Computer Science ›› 2020, Vol. 47 ›› Issue (11): 113-121.doi: 10.11896/jsjkx.191000071

• Database & Big Data & Data Science • Previous Articles     Next Articles

Big Data Intelligent Retrieval and Big Data Block Element Intelligence Separation

HAO Xiu-mei1, SHI Kai-quan2   

  1. 1 School of Mathematics and Quantitative Economics,Shandong University of Finance and Economics,Jinan 250014,China
    2 School of Mathematics,Shandong University,Jinan 250100,China
  • Received:2019-10-12 Revised:2020-03-27 Online:2020-11-15 Published:2020-11-05
  • About author:HAO Xiu-mei,born in 1965,Ph.D,professor,Ph.D supervisor.Her main research interests include risk data identification,big data analysis and application and rough system theory and app-lication.
    SHI Kai-quan,born in 1945,professor,Ph.Dsupervisor.His main research interests include big data theory and application,information intelligent system.He proposed S-rough sets,function S-rough sets,P-sets,inverse P-sets,function P-sets and function inverse P-sets.More papers were published in Science in China E,Science in China F and other journals. In 2010-2016,a number of papers were selected as “100 most influential domestic academic papers in China”.The two papers published in Computer Science,“Function S-rough sets,function rough sets and separation-composition of law for information systems” and “P-sets,inverse P-sets and the intelligent fusion-filter identification of information”were listed among them.A number of papers were selected in Frontrunner 5000.A number of monographs have been published.
  • Supported by:
    This work was supported by the National Social Science Foundation of China (71663010) and Natural Science Foundation of Shandong Province,China (zr2013aq019).

Abstract: By using∨-type big data structure generated by inverse P-sets,some new concepts of ∨-type big data are given,such as big data block,block matrix,block element,block element matrix and data element.Based on these concepts,the reasoning structure of block attribute,the reasoning structure of block matrix,the intelligent separation theorems,the intelligent retrieval theorems of block element and the equivalence class theorems of block and block element are given.An intelligent separation criterion of block element and an intelligent retrieval criterion of block are presented.A block element intelligent separation-block intelligent retrieval algorithm and its algorithm process are given.The application of big data intelligent retrieval-big data block element intelligent separation-acquisition is given.∨-type big data satisfies the logical characteristic of ‘attribute disjunction'.

Key words: Application, Attribute-matrix reasoning, Big data block, Intelligent retrieval algorithm, Intelligent retrieval criterion, V-type big data

CLC Number: 

  • O144
[1] SHI K Q.Big data structure-logic characteristics and big datalaw [J].Journal of Shandong University (Natural Science),2019,54(2):1-29.
[2] SHI K Q.P-sets[J].Journal of Shandong University (Natural Science),2008,43(11):77-84.
[3] SHI K Q.P-sets and its applications [J].Advances in Systems Science and Applications,2009,9(2):209-219.
[4] SHI K Q.P-sets and its applied characteristics [J].Computer Science,2010,37(8):1-8.
[5] SHI K Q.P-reasoning and P-reasoning discovery- identification of information [J].Computer Science,2011,38(7):1-9.
[6] SHI K Q.P-sets,inverse P-sets and the intelligent fusion-filteridentification of information [J].Computer Science,2012,39(4):1-13.
[7] FAN C X,LIN H K.P-sets and the reasoning- identification of disaster information [J].International Journal of Convergence Information Technology,2012,7(1):337-345.
[8] LIN H K,FAN C X.The dual form of P-reasoning and identification of unknown attribute [J].International Journal of Digital Content Technology and its Applications,2012,6(1):121-131.
[9] ZHANG L,CUI Y Q,SHI K Q.Outer P-sets and data internal recovery [J].Systems Engineering and Electronics,2010,32(6):1233-1238.
[10] WANG Y,GENG H Q,SHI K Q.P-sets and dependence discovery of dynamic information [J].Systems Engineering and Electronics,2011,33(9):2035-2038.
[11] LI Y Y,LIN H K,SHI K Q.Characteristics of data discrete interval and data discovery-application[J].Systems Engineering and Electronics,2011,33(10):2258-2262.
[12] ZHANG L,TANG J H,SHI K Q.The fusion of internal packet information and its feature of attribute conjunction [J].Journal of Shandong University(Natural Science),2014,49(2):93-97.
[13] SHI K Q,ZHANG L.Internal P-set and data outer-recovery[J].Journal of Shandong University (Natural Science),2009,44(4):8-14.
[14] ZHANG G Y,ZHOU H Y,SHI K Q.P-sets and the recovery-identification double [J].Systems Engineering and Electronics,2010,32(9):1919-1924.
[15] ZHANG L,REN X F.P-sets and (f,f-)-heredity[J].Quantitative Logic and Soft Computing,2010,2(1):735-743.
[16] ZHANG L,XIU M,SHI K Q.P-sets and application of internal-outer data circle [J].Quantitative Logic and Soft Computing,2010,2(1):581-591.
[17] QIU Y F,CHEN B H.f-model generated by P-sets [J].Quantitative Logic and Soft Computing,2010,2(1):613-620.
[18] LI Y Y,ZHANG L,SHI K Q.Generation and recovery of compressed data and redundant data[J].Quantitative Logic and Soft Computing,2010,2(1):661-671.
[19] XIU M,SHI K Q,ZHANG L.P-sets and F--data selection-discovery [J].Quantitative Logic and Soft Computing,2010,2(1):791-799.
[20] ZHAO S L,FAN C X,SHI K Q.Outer P-information generation and its reasoning-searching discovery [J].Journal of Shandong University (Natural Science),2012,47(1):99-104.
[21] ZHAO S L,WU S L,SHI K Q.Internal P- reasoning information recovery and attribute hiding searching discovery[J].Computer Science,2013,40(4):209-213.
[22] SHI K Q.Function P-sets[J].Journal of Shandong University(Natural Science),2011,46(2):62-69.
[23] SHI K Q.Function P-sets[J].International Journal of Machine Learning and Cybernetics,2011,2(4):281-288.
[24] SHI K Q.P-information law intelligent fusion and soft information image intelligent generation[J].Journal of Shandong University (Natural Science),2014,49(4):1-17.
[25] TANG J H,ZHANG L,SHI K Q.Intelligent fusion of information law and its inner separation[J].Computer Science,2015,42(2):204-209.
[26] LIN R,FAN C X.Function P-sets and dynamic characteristics ofinformation law[J].Journal of Shandong University (Natural Science),2012,47(1):121-126.
[27] REN X F,ZHANG L,SHI K Q.Two types of dynamic information law models and their applications in information camouflage and risk identification[J].Computer Science,2018,45(9):230-236.
[28] CHEN B H,ZHANG L,SHI K Q.Intelligent dynamic fusion of packet information and the intelligent state recognition of information law[J].Journal of Shandong University (Natural Science),2018,53(2):83-87.
[29] TANG J H,ZHANG L,SHI K Q,et al.Outer P-informationlaw reasoning andits application in intelligent fusion and separating of information law [J].Microsystem Technologies,2018,24(10):4389-4398.
[30] SHI K Q.P-augmented matrix and dynamic intelligent discoveryidentification of information [J].Journal of Shandong University (Natural Science),2015,50(10):1-12.
[31] ZHANG L,REN X F,SHI K Q.The dynamic segmentation characteristics of P-augmented matrix and the dynamic intelligent acquisition of P-information [J].International Journal of Applied Decision Sciences,2016,9(4):413-425.
[32] ZHANG L,REN X F,SHI K Q.Intelligent switch- camouflage of information laws and P-law augmented matrices [J].Journal of Shandong University (Natural Science),2016,51(8):90-97.
[33] TANG J H,CHEN B H,SHI K Q.P-augmented matrix reasoning and intelligent decomposition mining of information [J].Journal of Shandong University (Natural Science),2016,51(12):61-66.
[34] LIU J Q,ZHANG H Y.Information P-dependence and P-dependence mining-sieving [J].Computer Science,2018,45(7):202-206.
[35] SHI K Q.Inverse P-sets[J].Journal of Shandong University(Natural Science),2012,47(1):98-109.
[36] SHI K Q,TANG J H,ZHANG L.Intelligent fusion of inverse packet information and recessive transmission of information's intelligent hiding[J].Systems Engineering and Electronics,2015,37(3):599-605.
[37] SHI K Q.Function inverse P-sets and information law fusion[J].Journal of Shandong University:Natural Science,2012,47(8):73-80.
[38] LIN K K,FAN C X.Embedding camouflage of inverse P-information and application[J].International Journal of Convergence Information and Technology,2012,7(20):471-480.
[39] FAN C X,HUANG S L.Inverse P-reasoning discovery identification of inverse P-information[J].International Journal of Digital Content Technology and its Applications,2012,6(20):735-744.
[40] SHI K Q.Function inverse P-sets and the hiding information generated by function inverse P-information law fusion[C]//Proceedings of the 13th IFIP WG 6.11 Conference on e-Business,e-Services,and e-Society.Sanya,China,2014:224-237.
[41] TANG J H,CHEN B H,ZHANG L,BAI X R.Function inverse P-sets and the dynamic separation of inverse P- information laws[J].Journal of Shandong University (Natural Science),2013,48(8):104-110.
[42] GUO H L,REN X F,ZHANG L.Relationships between dynamic data mining and P-augmented matrix[J].Journal of Shandong University (Natural Science),2016,51(8):105-110.
[43] GUO H L,CHEN B H,TANG J H.Inverse P-sets and intelligent fusion mining-discovery of information [J].Journal of Shandong University (Natural Science),2013,48(8):97-103,110.
[44] ZHANG L,REN X F,SHI K Q,et al.Inverse packet matrix reasoning model-based the intelligent dynamic separation and acquisition of educational information[J].Microsystem Technologies,2018,24(10):4415-4421.
[45] REN X F,ZHANG L,SHI K Q,et al.Inverse P-augmented matrix method-based the dynamic findings of unknown information[J].Microsystem Technologies,2018,24(10):4187-4192.
[46] ZHANG L,REN X F,SHI K Q.Inverse P-information law mo-dels and the reality-camouflage intelligent transformations of information image[C]//Proceedings of the 2016 International Conference on Network and Information Systems for Compu-ters.Washington:IEEE,2016:337-341.
[47] ZHANG L,REN X F,SHI K Q.Inverse P-data models and data intelligent separation[C]//Proceedings of the 2016 International Conference on Electronic Information Technology and Intellectualization.2016.
[48] REN X F,ZHANG L,SHI K Q.Surplus- deficiency of cardinal number and inverse P-augmented matrices[J].Journal of Shandong University (Natural Science),2015,50(10):13-18,26.
[49] ZHANG L,REN X F.Surplus-deficient theorem of cardinalnumber and data internal-outer mining- separation [J].Journal of Shandong University (Natural Science),2015,50(8):90-94.
[50] GUO H L,ZHANG L.Data separation and its attribute state characteristics [J].Journal of Shandong University (Natural Science),2017,52(12):89-94.
[51] REN X F,ZHANG L,SHI K Q.Boundary Characteristics of Inverse P-sets and System Condition Monitoring[J].Computer Science,2016,43(10):211-213,255.
[52] REN X F,ZHANG L.Perturbation theorems of inverse P-sets and perturbation-based data mining[J].Journal of Shandong University (Natural Science),2016,51(12):54-60.
[53] WANG F Y,CARLEY K M,ZENG D,et al.Social computing:From social informatics to social intelligence [J].IEEE Intelligent systems,2007,22(2):79-83.
[54] ZHANG N,WANG F Y,ZHU F,et al.DynaCAS:Computational experiments and decision support for ITS [J].IEEE Intelligent Systems,2008,23(6):19-23.
[55] WANG F Y.Parallel control and management for intelligenttransportation systems:Concepts,architectures,and applications[J].IEEE Transactions on Intelligent Transportation Systems,2010,11(3):630-638.
[56] WANG F Y.Scanning the issue and beyond:Parallel drivingwith software vehicular robots for safety and smartness [J].IEEE Transactions on Intelligent Transportation Systems,2014,15(4):1381-1387.
[57] LV Y,DUAN Y,KANG W,et al.Traffic flow prediction with big data:A deep learning approach[J].IEEE Trans.Intelligent Transportation Systems,2015,16(2):865-873.
