期刊文献+
共找到100篇文章
< 1 2 5 >
每页显示 20 50 100
Comparison of R and Excel in the Field of Data Analysis
1
作者 Jue Wang 《Journal of Electronic Research and Application》 2024年第3期178-184,共7页
This research paper compares Excel and R language for data analysis and concludes that R language is more suitable for complex data analysis tasks.R language’s open-source nature makes it accessible to everyone,and i... This research paper compares Excel and R language for data analysis and concludes that R language is more suitable for complex data analysis tasks.R language’s open-source nature makes it accessible to everyone,and its powerful data management and analysis tools make it suitable for handling complex data analysis tasks.It is also highly customizable,allowing users to create custom functions and packages to meet their specific needs.Additionally,R language provides high reproducibility,making it easy to replicate and verify research results,and it has excellent collaboration capabilities,enabling multiple users to work on the same project simultaneously.These advantages make R language a more suitable choice for complex data analysis tasks,particularly in scientific research and business applications.The findings of this study will help people understand that R is not just a language that can handle more data than Excel and demonstrate that r is essential to the field of data analysis.At the same time,it will also help users and organizations make informed decisions regarding their data analysis needs and software preferences. 展开更多
关键词 EXCEL R language data analysis Open source COMPARE data management Advantages Disadvantages FUNCTION
下载PDF
Exploration and Practice of Big Data Introductory Courses for Big Data Management and Application Majors
2
作者 Tinghui Huang Junchao Dong Liang Min 《Journal of Contemporary Educational Research》 2024年第2期131-137,共7页
As an introductory course for the emerging major of big data management and application,“Introduction to Big Data”has not yet formed a curriculum standard and implementation plan that is widely accepted and used by ... As an introductory course for the emerging major of big data management and application,“Introduction to Big Data”has not yet formed a curriculum standard and implementation plan that is widely accepted and used by everyone.To this end,we discuss some of our explorations and attempts in the construction and teaching process of big data courses for the major of big data management and application from the perspective of course planning,course implementation,and course summary.After interviews with students and feedback from questionnaires,students are highly satisfied with some of the teaching measures and programs currently adopted. 展开更多
关键词 Big data management and application “Introduction to Big data Teaching reform Curriculum exploration
下载PDF
Importance of the reputation of data manager in the acceptance of connected vehicles
3
作者 Sailesh Acharya Michelle Mekker 《Communications in Transportation Research》 2022年第1期24-32,共9页
With the known evidence that potential connected vehicle(CV)users are worried about sharing data because of the associated data privacy and security issues,this study investigates the importance of the reputation of t... With the known evidence that potential connected vehicle(CV)users are worried about sharing data because of the associated data privacy and security issues,this study investigates the importance of the reputation of the data manager(who collects,stores,and owns the data)of CV technology(CVT).Based on a questionnaire survey of 2400 US adults,this study asserts that the data manager's reputation has a significant impact on the public perception of data privacy and security issues in CVT along with overall CV acceptance.The results show that data privacy issues have a more negative impact on CV acceptance than data security issues.In addition,the reputation of a data manager has a bigger role in the eyes of the public in shaping their perception of data privacy in comparison to data security.Based on the results,the public considers data privacy as the responsibility of the data manager to protect their data from unauthorized/illegal third-party access,whereas data security is the technological strength of CVT to protect the data from hacking.Finally,it is recommended that CV stakeholders take actions to improve potential CV users'confidence in the privacy of data shared by disclosing the data management process,data privacy protection efforts,building public trust in the data manager,and introducing/enforcing laws regarding data privacy protection. 展开更多
关键词 Connected vehicle data privacy data security REPUTATION data manager ACCEPTANCE
原文传递
Proof of Activity Protocol for IoMT Data Security
4
作者 R.Rajadevi K.Venkatachalam +2 位作者 Mehedi Masud Mohammed A.AlZain Mohamed Abouhawwash 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期339-350,共12页
The Internet of Medical Things(IoMT)is an online device that senses and transmits medical data from users to physicians within a time interval.In,recent years,IoMT has rapidly grown in the medicalfield to provide heal... The Internet of Medical Things(IoMT)is an online device that senses and transmits medical data from users to physicians within a time interval.In,recent years,IoMT has rapidly grown in the medicalfield to provide healthcare services without physical appearance.With the use of sensors,IoMT applications are used in healthcare management.In such applications,one of the most important factors is data security,given that its transmission over the network may cause obtrusion.For data security in IoMT systems,blockchain is used due to its numerous blocks for secure data storage.In this study,Blockchain-assisted secure data management framework(BSDMF)and Proof of Activity(PoA)protocol using malicious code detection algorithm is used in the proposed data security for the healthcare system.The main aim is to enhance the data security over the networks.The PoA protocol enhances high security of data from the literature review.By replacing the malicious node from the block,the PoA can provide high security for medical data in the blockchain.Comparison with existing systems shows that the proposed simulation with BSD-Malicious code detection algorithm achieves higher accuracy ratio,precision ratio,security,and efficiency and less response time for Blockchain-enabled healthcare systems. 展开更多
关键词 Blockchain IoMT malicious code detection SECURITY secure data management framework data management POA
下载PDF
Privacy Data Management Mechanism Based on Blockchain and Federated Learning
5
作者 Mingsen Mo Shan Ji +2 位作者 Xiaowan Wang Ghulam Mohiuddin Yongjun Ren 《Computers, Materials & Continua》 SCIE EI 2023年第1期37-53,共17页
Due to the extensive use of various intelligent terminals and the popularity of network social tools,a large amount of data in the field of medical emerged.How to manage these massive data safely and reliably has beco... Due to the extensive use of various intelligent terminals and the popularity of network social tools,a large amount of data in the field of medical emerged.How to manage these massive data safely and reliably has become an important challenge for the medical network community.This paper proposes a data management framework of medical network community based on Consortium Blockchain(CB)and Federated learning(FL),which realizes the data security sharing between medical institutions and research institutions.Under this framework,the data security sharing mechanism of medical network community based on smart contract and the data privacy protection mechanism based on FL and alliance chain are designed to ensure the security of data and the privacy of important data in medical network community,respectively.An intelligent contract system based on Keyed-Homomorphic Public Key(KH-PKE)Encryption scheme is designed,so that medical data can be saved in the CB in the form of ciphertext,and the automatic sharing of data is realized.Zero knowledge mechanism is used to ensure the correctness of shared data.Moreover,the zero-knowledge mechanism introduces the dynamic group signature mechanism of chosen ciphertext attack(CCA)anonymity,which makes the scheme more efficient in computing and communication cost.In the end of this paper,the performance of the scheme is analyzed fromboth asymptotic and practical aspects.Through experimental comparative analysis,the scheme proposed in this paper is more effective and feasible. 展开更多
关键词 data management blockchain federated learning
下载PDF
A Trailblazing Framework of Security Assessment for Traffic Data Management
6
作者 Abdulaziz Attaallah Khalil al-Sulbi +5 位作者 Areej Alasiry Mehrez Marzougui Neha Yadav Syed Anas Ansar Pawan Kumar Chaurasia Alka Agrawal 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1853-1875,共23页
