期刊文献+

物联网多源异构型目标数据优化查询仿真 被引量:6

Simulation of Optimization Query of the Multi-Source Heterogeneous Target Data in the Internet of Things Environment
在线阅读 下载PDF
导出
摘要 对物联网多源异构型的目标数据进行优化查询,能够有效提高查询数据的准确性。对多源异构型目标数据优化查询,需要得到个数据属性值相似度判别阈值,计算相似度总值,完成多源异构型目标数据优化查询。传统方法首先确定数据块边界,定义不同数据属性,但忽略了计算相似度总值,导致查询准确性低。提出动态权重的物联网多源异构型目标数据优化查询方法。对多源异构型目标数据质量进行度量,求得数据列间的灰色关联度,赋值函数得到目标数据的属性值和相似度判别阈值,计算其总值,完成目标数据优化查询。仿真证明,该方法大大提高了数据查询的准确性。 This paper proposes a method for optimization query of target data with multi - source heterogeneous type of internet of things based on dynamic weight. The quality of the target data is measured, and then grey correlation degree among data columns is obtained. The function is assigned to obtain attribute value and discrimination threshold of similarity degree of the target data, and its total value is calculated. Thus, the optimization query is completed. Simulation proves that the method improves accuracy of the data query greatly.
出处 《计算机仿真》 北大核心 2017年第12期435-438,共4页 Computer Simulation
基金 陕西省国际科技合作与交流项目(2016kw_045)
关键词 多源异构型 目标数据 优化查询 Multi- source heterogeneous type Target data Optimization query
  • 相关文献

参考文献10

二级参考文献109

  • 1陈兰香,许力.云存储服务中可证明数据持有及恢复技术研究[J].计算机研究与发展,2012,49(S1):19-25. 被引量:30
  • 2秦毅,彭力.基于RFID的超市物联网购物引导系统的设计与实现[J].计算机研究与发展,2010,47(S2):350-354. 被引量:28
  • 3刘俊辉.MD5消息摘要算法实现及改进[J].福建电脑,2007,23(4):92-93. 被引量:10
  • 4Wikipedia.Comparison of online backup services[EB/OL],(2014-01-27)[2014-01-28].http://en.wikipedia.org/wiki/Comparison of online backup services.
  • 5Dropbox Corporation.Dropbox cloud service[EB/OL],2007[2014-01-28].http://www.dropbox.com/.
  • 6Wuala Corporation.Wuala[EB/OL].2009[2014-01-28].http://www.wuala.com/.
  • 7Dutch M.Understanding data de-duplication ratios[EB/OL].(2009-02-01)[2014-01-28].http://www.snia.org/.
  • 8Harnik D,Pinkas B,Shulman-Peleg A.Side channels incloud services,the case of deduplication in cloud storage[J].IEEE Security and Privacy Magazine,2010,8(6):40-47.
  • 9Halevi S,Harnik D,et al.Proofs of ownership in remotestorage systems[C]//Proc of the 18th ACM Conf on Computer and Communications Security.New York:ACM,2011:491-500.
  • 10Mulazzani M,Schrittwieser S,et al.Dark clouds on thehorizon:Using cloud storage as attack vector and online slackspace[C]//Proc of the 20th USENIX Security Symposium.Berkeley:USENIX Association,2011:5-15.

共引文献64

同被引文献102

引证文献6

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部