Computer Science ›› 2025, Vol. 52 ›› Issue (6A): 240600027-8.doi: 10.11896/jsjkx.240600027
• Big Data & Data Science • Previous Articles Next Articles
MENG Xiangfu1, LI Zihan1, SHI Jiasheng1, GUO Jianwei2, ZHAO Liang3, GUO Sicong2, WANG Peizhuang2
CLC Number:
[1]WANG P Z,OUYANG H,ZHONG Y X,et al.Cognition math based on factor space[J].Annals of Data Science,2016,3(3):281-303. [2]YUAN X H,WANG P Z,LEE F S.Factor space and its algebraic representation theory[J].Journal of Mathematical Analysis and Applications,1992,171(1):256-276. [3]WANG P Z.A factor spaces approach to knowledge representation[J].Fuzzy Sets and Systems,1990,36(1):113-124. [4]PAWLAK Z.ROUGH sets[J].International Journal of Computer and Information Sciences,1982,11(5):341-356. [5]WANG P Z.Factor spaces and factor databases[J].Journal of Liaoning Technical University(Natural Science Edition),2013,32(10):1297-1304. [6]WANG P Z,GUO S C,BAO Y K,et al.Causality analysis in factor spaces[J].Journal of Liaoning Technical University(Na-tural Science Edition),2014,33(7):865-870. [7]WANG H D,WANG P Z,GUO S C.Improved factor analysis on factor spaces[J].Journal of Liaoning Technical University(Natural Science Edition),2015,34(4):539-544. [8]LIU H T,GUO S C.Reasoning model of causality analysis[J].Journal of Liaoning Technical University(Natural Science Edition),2015,34(1):124-128. [9]QU G H,ZENG F H,LIU Z L,et al.Background distribution and Fuzzy background relation in factor spaces[J].Fuzzy Systems and Mathematics,2017,31(6):66-73. [10]LU J H,LIU H T,GUO F F,et al.The algorithm of extraction of background bases[J].Fuzzy Systems and Mathematics,2017,31(6):82-86. [11]WANG P Z.Factor space-mathematical basis of mechanismbased artificial intelligence theory[J].CAAI Transactions on Intelligent Systems,2018,13(1):37-54. [12]CUI T J,MA Y D.Research on distinguishing method of coal mine safety situation based on factor space [J].Systems Engineering-Theory and Practice,2015,35(11):2891-2897. [13]CUI T J,LI S S,WANG L G.System function structure analysis in complete and incomplete background relationship[J].Computer Science,2017,44(3):268-273,306. [14]LI S S,CUI T J,MA Y D,et al.Analysis of background relationship between fault and its influencing factors in SFT[J].Application Research of Computers,2017,34(11):3277-3280,3284. [15]ZENG F H,ZHENG L.Sample cultivation of factor analysismethod[J].Journal of Liaoning Technical University(Natural Science Edition),2017,36(3):320-323. [16]LIU H T,HAO C B,FU G.Prediction method of coal and gas outburst under factor space [J].Journal of Heilongjiang University of Science and Technology,2017,27(4):354-358. [17]LIU H T.Extraction method of dominant factors affecting coal and gas outburst in factor space [J].Journal of Heilongjiang University of Science and Technology,2019,29(3):267-271. [18]CUI T J,WANG P Z.Intelligent reliability analysis methodbased on space fault tree and factor space[J].CAAI Transactions on Intelligent Systems,2019,14(5):853-864. [19]LI X S,XU L B,LIU H T.A research on problem oriented intelligent processing model by basic-element and factor space[J].Journal of Guangdong University of Technology,2019,36(1):1-9. [20]CUI T J,LI S S.Sample selection strategy of artificial intelli-gence based on factor space[J].CAAI Transactions on Intelligent Systems,2021,16(2):346-352. [21]LI X S,XU L B,LIU H T,et al.A complementary analysis of factor space and extenics and a fusion model for solving pro-blems[J].CAAI Transactions on Intelligent Systems,2022,17(5):990-998. [22]CUI T J,LI S S.Function and relationship of data,factor,computing power,and algorithm in the artificial system[J].CAAI Transactions on Intelligent Systems,2022,17(4):772-779. [23]CUI T J,LI S S.Construction and application of factor connection distribution formula based on connection number and system function status[J].CAAI Transactions on Intelligent Systems,2023,18(6):1305-1311. [24]PENG X T,KANDEL A,WAND P Z.Concepts,rules,and fuzzy reasoning:a factor space approach[J].IEEE Transactions on Systems,Man,and Cybernetics,1991,21(1):194-205. [25]WANG P Z,LIU Z L,SHI Y,et al.Factor space,the theoretical base of data science[J].Annals of Data Science,2014,1(2):233-251. [26]ZANG C,NAUGHTON J,DEWITT D,et al.On supportingcontainment queries in relational database management system[C]//Proceedings of the 2001 ACM SIGMOD International Conference on Management of Data.2001:425-436. [27]WU X D,LEE M L,HSU W.A prime number labeling scheme for dynamic ordered XML trees[C]//Proceedings 20th International Conference on Data Engineering.2004:66-78. [28]KO H K,LEE S K.A binary string approach for updates in dynamic ordered XML data[J].IEEE Transactions on Knowledge and Data Engineering,2010,22(4):602-607. |
[1] | LIANG Binghao, ZHANG Chuangang, YUAN Mingming. Large Model Driven AI Application Service Platform [J]. Computer Science, 2025, 52(6A): 240900022-4. |
[2] | SHI Zhuopeng, KONG Xiangmin, WEI Jiahong, SONG Xiaofan. Self-matching Method of Virtual Terminals of Intelligent Stations Based on K-nearest Neighbor Weighting Algorithm [J]. Computer Science, 2025, 52(6A): 240600039-6. |
[3] | TENG Minjun, SUN Tengzhong, LI Yanchen, CHEN Yuan, SONG Mofei. Internet Application User Profiling Analysis Based on Selection State Space Graph Neural Network [J]. Computer Science, 2025, 52(6A): 240900060-8. |
[4] | LIANG Zheheng, WU Yuewen, LI Yongjian , ZHANG Xiaolu , SHEN Guiquan, SU Lingang, LIU Junle. Resource Preference-sensitive Cloud Configuration Recommendation Method for Big DataApplications [J]. Computer Science, 2025, 52(6A): 240800114-9. |
[5] | XUE Wenyao, WANG Yichen, REN Qingwei. Safety-Critical Software Testing Modeling Method Based on MARTE and STAMP [J]. Computer Science, 2025, 52(6A): 240500080-10. |
[6] | SHI Heyuan, CHEN Shijun, ZHANG Qiang, SHEN Yuheng, JIANG Yu, SHI Ronghua. Configuration-guided Directed Kernel Fuzzing for Real-time Linux [J]. Computer Science, 2025, 52(6A): 240400161-8. |
[7] | WANG Panlong, WANG Lei, YING Jinrui, LIU Bowen, GAO Zhiyong. CNFED:An Error Detection Tool for Floating-point Expressions Based on Condition Number [J]. Computer Science, 2025, 52(6A): 240800070-8. |
[8] | ZHANG Xuming, SHI Yaqing, HUANG Song, WANG Xingya, HU Jinchang, LU Jiangtao. Survey of Open-source Software Component Vulnerability Detection and Automatic RepairTechnology [J]. Computer Science, 2025, 52(6): 1-20. |
[9] | ZHANG Ce, SUN Zhichao, JI Kexing, WANG Jinyong, WANG Yubin. Modeling Mechanism and Review of Imperfect Debugging Reliability Model Related to the Total Number of Faults in Software [J]. Computer Science, 2025, 52(6): 21-34. |
[10] | HU Mengze, MA Xutong, ZHANG Hao, ZHANG Jian. Flow-sensitive Coding Style Checking for C/C++ Programs [J]. Computer Science, 2025, 52(6): 35-43. |
[11] | QIAO Yu, XU Tao, ZHANG Ya, WEN Fengpeng, LI Qiangwei. Graph Neural Network Defect Prediction Method Combined with Developer Dependencies [J]. Computer Science, 2025, 52(6): 52-57. |
[12] | WANG Chenyuan, ZHANG Yanmei, YUAN Guan. Class Integration Test Order Generation Approach Fused with Deep Reinforcement Learning andGraph Convolutional Neural Network [J]. Computer Science, 2025, 52(6): 58-65. |
[13] | WEI Youyuan, SONG Jianhua, ZHANG Yan. Survey of Binary Code Similarity Detection Method [J]. Computer Science, 2025, 52(6): 365-380. |
[14] | YE Jueyu, LUN Zhanqun, YUE Qiaoli, LI Hongtao, ZHANG Haikuo, QIANG Jishen. Study on DApp Resource Naming and Addressing Technology [J]. Computer Science, 2025, 52(5): 299-306. |
[15] | WANG Pu, GAO Zhanyun, WANG Zhenfei, SONG Zheli. BDBFT:A Consensus Protocol Based on Reputation Prediction Model for IoT Scenario [J]. Computer Science, 2025, 52(5): 366-374. |
|