Design and Implementation of Data Mining Based on Distributed Computing

Article Preview

Abstract:

Beacause internet data has a massive, diverse, heterogeneous, dynamic features, using traditional databases to analyze these data, data storage and processing efficiencies already can not meet the requirements. Utilizing leading-edge distributed computing technology to solve traditional data mining scenarios in lack of data mining of massive data improved data mining algorithm of lot OK Hadoop distributed computing platform, which later on other data mining algorithms using Hadoop to reference while using rich data mining algorithms can be found there is more value in your data.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1702-1705

Citation:

Online since:

September 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Jae-Ho Lee. Implementing priorit inheritance semaphore on uC/OS real-time kernel[J]. SoftwareTechnologies for Future Embedded Systems,2003. IEEE Workshop on,15-16 May (2003).

DOI: 10.1109/wstfes.2003.1201367

Google Scholar

[2] The week renders meritorious service. ARM embedded system experiment tutorial (a) [m]. Beijing: Beijing University of Aeronautics and Astronautics press, (2004).

Google Scholar

[3] Xie Xiren addendum, computer networking (2nd Edition). Beijing: Publishing House of electronics industry, 1999. 4.

Google Scholar

[4] Shen Lansun and Zhao, data collection technology. Anhui: University of science and technology of China Press, 1990. 8.

Google Scholar

[5] C. Shi and B. Bhargava, An efficient MPEG video encryption algorithm, in Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems, 1998, pages 381~386.

DOI: 10.1109/reldis.1998.740527

Google Scholar

[6] T.B. Maples and G.A. Spanos. Performance Study of a Selevtive Encryption Scheme for the Security of Networked, Real-time Video. In Proceedings of The 4th International Conference on Computer Communications and Network, September (2008).

DOI: 10.1109/icccn.1995.540095

Google Scholar