Computer Science ›› 2018, Vol. 45 ›› Issue (7): 202-206.doi: 10.11896/j.issn.1002-137X.2018.07.035
• Artificial Intelligence • Previous Articles Next Articles
LIU Ji-qin ,ZHANG Hai-yue
CLC Number:
[1]SHI K Q.P-sets [J].Journal of Shandong University(Natural Science),2008,43(11):77-84.(in Chinese) 史开泉.P-集合[J].山东大学学报(理学版),2008,43(11):78-84. [2]SHI K Q.P-sets and its applications[J].An International Journal Advances in Systems Science and Applications,2009,9(2):209-219. [3]SHI K Q,LI X H.Camouflaged information identification and its application [J].An International Journal Advances in Systems Science and Applications,2010,10(2):157-167. [4]SHI K Q.Function P-sets [J].Journal of Shandong University(Natural Science),2011,46(2):62-69.(in Chinese) 史开泉.函数P-集合[J].山东大学学报(理学版),2011,46(2):62-69. [5]SHI K Q.Function P-sets [J].International Journal of Machine Learning and Cybernetics,2011,2(4):281-288. [6]SHI K Q.P-sets and its applied characteristics [J].Computer Science,2010,37(8):1-8.(in Chinese) 史开泉.P-集合与它的应用特征[J].计算机科学,2010,37(8):1-8. [7]SHI K Q.P-reasoning and P-reasoning discovery-identificationof information [J].Computer Science,2011,38(7):1-9.(in Chinese) 史开泉.P-推理与信息的P-推理发现辨识 [J].计算机科学,2011,38(7):1-9. [8]SHI K Q.P-sets,inverse P-sets and the intelligent fusion-filter identification of information [J].Computer Science,2012,39(4):1-13.(in Chinese) 史开泉.P-集合,逆P-集合与信息智能融合-过滤辨识 [J].计算机科学,2012,39(4):1-13. [9]FAN C X,LIN H K.P-sets and the reasoning identification of disaster information [J].Journal of Convergence Information Technology,2012,7(1):337-345. [10]XIE W Q,XUE Y X.The attribute law of hierarchical packet sets [J].Mathematics in Practice and Theory,2016,46(11):280-286.(in Chinese) 谢维奇,薛永献.层次P-集合的属性规律发现[J].数学的实践与认识,2016,46(11):280-286. [11]SHI K Q.P-augmented matrix and dynamic intelligent discovery-identification of information [J].Journal of Shandong University(Natural Science),2015,50(10):1-12.(in Chinese) 史开泉.P-增广矩阵与信息的智能动态发现-辨识[J].山东大学学报(理学版),2015,50(10):1-12. [12]ZHANG L,REN X F,SHI K Q.Intelligent switch-camouflage of information laws and P-law augmented matrices [J].Journal of Shandong University(Natural Science),2016,51(8):90-97.(in Chinese) 张凌,任雪芳,史开泉.信息规律智能变换-伪装与P-规律增广矩阵[J].山东大学学报(理学版),2016,51(8):90-97. [13]LU Y,LI B Y,SHI K Q.Intelligent mining for P-information with expanded characteristic of disjunctive attribute [J].Computer Science,2015,42(1):215-219.(in Chinese) 路英,李备友,史开泉.具有属性析取扩展特征的内逆P-信息智能挖掘[J].计算机科学,2015,42(1):215-219. [14]SHI K Q,YAO B X.Function S-rough sets and law identification [J].Science in China F:Information Science,2008,51(5):499-510. [15]PAL S K,MEHER S K,DUTTA S.Class-dependent rough-fuzzy granular space,dispersion index and classification.Pattern Recognition,2011,45(7):2690-2707. [16]ANDRZEJ S,JAROSLAW S,ROMAN S.Modeling rough gra-nular computing based on approximation space .Information Science,2011,184(1):20-43. [17]WITOLD P,BARBARA R,GIANCARLO S.Knowledge transfer in system modeling and its realization through an optimal allocation of information granularity .Applied Soft Computing,2012,12(8):1985-1995. [18]张文修,姚一豫,梁怡.粗糙集与概念格[M].西安:西安交通大学出版社,2006. |
[1] | HU Yu-jiao, JIA Qing-min, SUN Qing-shuang, XIE Ren-chao, HUANG Tao. Functional Architecture to Intelligent Computing Power Network [J]. Computer Science, 2022, 49(9): 249-259. |
[2] | WANG Yi, LI Zheng-hao, CHEN Xing. Recommendation of Android Application Services via User Scenarios [J]. Computer Science, 2022, 49(6A): 267-271. |
[3] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[4] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[5] | SUN Xuan, WANG Huan-xiao. Capability Building for Government Big Data Safety Protection:Discussions from Technologicaland Management Perspectives [J]. Computer Science, 2022, 49(4): 67-73. |
[6] | GENG Hai-jun, WANG Wei, YIN Xia. Single Node Failure Routing Protection Algorithm Based on Hybrid Software Defined Networks [J]. Computer Science, 2022, 49(2): 329-335. |
[7] | HE Quan-qi, YU Fei-hong. Review of Low Power Architecture for Wireless Network Cameras [J]. Computer Science, 2021, 48(6A): 369-373. |
[8] | DONG Shi. Survey on Software Defined Networks Security [J]. Computer Science, 2021, 48(3): 295-306. |
[9] | ZHANG Han-shuo, YANG Dong-ju. Technology Data Analysis Algorithm Based on Relational Graph [J]. Computer Science, 2021, 48(3): 174-179. |
[10] | LI Hui, LI Xiu-hua, XIONG Qing-yu, WEN Jun-hao, CHENG Lu-xi, XING Bin. Edge Computing Enabling Industrial Internet:Architecture,Applications and Challenges [J]. Computer Science, 2021, 48(1): 1-10. |
[11] | ZHANG Yu-xiang, REN Shuang. Overview of Application of Positioning Technology in Virtual Reality [J]. Computer Science, 2021, 48(1): 308-318. |
[12] | ZHANG Meng-yue, HU Jun, YAN Guan, LI Hui-jia. Analysis of China’s Patent Application Concern Based on Visibility Graph Network [J]. Computer Science, 2020, 47(8): 189-194. |
[13] | GUO Jie, GAO Xi-ran, CHEN Li, FU You, LIU Ying. Parallelizing Multigrid Application Using Data-driven Programming Model [J]. Computer Science, 2020, 47(8): 32-40. |
[14] | ZHAO Ming. Survey on Technology and Application of Edge Computing [J]. Computer Science, 2020, 47(6A): 268-272. |
[15] | LIN Xu-dan, BAO Shi-Jian, ZHAO Li-xin and ZHAO Chen-lin. Design and Performance Analysis of Automotive Supply Chain System Based on Hyperledger Fabric [J]. Computer Science, 2020, 47(6A): 546-551. |
|