首页 > 最新文献

9th International Conference on Computer Science, Engineering and Applications (CCSEA 2019)最新文献

英文 中文
A MapReduce based Algorithm for Data Migration in a Private Cloud Environment 私有云环境下基于MapReduce的数据迁移算法
A. Pandey, R. Thulasiram, A. Thavaneswaran
When a resource in a data center reaches its end-of-life, instead of investing in upgrading, it is possibly the time to decommission such a resource and migrate workloads to other resources in the data center. Data migration between different cloud servers is risky due to the possibility of data loss. The current studies in the literature do not optimize the data before migration, which could avoid data loss. MapReduce is a software framework for distributed processing of large data sets with reduced overhead of migrating data. For this study, we design a MapReduce based algorithm and introduce a few metrics to test and evaluate our proposed framework. We deploy an architecture for creating an Apache Hadoop environment for our experiments. We show that our algorithm for data migration works efficiently for text, image, audio and video files with minimum data loss and scale well for large files as well.
当数据中心中的资源达到其生命周期结束时,不是投资于升级,而是可能是时候让这种资源退役,并将工作负载迁移到数据中心中的其他资源。不同云服务器之间的数据迁移存在数据丢失的风险。目前文献中的研究没有在迁移前对数据进行优化,这样可以避免数据丢失。MapReduce是一个用于分布式处理大型数据集的软件框架,减少了数据迁移的开销。在这项研究中,我们设计了一个基于MapReduce的算法,并引入了一些指标来测试和评估我们提出的框架。我们部署了一个架构,用于为我们的实验创建一个Apache Hadoop环境。我们证明了我们的数据迁移算法在文本、图像、音频和视频文件中有效地工作,数据丢失最小,并且对于大文件也可以很好地扩展。
{"title":"A MapReduce based Algorithm for Data Migration in a Private Cloud Environment","authors":"A. Pandey, R. Thulasiram, A. Thavaneswaran","doi":"10.5121/CSIT.2019.90916","DOIUrl":"https://doi.org/10.5121/CSIT.2019.90916","url":null,"abstract":"When a resource in a data center reaches its end-of-life, instead of investing in upgrading, it is possibly the time to decommission such a resource and migrate workloads to other resources in the data center. Data migration between different cloud servers is risky due to the possibility of data loss. The current studies in the literature do not optimize the data before migration, which could avoid data loss. MapReduce is a software framework for distributed processing of large data sets with reduced overhead of migrating data. For this study, we design a MapReduce based algorithm and introduce a few metrics to test and evaluate our proposed framework. We deploy an architecture for creating an Apache Hadoop environment for our experiments. We show that our algorithm for data migration works efficiently for text, image, audio and video files with minimum data loss and scale well for large files as well.","PeriodicalId":248929,"journal":{"name":"9th International Conference on Computer Science, Engineering and Applications (CCSEA 2019)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126041033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Motion Compensated Restoration of Colonoscopy Images
Nidhal Azawi, J. Gauch
Colonoscopy examinations are widely used for detecting colon cancer and many other colon abnormalities. Unfortunately, the resulting colon videos often have artifacts caused by camera motion and specular highlights caused by light reflections from the wet colon surface. To address these problems, we have developed a method for motion compensated colonoscopy image restoration. Our approach utilizes RANSAC-based image registration to align sequences of N consecutive images in the colonoscopy video and restores each frame of the video using information from these aligned images. We compare image alignment quality when N adjacent images are registered to each other versus registering images with larger step sizes between them. Three types of image pre processing were evaluated in our work. We found that the removal of non-informative images prior to image registration produced better alignment results and reduced processing time. We also evaluated the effects of image smoothing and resizing as a pre processing step for image registration.
结肠镜检查被广泛用于检测结肠癌和许多其他结肠异常。不幸的是,最终的结肠视频通常有由相机运动和由潮湿结肠表面的光反射引起的高光引起的伪影。为了解决这些问题,我们开发了一种运动补偿结肠镜图像恢复方法。我们的方法利用基于ransac的图像配准来对齐结肠镜检查视频中的N个连续图像序列,并使用这些对齐图像中的信息恢复视频的每一帧。我们比较了N个相邻图像相互配准与配准之间步长较大的图像时的图像对齐质量。在我们的工作中对三种类型的图像预处理进行了评估。我们发现,在图像配准之前去除非信息图像可以产生更好的对准结果并减少处理时间。我们还评估了图像平滑和调整大小作为图像配准的预处理步骤的效果。
{"title":"Motion Compensated Restoration of Colonoscopy Images","authors":"Nidhal Azawi, J. Gauch","doi":"10.5121/CSIT.2019.90920","DOIUrl":"https://doi.org/10.5121/CSIT.2019.90920","url":null,"abstract":"Colonoscopy examinations are widely used for detecting colon cancer and many other colon abnormalities. Unfortunately, the resulting colon videos often have artifacts caused by camera motion and specular highlights caused by light reflections from the wet colon surface. To address these problems, we have developed a method for motion compensated colonoscopy image restoration. Our approach utilizes RANSAC-based image registration to align sequences of N consecutive images in the colonoscopy video and restores each frame of the video using information from these aligned images. We compare image alignment quality when N adjacent images are registered to each other versus registering images with larger step sizes between them. Three types of image pre processing were evaluated in our work. We found that the removal of non-informative images prior to image registration produced better alignment results and reduced processing time. We also evaluated the effects of image smoothing and resizing as a pre processing step for image registration.","PeriodicalId":248929,"journal":{"name":"9th International Conference on Computer Science, Engineering and Applications (CCSEA 2019)","volume":"230 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128601556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enabling Edge Computing Using Container Orchestration and Software Defined Wide Area Networks 使用容器编排和软件定义的广域网实现边缘计算
Felipe Rodriguez Yaguache, K. Ahola
With SD-WAN being increasingly adopted by corporations, and Kubernetes becoming the defacto container orchestration tool, the opportunities for deploying edge-computing applications running over SD-WAN are vast. Unfortunately, service orchestration in SD-WAN has not been provided with enough attention, resulting in the lack of research focused on service discovery in these scenarios. In this document, an in-house service discovery solution that works alongside Kubernetes’ master node for allowing an improved traffic handling and better user experience is developed. The service discovery solution was conceived following a design science research approach. Our research includes the implementation of a proof-of-concept SD-WAN topology alongside a Kubernetes cluster that allows us to deploy custom services and delimit the necessary characteristics of our in-house solution. Also, the implementation's performance is tested based on the required times for updating the discovery solution according to service updates. Finally, some conclusions and modifications are pointed out based on the results, while also discussing possible enhancements.
随着SD-WAN越来越多地被企业采用,Kubernetes成为事实上的容器编排工具,部署在SD-WAN上运行的边缘计算应用程序的机会是巨大的。不幸的是,SD-WAN中的服务编排没有得到足够的重视,导致缺乏对这些场景中的服务发现的研究。在本文档中,开发了一个内部服务发现解决方案,该解决方案与Kubernetes的主节点一起工作,以改进流量处理和更好的用户体验。服务发现解决方案是按照设计科学研究方法构思的。我们的研究包括实现一个概念验证的SD-WAN拓扑以及一个Kubernetes集群,它允许我们部署自定义服务并划分我们内部解决方案的必要特征。此外,还根据根据服务更新更新发现解决方案所需的时间来测试实现的性能。最后,在此基础上提出了一些结论和需要改进的地方,并对可能的改进进行了讨论。
{"title":"Enabling Edge Computing Using Container Orchestration and Software Defined Wide Area Networks","authors":"Felipe Rodriguez Yaguache, K. Ahola","doi":"10.5121/CSIT.2019.90930","DOIUrl":"https://doi.org/10.5121/CSIT.2019.90930","url":null,"abstract":"With SD-WAN being increasingly adopted by corporations, and Kubernetes becoming the defacto container orchestration tool, the opportunities for deploying edge-computing applications running over SD-WAN are vast. Unfortunately, service orchestration in SD-WAN has not been provided with enough attention, resulting in the lack of research focused on service discovery in these scenarios. In this document, an in-house service discovery solution that works alongside Kubernetes’ master node for allowing an improved traffic handling and better user experience is developed. The service discovery solution was conceived following a design science research approach. Our research includes the implementation of a proof-of-concept SD-WAN topology alongside a Kubernetes cluster that allows us to deploy custom services and delimit the necessary characteristics of our in-house solution. Also, the implementation's performance is tested based on the required times for updating the discovery solution according to service updates. Finally, some conclusions and modifications are pointed out based on the results, while also discussing possible enhancements.","PeriodicalId":248929,"journal":{"name":"9th International Conference on Computer Science, Engineering and Applications (CCSEA 2019)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122691343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ual Enterprise Architecture Supply Chain (VEASC) Model on Cloud Computing: A simulation-based study through OPNET modelling 基于云计算的企业架构供应链模型:基于OPNET建模的仿真研究
Tlamelo Phetlhu, S. Lubbe
The traditional models of electronic data interchange (EDI) and out-of-application methods for messaging and collaborations are not suitable to achieve the full benefits of VEASC because of multiple limitations. The limitations are: multiple human interventions, lack of real time visibility into the supply chain flows, inability to accurately synchronise the demand and supplyside information, and inability to build dynamic capabilities required for facing supply chain dynamics. The existing studies about deploying supply chain applications on cloud computing are focussed on overcoming these limitations through service-oriented architectures and their components. However, their focus needs to be expanded to virtual enterprise architecture modelling to overcome the limitations of EDI and out-of-application methods effectively. The virtual enterprise architecture supply chain (VEASC) model has been studied in this research employing Optimised Networking (OPNET) modelling and simulations of a commercial application called INTEND. The simulation results reflect a potential to overcome the limitations of traditional EDI and out-of-application methods. However, the true potential of the proposed system and the changes needed to automatically recover from failures can be determined after testing actual transactions in a real world VEASC implementation.
由于多种限制,传统的电子数据交换(EDI)模型和用于消息传递和协作的应用程序外方法不适合实现VEASC的全部好处。限制是:多重人为干预,缺乏对供应链流程的实时可见性,无法准确同步需求和供应方面的信息,以及无法建立面对供应链动态所需的动态能力。现有的关于在云计算上部署供应链应用程序的研究主要集中在通过面向服务的体系结构及其组件来克服这些限制。然而,他们的重点需要扩展到虚拟企业架构建模,以有效地克服EDI和应用程序外方法的局限性。虚拟企业架构供应链(VEASC)模型在本研究中采用了优化网络(OPNET)建模,并模拟了一个名为intent的商业应用程序。仿真结果反映了克服传统EDI和过时方法局限性的潜力。但是,建议系统的真正潜力和自动从故障中恢复所需的更改可以在测试真实世界VEASC实现中的实际事务后确定。
{"title":"ual Enterprise Architecture Supply Chain (VEASC) Model on Cloud Computing: A simulation-based study through OPNET modelling","authors":"Tlamelo Phetlhu, S. Lubbe","doi":"10.5121/CSIT.2019.90914","DOIUrl":"https://doi.org/10.5121/CSIT.2019.90914","url":null,"abstract":"The traditional models of electronic data interchange (EDI) and out-of-application methods for messaging and collaborations are not suitable to achieve the full benefits of VEASC because of multiple limitations. The limitations are: multiple human interventions, lack of real time visibility into the supply chain flows, inability to accurately synchronise the demand and supplyside information, and inability to build dynamic capabilities required for facing supply chain dynamics. The existing studies about deploying supply chain applications on cloud computing are focussed on overcoming these limitations through service-oriented architectures and their components. However, their focus needs to be expanded to virtual enterprise architecture modelling to overcome the limitations of EDI and out-of-application methods effectively. The virtual enterprise architecture supply chain (VEASC) model has been studied in this research employing Optimised Networking (OPNET) modelling and simulations of a commercial application called INTEND. The simulation results reflect a potential to overcome the limitations of traditional EDI and out-of-application methods. However, the true potential of the proposed system and the changes needed to automatically recover from failures can be determined after testing actual transactions in a real world VEASC implementation.","PeriodicalId":248929,"journal":{"name":"9th International Conference on Computer Science, Engineering and Applications (CCSEA 2019)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123119846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Issues in Cloud-Based Businesses 基于云的业务中的安全问题
M. Ladan
Cloud-based Business is a Business running and relying on Cloud computing IT paradigm. Cloud computing is an emerging technology paradigm that transfers current technological and computing concepts into utility-like solutions similar to electricity and communication systems. It provides the full scalability, reliability, computing resources configurability and outsourcing, resource sharing, external data warehousing, and high performance and relatively low cost feasible solutions and services as compared to dedicated infrastructures. Cloud-based Businesses store, access, use, and manage their data and software applications over the internet on a set of servers in the cloud without the need to have them stored/installed locally on their local devices. The cloud technology is used daily by many businesses/people around the world from using web based email services to executing heavy complex business transactions. Like any other emerging technology, Cloud computing comes with a baggage of some pros and cons. It is very useful in business development as it brings amazing results in a timely manner; however, it comes with increasing security and privacy concerns and issues. In this paper we will investigate, analyse, classify, and discuss the new security concerns and issues introduced by cloud computing. In addition, we present some security requirements that address and may alleviate these concerns and issues.
基于云的业务是一种运行并依赖于云计算的业务IT范式。云计算是一种新兴的技术范式,它将当前的技术和计算概念转化为类似于电力和通信系统的实用解决方案。与专用基础设施相比,它提供了完整的可扩展性、可靠性、计算资源可配置性和外包、资源共享、外部数据仓库以及高性能和相对低成本的可行解决方案和服务。基于云的企业通过互联网在云中的一组服务器上存储、访问、使用和管理他们的数据和软件应用程序,而不需要将它们存储/安装在本地设备上。从使用基于web的电子邮件服务到执行繁重复杂的商业交易,云技术每天都被世界各地的许多企业/个人使用。像任何其他新兴技术一样,云计算也有一些优点和缺点。它在业务开发中非常有用,因为它能及时带来惊人的结果;然而,随之而来的是越来越多的安全和隐私问题。在本文中,我们将调查、分析、分类和讨论云计算带来的新的安全问题。此外,我们还提出了一些安全需求,以解决并可能减轻这些担忧和问题。
{"title":"Security Issues in Cloud-Based Businesses","authors":"M. Ladan","doi":"10.5121/CSIT.2019.90929","DOIUrl":"https://doi.org/10.5121/CSIT.2019.90929","url":null,"abstract":"Cloud-based Business is a Business running and relying on Cloud computing IT paradigm. Cloud computing is an emerging technology paradigm that transfers current technological and computing concepts into utility-like solutions similar to electricity and communication systems. It provides the full scalability, reliability, computing resources configurability and outsourcing, resource sharing, external data warehousing, and high performance and relatively low cost feasible solutions and services as compared to dedicated infrastructures. Cloud-based Businesses store, access, use, and manage their data and software applications over the internet on a set of servers in the cloud without the need to have them stored/installed locally on their local devices. The cloud technology is used daily by many businesses/people around the world from using web based email services to executing heavy complex business transactions. Like any other emerging technology, Cloud computing comes with a baggage of some pros and cons. It is very useful in business development as it brings amazing results in a timely manner; however, it comes with increasing security and privacy concerns and issues. In this paper we will investigate, analyse, classify, and discuss the new security concerns and issues introduced by cloud computing. In addition, we present some security requirements that address and may alleviate these concerns and issues.","PeriodicalId":248929,"journal":{"name":"9th International Conference on Computer Science, Engineering and Applications (CCSEA 2019)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123512509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of State-of-the-Art GAN-based Approaches to Image Synthesis 基于gan的最新图像合成方法综述
Shirin Nasr Esfahani, S. Latifi
In the past few years, Generative Adversarial Networks (GANs) have received immense attention by researchers in a variety of application domains. This new field of deep learning has been growing rapidly and has provided a way to learn deep representations without extensive use of annotated training data. Their achievements may be used in a variety of applications, including speech synthesis, image and video generation, semantic image editing, and style transfer. Image synthesis is an important component of expert systems and it attracted much attention since the introduction of GANs. However, GANs are known to be difficult to train especially when they try to generate high resolution images. This paper gives a thorough overview of the state-of-the-art GANs-based approaches in four applicable areas of image generation including Text-to-Image-Synthesis, Image-to-Image-Translation, Face Aging, and 3D Image Synthesis. Experimental results show state-of-the-art performance using GANs compared to traditional approaches in the fields of image processing and machine vision.
