Computer Science ›› 2018, Vol. 45 ›› Issue (9): 230-236.doi: 10.11896/j.issn.1002-137X.2018.09.038

• Artificial Intelligence • Previous Articles     Next Articles

Two Types of Dynamic Information Law Models and Their Applications in Information Camouflage and Risk Identification

REN Xue-fang1, ZHANG Ling1, SHI Kai-quan2   

  1. School of Information Engineering,Longyan University,Longyan,Fujian 364012,China1
    School of Mathematics and Systems Science,Shandong University,Jinan 250100,China2
  • Received:2017-08-29 Online:2018-09-20 Published:2018-10-10

Abstract: Function P-set is the function form of P-set.It is an information law model with dynamic characteristics and law or function characteristic obtained by improving P-set.In function P-set,the function’s attribute satisfies conjunctive normal form in mathematical logic.Function inverse P-set is the dual model of function P-set,in which the function’s attribute satisfies disjunctive normal form in mathematical logic.Here function P-set is defined as a type of dynamic information law model,while function inverse P-set is defined as another type of dynamic information law model.Based on the structures,characteristics and attribute normal forms of function P-sets and function inverse P-sets,a simple application of function P-set in information image splicing and camouflage and a simple application of function inverse P-set in profit risk estimation-identification were researched.Function P-sets and function inverse P-sets are the new theories and new models for the application research of dynamic information law.

Key words: Function P-sets, Function inverse P-sets, Information law, Conjunctive normal form, Disjunctive normal form

CLC Number: 

