基于改进的TreeMap算法的数据可视化系统的研究与实现
[Abstract]:In order to improve the efficiency and correctness of data processing, the technology of data visualization based on TreeMap algorithm is widely used. However, the classical TreeMap algorithm has some problems, such as low synthesis performance, which leads to the inefficiency of data visualization based on this algorithm. Based on the advantages of the classical TreeMap algorithm, this paper proposes an improved TreeMap algorithm for the problem of poor synthesis performance of the classical TreeMap algorithm, and applies it to the data visualization system to improve the comprehensive performance of the data visualization processing. In addition, the visual system is vulnerable to cross-domain script attacks, and the system is defended in detail. First of all, this paper discusses the basic theory of visualization technology, summarizes the characteristics of different types of visualization technology, expounds the basic theory of TreeMap algorithm, enumerates the classical TreeMap algorithm. At the same time, the basic knowledge of cross-domain script attacks is discussed, and the characteristics and basic defense methods of different types of cross-domain scripting attacks are expounded. Secondly, the research and design of data visualization system based on improved TreeMap algorithm are carried out. This paper puts forward the core algorithm of the system, a kind of improved TreeMap algorithm partial reverse layout algorithm (Squarified-PartialOrdering algorithm), analyzes the main thought strategy of the algorithm in depth, and studies the concrete application of the algorithm in the system. The security vulnerabilities of the system are analyzed, and the defense design work is done in detail. At the same time, the other functional modules of the system are deeply studied, and the design work is refined to each sub-module. On this basis, the implementation of each functional module of the system has been done in detail, corresponding to the previous module design work, the implementation work is also refined to each sub-module of the system, and the key part of the implementation code is given. And each functional module after the implementation of the effect diagram. Finally, according to the functional requirements of the system, a reasonable test environment is set up, the main functions and visual performance of the system are tested in detail, and the test results are analyzed and summarized. In terms of system functions, the system can visualize a large amount of data and has a certain cross-domain script attack defense function. In the aspect of visualization performance, after adopting the improved TreeMap algorithm, the system improves the problems caused by the defects of some classical TreeMap algorithms, obtains a higher performance of the visual aspect ratio, and at the same time ensures the continuity of the data. It also avoids the narrow problem in the last area. As a whole, the system not only has perfect visualization function and certain security defense, but also has high visual comprehensive performance, which improves the efficiency and correctness of users' obtaining information to a certain extent.
【学位授予单位】:北京邮电大学
【学位级别】:硕士
【学位授予年份】:2016
【分类号】:TP309
【参考文献】
相关期刊论文 前10条
1 陈谊;胡海云;李志龙;;树图布局算法的比较与优化研究[J];计算机辅助设计与图形学学报;2013年11期
2 陈谊;贾艳杰;孙悦红;;分块排序的正方化树图布局算法[J];计算机辅助设计与图形学学报;2013年05期
3 张昕;袁晓如;;树图可视化[J];计算机辅助设计与图形学学报;2012年09期
4 肖卫东;孙扬;赵翔;周城;封孝生;;层次信息可视化技术研究综述[J];小型微型计算机系统;2011年01期
5 张敏;;基于Treemap的大规模商务层次数据可视化研究[J];科技传播;2010年17期
6 陈建青;张玉清;;Web跨站脚本漏洞检测工具的设计与实现[J];计算机工程;2010年06期
7 谷建涛;周哲;佟玉霞;;基于树图双向正方化算法的实验研究[J];计算机应用与软件;2009年09期
8 陈嘉迅;;论跨站脚本(XSS)攻击的危害、成因及防范[J];网络与信息;2008年09期
9 景民昌;孙洁丽;;大型层次信息可视化方法研究[J];情报科学;2008年04期
10 刘波;徐学文;;可视化分类方法对比研究[J];情报杂志;2008年02期
相关重要报纸文章 前1条
1 奇云;;“虚拟中国人”向我们走来![N];中国审计报;2002年
相关硕士学位论文 前8条
1 许文鹏;数据可视化系统架构的设计与实现[D];北京交通大学;2015年
2 李希娟;大数据时代下的数据可视化研究[D];河北大学;2014年
3 曾悠;大数据时代背景下的数据可视化概念研究[D];浙江大学;2014年
4 章明;Web应用程序客户端脚本安全技术研究[D];上海交通大学;2012年
5 张哲;Web应用中安全漏洞检测技术的研究[D];西安电子科技大学;2011年
6 雷超;企业办公及科研管理可视化系统的研究与开发[D];西安电子科技大学;2011年
7 黄文锋;DOM型XSS攻击防范模型研究[D];广州大学;2010年
8 沈寿忠;基于网络爬虫的SQL注入与XSS漏洞挖掘[D];西安电子科技大学;2009年
,本文编号:2242866
本文链接:https://www.wllwen.com/kejilunwen/ruanjiangongchenglunwen/2242866.html