Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 445-452.

• Big Data & Data Mining • Previous Articles     Next Articles

Symbolic Value Partition Algorithm Using Granular Computing

YANG Feng   

  1. School of Computer Science,Southwest Petroleum University,Chengdu 610500,China
  • Online:2019-02-26 Published:2019-02-26

Abstract: In the field of data mining,data preprocessing based on symbolic data packets is a very challenging issue.It provides people with a more simplified representation of data.In the past research,researchers proposed many solutions,such as using rough set approach to solve this problem.In this paper,a symbolic data grouping algorithm based on grain computing was proposed,which is divided into two stages:granularity generation and granularity selection.At the stage of particle size generation,for each attribute,the tree is constructed from the bottom of the leaf with the cluster of corresponding attribute values as a binary tree,forming a forest of attribute trees.In the stage of granularity selection,each tree is globally considered on the basis of information gain,and the optimal grain layer is selected.The result of layer selection is the grouping result of symbolic data.Experimental results show that compared with the existing algorithms,this algorithm presents a more balanced hierarchy and more excellent compression efficiency,and has better application value.

Key words: Granular computing, Information gain, Symbol, Value partition

CLC Number: 

  • TP311
[1]王齐,钱宇华,李飞江.基于空间结构的符号数据仿射传播算法[J].模式识别与人工智能,2016,29(12):1132-1139.
[2]党红恩,赵尔平,刘炜,等.利用数据变换与并行运算的闭频繁项集挖掘方法[J].湘潭大学自然科学学报,2018,40(1):119-122.
[3]BAZAN J G,NGUYEN H S,NGUYEN S H,et al.Rough Set Algorithms in Classification Problem[C]∥Rough set methods and applications.Physica-Verlag GmbH,2000:49-88.
[4]MIN F,LIU Q,FANG C.Rough sets approach to symbolic value partition[J].International Journal of Approximate Reaso-ning,2008,49(3):689-700.
[5]沈思倩,毛宇光,江冠儒.不完全数据集的差分隐私保护决策树研究[J].计算机科学,2017,44(6):139-143.
[6]HOSSAIN M M,HABIB A,RAHMAN M S.Transliteration Based Bengali Text Compression using Huffman principle[C]∥International Conference on Informatics,Electronics & Vision.IEEE,2014:1-6.
[7]朱淑芹,李俊青,葛广英.基于一个新的四维离散混沌映射的图像加密新算法[J].计算机科学,2017,44(1):188-193.
[8]孙艳歌,王志海,原继东,等.基于信息熵的数据流自适应集成分类算法[J].中国科学技术大学学报,2017,47(7):575-582.
[9]XU Y,CHEN B Z,HU Z C.Research for multi-sensor data fusion based on Huffman tree clustering algorithm in greenhouses[J].International Journal of Embedded Systems,2016,8(1):34.
[10]曹鹏,栗伟,赵大哲.面向不均衡数据集的ARSGOS算法[J].小型微型计算机系统,2014,35(4):818-823.
[11]FALANDYSZ J.Review:On published data and methods for selenium in mushrooms[J].Food Chemistry,2013,138(1):242-250.
[12]YANG L,LUO P,CHEN C L,et al.A large-scale car dataset for fine-grained categorization and verification[C]∥Computer Vision and Pattern Recognition.IEEE,2015:3973-3981.
[13]SHASHA D.Open Field Tic-Tac-Toe[J].Communications of the Acm,2017,60(1):112.
[14]JONAS A.DieGSVP-Agenturen als Forschungsobjekt[M]∥Das Governance-System der GSVP:Die Rolle des EU-Satellitenzentrums und der Europischen Verteidigungsagentur.Nomos Verlagsgesellschaft mbH & Co.KG,2015:133-177.
[15]赵继军,郭昆,冯楠,等.基于RSVP—TE的有向泛洪IRWA算法研究[J].光通信研究,2013(5):8-11.
[1] FANG Lian-hua, LIN Yu-mei, WU Wei-zhi. Optimal Scale Selection in Random Multi-scale Ordered Decision Systems [J]. Computer Science, 2022, 49(6): 172-179.
[2] ZHAO Zhi-qiang, YI Xiu-shuang, LI Jie, WANG Xing-wei. Research on DoS Intrusion Detection Technology of IPv6 Network Based on GR-AD-KNN Algorithm [J]. Computer Science, 2021, 48(6A): 524-528.
[3] LI Ming-lei, HUANG Hui, LU Yu-liang, ZHU Kai-long. SymFuzz:Vulnerability Detection Technology Under Complex Path Conditions [J]. Computer Science, 2021, 48(5): 25-31.
[4] ZHANG Yan-jin, BAI Liang. Fast Symbolic Data Clustering Algorithm Based on Symbolic Relation Graph [J]. Computer Science, 2021, 48(4): 111-116.
[5] WEN Xin, YAN Xin-yi, CHEN Ze-hua. Minimal Optimistic Concept Generation Algorithm Based on Equivalent Relations [J]. Computer Science, 2021, 48(3): 163-167.
[6] ZHOU Sheng-yi, ZENG Hong-wei. Program Complexity Analysis Method Combining Evolutionary Algorithm with Symbolic Execution [J]. Computer Science, 2021, 48(12): 107-116.
[7] RAO Meng,MIAO Duo-qian,LUO Sheng. Rough Uncertain Image Segmentation Method [J]. Computer Science, 2020, 47(2): 72-75.
[8] FENG Jin-zhan, CAI Shu-qin. Helpfulness Degree Prediction Model of Online Reviews Fusing Information Gain and Gradient Decline Algorithms [J]. Computer Science, 2020, 47(10): 69-74.
[9] HUANG Zhao,HUANG Shu-guang,DENG Zhao-kun,HUANG Hui. Automatic Vulnerability Detection and Test Cases Generation Method for Vulnerabilities Caused by SEH [J]. Computer Science, 2019, 46(7): 133-138.
[10] ZHANG Long, ZHOU Yang, TIAN Jiang-peng, ZHAO Hai-peng. Design Method of Semantic-driven Cyberspace Resource Symbol [J]. Computer Science, 2019, 46(4): 83-88.
[11] FANG Hao, WU Li-fa, WU Zhi-yong. Automatic Return-to-dl-resolve Exploit Generation Method Based on Symbolic Execution [J]. Computer Science, 2019, 46(2): 127-132.
[12] YAN An, YAN Xin-yi, CHEN Ze-hua. Formal Vector Method of Rule Extraction for Consistent Decision Information System [J]. Computer Science, 2019, 46(10): 236-241.
[13] YE Zhi-bin,YAN Bo. Survey of Symbolic Execution [J]. Computer Science, 2018, 45(6A): 28-35.
[14] JI Hai-juan, ZHOU Cong-hua, LIU Zhi-feng. Symbolic Aggregate Approximation Method of Time Series Based on Beginning and End Distance [J]. Computer Science, 2018, 45(6): 216-221.
[15] LI Hang, ZANG Lie, GAN Lu. Search of Speculative Symbolic Execution Path Based on Ant Colony Algorithm [J]. Computer Science, 2018, 45(6): 145-150.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!