1. Introduction
The following characteristics are shared by information in all information fields:
- (1)
Some information elements in information lose their value of existence under certain conditions (information elements are redundant information of ), they are deleted from , or is moved out of .
- (2)
is an incomplete information, some information elements are missing in , are added from outside to inside , or are moved from outside to inside .
- (3)
The information element in has attributes (characteristics of ), and is an attribute set (attributes are divided into numeric attributes and non-numeric attributes).
Characteristics (1)–(3) are hidden in the information system and are not known to the general public, or have not attracted people’s attention. In short, information
is an attribute set with dynamic characteristics. In order to study the diversified recommendation problem based on a real-world data set, a many-objective recommendation model and algorithm design were constructed [
1]. A privacy protection scheme that guarantees the safe sharing of unmanned aerial vehicle big data is designed [
2]. A new method for recognizing pig face information images is proposed [
3]. These references give the algorithm design of information (data) mining and recognition in different fields but do not involve characteristics (1)–(3). The focus of this research is on the mathematical models and methods that are used to investigate the information
with characteristics (1)–(3) and their applications.
The idea of P-sets was put forth in [
4], and it is obtained by giving Cantor set
dynamic properties in order to make it better. Assuming that
attribute set is
, then P-sets have the following dynamic properties:
Supplementing some attributes in , becomes and Cantor set becomes internal P-set , where and .
Deleting some attributes in , becomes and Cantor set becomes outer P-set , where and .
Supplementing some attributes in , and deleting some attributes in , becomes and Cantor set becomes P-sets , where and .
The internal P-set matches the characteristics of (1), the outer P-set matches the characteristics of (2), and the P-sets match the characteristics of (1) and (2). Clearly, P-sets are the theoretical foundation, approach, and model preparation for this research.
Several researchers have investigated the theory and application of P-sets and have achieved some outstanding results. The L. A. Zadeh fuzzy set is enhanced by the use of P-sets, and a separated fuzzy set made up of an internal and an external separated fuzzy set is proposed [
5]. It has been proposed [
6] that P-sets have an algebraic model. By adding an assistant set to the function, P-sets to expand it [
7]. A new approach to studying big data with the P-sets mathematical model has been proposed in references [
8,
9]. By introducing P-sets to intuitionistic fuzzy sets, the intuitionistic fuzzy sets are improved, and P-intuitionistic fuzzy sets are proposed [
10]. More dynamic characteristics and applications of P-sets are discussed [
11,
12,
13]. P-information fusion and application based on P-sets are obtained [
14,
15,
16,
17]. Inverse P-sets are proposed, which is the symmetric form of P-sets [
18,
19,
20,
21,
22,
23,
24]. Function P-sets are given, which is the functional form of P-sets [
25,
26], and the function inverse P-sets are also proposed, which is the symmetric form of function P-sets [
27,
28,
29]. However, for the problem of how to separate and identify the corresponding changed information elements due to the change of the structural characteristics (attribute set) of information
, these references do not provide theoretical methods and algorithm design research.
This work examines the integration of P-sets with information systems using the P-sets mathematical model, and it uses the attribute reasoning produced by P-sets as a brilliant way to discover some unknown fundamental ideas. The relationship between sub-information generation and its attributes is discussed in this paper, along with how to determine its reasoning pattern and logical properties. The sub-information intelligent separation identification theorem is also demonstrated, and a sub-information intelligent separation identification algorithm is developed. The application of intelligent case information separation and identification is described in the end. In this study, new conceptual and theoretical findings are presented.
P-sets and their straightforward structure are introduced in the next section as a theoretical background in order to make the discussion and understanding of the conclusions easier.
2. Dynamic Model with Attribute Conjunction
Cantor set
is given, and
is the attribute set of
,
is referred to as internal P-sets generated by
, referred to as that
is internal P-set for short,
X− is referred to as
-element deleted set of
,
If the attribute set
of
meets
where in Equation (3),
changes
into
; in Equation (1),
,
.
The Cantor set
is given, and
is the attribute set of
,
is referred to as outer P-sets generated by
, referred to as that
is outer P-set for short,
is referred to as
-element supplemented set of
,
If attribute set
of
meets
where in Equation (6),
changes
into
,
; in Equation (4),
.
The set pair, which is composed of the internal packet set
and outer packet set
, is referred to as P-sets generated by
, referred to as P-sets for short and written as
From Equations (9) and (11), we obtain:
Equation (8) is referred to as the family of P-sets generated by , which is the general expression of P-sets, where both and are indicator sets.
From Equations (1)–(8), we obtain:
Proposition 1. Under the condition of,
P-setsand Cantor set meet: Proof. 1.
if , from Equation (3), we get: , ; and in the Formula (2), in the Formula (1).
2. if , from Equation (6), we get: ; , and in the Formula (5), in the Formula (4).
Based on 1 and 2, we can complete this Proposition. □
Proposition 2. Under the condition of , the family of P-sets and Cantor set meet: The proof is similar to Proposition 1, and it is omitted.
