The main goal and feature of the conference are to bring together scientists, engineers and industry researchers together to exchange and share their experiences, research results and discuss emerging practical problems and solutions. ICCBDC 2020 received 39 submissions of research papers. After a strict reviewing process, 23 of them have been accepted for presentation at the conference and publication in the proceedings. The conference program included invited talks, six research paper presentation sessions and one industry session. It covered recent trends and advances made in the fields of cloud and big data computing. All accepted papers were presented online in 15 minutes followed by discussions. This conference proceedings consists of the research papers presented at ICCBDC 2020.
Proceeding Downloads
A replica storage optimal method for HDFS: based on SVM
When the Hadoop distributed file system (HDFS) makes load balancing decisions, the rack-aware strategy of HDFS does not take into account the differences of various node servers comprehensively, which leads to the imbalance of cluster load. According to ...
Uncertainty and Imprecision in Big Data Management: Models, Issues, Paradigms, and Future Research Directions
This paper provides an overview of state-of-the-art proposals and forefront research directions in the context of uncertainty and imprecision in big data management, an emerging topic in the actual research community.
An Analysis of Scientific Production in Big Data Knowledge Domain on Google Books, YouTube and IEEE Explore® Digital Library
The paper aims to reveal the current state of book, video and article production in Big Data Knowledge Domain on particular platforms by examining the capabilities of Application Programming Interface (API) technology in conducting scientific data-...
OLAPing Big Social Data: Multidimensional Big Data Analytics over Big Social Data Repositories
Nowadays, a great deal of attention is devoted to the relevant problem of supporting big data analytics from social systems (e.g., social networks, smart city applications, skill management platforms, and so forth). Following this innovative trend, the ...
MERP: A Multi-index Evaluation Replication Placement Strategy for Cloud Storage Cluster
With the advent of the big data era, the research focuses on how to enhance the reliability, availability and high performance of the cloud storage system. Aiming to cope with extensive data storage, a replication placement strategy based on rack-...
MMFS: A grape disease recognition method based on multi-feature fusion and SVM
At present, pest and disease recognition methods based on machine vision generally have the problems of complicated image pre-processing steps and high difficulty in image processing technology, resulting in the technology is not practical in ...
A machine learning based shared bikes scheduling method
The emergence of shared bikes has significantly improved the "last kilometer" problem in urban public transport, and conforms to the modern travel concept of green travel and healthy travel. By studying domestic and foreign public bike management ...
Anomaly Detection Using Hierarchical Temporal Memory (HTM) in Crowd Management
Effective crowd management during events helps to avoid overcrowding that could lead to serious incidents and fatalities. Such application domain generates spatial and temporal resolution that demands diverse sophisticated mechanisms to measure, extract ...
Design of Fast and Scalable Clustering Algorithm on Spark
Clustering is a popular unsupervised data mining technique. It has been applied in various data mining and big data applications. Efficient clustering algorithms and implementation techniques are keys to cope with the scalability and performance ...
Release-Aware Encryption Adjustment Query processing for Document Database
Providing confidentiality and privacy is a major security requirement for database systems. Private data is typically stored in the database in encrypted form. To query such data either it should be decrypted, leaving it vulnerable to server-side ...
Towards Elastic Data Warehousing by Decoupling Data Management and Computation
Moving data warehouses to the cloud is what today's companies consider a trend towards cost-effective data management. To fully achieve the economic goal, the cloud data warehouse system is supposed to be able to adjust its resource provisioning to ...
Autoencoders: A Low Cost Anomaly Detection Method for Computer Network Data Streams
Computer networks are vulnerable to cyber attacks that can affect the confidentiality, integrity and availability of mission critical data. Intrusion detection methods can be employed to detect these attacks in real-time. Anomaly detection offers the ...
Autonomous Data-driven Integration Algorithm
In this paper, an autonomous data-driven integration algorithm is the main focus of the Autonomous Open Data Prediction Framework [1]. This paper proposes the autonomous Web Service integration into ERP systems. The paper highlights the Autonomous Open ...
Reconstruction-based anomaly detection for the cloud: A comparison on the Yahoo! Webscope S5 dataset
The detection of anomalies in cloud metrics is an important way to identify suspicious data instances that indicate a system problem such as hardware failures, performance bottlenecks or intrusions. Yet, especially in a cloud computing infrastructure ...
An improved method for HDFS replica recovery: based on SVM algorithm
In a cloud storage system, a failure of the data server can lead to increased traffic to other normal servers, increasing the burden on these nodes. There are many defects in the replica recovery method adopted by HDFS, the distributed file system of ...
Analysis of ranging error with high precision and the improved algorithm of UWB
This paper analyzes various UWB ranging methods such as SS-TWR and ADS-TWR. The Clock skew and antenna delay are two of the main sources of error.[1] Based on the analysis, this paper proposes a new chaotic particle swarm optimization algorithm for ...
Development of a Low-Cost Solar Powered & Real-Time Water Quality Monitoring System for Malaysia Seawater Aquaculture: Application & Challenges
Harmful algal bloom (HAB) has been a long-term threat to the ecosystem as it pollutes water and reduces the safe water usage worldwide. Therefore, scientists and researchers dedicated tremendous time and efforts to prevent the growth of algal by ...
A scalable and secure model for surveillance cameras in resource constrained IoT systems
In wireless multimedia surveillance networks (WMSNs), the sensors generate continuous data streams which are saved on cloud servers for processing and future use. Large-scale security and monitoring decisions are based on the video data fed back to the ...
HTM Based Anomaly Detecting Model for Traffic Congestion
Traffic congestion has become one of the most critical issues that have to be addressed in road transport. There were many attempts to address this problem. However, there is a demand for innovative solutions developments, as the roads infrastructure ...
A Fast Adaptive Replica Recovery Algorithm Based on Access Frequency and Environment Awareness
As cloud storage adopts a distributed architecture to store massive data, how to improve the reliability of the storage center has become the focus of researchers. HDFS, the distributed file system of Hadoop, uses a sequential recovery method to recover ...
Digitalization and Green Economy - changes of business perspectives
In this paper, the author aims to show how new technologies, digitalization of everything and green economy approach change the business environment perspective and strategy and organization of business approach. Digitalization, digital transformation, ...
Utilizing cost-sensitive machine learning classifiers to identify compounds that inhibit Alzheimer's APP translation
Virtual screening of bioassay data can be of immense benefit to identify compounds which can assist in restricting the production of amyloid beta peptides (Aβ), observed in Alzheimer patients, by inhibiting the translation of amyloid precursor protein (...
Disaster Management, Digitalization and Financial Resources: key factors to keep the organization ongoing
Nowadays, the whole world faces an epidemiological attack -viruses that affect our social and economic life. Disaster management and digitalization with financial support can help all organizations to keep ongoing. Disaster Management deals with the ...
- Proceedings of the 2020 4th International Conference on Cloud and Big Data Computing