收藏 分销(赏)

物流管理专业文献翻译--物联网--传统数据库的死亡--大学毕业设计论文.doc

上传人:w****g 文档编号:2150302 上传时间:2024-05-20 格式:DOC 页数:19 大小:84.50KB
下载 相关 举报
物流管理专业文献翻译--物联网--传统数据库的死亡--大学毕业设计论文.doc_第1页
第1页 / 共19页
物流管理专业文献翻译--物联网--传统数据库的死亡--大学毕业设计论文.doc_第2页
第2页 / 共19页
物流管理专业文献翻译--物联网--传统数据库的死亡--大学毕业设计论文.doc_第3页
第3页 / 共19页
物流管理专业文献翻译--物联网--传统数据库的死亡--大学毕业设计论文.doc_第4页
第4页 / 共19页
物流管理专业文献翻译--物联网--传统数据库的死亡--大学毕业设计论文.doc_第5页
第5页 / 共19页
点击查看更多>>
资源描述

1、宁波大学本科毕业设计(论文)系列表格 英文翻译分 院 海 运 学 院 专 业 物 流 管 理 届 别 2012届 学 号 084771115 姓 名 指导教师 2011 年 10 月 31日The Internet of Things: The Death of a Traditional Database?Keith G. JefferyDirector IT & International Strategy, Science and Technology Facilities Council, Rutherford Appleton Laboratory,Harwell Science a

2、nd Innovation Campus, Chilton, Didcot, Oxfordshire OX11 0QX UKAbstractTraditional database research has developed technology to ensure that the database even when distributed represents the world of interest with integrity and a consistent state. Important concepts have been developed and proven. Ho

3、wever, the internet of things challenges all this. Very large numbers of nodes handle volumes that are vast, the speed is fast and the data/information space is global indeed with space data universal. This poses challenges. What does the concept of a state mean when the information map of the real

4、world of interest is represented across millions of nodes, many of which are updating in real-time? What does a transaction look like when the data being updated is spread across hundreds or thousands of nodes with differing update policies? Worse, how does one roll back or compensate a transaction?

5、 We have already seen database research applied to semi-structured data, to streamed data, and real-time applications. Is it possible for these techniques to be applied to the internet of things? The internet of things opens up more opportunities for security compromises. How do we develop trust ban

6、d security techniques across multiple policies? How do we prevent the unauthorized use of private information yet permit authorized use? We need dynamic trust, security, and privacy management. Do we need a new theoretical framework?KeywordsDatabase, Future internet, Integrity, Process, State, Trans

7、action, Workflow. 1. IntroductionThere is much activity in Europe and the world on predicting the future of information and communication technology (ICT). There are roadmapping exercises for R and D in various domains to meet that predicted future. The EC has set up expert groups and/or Projects co

8、vering GRIDs, CLOUDs, Service-Oriented Architectures, quantum and bio-computing, new materials, humancomputer interaction, and cognitive technology among others. There is much discussion of Web2.0 and beyond. The Internet of Things (http:/ en.wikipedia.org/wiki/Internet_of_Things) is a strong theme

9、with a recent EC (European Commission) conference (May 2009) dedicated to it. The formation of the FIA (Future Internet Assembly) underpins the groundswell of enthusiasm for this idea, and Issue 77 of ERCIM News 1 has Future Internet Technology as the special theme, with a foreword by Viviane Reding

10、, EC Commissioner for Information Society and Media, emphasizing the importance. Europe is establishing an e-Infrastructure and the US is establishing its Cyberinfrastructure.Database researchers (with a few notable exceptions) have not been very prominent in these discussions. This is surprising, a

11、s the movement toward takeup of these new technologies by the business world pioneered in the research field will require, at the least, interoperation with the existing database technology, and most likely a further wholesale evolutionary or revolutionary developmentof the database technology, to a

12、dapt to the new environment. Database research has moved to include semi-structured data and its processing and managing of data streams. There is work on schema matching and mapping for interoperation (sometimes in the context of Dataspaces), and on domain ontologies. There is still ongoing work on

13、 web-database interfaces, modeling, and systems development. Work on performance or query optimization with new algorithms continues, as does optimized storage architecture including P2P (Peer to Peer).Where are the advances in database research matching and/or contributing to the huge advances in (

14、among others) social networking, content creation and repurposing, gaming, sensor systems, robotics, autonomic systems, visualization, user interaction, systems and software development, and service-oriented architecture?2. A VisionThe vision has its roots in 2 with subsequent refinements 3,4 leadin

15、g to an analysis and synthesis performed in 2008 and updated in 2009 by ERCIM (www.ercim.org). It is based on the architecture proposed for the UK e-Science program 2 and is represented in Figure 1.Let us imagine a possible state in 20 years time. The problems facing Europe and the world (from conti

16、nent through country to individual person scale) are large, complex, and require unprecedented scientific, mathematical, and IT skills for their solution.There is a fast, reliable, inexpensive e-infrastructure providing all communication services. Persons are connected to the e-infrastructure via pe

17、rsonal computer devices that are continuously online. The networking components of the e-infrastructure invisibly provide optimal connectivity in terms of performance, reliability, cost, and security. The e-infrastructure physically senses, detects, records, and curates everything, using all the com

18、puters, storage devices, networks, and sensors. Subject to security, privacy, ownership and commercial rights all computational, storage, detector, and communication facilities are available to everyone. Detectors and subsystems will occur in all environments, across all industries and social servic

19、es, as also in the home environment. Subsystems are embedded within the e-infrastructure for example control systems for utilities including personaltransport. Other subsystems will be robotic for agriculture, manufacturing, healthcare, and other applications. This e-infrastructure vision has major

20、implications:1. There is a continuing and accelerating need for ever faster, smaller, cheaper, and more energy-efficient (and less heat-producing) devices. At some point biologically-inspired systems will dominate and will compete/cooperate with quantum-based technologies.2. New intelligent material

21、s will be developed, which will allow artifacts to be constructed internet-ready. These will range from agricultural products through to manufactured products.3. The open availability of everything simplifies the physical access and improves the performance,Including reducing latency, but will deman

22、d everincreasing performance, scalability, reliability, and self-management.4. The middleware of the e-infrastructure bears heavy responsibilities: (a) for providing the self* characteristics (self-managing, self-tuning, self- repairing) of a reliable e-infrastructure; (b) for identification, author

23、ization, trust, security, privacy, and access control; (c) for hiding the complexity through virtualization and abstraction, thus providing homogeneous access to and utilization of heterogeneous facilities.The i-infrastructure relies on the underlying e-infrastructure and converts the data (structur

24、ed, semi-structured, and unstructured) to information. The i-infrastructure provides the processing capabilities to collect, structure, manage, describe, and manipulate the information. It provides computational modeling/simulation facilities to generate new information. The processing capabilities

25、will be Service-Oriented Knowledge Utilities (SOKUs) which are discoverable/composable and dynamically tunable, based on properties described by their metadata. There is a massive Amount of content: From structured verified data and information through to personally authored social networking artifa

26、cts, and from data streams generated by detectors through to entertainment and education material. The volumes of data and information will preclude shipping data to processors with appropriate software; rather we shall need to ship software to the data.The k-Infrastructure manages knowledge; allowi

27、ng differing semantic descriptions over a formal syntax in the i-layer. This is the domain where humans or data mining extract knowledge from information by deduction or induction, where that knowledge is codified and stored for use in optimizing the e- and i- layers, and for interfacing to intellig

28、ent applications and intelligent user interfaces in the overlying application layer.Relying on this e-, i-, and k-infrastructure are applications. They also will be constructed from SOKUs. The SOKUs will have functional characteristics and their nonfunctional characteristics (including performance,

29、security, and use-condition aspects) will be determined by a well-defined interface to the e-infrastructure. Such architecture allows extensive re-use of well-tried components and the rapid development of applications, using them and additional new services specifically for a particular application.

