Tech Threads

A Credible approach of Big Data processing and subsequent analysis on telecom data to minimize crime, combat terrorism, unsocial activities, etc.

– To find the duration of each call made from a particular number.
– The numbers from which the calls are being made.(calling party)
– The numbers receiving the calls (called party)
– When the call started (date and time)
– How long the call was (duration)
– The identifier of the telephone exchange writing the record
– Call type (voice, SMS, etc.)
– If the SIM card has been destroyed and same phone was used with new SIM card
– In case, phone and SIM both were replaced with new ones and calls made to the contacts of previous phone or SIM,
with call patterns, the caller party can be tracked.
– Capturing maximum number of calls, duration that has been made to a particular number.
– Live location capture of suspected number
– Details of past locations of suspected number along with the patterns of visits.
– Which number and how many times the call has been made during a day.
– Where that person was/is when the call has been made.
– Where the person is currently based on the geo location feed.
To counter the business as well as technical challenges to achieve the above by processing massive volume of CDR, GPS data, we can setup the end to end multi node Hadoop cluster to fit the petabytes of data and process the same. We can define mappings for each CDR file and write component to process each file in a distributed manner with 0 data loss and apply DQ check to extract good records from hundreds of GB/TB data generated continuously from multiple interfaces including mobile towers. By developing module to ingest geo-location feed and customer data (provided by the ISP) on HDFS multi node cluster and subsequent immediate processing of data, we can achieve geo-fencing feature which helps security agency to conduct behavioral analysis of the suspected person/groups etc. Besides, using QlikView reporting tool, gathering of the criminals/unsocial persons can be plotted to avoid future crimes etc. This high level architectural diagram can be leveraged to implement the entire solution.

We need to have corrupt data purification mechanism before ingestion into HDFS multi node cluster. Data quality plays a major factor in delivering the final dashboard. By collecting good quality of data from telecom operators, we can present final dashboard to security/investigating agency. Ideally Telecom Company or mobile service provider filter data feeds before exporting to the third party system or cloud environment for processing.
Written by
Gautam Goswami    

Can be contacted for real time POC development and hands-on technical training. Also to develop/support any Hadoop related project. Email:- gautam@onlineguwahati.com. Gautam is a consultant as well as Educator. Prior to that, he worked as Sr. Technical Architect in multiple technologies and business domain. Currently, he is specializing in Big Data processing and analysis, Data lake creation, architecture etc. using HDFS. Besides, involved in HDFS maintenance and loading of multiple types of data from different sources, Design and development of real time use case development on client/customer demands to demonstrate how data can be leveraged for business transformation, profitability etc. He is passionate about sharing knowledge through blogs, seminars, presentations etc. on various Big Data related technologies, methodologies, real time projects with their architecture /design, multiple procedure of huge volume data ingestion, basic data lake creation etc.

Page: 1 2

Recent Posts

Protecting Your Data Pipeline: Avoid Apache Kafka Outages

An Apache Kafka outage occurs when a Kafka cluster or some of its components fail,… Read More

4 months ago

The Significance of Complex Event Processing (CEP) with RisingWave for Delivering Accurate Business Decisions

Complex event processing (CEP) is a highly effective and optimized mechanism that combines several sources… Read More

7 months ago

Principle Of Data Science

Source:- www.PacktPub.com This book focuses on data science, a rapidly expanding field of study and… Read More

7 months ago

Integrating Apache Kafka in KRaft Mode with RisingWave for Event Streaming Analytics

Over the past few years, Apache Kafka has emerged as the top event streaming platform… Read More

7 months ago

Criticality in Data Stream Processing and a Few Effective Approaches

In the current fast-paced digital age, many data sources generate an unending flow of information,… Read More

8 months ago

Partitioning Hot and Cold Data Tier in Apache Kafka Cluster for Optimal Performance

At first, data tiering was a tactic used by storage systems to reduce data storage… Read More

9 months ago