Machine Learning Based Distributed Big Data Analysis Framework for Next Generation Web in IoT

被引:22
作者
Singh, Sushil Kumar [1 ]
Cha, Jeonghun [1 ]
Kim, Tae Woo [1 ]
Park, Jong Hyuk [1 ]
机构
[1] Seoul Natl Univ Sci & Technol, Dept Comp Sci & Engn, SeoulTech, Seoul 01811, South Korea
关键词
machine learning; big data analysis; extreme learning machine; IoT; security; and privacy; INTRUSION DETECTION SYSTEM; DATA ANALYTICS; NETWORKS; PERFORMANCE; PREDICTION;
D O I
10.2298/CSIS200330012S
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For the advancement of the Internet of Things (IoT) and Next Generation Web, various applications have emerged to process structured or unstructured data. Latency, accuracy, load balancing, centralization, and others are issues on the cloud layer of transferring the IoT data. Machine learning is an emerging technology for big data analytics in IoT applications. Traditional data analyzing and processing techniques have several limitations, such as centralization and load managing in a massive amount of data. This paper introduces a Machine Learning Based Distributed Big Data Analysis Framework for Next Generation Web in IoT. We are utilizing feature extraction and data scaling at the edge layer paradigm for processing the data. Extreme Learning Machine (ELM) is adopting in the cloud layer for classification and big data analysis in IoT. The experimental evaluation demonstrates that the proposed distributed framework has a more reliable performance than the traditional framework.
引用
收藏
页码:597 / 618
页数:22
相关论文
共 52 条
[1]   High-Performance Extreme Learning Machines: A Complete Toolbox for Big Data Applications [J].
Akusok, Anton ;
Bjork, Kaj-Mikael ;
Miche, Yoan ;
Lendasse, Amaury .
IEEE ACCESS, 2015, 3 :1011-1025
[2]   Extreme Learning Machines on High Dimensional and Large Data Applications: A Survey [J].
Cao, Jiuwen ;
Lin, Zhiping .
MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
[3]   Blockchain-Based Cyber Threat Intelligence System Architecture for Sustainable Computing [J].
Cha, Jeonghun ;
Singh, Sushil Kumar ;
Pan, Yi ;
Park, Jong Hyuk .
SUSTAINABILITY, 2020, 12 (16)
[4]   APPLICATION OF BOOTSTRAP AND OTHER RESAMPLING TECHNIQUES - EVALUATION OF CLASSIFIER PERFORMANCE [J].
CHERNICK, MR ;
MURTHY, VK ;
NEALY, CD .
PATTERN RECOGNITION LETTERS, 1985, 3 (03) :167-178
[5]   Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing [J].
Diro, Abebe Abeshu ;
Chilamkurti, Naveen .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (02) :169-175
[6]   Design of Intrusion Detection System Based on Improved ABC_elite and BP Neural Networks [J].
Duan, Letian ;
Han, Dezhi ;
Tian, Qiuting .
COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2019, 16 (03) :773-795
[7]   A Parallel Multiclassification Algorithm for Big Data Using an Extreme Learning Machine [J].
Duan, Mingxing ;
Li, Kenli ;
Liao, Xiangke ;
Li, Keqin .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2018, 29 (06) :2337-2351
[8]   Block5GIntell: Blockchain for AI-Enabled 5G Networks [J].
El Azzaoui, Abir ;
Singh, Sushil Kumar ;
Pan, Yi ;
Park, Jong Hyuk .
IEEE ACCESS, 2020, 8 :145918-145935
[9]   Software-Defined Networks with Mobile Edge Computing and Caching for Smart Cities: A Big Data Deep Reinforcement Learning Approach [J].
He, Ying ;
Yu, F. Richard ;
Zhao, Nan ;
Leung, Victor C. M. ;
Yin, Hongxi .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (12) :31-37
[10]  
Hossain B, 2019, INTELL AUTOM SOFT CO, V25, P105