Computer Science ›› 2016, Vol. 43 ›› Issue (10): 211-213, 255.doi: 10.11896/j.issn.1002-137X.2016.10.040

Previous Articles     Next Articles

Boundary Characteristics of Inverse P-sets and System Condition Monitoring

REN Xue-fang, ZHANG Ling and SHI Kai-quan   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Inverse P-sets are set models which have dynamic characteristics,and their dynamic characteristics come from element (or attribute) dynamic transferring.Elements transferring into the set makes the boundary of the set expand,and elements moving out from the set makes the boundary of the set contract,generating perturbation boundary and stable core.Based on the fact above and the inverse P-set theory,the concepts of boundary and core of inverse P-sets were proposed,their characteristics were given,and the relationships between inverse P-sets and finite ordinary element set were discussed.Then based on the aforementioned results,the perturbation theorems of the boundaries and the perturbation theorems of core were presented.Finally the application of inverse P-set,the boundary and the core in system condition monitoring was given.

Key words: Inverse P-sets,Element transfer,Boundary,Core,Perturbation theorems

[1] Shi Kai-quan.Inverse P-sets [J].Journal of Shandong University(Natural Science),2012,47(1):98-109(in Chinese) 史开泉.逆P-集合[J].山东大学学报(理学版),2012,47(1):98-109
[2] Shi Kai-quan.Function inverse P-sets and the hiding information generated by function inverse P-information law fusion [C]∥13thIFIPWG 6.11 Conference on e-Business,e-Services,and e-Society,13E 2014 Sanya,China,November,28-30,2014 Proceedings Digital Services and Information Intelligence.2014:224-237
[3] Ren Xue-fang,Zhang Ling,Shi Kai-quan.Surplus-deficiency ofcardinal number and inverse P-augmented matrices [J].Journal of Shandong University(Natural Science),2015,50(10):13-18(in Chinese) 任雪芳,张凌,史开泉.基数余-亏与逆P-增广矩阵[J].山东大学学报(理学版),2015,50(10):13-18
[4] Lin Hong-kang,Fan Cheng-xian.Embedding camouflage of inverse P-information and applications [J].International Journal of Convergence Information and Technology,2012,7(20):471-480
[5] Fan Cheng-xian,Huang Shun-liang.Inverse P-reasoning disco-very identification of inverse P-information [J].International Journal of Digital Content Technology and its Applications,2012,6(20):735-744
[6] Shi Kai-quan.P-sets,inverse P-sets and the intelligent fusion-filter identification of information [J].Computer Science,2012,39(4):1-13(in Chinese) 史开泉.P-集合,逆P-集合与信息智能融合-过滤辨识[J].计算机科学,2012,39(4):1-13
[7] Shi Kai-quan,Tang Ji-hua,Zhang Ling.Intelligent fusion of inverse P-information and recessive transmission of information intelligent hiding [J].Systems Engineering and Electronics,2015,37(3):599-605(in Chinese) 史开泉,汤积华,张凌.逆P-信息智能融合与信息智能隐藏的隐性传递[J].系统工程与电子技术,2015,37(3):599-605
[8] Shi Kai-quan.P-sets[J].Journal of Shandong University(Natural Science),2008,43(11):77-84(in Chinese) 史开泉.P-集合[J].山东大学学报(理学版),2008,43(11):77-84
[9] Shi Kai-quan.P-sets and its application [J].Advances in Sys-tems Science and Applications,2009,9(2):209-219
[10] Zhang Ling,Tang Ji-hua,Shi Kai-quan.The fusion of internal P-information and its feature of attribute conjunction [J].Journal of Shandong University(Natural Science),2014,49(2):93-97(in Chinese) 张凌,汤积华,史开泉.内P-信息融合与它的属性合取特征[J].山东大学学报(理学版),2014,49(2):93-97
[11] Shi Kai-quan,Zhang Li.Internal P-sets and data Outer-recovery [J].Journal of Shandong University(Natural Science),2009,44(4):8-14(in Chinese) 史开泉,张丽.内P-集合与数据外-恢复[J].山东大学学报(理学版),2009,44(4):8-14
[12] Shi Kai-quan.P-sets and its applied characteristics [J].Compu-ter Science,2010,37(8):1-8(in Chinese) 史开泉.P-集合与它的应用特性[J].计算机科学,2010,37(8):1-8
[13] Shi Kai-quan.P-reasoning and P-reasoning discovery- identification of information [J].Computer Science,2011,38(7):1-9(in Chinese) 史开泉.P-推理与信息的P-推理发现-辨识[J].计算机科学,2011,38(7):1-9
[14] Zhang Li,Xiu Ming,Shi Kai-quan.P-sets and Applications of Internal-Outer Data Circle [C]∥Proceedings of 2nd International Conference on Quantitative Logic and Soft Computing:Quantitative Logic and Soft Computing.Berlin:Springer-Verlag,2010:581-591
[15] Qiu Yu-feng,Chen Bao-hui.f-Model Generated by P-Set [C]∥Proceedings of 2nd International Conference on Quantitative Logic and Soft Computing:Quantitative Logic and Soft Computing.Berlin:Springer-Verlag,2010:613-620
[16] Li Yu-ying,Zhang Ling,Shi Kai-quan.Generation and Recovery of Compressed Data and Redundant Data [C]∥Proceedings of 2nd International Conference on Quantitative Logic and Soft Computing:Quantitative Logic and Soft Computing.Berlin:Springer-Verlag,2010:661-671
[17] Zhang Ling,Ren Xue-fang.P-Sets and its (f,)-Heredity[C]∥Proceedings of 2nd International Conference on Quantitative Logic and Soft Computing:Quantitative Logic and Soft Computing.Berlin:Springer-Verlag,vol.2,2010:735-743
[18] Xiu Ming,Shi Kai-quan,Zhang Li.P-sets and -data Selection-Discovery[C]∥Proceedings of 2nd International Conference on Quantitative Logic and Soft Computing:Quantitative Logic and Soft Computing.Berlin:Springer-Verlag,2010:791-799

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .