计算机科学 ›› 2020, Vol. 47 ›› Issue (11): 113-121.doi: 10.11896/jsjkx.191000071
郝秀梅1, 史开泉2
HAO Xiu-mei1, SHI Kai-quan2
摘要: 文中利用逆P-集合生成∨型大数据结构,给出∨型大数据的新概念,如大数据区块、区块矩阵、区块元、区块元矩阵与数据元概念;利用这些概念给出区块属性推理结构、区块矩阵推理结构、区块元智能分离定理、区块元智能检索定理、区块与区块元等价类定理;给出区块元智能分离准则、区块智能检索准则;给出区块元智能分离-区块智能检索算法与算法过程;给出大数据智能检索-大数据区块元智能分离-获取的应用。∨型大数据满足“属性析取”的逻辑特征。
中图分类号:
[1] SHI K Q.Big data structure-logic characteristics and big datalaw [J].Journal of Shandong University (Natural Science),2019,54(2):1-29. [2] SHI K Q.P-sets[J].Journal of Shandong University (Natural Science),2008,43(11):77-84. [3] SHI K Q.P-sets and its applications [J].Advances in Systems Science and Applications,2009,9(2):209-219. [4] SHI K Q.P-sets and its applied characteristics [J].Computer Science,2010,37(8):1-8. [5] SHI K Q.P-reasoning and P-reasoning discovery- identification of information [J].Computer Science,2011,38(7):1-9. [6] SHI K Q.P-sets,inverse P-sets and the intelligent fusion-filteridentification of information [J].Computer Science,2012,39(4):1-13. [7] FAN C X,LIN H K.P-sets and the reasoning- identification of disaster information [J].International Journal of Convergence Information Technology,2012,7(1):337-345. [8] LIN H K,FAN C X.The dual form of P-reasoning and identification of unknown attribute [J].International Journal of Digital Content Technology and its Applications,2012,6(1):121-131. [9] ZHANG L,CUI Y Q,SHI K Q.Outer P-sets and data internal recovery [J].Systems Engineering and Electronics,2010,32(6):1233-1238. [10] WANG Y,GENG H Q,SHI K Q.P-sets and dependence discovery of dynamic information [J].Systems Engineering and Electronics,2011,33(9):2035-2038. [11] LI Y Y,LIN H K,SHI K Q.Characteristics of data discrete interval and data discovery-application[J].Systems Engineering and Electronics,2011,33(10):2258-2262. [12] ZHANG L,TANG J H,SHI K Q.The fusion of internal packet information and its feature of attribute conjunction [J].Journal of Shandong University(Natural Science),2014,49(2):93-97. [13] SHI K Q,ZHANG L.Internal P-set and data outer-recovery[J].Journal of Shandong University (Natural Science),2009,44(4):8-14. [14] ZHANG G Y,ZHOU H Y,SHI K Q.P-sets and the recovery-identification double [J].Systems Engineering and Electronics,2010,32(9):1919-1924. [15] ZHANG L,REN X F.P-sets and (f,f-)-heredity[J].Quantitative Logic and Soft Computing,2010,2(1):735-743. [16] ZHANG L,XIU M,SHI K Q.P-sets and application of internal-outer data circle [J].Quantitative Logic and Soft Computing,2010,2(1):581-591. [17] QIU Y F,CHEN B H.f-model generated by P-sets [J].Quantitative Logic and Soft Computing,2010,2(1):613-620. [18] LI Y Y,ZHANG L,SHI K Q.Generation and recovery of compressed data and redundant data[J].Quantitative Logic and Soft Computing,2010,2(1):661-671. [19] XIU M,SHI K Q,ZHANG L.P-sets and F--data selection-discovery [J].Quantitative Logic and Soft Computing,2010,2(1):791-799. [20] ZHAO S L,FAN C X,SHI K Q.Outer P-information generation and its reasoning-searching discovery [J].Journal of Shandong University (Natural Science),2012,47(1):99-104. [21] ZHAO S L,WU S L,SHI K Q.Internal P- reasoning information recovery and attribute hiding searching discovery[J].Computer Science,2013,40(4):209-213. [22] SHI K Q.Function P-sets[J].Journal of Shandong University(Natural Science),2011,46(2):62-69. [23] SHI K Q.Function P-sets[J].International Journal of Machine Learning and Cybernetics,2011,2(4):281-288. [24] SHI K Q.P-information law intelligent fusion and soft information image intelligent generation[J].Journal of Shandong University (Natural Science),2014,49(4):1-17. [25] TANG J