在过去的几年中,生成对抗网络(GANs)在各个应用领域受到了研究人员的极大关注。这个新的深度学习领域正在迅速发展,并提供了一种无需大量使用带注释的训练数据来学习深度表示的方法。他们的成果可用于各种应用,包括语音合成、图像和视频生成、语义图像编辑和风格转移。图像合成是专家系统的一个重要组成部分,自gan引入以来备受关注。然而,众所周知,gan很难训练,特别是当它们试图生成高分辨率图像时。本文全面概述了在图像生成的四个适用领域,包括文本到图像合成、图像到图像翻译、人脸老化和3D图像合成,最先进的基于gan的方法。实验结果表明,在图像处理和机器视觉领域,与传统方法相比,gan具有最先进的性能。
{"title":"A Survey of State-of-the-Art GAN-based Approaches to Image Synthesis","authors":"Shirin Nasr Esfahani, S. Latifi","doi":"10.5121/CSIT.2019.90906","DOIUrl":"https://doi.org/10.5121/CSIT.2019.90906","url":null,"abstract":"In the past few years, Generative Adversarial Networks (GANs) have received immense attention by researchers in a variety of application domains. This new field of deep learning has been growing rapidly and has provided a way to learn deep representations without extensive use of annotated training data. Their achievements may be used in a variety of applications, including speech synthesis, image and video generation, semantic image editing, and style transfer. Image synthesis is an important component of expert systems and it attracted much attention since the introduction of GANs. However, GANs are known to be difficult to train especially when they try to generate high resolution images. This paper gives a thorough overview of the state-of-the-art GANs-based approaches in four applicable areas of image generation including Text-to-Image-Synthesis, Image-to-Image-Translation, Face Aging, and 3D Image Synthesis. Experimental results show state-of-the-art performance using GANs compared to traditional approaches in the fields of image processing and machine vision.","PeriodicalId":248929,"journal":{"name":"9th International Conference on Computer Science, Engineering and Applications (CCSEA 2019)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126855280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security Considerations for Edge Computing 边缘计算的安全考虑
J. Acken, Naresh Sehgal
Present state of edge computing is an environment of different computing capabilities connecting via a wide variety of communication paths. This situation creates both great operational capability opportunities and unimaginable security problems. This paper emphasizes that the traditional approaches to security of identifying a security threat and developing the technology and policies to defend against that threat are no longer adequate. The wide variety of security levels, computational capabilities, and communication channels requires a learning, responsive, varied, and individualized approach to information security. We describe a classification of the nature of transactions with respect to security based upon relationships, history, trust status, requested actions and resulting response choices. Problem is that the trust evaluation has to be individualized between each pair of devices participating in edge computing. We propose that each element in the edge computing world utilizes a localized ability to establish an adaptive learning trust model with each entity that communicates with the element. Specifically, the model we propose increments or decrements the value of trust score based upon each interaction.
