Abstract

To improve the data interaction control effect of a heterogeneous database and reduce packet loss rate and response time, a new heterogeneous database data interaction control system based on information fusion is designed. The system consists of hardware and software parts. The hardware part of the heterogeneous database data interaction control system is composed of a data extraction module, data sending and receiving module, encryption module, and data interaction control module. On the basis of completing hardware design, the system software is designed, a fuzzy similarity matrix is constructed by calculating the similarity among the evidence, the weight coefficient of each piece of evidence is calculated by calculating the support function of each piece of evidence, the evidence source model is modified by using discount rules, and Dempster–Shafer combination rules are transformed into matrix analysis. Combined with the modified evidence source model, information fusion of the heterogeneous database is carried out to complete the software design of the data interactive control system. The experimental results show that the data interaction control effect of the heterogeneous database in this system is good, and the packet loss rate and response time are low, improving the data interaction control effect.

References

1.
Zhou
B.
and
Yang
M.
, “
Research on an Adaptive Heterogeneous Database Middleware and Visualization Technology
,”
Journal of Physics: Conference Series
1982
, no. 
1
(
2021
): 012205, https://doi.org/10.1088/1742-6596/1982/1/012205
2.
R.
Aussel
,
M.
Asif
,
S.
Chenag
,
S.
Jaeger
,
P.
Milpied
, and
L.
Spinelli
, “
ShIVA: A User-Friendly and Interactive Interface Giving Biologists Control Over Their Single-Cell RNA-Seq Data
,”
Scientific Reports
13
, no. 
1
(
2023
): 14377, https://doi.org/10.3969/j.issn.1000-386x.2015.05.010
3.
Chen
J.
, “
Simulation of Heterogeneous Database Encryption Algorithm Based on B/S Structure
” (in Chinese),
Computer Simulation
38
, no. 
4
(
2021
): 236–239+262, https://doi.org/10.3969/j.issn.1006-9348.2021.04.047
4.
Wu
L. P.
,
Liu
Y. M.
, and
Wu
Q.
, “
Design and Research of Secure Interaction System for Video Surveillance Data
,”
Electronic Measurement Technology
43
, no. 
2
(
2020
):
143
147
, https://doi.org/10.19651/j.cnki.emt.1903346
5.
Giunta
G.
, “
Generalized Q-Functions for Application to Noncoherent Serial Detection of Spread-Spectrum Communication Signals
,”
IEEE Transactions on Signal Processing
48
, no. 
5
(May
2000
):
1506
1513
, https://doi.org/10.1109/78.840004
6.
Xu
D.
, “
Design of Industrial Internet Test Data Interactive Integration System Based on Web Interface
,”
Electronic Design Engineering
29
, no. 
17
(
2021
):
40
48
, https://doi.org/10.14022/j.issn1674-6236.2021.17.009
7.
Wu
Y. B.
, “
Design and Implementation of a Data Interaction System for Intranet and Extranet
,”
Software Engineering
23
, no. 
8
(
2020
):
25
27
, https://doi.org/10.19644/j.cnki.issn2096-1472.2020.08.007
8.
Ni
Y. D.
and
Zhang
Z. N.
, “
Design and Implementation of Flight Data Interactive Analysis System
,”
Modern Electronics Technique
45
, no. 
5
(
2022
):
110
116
, https://doi.org/10.16652/j.issn.1004-373x.2022.05.019
9.
Asfand-E-Yar
M.
and
Ali
R.
, “
Semantic Integration of Heterogeneous Databases of Same Domain Using Ontology
,”
IEEE Access
8
(
2020
):
77903
77919
, https://doi.org/10.1109/ACCESS.2020.2988685
10.
Chu
Z.
and
Wang
H.
, “
An Investigation of Hotlinking and Its Countermeasures
,”
Computer Communications
34
, no. 
4
(April
2011
):
577
590
, https://doi.org/10.1016/j.comcom.2010.05.007
11.
Berta
P.
,
Bossi
M.
, and
Verzillo
S.
, “
%CEM: A SAS Macro to Perform Coarsened Exact Matching
,”
Journal of Statistical Computation and Simulation
87
, no. 
2
(
2017
):
227
238
, https://doi.org/10.1080/00949655.2016.1203433
12.
Qtaish
A.
and
Alshammari
M. T.
, “
A Narrative Review of Storing and Querying XML Documents Using Relational Database
,”
Journal of Information & Knowledge Management
18
, no. 
4
(December
2019
): 1950048, https://doi.org/10.1142/S0219649219500485
13.
Wang
Y.
,
Yang
J.
, and
Wang
Y.
, “
Image Encryption Algorithm Based on Improved Henon Hyperchaotic System Combined with AES Algorithm
,”
Computer Engineering and Applications
55
, no. 
22
(November
2019
):
180
186
, https://doi.org/10.3778/j.issn.1002-8331.1807-0230
14.
Zhao
J.
,
Zeng
X. Y.
,
Han
J.
, and
Chen
J.
, “
Ultra-Low-Cost VLSI Implementation of AES Algorithm
” (in Chinese),
Journal of Chinese Computer Systems
28
, no. 
8
(
2007
):
1512
1515
, https://doi.org/10.3969/j.issn.1000-1220.2007.08.035
15.
Taneja
A.
,
Shukla
R. K.
, and
Shukla
R. S.
, “
Improvisation of RSA Algorithm in Respect to Time and Security with the Proposed (AEA) Algorithm
,”
Journal of Physics: Conference Series
1998
, no. 
1
(
2021
): 012036, https://doi.org/10.1088/1742-6596/1998/1/012036
16.
Osamor
V. C.
and
Edosomwan
I. B.
, “
Employing Scrambled Alpha-Numeric Randomization and RSA Algorithm to Ensure Enhanced Encryption in Electronic Medical Record
,”
Informatics in Medicine Unlocked
25
(
2021
): 100672, https://doi.org/10.1016/j.imu.2021.100672
This content is only available via PDF.
You do not currently have access to this content.