Computer Science ›› 2018, Vol. 45 ›› Issue (11): 238-243.doi: 10.11896/j.issn.1002-137X.2018.11.037

• Artificial Intelligence • Previous Articles     Next Articles

Two Types of Dynamic Information Models and Their Applications

ZHANG Ling1, REN Xue-fang1, SHI Kai-quan2   

  1. (School of Mathematics and Information Engineering,Longyan University,Longyan,Fujian 364012,China)1
    (School of Mathematics and Systems Science,Shandong University,Jinan 250100,China)2
  • Received:2017-08-29 Published:2019-02-25

Abstract: P-set is a type of set model with dynamic characteristics,in which the elements’ attribute satisfies the conjunctive normal form in mathematical logic.P-set is proposed by introducing dynamic characteristics into finite ordinary element set (finite Cantor set) X and improving it.Inverse P-set is another type of set model with dynamic characteristics,in which the elements’ attribute satisfies the disjunctive normal form in mathematical logic.Inverse P-set is also proposed by introducing dynamic characteristics into finite ordinary element set X and improving it.Inverse P-set is the dual form of P-set.Here P-set is defined as a type of dynamic information model,while inverse P-set is defined as ano-ther type of dynamic information model.In this paper,the structures,generations and dynamic characteristics of P-sets and inverse P-sets were introduced.The existence facts of P-sets and inverse P-sets were presented.By employing P-sets,the recursive searching-finding and application of information with attribute conjunctive normal form were given.By using inverse P-sets,the the mining-acquisition and application of information with attribute disjunctive normal form were given.P-sets and inverse P-sets are the new models and new methods for the application research of dynamic information or dynamic data.

Key words: P-sets, Inverse P-sets, Conjunctive normal form, Disjunctive normal form, Recursive searching-finding, Mining-acquisition

CLC Number: 