H,ZHANG L,SHI K Q.Intelligent fusion of information law and its inner separation[J].Computer Science,2015,42(2):204-209. [26] LIN R,FAN C X.Function P-sets and dynamic characteristics ofinformation law[J].Journal of Shandong University (Natural Science),2012,47(1):121-126. [27] REN X F,ZHANG L,SHI K Q.Two types of dynamic information law models and their applications in information camouflage and risk identification[J].Computer Science,2018,45(9):230-236. [28] CHEN B H,ZHANG L,SHI K Q.Intelligent dynamic fusion of packet information and the intelligent state recognition of information law[J].Journal of Shandong University (Natural Science),2018,53(2):83-87. [29] TANG J H,ZHANG L,SHI K Q,et al.Outer P-informationlaw reasoning andits application in intelligent fusion and separating of information law [J].Microsystem Technologies,2018,24(10):4389-4398. [30] SHI K Q.P-augmented matrix and dynamic intelligent discoveryidentification of information [J].Journal of Shandong University (Natural Science),2015,50(10):1-12. [31] ZHANG L,REN X F,SHI K Q.The dynamic segmentation characteristics of P-augmented matrix and the dynamic intelligent acquisition of P-information [J].International Journal of Applied Decision Sciences,2016,9(4):413-425. [32] ZHANG L,REN X F,SHI K Q.Intelligent switch- camouflage of information laws and P-law augmented matrices [J].Journal of Shandong University (Natural Science),2016,51(8):90-97. [33] TANG J H,CHEN B H,SHI K Q.P-augmented matrix reasoning and intelligent decomposition mining of information [J].Journal of Shandong University (Natural Science),2016,51(12):61-66. [34] LIU J Q,ZHANG H Y.Information P-dependence and P-dependence mining-sieving [J].Computer Science,2018,45(7):202-206. [35] SHI K Q.Inverse P-sets[J].Journal of Shandong University(Natural Science),2012,47(1):98-109. [36] SHI K Q,TANG J H,ZHANG L.Intelligent fusion of inverse packet information and recessive transmission of information's intelligent hiding[J].Systems Engineering and Electronics,2015,37(3):599-605. [37] SHI K Q.Function inverse P-sets and information law fusion[J].Journal of Shandong University:Natural Science,2012,47(8):73-80. [38] LIN K K,FAN C X.Embedding camouflage of inverse P-information and application[J].International Journal of Convergence Information and Technology,2012,7(20):471-480. [39] FAN C X,HUANG S L.Inverse P-reasoning discovery identification of inverse P-information[J].International Journal of Digital Content Technology and its Applications,2012,6(20):735-744. [40] SHI K Q.Function inverse P-sets and the hiding information generated by function inverse P-information law fusion[C]//Proceedings of the 13th IFIP WG 6.11 Conference on e-Business,e-Services,and e-Society.Sanya,China,2014:224-237. [41] TANG J H,CHEN B H,ZHANG L,BAI X R.Function inverse P-sets and the dynamic separation of inverse P- information laws[J].Journal of Shandong University (Natural Science),2013,48(8):104-110. [42] GUO H L,REN X F,ZHANG L.Relationships between dynamic data mining and P-augmented matrix[J].Journal of Shandong University (Natural Science),2016,51(8):105-110. [43] GUO H L,CHEN B H,TANG J H.Inverse P-sets and intelligent fusion mining-discovery of information [J].Journal of Shandong University (Natural Science),2013,48(8):97-103,110. [44] ZHANG L,REN X F,SHI K Q,et al.Inverse packet matrix reasoning model-based the intelligent dynamic separation and acquisition of educational information[J].Microsystem Technologies,2018,24(10):4415-4421. [45] REN X F,ZHANG L,SHI K Q,et al.Inverse P-augmented matrix method-based the dynamic findings of unknown information[J].Microsystem Technologies,2018,24(10):4187-4192. [46] ZHANG L,REN X F,SHI K Q.Inverse P-information law mo-dels and the reality-camouflage intelligent transformations of information image[C]//Proceedings of the 2016 International Conference on Network and Information Systems for Compu-ters.Washington:IEEE,2016:337-341. [47] ZHANG L,REN X F,SHI K Q.Inverse P-data models and data intelligent separation[C]//Proceedings of the 2016 International Conference on Electronic Information Technology and Intellectualization.2016. [48] REN X F,ZHANG L,SHI K Q.Surplus- deficiency of cardinal number and inverse P-augmented matrices[J].Journal of Shandong University (Natural Science),2015,50(10):13-18,26. [49] ZHANG L,REN X F.Surplus-deficient theorem of cardinalnumber and data internal-outer mining- separation [J].Journal of Shandong University (Natural Science),2015,50(8):90-94. [50] GUO H L,ZHANG L.Data separation and its attribute state characteristics [J].Journal of Shandong University (Natural Science),2017,52(12):89-94. [51] REN X F,ZHANG L,SHI K Q.Boundary Characteristics of Inverse P-sets and System Condition Monitoring[J].Computer Science,2016,43(10):211-213,255. [52] REN X F,ZHANG L.Perturbation theorems of inverse P-sets and perturbation-based data mining[J].Journal of Shandong University (Natural Science),2016,51(12):54-60. [53] WANG F Y,CARLEY K M,ZENG D,et al.Social computing:From social informatics to social intelligence [J].IEEE Intelligent systems,2007,22(2):79-83. [54] ZHANG N,WANG F Y,ZHU F,et al.DynaCAS:Computational experiments and decision support for ITS [J].IEEE Intelligent Systems,2008,23(6):19-23. [55] WANG F Y.Parallel control and management for intelligenttransportation systems:Concepts,architectures,and applications[J].IEEE Transactions on Intelligent Transportation Systems,2010,11(3):630-638. [56] WANG F Y.Scanning the issue and beyond:Parallel drivingwith software vehicular robots for safety and smartness [J].IEEE Transactions on Intelligent Transportation Systems,2014,15(4):1381-1387. [57] LV Y,DUAN Y,KANG W,et al.Traffic flow prediction with big data:A deep learning approach[J].IEEE Trans.Intelligent Transportation Systems,2015,16(2):865-873. [58] LV Y,ZHANG X,KANG W,et al.Managing Emergency Traffic Evacuation With a Partially Random Destination Allocation Strategy:A Computational-Experiment-Based Optimization Approach[J].IEEE Trans.Intelligent Transportation Systems,2015,16(4):2182-2191. [59] YUAN Y,WANG F Y,ZENG D.Developing a cooperative bidding framework for sponsored search markets-An evolutionary perspective [J].Information Sciences,2016,369:674-689. [60] WANG F Y.The emergence of intelligent enterprises:FromCPS to CPSS [J].IEEE Intelligent Systems,2010,25(4):85-88. [61] GOODHOPE K,KOSHY J,KREOS J,et al.Building LinkedIn'sReal-time Activity Data Pipeline [J].IEEE Data Eng.Bull.2012,35(2):33-45. [62] MCKUSICK K,QUINLAN S.GFS:evolution on fast-forward[J].Communications of the ACM,2010,53(3):42-49. [63] MELNIK S,GUBAREV A,LONG J J,et al.Dremel:interactive analysis of web-scale datasets [J].Proceedings of the VLDB Endowment,2010,3(1/2):330-339. [64] BU Y,HOWE B,BALAZINSKA M,et al.HaLoop:efficient iterative data processing on large clusters [J].Proceedings of the VLDB Endowment,2010,3(1/2):285-296. [65] CHEN S.Cheetah:a high performance,custom data warehouse on top of MapReduce [J].Proceedings of the VLDB Endowment,2010,3(1/2):1459-1468. [66] LUO T,LEE R,MESNIER M,et al.Storage-DB:heterogeneity-aware data management to exploit the full capability of hybrid storage systems [J].Proceedings of the VLDB