30、 The applications will range from games and edutainment through to B2C (Businesstocustomer) and B2B (business-to-business) transactions within an E2E (enterprise-to-enterprise) environment and on to advanced R and D activities. Decision-making will be based not just on structured information and kno

31、wledge induction and deduction utilizing information, but also on simulations. These applications will be available (under appropriate conditions determined by the restrictive metadata) to everyone. Some applications will be general and widely applicable ranging from entertainment and games through

32、cooperative working/socializing to information management and analysis. These are likely to be pre-composed and optimized for efficiency. Some applications will be highly specialized for particular industrial/commercial sectors or for social sectors such as healthcare and environment; these will be

33、constructed dynamically at demand-time.The end-user will interact with the applications via a set of personalized devices including robots providing services. Each device-based service will have associated role-based profiles (metadata covering mainly nonfunctional requirements) to interact with the

34、 e-infrastructure. This provides the context for user- application interactions mediated by SOKU agents. The end-user device services will be intelligent and will learn from experience. They will act on behalf of the user in a majority of the cases. The end-user will not know (or care) where and how

35、 her requirements are met, as long as the agreed service levels are achieved. The use of service level agreements negotiated by agents on behalf of the user, their enforcement, and dealing with dissatisfaction and recompense will raise new challenges.7. ConclusionThe database research community has

36、in the past made great advances with major results (e.g., relational database technology although the pivotal research was done 40 years ago) being taken up and developed further by the IT industry and their products used throughout commerce and industry generating wealth and value. Similarly the te

37、chnology has underpinned advances in domains such as, environmental monitoring, healthcare, and education, generating improvements in the quality of life. Dave deWitt 7 proposed that database technology was a roadkill on the information superhighway and the subsequent development of web-based system

38、s al though backended by database technology has in some ways proved him right.The internet of things provides database research with a new opportunity and new challenges. The speed and required low latency for many applications are beyond the current capabilities and demand architecture beyond the

39、current database server clusters and distributed databases. Although database technology research has addressed semi-structured and multimedia information and datastreams, homogeneous access to and processing of heterogeneous sources is not yet solved. There has been research on representation of te

40、mporal properties, but no generally accepted representation has emerged (despite standardization). There has been research on incomplete and uncertain information, but again no generally accepted consensus.There are challenges (not dealt with above) in the representation of morality in the processin

41、g of information with appropriate privacy and security. A more widespread, open, and intelligent environment will produce new malware and malicious attacks; therefore, safeguards will have to be designed.物联网:传统数据库的死亡?摘要:传统的数据库研究通过开发技术,来确保数据库即便在为分散式的情况下依然代表利益世界完整和一致的状态。重要的概念已经被开发和证明。然而,物联网将遇到这些挑战。大量的

42、节点数和处理量,反应速度快,数据/信息空间是全球性的与空间数据通用。这带来了挑战。当真实的利益世界的信息地图通过各地数以百万计的节点来表示,并且其中有许多是在实时更新时,一个国家的概念意味着什么?当数据通过跨越数百或数千个节点,以及不同的策略进行更新时,一项交易看起来又像什么?更糟糕的是,如何不重算或补偿交易?我们已经看到了数据库的研究,关于半结构化数据和流数据,并实时应用。这些技术也可能将被应用到物联网吗? 物联网为安全隐患打开了更多的机会。我们将如何跨越多政策体系,来开发信任保障安全技术?我们如何防止擅自对私人信息的授权使用?我们需要动态的信任,安全和隐私管理。我们需要一个新的理论框架?关

43、键字:数据库,未来的互联网,完整性,过程,状态,交易,工作流。1、介绍 通过欧洲和世界上的许多活动可以预见到信息和通讯技术(ICT)的未来。现有的R&D的路线图以满足各个领域对未来发展的要求。欧盟委员会已经成立了专家小组和/或项目组,包括网格(GRIDs)、云(CLOUDs)、面向服务的体系架构、量子生物计算机、新型材料、人机交互,以及认知技术,那里有许多关于Web2.0和更高层次内容的讨论。而物联网也成为了欧共体(欧盟委员会)最近一个会议专门强调的重要主题。未来互联网大会(FIA)的根本目的在于加强和巩固对这个主题的热情,并且ERCIM NEWs第77号期刊已经将未来英特网技术作为特别主题。

44、欧共体负责信息社会与媒体的专员维维安,在撰写前言来强调其重要性。欧洲正在建立一个电子设备基础(e-infrastructure),而美国正在建立它的网络基础设施。 数据库研究人员(除少数例外)仍没有在这些讨论中表现得非常突出,这是令人惊讶的。因为试图率先通过在商业领域应用这些新技术的活动来促进研究,至少需要与现有的数据库技术的交互操作,并且这也可能促使数据库技术得到进一步、大规模、革命性的发展,以适应新的环境。数据库的研究已经转移到包括半结构化数据和其数据流的处理和管理的方面。同样有交互操作相匹配和映射的模式(有时在数据空间的背景下),以及领域本体的工作。还有关于网格数据库的界面建模、系统开发

45、的工作都正在进行中。而关于新算法的性能或查询、优化工作仍在继续,例如:优化的存储架构包括P2P(点对点)。2、前景前景有其根源,在随后的改进之后,将由ERCIM在2008年进行分析和综合,而在2009年将得到更新,它是基于为英国e-Science项目而计划的架构,并且如图一所示。让我们想象一个在20年时间里可能出现的状况,欧洲,以及世界所面临的问题(规模从国家到个人)是大型的、复杂的,并且需要前所未有的科学、数学和IT技能来帮他们解决。将会出现一个快速的、可靠的、价格低廉的电子设备基础(e-infrastructure)来提供所有的通讯服务。人们通过持续在线的个人电脑设备与e-infrastr

46、ucture相连接,而e-infrastructure的网络组建将在性能、可靠性、成本、安全性方面提供最佳的连接。e-infrastructure通过运用所有的计算机、存储设备、网络和传感器来进行物理感知、检测和记录,并执行一切活动,除了安全性、隐私权、所有权和商业权利以外。所有商业用途的存储器、探测器和通讯设施都将提供给大家。探测器和子系统将出现在所有环境中,渗透到各个行业和社会服务中,同样也会出现在现在的家庭环境中。子系统将会被嵌入到e-infrastructure之中例如:水电费控制系统包括个人用量,而其他子系统将为农业、制造业、医疗保健和其他应用领域服务。以下几点对e-infrastr

47、ucture的前景有着重要影响:(1)有一个对于更快速、体积更小、价格更便宜、更节能(少产热量)的设备的持续加速的需求。在一些情况下,生物启发的系统将会主导市场,并且与量子技术竞争或合作。(2)新型“智能材料”将被开发,这将使工作具有“网络准备”覆盖范围将从农产品延伸到制造业产品。(3)通过简化物理步骤来提升性能的可行性途径,包括减少延迟,但会对性能、可扩展性、可靠性和自我管理提出更高的要求。(4)e-infrastructure的中间件承担着重大的责任:(a)提供一个具有“自我”特点(自我管理)自我调控、自我修复)的可靠的e-infrastructure;(b)承鉴定、授权、信任、安全、保密

48、,以及访问控制的工作;(c)通过虚拟化和抽象化来隐藏其复杂性,从而提供均等的访问权和异构设施的使用权。i-infrastructure依赖于处于底层的e-infrastructure,并且将数据转换成信息(结构化数据、半结构化数据和非结构化数据)。i-infrastructure具备关于收集、组织、管理、描述和操作信息的处理能力。它提供计算建模/仿真设施,以产生新的信息。这种处理能力将会服务于公共事业,成为SOKUs。而其中有大量内容:从已核实的数据和信息,到自创的社交资源,并从探测的数据流,到娱乐和教育材料。通过大量的数据和信息将会妨碍是我们用于传输数据的软件。k-infrastructure的管理理念允许在i-infrastructure层面上存在不同的语义描述。经过删减和归纳后的信息将会被应用于e-i-k-infrastructure层面,并且服务于只能应用。依托于e-i-i-infrastructur

展开阅读全文
相似文档                                   自信AI助手自信AI助手
猜你喜欢                                   自信AI导航自信AI导航
搜索标签

当前位置:首页 > 学术论文 > 毕业论文/毕业设计

移动网页_全站_页脚广告1

关于我们      便捷服务       自信AI       AI导航        获赠5币

©2010-2024 宁波自信网络信息技术有限公司  版权所有

客服电话:4008-655-100  投诉/维权电话:4009-655-100

gongan.png浙公网安备33021202000488号   

icp.png浙ICP备2021020529号-1  |  浙B2-20240490  

关注我们 :gzh.png    weibo.png    LOFTER.png 

客服