  • O144
[1] SHI K Q.Function P-sets[J].Journal of Shandong University(Natural Science),2011,46(2):62-69.(in Chinese)史开泉.函数P-集合[J].山东大学学报(理学版),2011,46(2):62-69.
[2] SHI K Q.Function P-sets[J].International Journal of Machine Learning and Cybernetics,2011,2(4):281-288.
[3] TANG J H,ZHANG L,SHI K Q.Intelligent fusion of information law and its inner separation[J].Computer Science,2015,42(2):204-209.(in Chinese)汤积华,张凌,史开泉.信息规律智能融合与它的智能融合内分离[J].计算机科学,2015,42(2):204-209.
[4] SHI K Q.P-information law intelligent fusion and soft information image intelligent generation [J].Journal of Shandong University(Natural Science),2014,49(4):1-17.(in Chinese)史开泉.P-信息规律智能融合与软信息图像智能生成[J].山东大学学报(理学版),2014,49(4):1-17.
[5] FAN C X,CHANG F L,SHI K Q.The generation of band information law and dynamic hiding of information law [J].International Journal of Machine Learning and Cybernetics,2016,7(3):443-449.
[6] SHI K Q.P-sets[J].Journal of Shandong University(Natural Science),2008,43(11):77-84.(in Chinese)史开泉.P-集合[J].山东大学学报(理学版),2008,43(11):77-84.
[7] SHI K Q.P-sets and its application [J].Advances in Systems Science and Applications,2009,9(2):209-219.
[8] SHI K Q.P-sets,inverse P-sets and the intelligent fusion-filteridentification of information[J].Computer Science,2012,39(4):1-13.(in Chinese)史开泉.P-集合,逆P-集合与信息智能融合-过滤辨识[J].计算机科学,2012,39(4):1-13.
[9] FAN C X,LIN H K.P-sets and the reasoning- identification of disaster information[J].International Journal of Convergence Information Technology,2012,7(1):337-345.
[10] LIN H K,FAN C X.The dual of P-reasoning and identification of unknown attribute[J].International Journal of Digital Content Technology and Its Applications,2012,6(1):121-131.
[11] ZHANG L,XIU M,SHI K Q.P-sets and Applications of Internal-Outer Data Circle[C]∥Proceedings of International Con-ference on Quantitative Logic and Soft Computing.Berlin:Springer-Verlag,2010:581-591.
[12] QIU Y F,CHEN B H.f-Model Generated by P-Set [C]∥Proceedings of International Conference on Quantitative Logic and Soft Computing.Berlin:Springer-Verlag,2010:613-620.
[13] LI Y Y,ZHANG L,SHI K Q.Generation and recovery of compressed data and redundant data[C]∥Proceedings of International Conference on Quantitative Logic and Soft Computing.Berlin:Springer-Verlag,2010:661-671.
[14] ZHANG L,REN X F.P-Sets and its (f,f-)-Heredity [C]∥Proceedings of International Conference on Quantitative Logic and Soft Computing.Berlin:Springer-Verlag,2010:735-743.
[15] XIU M,SHI K Q,ZHANG L.P-sets and F-data Selection-Discovery[C]∥Proceedings of International Conference on Quantitative Logic and Soft Computing.Berlin:Springer-Verlag,2010:791-799.
[16] ZHANG L,TANG J H,SHI K Q.The fusion of internal P-information and its feature of attribute conjunction [J].Journal of Shandong University(Natural Science),2014,49(2):93-97.(in Chinese)张凌,汤积华,史开泉.内P-信息融合与它的属性合取特征[J].山东大学学报(理学版),2014,49(2):93-97.
[17] SHI K Q.Function inverse P-sets and information law fusion[J].Journal of Shandong University(Natural Science),2012,47(8):73-80.(in Chinese)史开泉.函数逆P-集合与信息规律融合[J].山东大学学报(理学版),2012,47(8):73-80.
[18] SHI K Q.Function inverse P-sets and the hiding information generated by function inverse P-information law fusion [C]∥Proceedings of Digital Services and Information Intelligence on e-Business,e-Services,and e-Society.Berlin:Springer-Verlag,2014:224-237.
[19] TANG J H,CHEN B H,ZHANG L,et al.Function inverseP-sets and the dynamic separation of inverse P-information laws [J].Journal of Shandong University(Natural Science),2013,48(8):104-110.(in Chinese)汤积华,陈保会,张凌,等.函数逆P-集合与逆P-信息规律动态分离[J].山东大学学报(理学版),2013,48(8):104-110.
[20] SHI K Q.Inverse P-sets[J].Journal of Shandong University(Natural Science),2012,47(1):98-109.(in Chinese)史开泉.逆P-集合[J].山东大学学报(理学版),2012,47(1):98-109.
[21] FAN C X,HUANG S L.Inverse P-reasoning discovery identification of inverse P-information[J].International Journal of Digi-tal Content Technology and Its Applications,2012,6(20):735-744.
[22] SHI K Q,TANG J H,ZHANG L.Intelligent fusion of inverse P-information and recessive transmission of information intelligent hiding[J].Systems Engineering and Electronics,2015,37(3):599-605.(in Chinese)史开泉,汤积华,张凌.逆P-信息智能融合与信息智能隐藏的隐性传递[J].系统工程与电子技术,2015,37(3):599-605.
[1] ZHANG Ling, REN Xue-fang, SHI Kai-quan. Two Types of Dynamic Information Models and Their Applications [J]. Computer Science, 2018, 45(11): 238-243.
[2] TANG Ji-hua, ZHANG Ling and SHI Kai-quan. Intelligent Fusion of Information Law and its Inner Separating [J]. Computer Science, 2015, 42(2): 204-209.
[3] ZHAO Shu-li,ZHANG Huan-li and SHI Kai-quan. Function P-sets and Internal-mining of Internal P-information Law Dependence [J]. Computer Science, 2013, 40(5): 237-241.
[4] . Function P-sets and Attribute Control of Information Laws [J]. Computer Science, 2012, 39(7): 225-228.
[5] SHI Kai-quan. Function S-Rough Sets, Function Rough Sets and Separation-Composition of Law for Information Systems [J]. Computer Science, 2010, 37(10): 1-10.
[6] . [J]. Computer Science, 2007, 34(4): 158-162.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[5] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[6] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[7] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[8] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[9] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[10] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .