Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 445-452.

• Big Data & Data Mining • Previous Articles     Next Articles

Symbolic Value Partition Algorithm Using Granular Computing

YANG Feng   

  1. School of Computer Science,Southwest Petroleum University,Chengdu 610500,China
  • Online:2019-02-26 Published:2019-02-26

Abstract: In the field of data mining,data preprocessing based on symbolic data packets is a very challenging issue.It provides people with a more simplified representation of data.In the past research,researchers proposed many solutions,such as using rough set approach to solve this problem.In this paper,a symbolic data grouping algorithm based on grain computing was proposed,which is divided into two stages:granularity generation and granularity selection.At the stage of particle size generation,for each attribute,the tree is constructed from the bottom of the leaf with the cluster of corresponding attribute values as a binary tree,forming a forest of attribute trees.In the stage of granularity selection,each tree is globally considered on the basis of information gain,and the optimal grain layer is selected.The result of layer selection is the grouping result of symbolic data.Experimental results show that compared with the existing algorithms,this algorithm presents a more balanced hierarchy and more excellent compression efficiency,and has better application value.

Key words: Granular computing, Information gain, Symbol, Value partition

CLC Number: 

  • TP311
[1]王齐,钱宇华,李飞江.基于空间结构的符号数据仿射传播算法[J].模式识别与人工智能,2016,29(12):1132-1139.
[2]党红恩,赵尔平,刘炜,等.利用数据变换与并行运算的闭频繁项集挖掘方法[J].湘潭大学自然科学学报,2018,40(1):119-122.
[3]BAZAN J G,NGUYEN H S,NGUYEN S H,et al.Rough Set Algorithms in Classification Problem[C]∥Rough set methods and applications.Physica-Verlag GmbH,2000:49-88.
[4]MIN F,LIU Q,FANG C.Rough sets approach to symbolic value partition[J].International Journal of Approximate Reaso-ning,2008,49(3):689-700.
[5]沈思倩,毛宇光,江冠儒.不完全数据集的差分隐私保护决策树研究[J].计算机科学,2017,44(6):139-143.
[6]HOSSAIN M M,HABIB A,RAHMAN M S.Transliteration Based Bengali Text Compression using Huffman principle[C]∥International Conference on Informatics,Electronics & Vision.IEEE,2014:1-6.
[7]朱淑芹,李俊青,葛广英.基于一个新的四维离散混沌映射的图像加密新算法[J].计算机科学,2017,44(1):188-193.
[8]孙艳歌,王志海,原继东,等.基于信息熵的数据流自适应集成分类算法[J].中国科学技术大学学报,2017,47(7):575-582.
[9]XU Y,CHEN B Z,HU Z C.Research for multi-sensor data fusion based on Huffman tree clustering algorithm in greenhouses[J].International Journal of Embedded Systems,2016,8(1):34.
[10]曹鹏,栗伟,赵大哲.面向不均衡数据集的ARSGOS算法[J].小型微型计算机系统,2014,35(4):818-823.
[11]FALANDYSZ J.Review:On published data and methods for selenium in mushrooms[J].Food Chemistry,2013,138(1):242-250.
[12]YANG L,LUO P,CHEN C L,et al.A large-scale car dataset for fine-grained categorization and verification[C]∥Computer Vision and Pattern Recognition.IEEE,2015:3973-3981.
[13]SHASHA D.Open Field Tic-Tac-Toe[J].Communications of the Acm,2017,60(1):112.
[14]JONAS A.DieGSVP-Agenturen als Forschungsobjekt[M]∥Das Governance-System der GSVP:Die Rolle des EU-Satellitenzentrums und der Europischen Verteidigungsagentur.Nomos Verlagsgesellschaft mbH & Co.KG,2015:133-177.
[15]赵继军,郭昆,冯楠,等.基于RSVP—TE的有向泛洪IRWA算法研究[J].光通信研究,2013(5):8-11.
[1] HUANG Zhao,HUANG Shu-guang,DENG Zhao-kun,HUANG Hui. Automatic Vulnerability Detection and Test Cases Generation Method for Vulnerabilities Caused by SEH [J]. Computer Science, 2019, 46(7): 133-138.
[2] ZHANG Long, ZHOU Yang, TIAN Jiang-peng, ZHAO Hai-peng. Design Method of Semantic-driven Cyberspace Resource Symbol [J]. Computer Science, 2019, 46(4): 83-88.
[3] FANG Hao, WU Li-fa, WU Zhi-yong. Automatic Return-to-dl-resolve Exploit Generation Method Based on Symbolic Execution [J]. Computer Science, 2019, 46(2): 127-132.
[4] YAN An, YAN Xin-yi, CHEN Ze-hua. Formal Vector Method of Rule Extraction for Consistent Decision Information System [J]. Computer Science, 2019, 46(10): 236-241.
[5] YE Zhi-bin,YAN Bo. Survey of Symbolic Execution [J]. Computer Science, 2018, 45(6A): 28-35.
[6] LI Hang, ZANG Lie, GAN Lu. Search of Speculative Symbolic Execution Path Based on Ant Colony Algorithm [J]. Computer Science, 2018, 45(6): 145-150.
[7] JI Hai-juan, ZHOU Cong-hua, LIU Zhi-feng. Symbolic Aggregate Approximation Method of Time Series Based on Beginning and End Distance [J]. Computer Science, 2018, 45(6): 216-221.
[8] ZHANG Jing, ZHOU An-min, LIU Liang, JIA Peng and LIU Lu-ping. Review of Crash Exploitability Analysis Methods [J]. Computer Science, 2018, 45(5): 5-14, 23.
[9] DENG Zhao-kun, LU Yu-liang, ZHU Kai-long, HUANG Hui. Symbolic Execution Technology Based Defect Detection System for Network Programs [J]. Computer Science, 2018, 45(11A): 325-329.
[10] LI Han, ZHAO Hai, CHEN Xing-chi, LIN Chuan. Long Term Memory Analysis of Relationship Between Pulse Transit Time and Blood Pressure [J]. Computer Science, 2018, 45(11A): 569-572.
[11] CHEN Li-fang, DAI Qi, FU Qi-feng. Design and Application of Extreme Learning Machine Model Based on Granular Computing [J]. Computer Science, 2018, 45(10): 59-63.
[12] WANG Gang, PENG Hua, JIN Yan-qing, TANG Yong-wang. Subsection Model Based Error-resilient Decoding Algorithm for Source Coding [J]. Computer Science, 2018, 45(10): 94-98.
[13] LI Hong-li, MENG Zu-qiang. Attribute Reduction Algorithm Using Information Gain and Inconsistency to Fill [J]. Computer Science, 2018, 45(10): 217-224.
[14] SHANG Ao, PEI Xiao-peng, LV Ying-chun and CHEN Ze-hua. State Reduction Algorithm for Completely Specified Sequential Logic Circuit Based on Equivalence Relation [J]. Computer Science, 2018, 45(1): 118-121.
[15] YE Xiao-qing, LIU Dun and LIANG De-cui. Three-way Granular Recommendation Algorithm Based on Collaborative Filtering [J]. Computer Science, 2018, 45(1): 90-96.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[3] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[4] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[5] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[6] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[7] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[8] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[9] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[10] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .