Computer Science ›› 2025, Vol. 52 ›› Issue (6A): 240600027-8.doi: 10.11896/jsjkx.240600027

• Big Data & Data Science • Previous Articles     Next Articles

Factor Query Language-Basic Language of Factor Database

MENG Xiangfu1, LI Zihan1, SHI Jiasheng1, GUO Jianwei2, ZHAO Liang3, GUO Sicong2, WANG Peizhuang2   

  1. 1 School of Electronic and Information engineering,Liaoning Technical University,Huludao,Liaoning 125105,China
    2 Institute of Intelligent Engineering and mathematics,Liaoning Technical University,Fuxin,Liaoning 123000,China
    3 School of Software,Liaoning Technical University,Huludao,Liaoning 125105,China
  • Online:2025-06-16 Published:2025-06-12
  • About author:LI Zihan,born in 2000.Her main research interests include artificial intelligence and graph representation lear-ning.
  • Supported by:
    National Natural Science Foundation of China(61772249) and Liaoning Provincial Department of Education Project(LJKZ0355,LJ2019QL017).

Abstract: To support the basic storage and efficient processing of factor pedigree data in the context of factor space theory,a factor query language and factor base management system architecture are proposed.Firstly,the concept of factor pedigree is introduced and the storage method for factor pedigree based on XML specification is provided.Subsequently,the basic operation specification for the design of the factor query language,including addition,deletion,modification,and retrieval,are set out.To improve the efficiency of factor query,while enhancing data update speed and reducing the cost of index update,factor coding strategies based on interval,prime numbers,and binary strings are further proposed in accordance with the characteristics of the factor pedigree.Finally,the system architecture and functional modules of the factor base management system are designed accordingly,serving as the operational carrier for the factor query language.Factor query language and factor base management system are the system platform for the implementation of factor space theory.This paper makes a preliminary discussion on this aspect,and provides basic ideas and solutions for the development and application of factor base management system.

Key words: Factor space, factor database, factor pedigree, factor query language, factor encoding, factor base management system

CLC Number: 

