Browse > Article
http://dx.doi.org/10.9708/jksci.2011.16.8.001

Data processing techniques applying data mining based on enterprise cloud computing  

Kang, In-Seong (Dept. of Information Management Engineering, Korea University)
Kim, Tae-Ho (Dept. of Information Management Engineering, Korea University)
Lee, Hong-Chul (Dept. of Industrial Management Engineering, Korea University)
Abstract
Recently, cloud computing which has provided enabling convenience that users can connect from anywhere and user friendly environment that offers on-demand network access to a shared pool of configurable computing resources such as smart-phones, net-books and PDA etc, is to be watched as a service that leads the digital revolution. Now, when business practices between departments being integrated through a cooperating system such as cloud computing, data streaming between departments is getting enormous and then it is inevitably necessary to find the solution that person in charge and find data they need. In previous studies the clustering simplifies the search process, but in this paper, it applies Hash Function to remove the de-duplicates in large amount of data in business firms. Also, it applies Bayesian Network of data mining for classifying the respect data and presents handling cloud computing based data. This system features improved search performance as well as the results Compared with conventional methods and CPU, Network Bandwidth Usage in such an efficient system performance is achieved.
Keywords
Cloud computing; Hash function; Bayesian network;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 JunHyeog Choi, DaeSu Kim, KeeWook Rim, "Dyna mic Recommendation System for a Web Library by Using Cluster Analysis and Bayesian Learning," Korean Society for Internet Information, Vol. 12, No. 5, October 2002.   DOI
2 Cloud Computing, http://100.naver.com/
3 Cloud Computing, http://terms.naver.com/
4 Consortium of Cloud Computing Research http://www.cccr.or.kr/bin/
5 Yun-Hee Lee, "Cloud Computing for Information Industry Business Innovation adoption," CIO Report, 2009.
6 Yoon-Su Jeong, Yong-Tae Kim, "An Authentication and Integrity Guarantee Mechanismof Flooding Packet based on Double Hash Chain," Korean Institute of Information Technology, Vol. 9, No. 1, January 2011.
7 Seung-Min Han, Eui-NamHuh, Chang-woo Youn, "Efficient Resource Recommendation System for Cloud Market Computing," Korean Society for Internet Information, Vol. 11, No. 3, June 2010.
8 Electronics and Telecommunications Research Analysis," ETRI, 2009.
9 8] Ion Stoica, Robert Morris, David Karger, M.Frans Kaashoek, and Hari Balakrishnan, "Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications," ACMSIGCOMM 2001, San Deigo, CA, August 2001.
10 J. Ben Schafer, Dan Frankowski, Jon Herlocker and Shilad Sen, "Collaborative Filtering Recommender Systems," The Adaptive Web, 2007.
11 Heavyload, https://www.jam-software.de/customer s/
12 Gediminas Adomavicius and Alexander Tuzhilin, "Toward the Next Generation of Recommender Systems: A Survey of the State-of-the-Art and Possible Extensions," IEEE Educational Activities Department, 2005.
13 BWMeter, http://www.desksoft.com/BWMeter.htm
14 Weka, http://www.cs.waikato.ac.nz/ml/weka/
15 Ho-Min Jung, Young-Woong Ko, "Storage System Perfo rmance Enhancement Using Duplicated Data Management Scheme," Korea Institute of Information Scientists and Engineers, Vol. 37, No. 1, February 2010.
16 L. P. Cox, C. D. Murray, and B. D. Noble. "Pastiche: Making backup cheap and easy," In Proc. 5th USENIX OSDI, Boston, MA, December 2002.
17 R. L. Rivest, "The MD5 Message Digest Algorithm," Request for Comments(RFC) 1321, Internet Activities Board, 1992.
18 RFC 3174, "US Secure Hash Algorithm 1 (SHA-1)"
19 Li Yan, KimHyung Sun, Byeong-Seob You, Jae-D ong Lee, Hae-Young Bae, "Data Cube GenerationMethod Using Hash Table in Spatial Data Warehouse," Korea Multimedia Society, Vol. 9, No. 11, November 2006.
20 Kyu-Ock Lee, Man-Pyo Hong, "Efficient Processor Alloc ation based on Join Selectivity inMultiple Hash Joins using Synchronization of Page Execution Time,", Korea Institute of Information Scientists and Engineers, Vol. 28, No. 3,4, April 2001.
21 David Heckerman, "A Tutorial on Learning Bayesia n Ne tworks," Technical Report MSR-TR -95-06, 1995.
22 Thomas Dean et al, "Artificial Intelligence Theory an d Practice," Addison Wesley, 1995.
23 Jensen, F. V., Bayesian Networks and Decision Graphs, Springer-Verlag Berlin Heidelberg New York, 2001.
24 Yujung Lee, Byoungho Kang, Jaeho Kang, Kwang ryel Ryu, "Generation and Selection of Nominal Virtual Examples for Improving the Classifier Performance," Korea Institute of Information Scientists and Engineers, Vol. 33, No.12, 2006.
25 Jeong-Sik Hwang, Su-Young Pi, Chang-Sik Son, Hwa n-Mook Chung, "A Purchase Pattern Analysis Using Bayesian Network and Neural Network," Korea Intelligent Information Systems, Vol. 15, No. 3, June 2005.   DOI
26 Kyung-Yong Jung, Seong-Yong Choi, Kee-Wook Rim, Jung-Hyun Lee, "Preference Prediction System using Similarity Weight granted Bayesian estimated value and Associative User Clustering," Korea Institute of Information Scientists and Engineers, Vol. 30, No. 3,4, April 2003.