Connected and autonomous vehicles are seeing their dawn at this moment.They provide numerous benefits to vehicle owners,manufacturers,vehicle service providers,insurance companies,etc.These vehicles generate a large a... Connected and autonomous vehicles are seeing their dawn at this moment.They provide numerous benefits to vehicle owners,manufacturers,vehicle service providers,insurance companies,etc.These vehicles generate a large amount of data,which makes privacy and security a major challenge to their success.The complicated machine-led mechanics of connected and autonomous vehicles increase the risks of privacy invasion and cyber security violations for their users by making them more susceptible to data exploitation and vulnerable to cyber-attacks than any of their predecessors.This could have a negative impact on how well-liked CAVs are with the general public,give them a poor name at this early stage of their development,put obstacles in the way of their adoption and expanded use,and complicate the economic models for their future operations.On the other hand,congestion is still a bottleneck for traffic management and planning.This research paper presents a blockchain-based framework that protects the privacy of vehicle owners and provides data security by storing vehicular data on the blockchain,which will be used further for congestion detection and mitigation.Numerous devices placed along the road are used to communicate with passing cars and collect their data.The collected data will be compiled periodically to find the average travel time of vehicles and traffic density on a particular road segment.Furthermore,this data will be stored in the memory pool,where other devices will also store their data.After a predetermined amount of time,the memory pool will be mined,and data will be uploaded to the blockchain in the form of blocks that will be used to store traffic statistics.The information is then used in two different ways.First,the blockchain’s final block will provide real-time traffic data,triggering an intelligent traffic signal system to reduce congestion.Secondly,the data stored on the blockchain will provide historical,statistical data that can facilitate the analysis of traffic conditions according to past behavior. 展开更多
关键词 Connected and autonomous vehicles(CAVs) traffic data management ethereum blockchain road side units smart cities
下载PDF
Automating the Competence Matrix of a Quality Control Laboratory with the Relational Database Management Framework—A Case Study with the Analytical Chemistry Unit of a National Regulatory Agency
7
作者 Marcel Okezue Eric Dietz 《E-Health Telecommunication Systems and Networks》 2023年第2期15-33,共19页
This study analyzed the concept of time efficiency in the data management process associated with the personnel training and competence assessments in one of the quality control (QC) laboratories of Nigeria’s Foods a... This study analyzed the concept of time efficiency in the data management process associated with the personnel training and competence assessments in one of the quality control (QC) laboratories of Nigeria’s Foods and Drugs Authority (NAFDAC). The laboratory administrators were burdened with a lot of mental and paper-based record keeping because the personnel training’s data were managed manually, hence not efficiently processed. The Excel spreadsheet provided by a Purdue doctoral dissertation as a remedial to this challenge was found to be deficient in handling operations in database tables, and therefore did not appropriately address the inefficiencies. Purpose: This study aimed to reduce the time it essentially takes to generate, obtain, manipulate, exchange, and securely store data that are associated with personnel competence training and assessments. Method: The study developed a software system that was integrated with a relational database management system (RDBMS) to improve manual/Excel-based data management procedures. To validate the efficiency of the software the mean operational times in using the Excel-based format were compared with that of the “New” software system. The data were obtained by performing four predefined core tasks for five hypothetical subjects using Excel and the “New” system (the model system) respectively. Results: It was verified that the average time to accomplish the specified tasks using the “New” system (37.08 seconds) was significantly (p = 0.00191, α = 0.05) lower than the time measurements for the Excel system (77.39 seconds) in the ANACHEM laboratory. The RDBMS-based “New” system provided operational (time) efficiency in the personnel training and competence assessment process in the QC laboratory and reduced human errors. 展开更多
关键词 data Management RDBMS NAFDAC Personnel Assessment SOP PROFICIENCY
下载PDF
Data Integrity and Risk
8
作者 Sasidhar Duggineni 《Open Journal of Optimization》 2023年第2期25-33,共9页
Data Integrity is a critical component of Data lifecycle management. Its importance increases even more in a complex and dynamic landscape. Actions like unauthorized access, unauthorized modifications, data manipulati... Data Integrity is a critical component of Data lifecycle management. Its importance increases even more in a complex and dynamic landscape. Actions like unauthorized access, unauthorized modifications, data manipulations, audit tampering, data backdating, data falsification, phishing and spoofing are no longer restricted to rogue individuals but in fact also prevalent in systematic organizations and states as well. Therefore, data security requires strong data integrity measures and associated technical controls in place. Without proper customized framework in place, organizations are prone to high risk of financial, reputational, revenue losses, bankruptcies, and legal penalties which we shall discuss further throughout this paper. We will also explore some of the improvised and innovative techniques in product development to better tackle the challenges and requirements of data security and integrity. 展开更多
