDY ON DATA REPERTORY ACUMEN SCHEMA TO MANAGE DATA PROVENANCE IN GEOSCIENCE APPLICATION?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 12)Publication Date: 2013-12-30
Authors : M.HEMALATHA K.S.KANNAN;
Page : 272-277
Keywords : Data Provenance; Geo Processing workflow; Geographic information system;
Abstract
Data provenance accepts and approves the scientists to model as to investigate the beginning of an unexpected value. It can be used as a duplicate recipe for output data products. The capturing provenance requires enormous effort by scientists in terms of time, training and need to design the workflow of the scientific model i.e., workflow source, which requires both time and training. Scientists may not document any workflow source before the model execution due to lack of time and training. And it is needed to capture provenance while the model is running, i.e., fine-grained data provenance. Explicit documentation of finegrained provenance is not feasible because of the massive storage consumption by source data in the applications, including those from the geosciences domain where data are continuously arriving and are processed. This work proposed an inference-based framework, which provides both workflow and finegrained data provenance at a minimal cost in terms of time, training, and disk consumption. The proposed framework is applicable to any given scientific model, which is capable of handling different model dynamics .The variation in the processing time as well as input data products arrival design. The framework used to especially shows the data that are proposed. Proposed framework is relevant and suitable for scientists using geosciences domains for their research work.
Other Latest Articles
- A STUDY ON INTERROGATION SYSTEM FOR GEORESOURCE USING RESOURCE DESCRIPTION FRAMEWORK?
- A New Approach for Detecting Memory Errors in JPEG2000 Standard
- MRI Image Sample Noise Filtration and a Design Toolbox to Generate Complex Phantoms in Medical Image Processing?
- Mitigating Location Attacks through Trust Based Model in MANETS?
- A Dynamic Heuristic Mechanism to Improve Throughput in MANET against Path Failures
Last modified: 2013-12-25 01:39:36