  • TP311
[1]WANG P Z,OUYANG H,ZHONG Y X,et al.Cognition math based on factor space[J].Annals of Data Science,2016,3(3):281-303.
[2]YUAN X H,WANG P Z,LEE F S.Factor space and its algebraic representation theory[J].Journal of Mathematical Analysis and Applications,1992,171(1):256-276.
[3]WANG P Z.A factor spaces approach to knowledge representation[J].Fuzzy Sets and Systems,1990,36(1):113-124.
[4]PAWLAK Z.ROUGH sets[J].International Journal of Computer and Information Sciences,1982,11(5):341-356.
[5]WANG P Z.Factor spaces and factor databases[J].Journal of Liaoning Technical University(Natural Science Edition),2013,32(10):1297-1304.
[6]WANG P Z,GUO S C,BAO Y K,et al.Causality analysis in factor spaces[J].Journal of Liaoning Technical University(Na-tural Science Edition),2014,33(7):865-870.
[7]WANG H D,WANG P Z,GUO S C.Improved factor analysis on factor spaces[J].Journal of Liaoning Technical University(Natural Science Edition),2015,34(4):539-544.
[8]LIU H T,GUO S C.Reasoning model of causality analysis[J].Journal of Liaoning Technical University(Natural Science Edition),2015,34(1):124-128.
[9]QU G H,ZENG F H,LIU Z L,et al.Background distribution and Fuzzy background relation in factor spaces[J].Fuzzy Systems and Mathematics,2017,31(6):66-73.
[10]LU J H,LIU H T,GUO F F,et al.The algorithm of extraction of background bases[J].Fuzzy Systems and Mathematics,2017,31(6):82-86.
[11]WANG P Z.Factor space-mathematical basis of mechanismbased artificial intelligence theory[J].CAAI Transactions on Intelligent Systems,2018,13(1):37-54.
[12]CUI T J,MA Y D.Research on distinguishing method of coal mine safety situation based on factor space [J].Systems Engineering-Theory and Practice,2015,35(11):2891-2897.
[13]CUI T J,LI S S,WANG L G.System function structure analysis in complete and incomplete background relationship[J].Computer Science,2017,44(3):268-273,306.
[14]LI S S,CUI T J,MA Y D,et al.Analysis of background relationship between fault and its influencing factors in SFT[J].Application Research of Computers,2017,34(11):3277-3280,3284.
[15]ZENG F H,ZHENG L.Sample cultivation of factor analysismethod[J].Journal of Liaoning Technical University(Natural Science Edition),2017,36(3):320-323.
[16]LIU H T,HAO C B,FU G.Prediction method of coal and gas outburst under factor space [J].Journal of Heilongjiang University of Science and Technology,2017,27(4):354-358.
[17]LIU H T.Extraction method of dominant factors affecting coal and gas outburst in factor space [J].Journal of Heilongjiang University of Science and Technology,2019,29(3):267-271.
[18]CUI T J,WANG P Z.Intelligent reliability analysis methodbased on space fault tree and factor space[J].CAAI Transactions on Intelligent Systems,2019,14(5):853-864.
[19]LI X S,XU L B,LIU H T.A research on problem oriented intelligent processing model by basic-element and factor space[J].Journal of Guangdong University of Technology,2019,36(1):1-9.
[20]CUI T J,LI S S.Sample selection strategy of artificial intelli-gence based on factor space[J].CAAI Transactions on Intelligent Systems,2021,16(2):346-352.
[21]LI X S,XU L B,LIU H T,et al.A complementary analysis of factor space and extenics and a fusion model for solving pro-blems[J].CAAI Transactions on Intelligent Systems,2022,17(5):990-998.
[22]CUI T J,LI S S.Function and relationship of data,factor,computing power,and algorithm in the artificial system[J].CAAI Transactions on Intelligent Systems,2022,17(4):772-779.
[23]CUI T J,LI S S.Construction and application of factor connection distribution formula based on connection number and system function status[J].CAAI Transactions on Intelligent Systems,2023,18(6):1305-1311.
[24]PENG X T,KANDEL A,WAND P Z.Concepts,rules,and fuzzy reasoning:a factor space approach[J].IEEE Transactions on Systems,Man,and Cybernetics,1991,21(1):194-205.
[25]WANG P Z,LIU Z L,SHI Y,et al.Factor space,the theoretical base of data science[J].Annals of Data Science,2014,1(2):233-251.
[26]ZANG C,NAUGHTON J,DEWITT D,et al.On supportingcontainment queries in relational database management system[C]//Proceedings of the 2001 ACM SIGMOD International Conference on Management of Data.2001:425-436.
[27]WU X D,LEE M L,HSU W.A prime number labeling scheme for dynamic ordered XML trees[C]//Proceedings 20th International Conference on Data Engineering.2004:66-78.
[28]KO H K,LEE S K.A binary string approach for updates in dynamic ordered XML data[J].IEEE Transactions on Knowledge and Data Engineering,2010,22(4):602-607.
[1] LIANG Binghao, ZHANG Chuangang, YUAN Mingming. Large Model Driven AI Application Service Platform [J]. Computer Science, 2025, 52(6A): 240900022-4.
[2] SHI Zhuopeng, KONG Xiangmin, WEI Jiahong, SONG Xiaofan. Self-matching Method of Virtual Terminals of Intelligent Stations Based on K-nearest Neighbor Weighting Algorithm [J]. Computer Science, 2025, 52(6A): 240600039-6.
[3] TENG Minjun, SUN Tengzhong, LI Yanchen, CHEN Yuan, SONG Mofei. Internet Application User Profiling Analysis Based on Selection State Space Graph Neural Network [J]. Computer Science, 2025, 52(6A): 240900060-8.
[4] LIANG Zheheng, WU Yuewen, LI Yongjian , ZHANG Xiaolu , SHEN Guiquan, SU Lingang, LIU Junle. Resource Preference-sensitive Cloud Configuration Recommendation Method for Big DataApplications [J]. Computer Science, 2025, 52(6A): 240800114-9.
[5] XUE Wenyao, WANG Yichen, REN Qingwei. Safety-Critical Software Testing Modeling Method Based on MARTE and STAMP [J]. Computer Science, 2025, 52(6A): 240500080-10.
[6] SHI Heyuan, CHEN Shijun, ZHANG Qiang, SHEN Yuheng, JIANG Yu, SHI Ronghua. Configuration-guided Directed Kernel Fuzzing for Real-time Linux [J]. Computer Science, 2025, 52(6A): 240400161-8.
[7] WANG Panlong, WANG Lei, YING Jinrui, LIU Bowen, GAO Zhiyong. CNFED:An Error Detection Tool for Floating-point Expressions Based on Condition Number [J]. Computer Science, 2025, 52(6A): 240800070-8.
[8] ZHANG Xuming, SHI Yaqing, HUANG Song, WANG Xingya, HU Jinchang, LU Jiangtao. Survey of Open-source Software Component Vulnerability Detection and Automatic RepairTechnology [J]. Computer Science, 2025, 52(6): 1-20.
[9] ZHANG Ce, SUN Zhichao, JI Kexing, WANG Jinyong, WANG Yubin. Modeling Mechanism and Review of Imperfect Debugging Reliability Model Related to the Total Number of Faults in Software [J]. Computer Science, 2025, 52(6): 21-34.
[10] HU Mengze, MA Xutong, ZHANG Hao, ZHANG Jian. Flow-sensitive Coding Style Checking for C/C++ Programs [J]. Computer Science, 2025, 52(6): 35-43.
[11] QIAO Yu, XU Tao, ZHANG Ya, WEN Fengpeng, LI Qiangwei. Graph Neural Network Defect Prediction Method Combined with Developer Dependencies [J]. Computer Science, 2025, 52(6): 52-57.
[12] WANG Chenyuan, ZHANG Yanmei, YUAN Guan. Class Integration Test Order Generation Approach Fused with Deep Reinforcement Learning andGraph Convolutional Neural Network [J]. Computer Science, 2025, 52(6): 58-65.
[13] WEI Youyuan, SONG Jianhua, ZHANG Yan. Survey of Binary Code Similarity Detection Method [J]. Computer Science, 2025, 52(6): 365-380.
[14] YE Jueyu, LUN Zhanqun, YUE Qiaoli, LI Hongtao, ZHANG Haikuo, QIANG Jishen. Study on DApp Resource Naming and Addressing Technology [J]. Computer Science, 2025, 52(5): 299-306.
[15] WANG Pu, GAO Zhanyun, WANG Zhenfei, SONG Zheli. BDBFT:A Consensus Protocol Based on Reputation Prediction Model for IoT Scenario [J]. Computer Science, 2025, 52(5): 366-374.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!