Endowment,2012,5(10):1076-1087. [67] WONG P C,SHEN H W,JOHNSON C R,et al.The top 10 challenges in extreme-scale visual analytics [J].IEEE computer graphics and applications,2012,32(4):63-67. [68] PIKE R,DORWARD S,GRIESEMER R,et al.Interpreting the data:Parallel analysis with Sawzall[J].Scientific Programming,2005,13(4):277-298. [69] SHI K Q,YAO B X.Function S-rough sets and law identification [J].Science in China E:Information Science,2008,38(4):553-564. [70] SHI K Q,ZHAO J L.Function S-rough sets and security-au-thentication of hiding law[J].Science in China E:Information Science,2008,38(8):1234-1243. [71] SHI K Q,YAO B X.Function S-rough sets and law identification [J].Science in China F:Information Science,2008,51(5):499-510. [72] SHI K Q,ZHAO J L.Function S-rough sets and security-au-thentication of hiding law[J].Science in China F:information Sciences,2008,51(7):924-935. |
[1] | 王毅, 李政浩, 陈星. 基于用户场景的Android 应用服务推荐方法 Recommendation of Android Application Services via User Scenarios 计算机科学, 2022, 49(6A): 267-271. https://doi.org/10.11896/jsjkx.210700123 |
[2] | 傅丽玉, 陆歌皓, 吴义明, 罗娅玲. 区块链技术的研究及其发展综述 Overview of Research and Development of Blockchain Technology 计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214 |
[3] | 李博, 向海昀, 张宇翔, 廖浩德. 面向食品溯源场景的PBFT优化算法应用研究 Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios 计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018 |
[4] | 孙轩, 王焕骁. 政务大数据安全防护能力建设:基于技术和管理视角的探讨 Capability Building for Government Big Data Safety Protection:Discussions from Technologicaland Management Perspectives 计算机科学, 2022, 49(4): 67-73. https://doi.org/10.11896/jsjkx.211000010 |
[5] | 耿海军, 王威, 尹霞. 基于混合软件定义网络的单节点故障保护方法 Single Node Failure Routing Protection Algorithm Based on Hybrid Software Defined Networks 计算机科学, 2022, 49(2): 329-335. https://doi.org/10.11896/jsjkx.210100051 |
[6] | 何权奇, 余飞鸿. 面向无线网络相机的低功耗架构研究综述 Review of Low Power Architecture for Wireless Network Cameras 计算机科学, 2021, 48(6A): 369-373. https://doi.org/10.11896/jsjkx.201100099 |
[7] | 董仕. 软件定义网络安全问题研究综述 Survey on Software Defined Networks Security 计算机科学, 2021, 48(3): 295-306. https://doi.org/10.11896/jsjkx.200300119 |
[8] | 张寒烁, 杨冬菊. 基于关系图谱的科技数据分析算法 Technology Data Analysis Algorithm Based on Relational Graph 计算机科学, 2021, 48(3): 174-179. https://doi.org/10.11896/jsjkx.191200154 |
[9] | 李辉, 李秀华, 熊庆宇, 文俊浩, 程路熙, 邢镔. 边缘计算助力工业互联网:架构、应用与挑战 Edge Computing Enabling Industrial Internet:Architecture,Applications and Challenges 计算机科学, 2021, 48(1): 1-10. https://doi.org/10.11896/jsjkx.200900150 |
[10] | 张宇翔, 任爽. 定位技术在虚拟现实中的应用综述 Overview of Application of Positioning Technology in Virtual Reality 计算机科学, 2021, 48(1): 308-318. https://doi.org/10.11896/jsjkx.200800010 |
[11] | 郭杰, 高希然, 陈莉, 傅游, 刘颖. 用数据驱动的编程模型并行多重网格应用 Parallelizing Multigrid Application Using Data-driven Programming Model 计算机科学, 2020, 47(8): 32-40. https://doi.org/10.11896/jsjkx.200500093 |
[12] | 林旭丹, 鲍士兼, 赵立昕, 赵成林. 基于Hyperledger Fabric的汽车供应链系统的方案设计与性能分析 Design and Performance Analysis of Automotive Supply Chain System Based on Hyperledger Fabric 计算机科学, 2020, 47(6A): 546-551. https://doi.org/10.11896/JsJkx.190700022 |
[13] | 赵明. 边缘计算技术及应用综述 Survey on Technology and Application of Edge Computing 计算机科学, 2020, 47(6A): 268-272. https://doi.org/10.11896/JsJkx.190600115 |
[14] | 葛雨明, 韩庆文, 王妙琼, 曾令秋, 李璐. 汽车大数据应用模式与挑战分析 Application Mode and Challenges of Vehicular Big Data 计算机科学, 2020, 47(6): 59-65. https://doi.org/10.11896/jsjkx.191200165 |
[15] | 胡宇佳, 甘伟, 朱敏. 基于多特征融合的增强子-启动子相互作用预测综述 Enhancer-Promoter Interaction Prediction Based on Multi-feature Fusion 计算机科学, 2020, 47(5): 64-71. https://doi.org/10.11896/jsjkx.191100027 |
|