期刊文献+

基于K-Means和网格化聚类的云数据管理模型研究 被引量:5

Research on Cloud Data Management Model Based K-Means and Gridding Clustering
下载PDF
导出
摘要 针对云数据的分类具有模糊性、不确定性等特点,将K-Means聚类与网格化互联互通的思想运用到云数据管理的模型中,提出了一种"K-Means网格化的云数据管理模型"方法。通过随机产生的高斯分布数据表明:所提出模型不仅能高效地解决数据在分类、模糊性等方面存在的问题,而且在提高数据分布区域化精度的同时减少了数据管理的个数。利用Matlab工具对数据进行了K-Means网格化验证分析,分析结果能为企业的数据管理提供有益的借鉴。 According to that the cloud data classification has the characteristics of fuzziness and uncertainty,and K-Means clustering and grid interconnection thought is introduced into the Cloud Data Management(CDM) model,and a new method "Cloud Data Management model based on KMeans Grid" is proposed in this paper.The demonstration shows that the present model not only is the more efficient solution to classification data,fuzzy and other characteristics,but also can improve the accuracy of regional data distribution while reducing the number of data management.Using MATLAB tools to verify and analyze data into K-Means grid,and the results of the analysis results can provide useful reference for company data management.
作者 刘加伶 程春游 陈庄 朱艳蓉 LIU Jialing CHENG Chunyou CHEN Zhuang ZHU Yanrong(College of Computer Science and Engineering, Chongqing University of Technology, Chongqing 400054, Chin)
出处 《重庆理工大学学报(自然科学)》 CAS 2017年第9期119-124,共6页 Journal of Chongqing University of Technology:Natural Science
基金 国家自然科学基金资助项目(71573026) 重庆市研究生科研创新项目(CYS16222) 重庆理工大学研究生创新基金资助项目(YCX2016252)
关键词 K-MEANS 云数据管理 网格化 模型 仿真 K-Means cloud data management gridding model simulation
  • 相关文献

参考文献8

二级参考文献117

  • 1姜传贤,孙星明,易叶青,杨恒伏.基于JADE算法的数据库公开水印算法的研究[J].系统仿真学报,2006,18(7):1781-1784. 被引量:9
  • 2刘雪梅,张树生,洪歧,黄绍林.逆向工程中基于模糊聚类的点云数据分区[J].机械科学与技术,2007,26(4):515-517. 被引量:4
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4王小平,曹立明.遗传算法:理论、应用与软件实现[M].西安:西安交通大学出版社,2002.
  • 5Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 6Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 7Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 8Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 9Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 10Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].

共引文献2118

同被引文献35

引证文献5

二级引证文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部