Methods of Extracting Information Based on Database Technology

Article Preview

Abstract:

According to the ternary number data mining algorithm, this paper combines SQL program operation and Oracle 10 g database system together. And then, numerical modeling and meshing technique are adopted to abstract data parameter from the database system. In addition,a mathematical model is established to abstract information from the ternary number database and the information literacy algorithm is also designed. In order to verify the reliability of the mathematical model and algorithm, a database abstracting numerical simulation experiment is designed for the velocity and temperature parameter. Through the experiment, it is discovered that there does not exist residual shock in the ternary number method when the data is being abstracted, which has a relatively stable convergence. At the same time, this paper gains the speed data distribution vector diagram. Eventually, the reliability of the algorithm designed in this paper is verified by comparing temperature data and the experimental data.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2422-2425

Citation:

Online since:

March 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Yang Ming, Zhang Yiting, Luo Junzhou, etc. The anonymous communication node selection algorithm based on weighted random bandwidth. Journal of southeast university (natural science edition), Vol. 6, (2010), pp.1169-1173.

Google Scholar

[2] Tang Ruichun , Liu Bin, Xu Shiru etc. Node selection strategy based on cluster caching in Hierarchical P2P system. Journal of ocean university of China, Vol. 40 (1), (2010), pp.104-108.

Google Scholar

[3] Wu Jiagao, Shao Shiwei, Hua Zheng, etc. Research and implementation on the network optimization mechanism of hybrid P2P spatial index, Journal of computer applications, Vol. 9, (2011), pp.2301-2304.

Google Scholar

[4] Zhang Xinyue. Pastry: research on the large-scale point-to-point routing system. Broad telecom- munications research center, Beijing university of posts and telecommunications , (2008), pp.112-117.

Google Scholar

[5] Li Nan, Cheng Jinfang, Liu Yi. Acoustic vector array MUSIC tensor decomposition algorithm. Journal of signal processing, Vol. 28 (11) , (2012), pp.1575-1580.

Google Scholar

[6] Deng Qianni , Chen Quan. Cloud computing and its key technology. Development and applications of high performance computing. Vol. 26 (1), (2009), pp.2-6.

Google Scholar

[7] Li Na, etc. Review of data mining software products . The public science and technology, Vol. 1, (2010), pp.22-24.

Google Scholar

[8] Zhu Qiandong, Pang Hongshen. Review of personalized search engine search research. Journal of library journal, Vol. 6 , (2008) , pp.14-17.

Google Scholar

[9] Deng Huan. High-performance true random number generator based on the oscillator. Research and development of solid-state electronics . Vol. 3, (2009), pp.211-217.

Google Scholar

[10] Wang Jianping, Fan Kefeng, Xiao Yong. Application and realization of the HDCP in DisplayPort. Computer system application. Vol. 4, (2009), pp.104-109.

Google Scholar