电信科学 ›› 2015, Vol. 31 ›› Issue (7): 1-12.doi: 10.11959/j.issn.1000-0801.2015189
• 视点聚焦 • 下一篇
廖建新
出版日期:
2015-08-21
发布日期:
2015-08-21
基金资助:
Jianxin Liao
Online:
2015-08-21
Published:
2015-08-21
Supported by:
摘要:
梳理了大数据研究的4项关键技术:“数据的采集、预处理与存储”、“数据的分析与挖掘”、“数据的隐私保护”、“数据中心体系结构”,挖掘和展示了国内外大数据研究的热点,以期对该领域的研究有一个系统而全面的认识。从处理平台、分析产品、标准化3个方面介绍了大数据技术应用的现状,并列举了大数据现有的产品应用及各行业应用案例。最后,从大数据的分析策略、深度学习、隐私保护和数据质量几个方面揭示了大数据研究存在的挑战和机遇,以期为后续大数据技术应用的发展提供参考。
廖建新. 大数据技术的应用现状与展望[J]. 电信科学, 2015, 31(7): 1-12.
Jianxin Liao. Big Data Technology:Current Applications and Prospects[J]. Telecommunications Science, 2015, 31(7): 1-12.
1 | Gantz J , Reinsel D . Extracting Value from Chaos. IDC iView Report, 2011 |
2 | Schnberger V M , Cukier K . 大数据时代:生活、工作与思维的大变革. 盛杨燕,周涛译. 杭州: 浙江人民出版社, 2013 Schnberger V M , Cukier K . Big Data:A Revolution that Will Transform How We Live,Work,and Think. Translated by Sheng Y Y,Zhou T. Hangzhou: Zhejiang People’s Publishing House, 2013 |
3 | Team R . Big Data Now:Current Perspectives from O’Reilly Radar. Sebastopol:O’Reilly Media, 2011 |
4 | Grobelnik M . Big data tutorial. , 2012 |
5 | 张引, 邹传伟, 廖小飞 . 大数据应用的现状与展望. 计算机研究与发展, 2013,50(s2) Zhang Y , Chen M , Liao X F . Big data applications:a survey. Journal of Computer Research and Development, 2013,50(s2) |
6 | Binzenh?fer A , Tutschku K , Graben B A D ,et al. A P2P-based framework for distributed network management. Lecture Notes in Computer Science, 2006(3883): 198~210 |
7 | Tutschku K , Chevul S , Binzenhfer A , Schmid M ,et al. A self-organizing concept for distributed end-to-end quality monitoring. University of Wurzburg Institute,Wurzburg,Germany, 2006 |
8 | 李强, 王宏, 王乐春 . 基于P2P 的分布式网络管理模型研究. 计算机工程, 2006,32(13): 150~152. Li Q , Wang H , Wang L C . Research of P2P based distributed network management. Computer Engineering, 2006,32(13): 150~152 |
9 | Karagiannis T , Papagiannaki K , Faloutsos M . Blinc:multilevel traffic classificaion in the dark. Proceedings of the 2005 Conference on Applications,Technologies,Architectures,and Protocols for Computer Communications, Philadelphia,Pennsylvania,USA, 2005 |
10 | Karagiannis T , Roido A , Aloutsos M ,et al. Transport layer identification of P2P traffic.In: Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, Taormina,Italy, 2004 |
11 | 鲍静, 范生万 . 基于数据挖掘的图书数据预处理. 大学图书情报学刊, 2008,26(2): 31~33. Bao J , Fan S W . Pre-processing library data based on data milling. Journal of Academic Library and Information Science, 2008,26(2): 31~33 |
12 | 刘云霞 . 数据归约的统计方法研究及应用(博士学位论文). 厦门大学, 2007 Liu Y X . Research and application of the statistical method of data reduction(doctor dissertation). Xiamen University, 2007 |
13 | 刘鹏 . 云计算技术基础. 北京: 电子工业出版社, 2011 Liu P . Fundamental Cloud Computing Technology. Beijing: Publishing House of Electronics Industry, 2011 |
14 | 王庆波, 金涬, 何乐 . 虚拟化与云计算. 北京: 电子工业出版社, 2010 Wang Q B , Jin X , He L . Virtualization and Cloud Computing. Beijing: Publishing House of Electronics Industry, 2010 |
15 | 王鹏 . 云计算的关键技术与应用实例. 北京: 人民邮电出版社, 2010 Wang P . Key Technologies and Applications of Cloud Computing. Beijing: Posts and Telecom Press, 2010 |
16 | Agrawal D , Bernstein P , Bertino E ,et al. Challenges and opportunities with big data. Challenges and Opportunities with Big Data-ResearcGate, 2012,6(12): 2032~2033 |