  • O144
[1]SHI K Q.P-sets[J].Journal of Shandong University(Natural Science),2008,43(11):77-84.(in Chinese)
[2]SHI K Q.P-sets and its application [J].Advances in Systems Science and Applications,2009,9(2):209-219.
[3]SHI K Q.P-sets,inverse P-sets and the intelligent fusion-filter identification of information [J].Computer Science,2012,39(4):1-13.(in Chinese)
[4]FAN C X,LIN H K.P-sets and the reasoning-identification of disaster information[J].International Journal of Convergence Information Technology,2012,7(1):337-345.
[5]LIN H K,FAN C X.The dual form of P-reasoning and identification of unknown attribute [J].International Journal of Digital Content Technology and its Applications,2012,6(1):121-131.
[6]LI Y Y,LIN H K,SHI K Q.Characteristics of data discrete interval and data discovery-application [J].Systems Engineering and Electronics,2011,33(10):2258-2262.(in Chinese)
[7]ZHANG L,REN X F.P-Sets and its (f,f-)-Heredity [C]∥Proceedings of International Conference on Quantitative Logic and Soft Computing.Berlin:Springer-Verlag,2010:735-743.
[8]XIU M,SHI K Q,ZHANG L.P-sets and F--data Selection-Discovery[C]∥Proceedings of International Conference on Quantitative Logic and Soft Computing.Berlin:Springer-Verlag,2010:791-799.
[9]ZHANG L,TANG J H,SHI K Q.The fusion of internal P-information and its feature of attribute conjunction [J].Journal of Shandong University(Natural Science),2014,49(2):93-97.(in Chinese)
[10]ZHANG L,REN X F,SHI K Q.Intelligent switch-camouflage of information laws and P-law augmented matrices [J].Journal of Shandong University(Natural Science),2016,51(8):90-97.(in Chinese)
[11]SHI K Q.Inverse P-sets [J].Journal of Shandong University(Natural Science),2012,47(1):98-109.(in Chinese)
[12]SHI K Q.Function inverse P-sets and the hiding information generated by function inverse P-information law fusion [C]∥Proceedings of Digital Services and Information Intelligence on e-Business,e-Services,and e-Society.Berlin:Springer-Verlag,2014:224-237.
[13]FAN C X,HUANG S L.Inverse P-reasoning discovery identification of inverse P-information [J].International Journal of Digi-tal Content Technology and its Applications,2012,6(20):735-744.
[14]SHI K Q,TANG J H,ZHANG L.Intelligent fusion of inverse P-information and recessive transmission of information intelligent hiding [J].Systems Engineering and Electronics,2015,37(3):599-605.(in Chinese)
[15]ZHANG L,REN X F.Surplus-deficient theorem of cardinal number and data internal-outer mining-separation [J].Journal of Shandong University(Natural Science),2015,50(8):90-94.(in Chinese)
[16]REN X F,ZHANG L,SHI K Q.Boundary Characteristics of Inverse P-sets and System Condition Monitoring[J].Computer Science,2016,43(10):211-213.(in Chinese)
[17]REN X F,ZHANG L.Perturbation theorems of inverse P-sets and perturbation-based data mining[J].Journal of Shandong University(Natural Science),2016,51(12):54-60.(in Chinese)
[18]SHI K Q.Function P-sets [J].Journal of Shandong University(Natural Science),2011,46(2):62-69.(in Chinese)
[19]SHI K Q.Function P-sets [J].International Journal of Machine Learning and Cybernetics,2011,2(4):281-288.
[20]SHI K Q.P-information law intelligent fusion and soft information image intelligent generation [J].Journal of Shandong University(Natural Science),2014,49(4):1-17.(in Chinese)
[21]FAN C X,CHANG F L,SHI K Q.The generation of band information law and dynamic hiding of information law [J].International Journal of Machine Learning and Cybernetics,2016,7(3):443-449.
[22]SHI K Q.Function inverse P-sets and information law fusion [J].Journal of Shandong University(Natural Science),2012,47(8):73-80.(in Chinese)
[23]TANG J H,CHEN B H,ZHANG L,et al.Function inverse P-sets and the dynamic separation of inverse P-information laws [J].Journal of Shandong University(Natural Science),2013,48(8):104-110.(in Chinese)
[24]ZHANG J X,XU F S.Applications of function internal inverse P-set to QSPQ research[J].Journal of Shandong University(Natural Science),2013,48(8):92-96.(in Chinese)
[1] REN Xue-fang, ZHANG Ling, SHI Kai-quan. Two Types of Dynamic Information Law Models and Their Applications in Information Camouflage and Risk Identification [J]. Computer Science, 2018, 45(9): 230-236.
[2] LIU Ji-qin , ZHANG Hai-yue. Information P-dependence and P-dependence Mining-sieving [J]. Computer Science, 2018, 45(7): 202-206.
[3] XU Feng-sheng, YU Xiu-qing and SHI Kai-quan. P-data Model and Intelligent Acquisition of P-data [J]. Computer Science, 2018, 45(5): 176-179.
[4] ZHANG Jing-xiao, XU Feng-sheng, LIU Xin-hua and ZHANG Li-hua. Outer Inverse P-sets and Double Information Camouflage-Recovery for Digital Image and its Application [J]. Computer Science, 2016, 43(2): 250-253.
[5] REN Xue-fang, ZHANG Ling and SHI Kai-quan. Boundary Characteristics of Inverse P-sets and System Condition Monitoring [J]. Computer Science, 2016, 43(10): 211-213.
[6] LU Ying, LI Bei-you and SHI Kai-quan. Intelligent Mining for P-Information with Expanded Characteristic of Disjunctive Attribute [J]. Computer Science, 2015, 42(1): 215-219.
[7] XU Feng-sheng,YU Xiu-qing and SHI Kai-quan. Intenal-Outer Fusion of Attributes and Intelligent Digging-Seperation of Information [J]. Computer Science, 2014, 41(7): 254-260.
[8] YU Xiu-qing,XU Feng-sheng and SHI Kai-quan. Discovery and Application of Risk Investment Losses Based on P-reasoning [J]. Computer Science, 2013, 40(8): 227-232.
[9] XU Feng-sheng,YU Xiu-qing and SHI Kai-quan. Embedding-camouflage of Inverse P-information and its Separation-discovery by Inverse P-reasoning [J]. Computer Science, 2013, 40(8): 200-203.
[10] GUO Zhi-lin,ZHAO Shu-li and SHI Kai-quan. System State Detection-Recognition Based on Random P-sets [J]. Computer Science, 2013, 40(7): 178-181.
[11] ZHAO Shu-li,ZHANG Huan-li and SHI Kai-quan. Function P-sets and Internal-mining of Internal P-information Law Dependence [J]. Computer Science, 2013, 40(5): 237-241.
[12] ZHAO Shu-li,WU Song-li and SHI Kai-quan. Internal P-reasoning Information Recovery and Attribute Hiding Reasoning Discovery [J]. Computer Science, 2013, 40(4): 209-213.
[13] . Inverse P-reasoning and Discovery,Reasoning-search for Unknown Information [J]. Computer Science, 2012, 39(8): 268-272.
[14] . Function P-sets and Attribute Control of Information Laws [J]. Computer Science, 2012, 39(7): 225-228.
[15] . P-sets and its Dynamic Equivalence Classes Characteristics [J]. Computer Science, 2012, 39(4): 246-249.
Full text



[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[5] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[6] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[7] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[8] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[9] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[10] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .