Retro-Dynamics and E-Business Model Application for Distributed Data Mining Using Mobile Agents

نویسندگان

  • Ezendu Ifeanyi Ariwa
  • Mohamed B. Senousy
  • Mohamed M. Medhat
چکیده

Distributed data mining (DDM) is the semi-automatic pattern extraction of distributed data sources. The next generation of the data mining studies will be distributed data mining for many reasons. First of all, most of the current used data mining techniques require all data to be resident in memory, i.e., the mining process must be done at the data source site. This is not feasible for the exponential growth of the data stored in organization(s) databases. Another important reason is that data is inherently distributed for fault tolerance purposes. DDM requires two main decisions about the DDM implementations: A distributed computation paradigm (message passing, RPC, mobile agents), and the used integration techniques (Knowledge probing, CDM) in order to aggregate and integrate the results of the various distributed data miners. Recently, the new distributed computation paradigm, which has been evolved as mobile agent is widely used. Mobile agent is a thread of control that can trigger the transfer of arbitrary code to a remote computer. Mobile agents paradigm has several advantages: Conserving bandwidth and reducing latencies. Also, complex, efficient and robust behaviours can be realized with surprisingly little code. Mobile agents can be used to support weak clients, allow robust remote interaction, and provide scalability. In this paper, we propose a new model that can benefit from the mobile agent paradigm to build an efficient DDM model. Since the size of the data to be migrated in the DDM process is huge, our model will overcome the communication bottleneck by using mobile agents paradigm. Our model divides the DDM process into several stages that can be done in parallel on different data sources: Preparation stage, data mining stage and knowledge integration stage. We also include a special section on how current e-business models can use our model to reinforce the decision support in the organization. A cost analysis in terms of time consumed by each minor process (communication or processing) is given to illustrate the overheads of this model and

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The application of data mining techniques in manipulated financial statement classification: The case of turkey

Predicting financially false statements to detect frauds in companies has an increasing trend in recent studies. The manipulations in financial statements can be discovered by auditors when related financial records and indicators are analyzed in depth together with the experience of auditors in order to create knowledge to develop a decision support system to classify firms. Auditors may annot...

متن کامل

Fault Tolerance in Mobile Computing using Multi Agent Environment for Electronic-Business Applications

Mobile agent technology has become a new paradigm for distributed real-time systems because of their inherent advantages. In any distributed system, along with other issues, survivability and fault tolerance are vital issues for deploying mobile-agent systems. E-business becoming a prominent domain for deploying agent technology, it also faces reliability problems due to the failure of agent pl...

متن کامل

The Adaptability of Conventional Data Mining Algorithms through Intelligent Mobile Agents in Modern Distributed Systems

Intelligent mobile agents are today accepted as powerful tools for data mining in a distributed environment. The use of data mining algorithms further beefs up the intelligence in software agents. Knowledge discovery and data mining algorithms are applied to discover hidden patterns and relations in complex datasets using intelligent agents. The distributed computing provides remote communicati...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004