17 | Luo D , Ding C , Huang H . Parallelization with multiplicative algorithms for big data mining. Proceedings of IEEE 12th International Conference on Data Mining, Brussels,Belgium, 2012: 489~498 |
18 | Gao F , Abd-Almageed W , Hefeeda M . Distributed approximate spectral clustering for large-scale datasets. Proceedings of the 21st International ACM Symposium on High-Performance Parallel and Distributed Computing, Delft,the Netherlands, 2012: 223~234 |
19 | Shim K . MapReduce algorithms for big data analysis,and storage of big data. Proceedings of the VLDB Endowment, Istanbul,Turkey, 2012: 2016~2017 |
20 | Abadi D J , Ahmad Y , Balazinska M ,et al. The design of the borealis stream processing engine. Proceedings of 2nd Biennial Conference on Innovative Data Systems Research(CIDR’05), Asilomar,CA,USA, 2005 |
21 | Motwani R , Widom J , Arasu A ,et al. Query processing,resource management,and approximation in a data stream management system. Proceedings of the 2003 CIDR Conference, Asilomar,CA,USA, 2003 |
22 | Han J W , Kamber M , Pei J ,et al. 数据挖掘:概念与技术. 范明,孟小峰译. 北京: 机械工业出版社, 2005 Han J W , Kamber M , Pei J ,et al. Data Mining:Concepts and Techniques.Translated by Fan M,Meng X F. Beijing: China Machine Press, 2005 |
23 | Al-Fhres M , Loukissas A , Vahdat A . A scalable,commodity data center network architecture. Proceedings of ACM SIGCOMM, Seattle,WA,USA, 2008 |
24 | Mitchell B , Sheppard J . Deep structure learning:beyond connectionist approaches. Proceedings of the 11th International Conference on Machine Learning and Applications(ICMLA), Boca Raton,Florida,USA, 2012: 162~167 |
25 | Hinton G , Osindero S , Teh Y W . A fast learning algorithm for deep belief nets. Neural Computation, 2006,18(7): 1527~1554 |
26 | FuKusHIMA K . Neocognitron:a self-organizing neural network model for a mechanism of pattern recognition unaffected by shift in position. Biological Cybemetics, 1980,36(4): 193~202 |
27 | Ranzato M , Susskind J , Mnih V ,et al. On deep generative models with applications to recognition. Proceedings of 2011 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Colorado Springs,CO,USA, 2011: 2857~2864 |
28 | Guo C , Wu H , Tan K ,et al. DCell:a scalable and fault-tolerant network structure for data center. Proceedings of ACM SIGCOMM, Seattle,WA,USA, 1998 |
29 | Li D , Guo C , Wu H ,et al. FiConn:using backup port for server interconnection in data centers. Proceedings of IEEE INFOCOM, Rio de Janeiro,Brazil, 2009 |
30 | 胡雄伟, 张宝林, 李抵飞 . 大数据研究与应用综述. 标准科学, 2013(10): 18~21 Hu X W , Zhang B L , Li D F . Overview of big data research and application. Standard Science, 2013(10): 18~21. |
31 | 方巍, 文学志, 潘吴斌 等. 云计算:概念、技术及应用研究综述. 南京信息工程大学学报:自然科学版, 2012,4(4): 351~361 Fang W , Wen X Z , Pan W B ,et al. Cloud computing:survey on concept,technology and application. JJournal of Nanjing University of Information Science & Technology, 2012,4(4): 351~361 |
32 | Chandarana P , Vijayalakshmi M . Big data analytics frameworks. Proceedings of 2014 International Conference on Circuits,Systems,Communication and Information Technology Applications (CSCITA), Mumbai,India, 2014: 430~434 |
33 | 中国电子技术标准化研究院. 大数据标准化白皮书, 2014China Electronics Standardization Institute. Big Data Standardization White Paper, 2014 |
34 | 宫夏屹, 李伯虎, 柴旭东 等. 大数据平台技术综述. 系统仿真学报, 2014,26(3): 489~496 Gong X Y , Li B H , Chai X D ,et al. Survey on big data platform technology. Journal of System Simulation, 2014,26(3): 489~496 |