[58] LV Y,ZHANG X,KANG W,et al.Managing Emergency Traffic Evacuation With a Partially Random Destination Allocation Strategy:A Computational-Experiment-Based Optimization Approach[J].IEEE Trans.Intelligent Transportation Systems,2015,16(4):2182-2191.
[59] YUAN Y,WANG F Y,ZENG D.Developing a cooperative bidding framework for sponsored search markets-An evolutionary perspective [J].Information Sciences,2016,369:674-689.
[60] WANG F Y.The emergence of intelligent enterprises:FromCPS to CPSS [J].IEEE Intelligent Systems,2010,25(4):85-88.
[61] GOODHOPE K,KOSHY J,KREOS J,et al.Building LinkedIn'sReal-time Activity Data Pipeline [J].IEEE Data Eng.Bull.2012,35(2):33-45.
[62] MCKUSICK K,QUINLAN S.GFS:evolution on fast-forward[J].Communications of the ACM,2010,53(3):42-49.
[63] MELNIK S,GUBAREV A,LONG J J,et al.Dremel:interactive analysis of web-scale datasets [J].Proceedings of the VLDB Endowment,2010,3(1/2):330-339.
[64] BU Y,HOWE B,BALAZINSKA M,et al.HaLoop:efficient iterative data processing on large clusters [J].Proceedings of the VLDB Endowment,2010,3(1/2):285-296.
[65] CHEN S.Cheetah:a high performance,custom data warehouse on top of MapReduce [J].Proceedings of the VLDB Endowment,2010,3(1/2):1459-1468.
[66] LUO T,LEE R,MESNIER M,et al.Storage-DB:heterogeneity-aware data management to exploit the full capability of hybrid storage systems [J].Proceedings of the VLDB Endowment,2012,5(10):1076-1087.
[67] WONG P C,SHEN H W,JOHNSON C R,et al.The top 10 challenges in extreme-scale visual analytics [J].IEEE computer graphics and applications,2012,32(4):63-67.
[68] PIKE R,DORWARD S,GRIESEMER R,et al.Interpreting the data:Parallel analysis with Sawzall[J].Scientific Programming,2005,13(4):277-298.
[69] SHI K Q,YAO B X.Function S-rough sets and law identification [J].Science in China E:Information Science,2008,38(4):553-564.
[70] SHI K Q,ZHAO J L.Function S-rough sets and security-au-thentication of hiding law[J].Science in China E:Information Science,2008,38(8):1234-1243.
[71] SHI K Q,YAO B X.Function S-rough sets and law identification [J].Science in China F:Information Science,2008,51(5):499-510.
[72] SHI K Q,ZHAO J L.Function S-rough sets and security-au-thentication of hiding law[J].Science in China F:information Sciences,2008,51(7):924-935.
[1] HU Yu-jiao, JIA Qing-min, SUN Qing-shuang, XIE Ren-chao, HUANG Tao. Functional Architecture to Intelligent Computing Power Network [J]. Computer Science, 2022, 49(9): 249-259.
[2] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[3] LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728.
[4] WANG Yi, LI Zheng-hao, CHEN Xing. Recommendation of Android Application Services via User Scenarios [J]. Computer Science, 2022, 49(6A): 267-271.
[5] SUN Xuan, WANG Huan-xiao. Capability Building for Government Big Data Safety Protection:Discussions from Technologicaland Management Perspectives [J]. Computer Science, 2022, 49(4): 67-73.
[6] GENG Hai-jun, WANG Wei, YIN Xia. Single Node Failure Routing Protection Algorithm Based on Hybrid Software Defined Networks [J]. Computer Science, 2022, 49(2): 329-335.
[7] HE Quan-qi, YU Fei-hong. Review of Low Power Architecture for Wireless Network Cameras [J]. Computer Science, 2021, 48(6A): 369-373.
[8] DONG Shi. Survey on Software Defined Networks Security [J]. Computer Science, 2021, 48(3): 295-306.
[9] ZHANG Han-shuo, YANG Dong-ju. Technology Data Analysis Algorithm Based on Relational Graph [J]. Computer Science, 2021, 48(3): 174-179.
[10] LI Hui, LI Xiu-hua, XIONG Qing-yu, WEN Jun-hao, CHENG Lu-xi, XING Bin. Edge Computing Enabling Industrial Internet:Architecture,Applications and Challenges [J]. Computer Science, 2021, 48(1): 1-10.
[11] ZHANG Yu-xiang, REN Shuang. Overview of Application of Positioning Technology in Virtual Reality [J]. Computer Science, 2021, 48(1): 308-318.
[12] ZHAO Hui-qun, WU Kai-feng. Big Data Valuation Algorithm [J]. Computer Science, 2020, 47(9): 110-116.
[13] ZHANG Meng-yue, HU Jun, YAN Guan, LI Hui-jia. Analysis of China’s Patent Application Concern Based on Visibility Graph Network [J]. Computer Science, 2020, 47(8): 189-194.
[14] GUO Jie, GAO Xi-ran, CHEN Li, FU You, LIU Ying. Parallelizing Multigrid Application Using Data-driven Programming Model [J]. Computer Science, 2020, 47(8): 32-40.
[15] ZHAO Ming. Survey on Technology and Application of Edge Computing [J]. Computer Science, 2020, 47(6A): 268-272.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!