关键词 data Governance data Integrity data Management data Security Technical Controls REGULATIONS
下载PDF
Big data management in the mining industry 被引量:10
9
作者 Chong-chong Qi 《International Journal of Minerals,Metallurgy and Materials》 SCIE EI CAS CSCD 2020年第2期131-139,共9页
The mining industry faces a number of challenges that promote the adoption of new technologies.Big data,which is driven by the accelerating progress of information and communication technology,is one of the promising ... The mining industry faces a number of challenges that promote the adoption of new technologies.Big data,which is driven by the accelerating progress of information and communication technology,is one of the promising technologies that can reshape the entire mining landscape.Despite numerous attempts to apply big data in the mining industry,fundamental problems of big data,especially big data management(BDM),in the mining industry persist.This paper aims to fill the gap by presenting the basics of BDM.This work provides a brief introduction to big data and BDM,and it discusses the challenges encountered by the mining industry to indicate the necessity of implementing big data.It also summarizes data sources in the mining industry and presents the potential benefits of big data to the mining industry.This work also envisions a future in which a global database project is established and big data is used together with other technologies(i.e.,automation),supported by government policies and following international standards.This paper also outlines the precautions for the utilization of BDM in the mining industry. 展开更多
关键词 big data big data management mining industry
下载PDF
Blockchain for Transparent Data Management Toward 6G 被引量:3
10
作者 Xuemin(Sherman)Shen Dongxiao Liu +5 位作者 Cheng Huang Liang Xue Han Yin Weihua Zhuang Rob Sun Bidi Ying 《Engineering》 SCIE EI 2022年第1期74-85,共12页
The wealth of user data acts as a fuel for network intelligence toward the sixth generation wireless networks(6G).Due to data heterogeneity and dynamics,decentralized data management(DM)is desirable for achieving tran... The wealth of user data acts as a fuel for network intelligence toward the sixth generation wireless networks(6G).Due to data heterogeneity and dynamics,decentralized data management(DM)is desirable for achieving transparent data operations across network domains,and blockchain can be a promising solution.However,the increasing data volume and stringent data privacy-preservation requirements in 6G bring significantly technical challenge to balance transparency,efficiency,and privacy requirements in decentralized blockchain-based DM.In this paper,we investigate blockchain solutions to address the challenge.First,we explore the consensus protocols and scalability mechanisms in blockchains and discuss the roles of DM stakeholders in blockchain architectures.Second,we investigate the authentication and authorization requirements for DM stakeholders.Third,we categorize DM privacy requirements and study blockchain-based mechanisms for collaborative data processing.Subsequently,we present research issues and potential solutions for blockchain-based DM toward 6G from these three perspectives.Finally,we conclude this paper and discuss future research directions. 展开更多
关键词 Blockchain data management DECENTRALIZATION TRANSPARENCY PRIVACY
下载PDF
Research on Product Data Management Based on Multi-agent System
11
作者 ZHUSai-juan YUTao 《Journal of Shanghai University(English Edition)》 CAS 2001年第4期322-325,共4页
PDM (product data management) is one kind of techniques based on software and database, which integrates information and process related to products. But it is not enough to perform the complication of PDM in enterpri... PDM (product data management) is one kind of techniques based on software and database, which integrates information and process related to products. But it is not enough to perform the complication of PDM in enterprises. Then the mechanism to harmonize all kinds of information and process is needed. The paper introduces a novel approach to implement the intelligent monitor of PDM based on MAS (multi agent system). It carries out the management of information and process by MC (monitor center). The paper first puts forward the architecture of the whole system, then defines the structure of MC and its interoperation mode. 展开更多
关键词 PDM(product data management) MAS (multi agent system) MC(monitor center)
下载PDF
Statecharts for Distributed Product Data Management System Modelling
12
作者 K K Leong K M Yu W B Lee 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第S1期260-261,共2页
Product data management (PDM) has been accepted as an important tool for the manufacturing industries. In recent years, more and mor e researches have been conducted in the development of PDM. Their research area s in... Product data management (PDM) has been accepted as an important tool for the manufacturing industries. In recent years, more and mor e researches have been conducted in the development of PDM. Their research area s include system design, integration of object-oriented technology, data distri bution, collaborative and distributed manufacturing working environment, secur ity, and web-based integration. However, there are limitations on their rese arches. In particular, they cannot cater for PDM in distributed manufacturing e nvironment. This is especially true in South China, where many Hong Kong (HK) ma nufacturers have moved their production plants to different locations in Pearl R iver Delta for cost reduction. However, they retain their main offices in HK. Development of PDM system is inherently complex. Product related data cover prod uct name, product part number (product identification), drawings, material speci fications, dimension requirement, quality specification, test result, log size, production schedules, product data version and date of release, special tooling (e.g. jig and fixture), mould design, project engineering in charge, cost spread sheets, while process data includes engineering release, engineering change info rmation management, and other workflow related to the process information. Accor ding to Cornelissen et al., the contemporary PDM system should contains manageme nt functions in structure, retrieval, release, change, and workflow. In system design, development and implementation, a formal specification is nece ssary. However, there is no formal representation model for PDM system. Theref ore a graphical representation model is constructed to express the various scena rios of interactions between users and the PDM system. Statechart is then used to model the operations of PDM system, Fig.1. Statechart model bridges the curr ent gap between requirements, scenarios, and the initial design specifications o f PDM system. After properly analyzing the PDM system, a new distributed PDM (DPDM) system is proposed. Both graphical representation and statechart models are constructed f or the new DPDM system, Fig.2. New product data of DPDM and new system function s are then investigated to support product information flow in the new distribut ed environment. It is found that statecharts allow formal representations to capture the informa tion and control flows of both PDM and DPDM. In particular, statechart offers a dditional expressive power, when compared to conventional state transition diagr am, in terms of hierarchy, concurrency, history, and timing for DPDM behavioral modeling. 展开更多
关键词 DPDM Statecharts for Distributed Product data Management System Modelling
下载PDF
STUDY ON THE BROKEN-ORE DRAWING DATA MANAGEMENT SYSTEM OF SUBLEVEL CAVING
13
作者 刘景秀 张又敏 +1 位作者 万虹 赵宏中 《Journal of Wuhan University of Technology(Materials Science)》 SCIE EI CAS 1994年第4期72-77,共6页
In order to realize the modernized miningmanagementi the authors. based on the practice of a specified mine, developed the application software of the broken ore drawing data management system for sublevel caving thro... In order to realize the modernized miningmanagementi the authors. based on the practice of a specified mine, developed the application software of the broken ore drawing data management system for sublevel caving through the study on FOXBASE computer language. This paper elabo-rates the overall conception of this system , indicates the main task which should he completed in this system and introduces its module structure and main functions. 展开更多
关键词 sublevel caving broken-ore drawing data management system
下载PDF
Preliminary study of Chinese Antarctic data management in accordance with the international framework
14
作者 程少华 朱建钢 +2 位作者 凌晓良 方斌贤 蒋从涛 《Chinese Journal of Polar Science》 1997年第2期72-79,共8页
Antarctic data management is the research focus, which the international Antarctic organizations, e.g. Antarctic Treaty Consultative Meeting(ATCM) , Scientific Committee on Antarctic Research(SCAR), and Council of Man... Antarctic data management is the research focus, which the international Antarctic organizations, e.g. Antarctic Treaty Consultative Meeting(ATCM) , Scientific Committee on Antarctic Research(SCAR), and Council of Managers of National Antarctic Programmes(COMNAP) have been paying close attention to and promoting actively. Through the co effort of international Antarctic organizations and member countries concerned in recent years, Antarctic Data Directory Syatem(ADDS) is established as the most important basic programme for development of the international Antarctic data management system. At present, Joint Committee on Antarctic Data Management(JCADM) is responsible for organizing and coordinating the international Antarctic data management, and implementing the project ADDS.In this paper the background on Antarctic data management in time sequence and the structure of international framework are introduced, meanwhile, it is necessary to develop ADDS first of all. The ADDS mainly consists of the two principal parts: National Antarctic Data Center(NADCs) of all the party members and Antarctic Main Directory(AMD), the best available technology for creating ADDS is to make full use of International Directory Network(IDN) and adopt its Directory Interchange Formats(DIF). In the light of the above requirements, combined with Chinese specific situation, the contents, technical and administrative methods on Chinese Antarctic data management are discussed to promote our related work. 展开更多
关键词 international framework Antarctic data management Antarctic data Directory Syatem Antarctic Main Directory.
下载PDF
Development on management and sharing of data collected in Chinese Antarctic and Arctic Research Expeditions
15
作者 凌晓良 杨滨 +3 位作者 张侠 张洁 朱建钢 汪大立 《Chinese Journal of Polar Science》 2004年第2期129-136,共8页
Combined with the current status of Antarctic data management and the characteristics of polar science data resulted from Chinese Antarctic and Arctic Research Expeditions, the Chinese Polar Science Database System(CP... Combined with the current status of Antarctic data management and the characteristics of polar science data resulted from Chinese Antarctic and Arctic Research Expeditions, the Chinese Polar Science Database System(CPSDS) has been designed and established in 2002. The infrastructure, technical standard, mechanism of sharing data of this system are reviewed in this article. Meanwhile, the development of Chinese polar data management is summarized. As the metadata is the powerful and useful tool for managing and disseminating scientific data, the metadata is also used as “search engine” of CPSDS. Besides, the trend of data management and sharing is also discussed. 展开更多
关键词 data management METAdata database system.
下载PDF
Establishment of Person and Enterprise Process Model in Product Data Management System
16
作者 Ming-lun Fang Jun-bo Mao Tao Yu 《Advances in Manufacturing》 2000年第3期239-242,共4页
Before the implementation of product data management (PDM) system, person model and enterprise process model (EPM) must be firstly established. For the convenience of project management, all the related users must be ... Before the implementation of product data management (PDM) system, person model and enterprise process model (EPM) must be firstly established. For the convenience of project management, all the related users must be allocated to the “Person User Role Group” net. Based on the person model and the direction of information flow, the EPM is established subsequently. The EPM consists of several release levels, in which the access controls are defined. The EPM procedure shows the blueprint of the workflow process structure. The establishment of person model and EPM in an enterprise has been instanced at the end of this paper. 展开更多
关键词 product data management(PDM) person model enterprise process model
下载PDF
Automated Performance Tuning of Data Management Systems with Materializations and Indices
17
作者 Nan N. Noon Janusz R. Getta 《Journal of Computer and Communications》 2016年第5期46-52,共7页
Automated performance tuning of data management systems offer various benefits such as improved performance, declined administration costs, and reduced workloads to database administrators (DBAs). Currently, DBAs tune... Automated performance tuning of data management systems offer various benefits such as improved performance, declined administration costs, and reduced workloads to database administrators (DBAs). Currently, DBAs tune the performance of database systems with a little help from the database servers. In this paper, we propose a new technique for automated performance tuning of data management systems. Firstly, we show how to use the periods of low workload time for performance improvements in the periods of high workload time. We demonstrate that extensions of a database system with materialised views and indices when a workload is low may contribute to better performance for a successive period of high workload. The paper proposes several online algorithms for continuous processing of estimated database workloads and for the discovery of the best plan for materialised view and index database extensions and of elimination of the extensions that are no longer needed. We present the results of experiments that show how the proposed automated performance tuning technique improves the overall performance of a data management system.   展开更多
关键词 Automated Performance Tuning Query Processing MATERIALIZATION INDEXING data Management Systems
下载PDF
Integrated Engineering Design and Data Management
18
《Electricity》 1997年第3期34-37,共4页
This paper describes how database information and electronic 3D models are integrated to produce power plant designs more efficiently and accurately. Engineering CAD/CAE systems have evolved from strictly 3D modeling ... This paper describes how database information and electronic 3D models are integrated to produce power plant designs more efficiently and accurately. Engineering CAD/CAE systems have evolved from strictly 3D modeling to spatial data management tools. This paper describes how process data, commodities, and location data are disseminated to the various project team members through a central integrated database. The database and 3D model also provide a cache of information that is valuable to the constructor, and operations and maintenance Personnel. 展开更多
关键词 DESIGN DCAD Integrated Engineering Design and data Management
下载PDF
How to Implement Product Data Management
19
作者 Yin Xiangyang Tong Bingshu Teng DongXing(Department of Precision instrument and Mechanology, Tsinghua University, Beijing, 100084, P.R.China)Han Yongsheng(ERC of Industrial Management & Design, Institute of Software, Chinese Academy of Sciences, Beijing,100080) 《Computer Aided Drafting,Design and Manufacturing》 1999年第2期41-47,共7页
introduced are the main implementation contents and brought out is a cycle optimal PDMimplementation methodology by phases through studying requirements of enterprises' datamanagement and summarizing the existing ... introduced are the main implementation contents and brought out is a cycle optimal PDMimplementation methodology by phases through studying requirements of enterprises' datamanagement and summarizing the existing method. The implementation contents include documentsmanagement product structure and configuration management, product classification and codingmanagement, workflow management and software encapsulation. It divides the PDM implementationinto preparing, software selechon and training, implementation plan making, concrete implementingand evaluating. By the cycle of the last two pheses, the successful implementation of PDM can beobtained. This methodology has been used in the CIMS project of two companies and proved to bepractical. 展开更多
关键词 Product data Management PDM Implementation Computer integrated ManufacturingSystem
全文增补中
SDN-Enabled Content Dissemination Scheme for the Internet of Vehicles
20
作者 Abida Sharif Muhammad Imran Sharif +5 位作者 Muhammad Attique Khan Nisar Ali Abdullah Alqahtani Majed Alhaisoni Ye Jin Kim Byoungchol Chang 《Computers, Materials & Continua》 SCIE EI 2023年第5期2383-2396,共14页
The content-centric networking(CCN)architecture allows access to the content through name,instead of the physical location where the content is stored,which makes it a more robust and flexible content-based architectu... The content-centric networking(CCN)architecture allows access to the content through name,instead of the physical location where the content is stored,which makes it a more robust and flexible content-based architecture.Nevertheless,in CCN,the broadcast nature of vehicles on the Internet of Vehicles(IoV)results in latency and network congestion.The IoVbased content distribution is an emerging concept in which all the vehicles are connected via the internet.Due to the high mobility of vehicles,however,IoV applications have different network requirements that differ from those of many other networks,posing new challenges.Considering this,a novel strategy mediator framework is presented in this paper for managing the network resources efficiently.Software-defined network(SDN)controller is deployed for improving the routing flexibility and facilitating in the interinteroperability of heterogeneous devices within the network.Due to the limited memory of edge devices,the delectable bloom filters are used for caching and storage.Finally,the proposed scheme is compared with the existing variants for validating its effectiveness. 展开更多
关键词 Internet of vehicles(IOV) content dissemination multi mediator data traffic management
下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部