35 | 黄哲学, 陈小军, 李俊杰 等. 面向服务的大数据分析平台解决方案. 科技促进发展, 2014,10(1): 52~59 Huang Z X , Chen X J , Li J J ,et al. Service oriented big data analytics platform. Science & Technology for Development, 2014,10(1): 52~59 |
36 | 袁玮 . 云计算在电信行业经营分析系统中对大数据的处理探析. 硅谷, 2014(6) Yuan W . Processing analysis for big data from cloud computing in telecom industry management analysis system. Silicon Valley, 2014(6) |
37 | Demchenko Y , De Laat C , Membrey P . Defining architecture components of the big data ecosystem. Proceedings of 2014 International Conference on Collaboration Technologies and Systems(CTS), Minneapolis,MN,USA, 2014: 104~112 |
38 | Zeng D , Lusch R . Big data analytics:perspective shifting from transactions to ecosystems. IEEE Intelligent Systems, 2013,28(2): 2~5 |
39 | Agarwal S , Mozafari B , Panda A ,et al. BlinkDB:queries with bounded errors and bounded response times on very large data. Proceedings of the 8th ACM European Conference on Computer Systems, Prague,Czech Republic, 2013: 29~42 |
40 | 孟小峰 . 位置大数据隐私保护研究综述. 软件学报, 2014,25(4): 693~712 Meng X F . Location privacy preservation in big data era:a survey. Journal of Software, 2014,25(4): 693~712 |
41 | Cheng Y , Park J , Sandhu R . Preserving user privacy from third-party applications in online social networks. Proceedings of the 22nd International Conference on World Wide Web Companion, New York,USA, 2013: 723~728 |
42 | Ghosh A , Roughgarden T , Sundararajan M . Universally utility-maximizing privacy mechanisms. Proceedings of the 22nd International Conference on World Wide Web Companion, Bethesda,Maryland,USA, 2009: 351~360 |
43 | 李默涵, 李建中, 高宏 . 数据时效性判定问题的求解算法. 计算机学报, 2012,35(11): 2348~2360 Li M H , Li J Z , Gao H . Evaluation of data currency. Chinese Journal of Computers, 2012,35(11): 2348~2360 |
44 | 刘波, 耿寅融 . 数据质量检测规则挖掘方法. 模式识别与人工智能, 2012,25(5): 835~844 Liu B , Geng Y R . Mining method for data quality detection rules. Pattern Recognition and Artificial Intelligence, 2012,25(5): 835~844 |
[1] | 韩璐, 陈威宇, 张斐, 何建锋, 苏怀振. 差异化需求下的非关系型分布式报送信息大数据分类方法[J]. 电信科学, 2023, 39(6): 114-121. |
[2] | 韩雪. 基于电力大数据的电力骨干通信网络毁伤韧性评估方法[J]. 电信科学, 2023, 39(5): 136-143. |
[3] | 孙玉娣. 基于电信大数据的5G网络海量用户复访行为预测模型[J]. 电信科学, 2023, 39(2): 157-162. |
[4] | 李爱华, 吴晓波, 陈超, 魏彬, 史嫄嫄. 5G网络大数据智能分析技术[J]. 电信科学, 2022, 38(8): 129-139. |
[5] | 黄更生, 黄宇红, 郭漫雪, 郑健平, 葛欣. DT时代面向数据服务的新型基础设施架构[J]. 电信科学, 2022, 38(7): 138-145. |
[6] | 孙杰, 孙滔, 孙震强, 刘云新, 杨爱东, 王达, 王鹏, 叶晓舟, 欧阳晔. 5G价值面,BSS/OSS融合的下一站[J]. 电信科学, 2022, 38(5): 136-148. |
[7] | 李攀攀, 谢正霞, 乐光学, 刘鑫. 基于深度学习的无线通信接收方法研究进展与趋势[J]. 电信科学, 2022, 38(2): 1-17. |
[8] | 赵海波, 相志军, 肖林松. 基于异构数据的电力短期负荷大数据预测方案[J]. 电信科学, 2022, 38(12): 103-111. |
[9] | 胡坚, 孙磊, 尹以雁, 杨晓康, 白金贵, 张叶江. 基于数据挖掘和地理可视化的4G/5G语音质量优化研究[J]. 电信科学, 2022, 38(10): 131-139. |
[10] | 何英杰, 李启伟, 孙涵, 郜迪, 董剑峰, 杨书华. 面向物联网轻量级隐私保护的真值发现机制[J]. 电信科学, 2021, 37(5): 124-132. |
[11] | 刘志勇, 何忠江, 阮宜龙, 单俊峰, 张超. 大数据安全特征与运营实践[J]. 电信科学, 2021, 37(5): 160-169. |
[12] | 王双星, 罗劲瑭, 帅莉莎, 张佳敏, 张敏, 阳小龙. 基于区块链的云数据匿名确定性删除方法[J]. 电信科学, 2021, 37(3): 90-104. |
[13] | 张驰, 陆晔, 罗渝平, 孙晓凯, 祝涵珂. 一种复杂场景下的视频流人脸隐私保护技术[J]. 电信科学, 2021, 37(1): 94-101. |
[14] | 刘晓军,武娟,徐晓青. 大数据架构剖析及数据安全融合技术[J]. 电信科学, 2020, 36(7): 146-155. |
[15] | 彭绍亮,白亮,王力,程敏霞,王树林. 面向智慧医疗的可信边缘计算[J]. 电信科学, 2020, 36(6): 56-63. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|