Evaluation Platform for DDM Algorithms With the Usage of Non-Uniform Data Distribution Strategies

Evaluation Platform for DDM Algorithms With the Usage of Non-Uniform Data Distribution Strategies

Mikołaj Markiewicz, Jakub Koperwas
DOI: 10.4018/IJITSA.290000
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Huge amounts of data are collected in numerous independent data storage facilities around the world. However, how the data is distributed between physical locations remains unspecified. Downloading all of the data for the purpose of processing it is undesirable and sometimes even impossible. Various methods have been proposed for performing data mining tasks, but the main problem is the lack of an objective strategy for comparing them. The authors present current research on a novel evaluation platform for distributed data mining (DDM) algorithms. The proposed platform opens up a new field to evaluate algorithms in terms of the quality of the results, transfer used, and speed, but also for the use of a non-uniform data distribution among independent nodes during algorithm evaluation. This work introduces a ‘data partitioning strategy’ term referring to a specific, not necessarily uniform data distribution. A brief evaluation for three clustering algorithms is also reported, showing the usability and simplicity of identifying differences in processing with the use of the platform.
Article Preview
Top

Introduction

Various data mining methods have been presented in our world for many years. They play an important role in our lives, in both the business and scientific domains. The continuous growth of data collected in the world increases every day, even reaching a size on the order of zettabytes (where a ZB is 1021 B) (Chen et al., 2014). It is estimated to reach from 168 (Khattak et al., 2019) to 175 (Alnoukari, 2020) ZB by 2025. Moreover, countless devices that form the Internet of Things (IoT) produce quintillions of bytes (1018 B) (Dobre & Xhafa, 2014) of data every day as well. In fact, 500 ZB of data was generated from such IoT sources in 2020 (Mirza et al., 2021) due to their number. The number of such devices increases, and the data cannot be stored in one place because of hardware and network limitations. On the other hand, multiple independent data centers collect such data for different institutions and companies. Therefore, new algorithms and methods are required to enable new findings in this large and distributed amount of data. Distributed data mining (DDM) has been gaining importance in recent years, with various methods implemented (Gan et al., 2017). Depending on the domain of study, these approaches are called Collaborative Systems (e.g., Zhou et al., 2010) or DDM methods and frameworks. Such processing methods should provide both quality results and processing performance while preserving the privacy of transferred data.

Much research on applications implementing various algorithms working in a Spark (Zaharia et al., 2012) cluster has been done. However, such processing requires a specific cluster environment and does not provide control over the processing and data transfer between nodes. Because of this lack of control, which will be discussed later, custom approaches and frameworks are usually implemented utilizing well-known worker-node communication architectures, such as centralized or peer-to-peer (P2P). On account of this expansion, for several years a great effort has been devoted to the study of distributed clustering, classification, and other data mining methods. One of the first examples is presented by Aouad et al. (2007), and a newer solution is presented by Bendechache and Kechadi (2015). Distributed classification methods have been studied by Navia-Vázquez et al. (2006) and Forero et al. (2010) and have even been studied explicitly in the network security domain (Hu et al., 2013). It is worth noting that recently, several authors (Forero et al., 2010; Xu et al., 2015; Jia et al., 2016) have pointed out the importance of preserving privacy in DDM processing. This processing concept, however, is not limited to the previously mentioned types of algorithms; it also applies to other methods, like frequent itemset mining, etc. Nevertheless, for the purposes of this work, we do not focus on these topics.

Complete Article List

Search this Journal:
Reset
Volume 17: 1 Issue (2024)
Volume 16: 3 Issues (2023)
Volume 15: 3 Issues (2022)
Volume 14: 2 Issues (2021)
Volume 13: 2 Issues (2020)
Volume 12: 2 Issues (2019)
Volume 11: 2 Issues (2018)
Volume 10: 2 Issues (2017)
Volume 9: 2 Issues (2016)
Volume 8: 2 Issues (2015)
Volume 7: 2 Issues (2014)
Volume 6: 2 Issues (2013)
Volume 5: 2 Issues (2012)
Volume 4: 2 Issues (2011)
Volume 3: 2 Issues (2010)
Volume 2: 2 Issues (2009)
Volume 1: 2 Issues (2008)
View Complete Journal Contents Listing