Results 51 to 60 of about 8,758 (210)

Coded MapReduce

open access: yes2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2015
MapReduce is a commonly used framework for executing data-intensive jobs on distributed server clusters. We introduce a variant implementation of MapReduce, namely "Coded MapReduce", to substantially reduce the inter-server communication load for the shuffling phase of MapReduce, and thus accelerating its execution.
Li, Songze   +2 more
openaire   +2 more sources

Clustering‐based recommendation method with enhanced grasshopper optimisation algorithm

open access: yesCAAI Transactions on Intelligence Technology, Volume 10, Issue 2, Page 494-509, April 2025.
Abstract In the era of big data, personalised recommendation systems are essential for enhancing user engagement and driving business growth. However, traditional recommendation algorithms, such as collaborative filtering, face significant challenges due to data sparsity, algorithm scalability, and the difficulty of adapting to dynamic user preferences.
Zihao Zhao   +9 more
wiley   +1 more source

MapReduce: within, outside, or on the side-by-side with parallel DBMSs?

open access: yesТруды Института системного программирования РАН, 2018
The approaches of use of MapReduce technology together with analytical DBMSs are discussed. The paper considers approaches where one implements MapReduce within a kernel of a parallel DBMS, where MapReduce serves as a communication infrastructure of a ...
Sergey D. Kuznetsov.
doaj  

Research of kNN algorithm based on MapReduce and double levels of inverted grid index(基于MapReduce和双层倒排网格索引的kNN算法)

open access: yesZhejiang Daxue xuebao. Lixue ban, 2014
随着卫星定位技术和移动互联网技术的飞速发展,地理空间数据来源变得更加多源异构.面对海量地理空间数据,如何快速有效地找到目标周围的兴趣点变得异常重要.依据空间k近邻(kNN)查询算法,提高效率的关键在数据索引和数据块存储结构设计,通过引入云计算的MapReduce编程模型,设计了一种面向MapReduce的地理空间数据双层倒排网格索引,利用CircularTrip算法实现了目标点近邻查询计算,最终获得距离目标点最邻近的数据点集.实验结果表明,该索引方法较单层倒排网格索引下的kNN查询效率有明显提高 ...
ZHAOMinchao(赵敏超)   +4 more
doaj   +1 more source

Autonomous Intelligent Monitoring of Photovoltaic Systems: An In‐Depth Multidisciplinary Review

open access: yesProgress in Photovoltaics: Research and Applications, Volume 33, Issue 3, Page 381-409, March 2025.
This article examines the autonomous monitoring and analysis of PV plants, highlighting key barriers and research directions for smart monitoring of PV systems. The discussed topics cover UAV choice and related standards, camera varieties, AI applications in monitoring, datasets, and data enhancement methods, as well as data exchange between UAVs and ...
M. Aghaei   +12 more
wiley   +1 more source

Interpretable decision-tree induction in a big data parallel framework

open access: yesInternational Journal of Applied Mathematics and Computer Science, 2017
When running data-mining algorithms on big data platforms, a parallel, distributed framework, such asMAPREDUCE, may be used. However, in a parallel framework, each individual model fits the data allocated to its own computing node without necessarily ...
Weinberg Abraham Itzhak, Last Mark
doaj   +1 more source

SparkGrid: Blockchain Assisted Secure Query Scheduling and Dynamic Risk Assessment for Live Migration of Services in Apache Spark‐Based Grid Environment

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
Grid computing is an emerging technology that enabled the heterogeneous collection of data and provisioning of services to the users. Due to the high amount of incoming heterogeneous request, grid computing needs an efficient scheduling to reduce execution time and satisfy service level agreement (SLA) and quality of service (QoS) requirements.
Gangasandra Mahadevaiah Kiran   +1 more
wiley   +1 more source

Mining Characteristics of Vulnerable Smart Contracts across Lifecycle Stages

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This paper conducts the first empirical study on smart contract security across three lifecycle stages: deployment and execution, upgrade, and destruction. It identifies seven vulnerability‐related features and applies them to machine learning models, revealing stage‐specific vulnerability patterns and improving detection accuracy.
Hongli Peng, Wenkai Li, Xiaoqi Li
wiley   +1 more source

Processing of raw astronomical data of large volume by MapReduce model

open access: yesТруды Института системного программирования РАН, 2018
Exponential grow of volume, increased quality of data in current and incoming sky surveys open new horizons for astrophysics but require new approaches to data processing especially big data technologies and cloud computing.
S. . Gerasimov   +4 more
doaj   +1 more source

A Methodological Framework to Hybrid Machine Learning for Detecting Unusual Cyberattacks in Internet of Things

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Background: The Internet of Things (IoT) represents one of the fastest‐expanding developments in the computer industry. However, the inherently hostile environment of the internet makes IoT systems vulnerable. A popular and promising method for detecting cyberattacks is machine learning (ML), which produces excellent outcomes for identified attacks ...
R. S. Ramya, S. Jayanthy, Peican Zhu
wiley   +1 more source

Home - About - Disclaimer - Privacy