边缘计算的现状是不同的计算能力通过各种各样的通信路径连接的环境。这种形势既创造了巨大的作战能力机遇,也带来了难以想象的安全问题。本文强调,识别安全威胁并开发技术和策略来防御该威胁的传统安全方法已不再适用。各种各样的安全级别、计算能力和通信渠道需要一种学习、响应、多样化和个性化的信息安全方法。我们描述了基于关系、历史、信任状态、请求操作和结果响应选择的安全方面的事务性质分类。问题是,参与边缘计算的每对设备之间的信任评估必须个性化。我们建议边缘计算世界中的每个元素利用本地化能力与与该元素通信的每个实体建立自适应学习信任模型。具体来说,我们提出的模型基于每次交互增加或减少信任得分的值。
{"title":"Security Considerations for Edge Computing","authors":"J. Acken, Naresh Sehgal","doi":"10.5121/CSIT.2019.90915","DOIUrl":"https://doi.org/10.5121/CSIT.2019.90915","url":null,"abstract":"Present state of edge computing is an environment of different computing capabilities connecting via a wide variety of communication paths. This situation creates both great operational capability opportunities and unimaginable security problems. This paper emphasizes that the traditional approaches to security of identifying a security threat and developing the technology and policies to defend against that threat are no longer adequate. The wide variety of security levels, computational capabilities, and communication channels requires a learning, responsive, varied, and individualized approach to information security. We describe a classification of the nature of transactions with respect to security based upon relationships, history, trust status, requested actions and resulting response choices. Problem is that the trust evaluation has to be individualized between each pair of devices participating in edge computing. We propose that each element in the edge computing world utilizes a localized ability to establish an adaptive learning trust model with each entity that communicates with the element. Specifically, the model we propose increments or decrements the value of trust score based upon each interaction.","PeriodicalId":248929,"journal":{"name":"9th International Conference on Computer Science, Engineering and Applications (CCSEA 2019)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115057773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Virtualization for Analytics and Business Intelligence in Big Data 面向大数据分析和商业智能的数据虚拟化
M. Muniswamaiah, T. Agerwala, C. Tappert
Data analytics and Business Intelligence (BI) is essential for strategic and operational decision making in an organization. Data analytics emphasizes on algorithms to control the relationship between data offering insights. The major difference between BI and analytics is that analytics has predictive competence whereas Business Intelligence helps in informed decision-making built on the analysis of past data. Business Intelligence solutions are among the most valued data management tools available. Business Intelligence solutions gather and examine current, actionable data with the determination of providing insights into refining business operations. Data needs to be integrated from disparate sources in order to derive insights. Traditionally organizations employ data warehouses and ETL process to obtain integrated data. Recently Data virtualization has been used to speed up the data integration process. Data virtualization and ETL are often complementary technologies performing complex, multi-pass data transformation and cleansing operations, and bulk loading the data into a target data store. In this paper we provide an overview of Data virtualization technique used for Data analytics and BI.
数据分析和商业智能(BI)对于组织中的战略和运营决策至关重要。数据分析强调算法来控制数据之间的关系,提供洞察力。BI和分析的主要区别在于,分析具有预测能力,而商业智能则有助于在分析过去数据的基础上做出明智的决策。商业智能解决方案是最有价值的数据管理工具之一。商业智能解决方案收集和检查当前的、可操作的数据,并确定为改进业务操作提供见解。需要将来自不同来源的数据集成起来,以便获得见解。传统上,组织使用数据仓库和ETL过程来获取集成数据。最近,数据虚拟化被用于加速数据集成过程。数据虚拟化和ETL通常是互补的技术,它们执行复杂的多通道数据转换和清理操作,并将数据批量加载到目标数据存储中。在本文中,我们概述了用于数据分析和BI的数据虚拟化技术。
{"title":"Data Virtualization for Analytics and Business Intelligence in Big Data","authors":"M. Muniswamaiah, T. Agerwala, C. Tappert","doi":"10.5121/CSIT.2019.90925","DOIUrl":"https://doi.org/10.5121/CSIT.2019.90925","url":null,"abstract":"Data analytics and Business Intelligence (BI) is essential for strategic and operational decision making in an organization. Data analytics emphasizes on algorithms to control the relationship between data offering insights. The major difference between BI and analytics is that analytics has predictive competence whereas Business Intelligence helps in informed decision-making built on the analysis of past data. Business Intelligence solutions are among the most valued data management tools available. Business Intelligence solutions gather and examine current, actionable data with the determination of providing insights into refining business operations. Data needs to be integrated from disparate sources in order to derive insights. Traditionally organizations employ data warehouses and ETL process to obtain integrated data. Recently Data virtualization has been used to speed up the data integration process. Data virtualization and ETL are often complementary technologies performing complex, multi-pass data transformation and cleansing operations, and bulk loading the data into a target data store. In this paper we provide an overview of Data virtualization technique used for Data analytics and BI.","PeriodicalId":248929,"journal":{"name":"9th International Conference on Computer Science, Engineering and Applications (CCSEA 2019)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121826895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
9th International Conference on Computer Science, Engineering and Applications (CCSEA 2019)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1