From Formulas (1)–(8) and Propositions 1 and 2, we can easily obtain the dynamic characteristics of P-sets as follows:
Under the condition that we continuously add attributes to , generates an internal P-sets ; similarly we delete attributes continuously in , dynamically generates an outer P-sets ; if the attributes are supplemented and deleted at the same time in , dynamically generates P-sets , .
Remarks:
is a finite element domain and is a finite attribute domain.
and are element (attribute) transfer, and are the family of elements (attributes) transfer, and the element (attributes) transfer is a concept of function or transformation.
The characteristics of are that: for element changes into ; for attribute changes into .
The characteristics of are that: for element , changes into ; for attribute , changes into .
The dynamic characteristics of Formula (1) are the same as the dynamic characteristics of down-counter .
The dynamic characteristics of Formula (4) are the same as the dynamic characteristics of accumulator . For example, for the Formula (4) , let , , so on.
Facts and attributes of the existence of P-sets
is a finite commodity element set of five apples, and
is the attribute set confined in
, where
denotes red color,
denotes sweet taste,
denotes produced by Henan province of China. Obviously,
has attributes
and
; the attribute
of
meets “conjunctive normal form”,
, moreover
Let
denotes weight is 150 g, supplementing attribute
in
,
is changed into
, and
is changed into internal P-sets
. Clearly,
has attributes
and
,
, moreover
If deleting attribute
in
,
is changed into
, and
is changed into outer P-sets
. Clearly,
has attributes
,
, moreover
This simple fact and logical feature can be accepted by ordinary people. The relationship among
,
and finite ordinary element set
are shown in
Figure 1.
Agreement: , .
3. Sub-Information Generation and Attribute Relationships
Definition 1. If attribute of information and attributeof information meetthenis called -sub-information dynamically generated by .
In Equation (11),,, is formed by attributeoutsidebeing transferred from outside to inside, the-sub-informationhas the attribute set.
Definition 2. If attribute αof information and attribute of informationmeetthenis called-sub-information dynamically generated by .
In Equation (12),,, is formed by attributeinsidebeing transferred from inside to outside, the-sub-informationhas the attribute set.
Definition 3. If the attribute of satisfiesthenis called-sub-information dynamically generated by.
Here, Equation (13) means: ,.
Proposition 3. The information coefficientof -sub-informationis a point in the discrete interval , or Here:;;is the self-information coefficient of;;is the unit discrete interval.
Proof. Because , and , we can get: , therefore , and Formula (14) is proved. □
Proposition 4. The information coefficient of -sub-information is a point outside the discrete interval , or Similar to Proposition 3, it is easy to prove Proposition 4, and the proofs are omitted.
Proposition 5. The discrete interval formed by the information coefficient of -sub-information and the unit discrete interval satisfy Proof. Because , therefore the discrete interval composed of and and the unit discrete interval satisfy , Proposition 5 is obtained. □
4. Attribute Reasoning and Sub-Information Intelligent Separation-Identification
Under the condition of supplementing attributes in
α, if
then
is called the
redundant set of
, where
is
-sub-information generated by
,
.
Under the condition of deleting attributes in
, if
then
is called the
supplementary set of
, where
is
-sub-information generated by
,
.
If
and
are attribute of
and
respectively, and satisfy
We call Formula (19) is -attribute reasoning generated by -sub-information ; is called -attribute reasoning condition, is called -attribute inference conclusion. Where “” is equivalent to “”.
If
and
are attribute of
and
, respectively, and satisfy
we call Formula (20) is
-attribute reasoning generated by
-sub-information
;
is called
-attribute reasoning condition,
is called
-attribute inference conclusion.
If
and
are attribute of
and
respectively, and satisfy
we call Formula (21) is
-attribute reasoning generated by
-sub-information
;
is called
-attribute reasoning condition,
is called
-attribute inference conclusion.
Formula (21) represents and .
Theorem 1. Conjunction extension theorem of -sub-information attribute
Ifis attribute of, then satisfies Proof. If
is the attribute set of information,
according to Formula (3), supplement attribute
in
, then delete the redundant information elements
in
, at this time,
generates
,
,
has attribute set
or the information element
has attribute
. Therefore, the attribute
of
satisfies:
. □
Theorem 2. Conjunction contraction theorem of -sub-information attribute
Ifis attribute of, thensatisfies Proof. If is generated by , then . is the attribute set of information , information element has attribute , Or the attribute of information element satisfies: ; according to Formula (3), has attribute set , or information element has attribute . Therefore, the attribute of satisfies: . □
Theorem 3. Separation identification theorem of -sub-information
If, and attribute ,meet Formula (19), then
1-sub-information is intelligently separated and identified in , that is 2 The information coefficientof-sub-informationand the information coefficientofsatisfywhere in Formula (24),.
Proof. From Formulas (1)–(3) in
Section 1 and Formula (19) in
Section 4, we obtain the following: under the condition of
, redundant information element
is deleted in
, then there is
, so that
, and
, that is:
is identified with respect to
, and Formula (24) is obtained.
, and
satisfies
, we get Formula (25). □
Inference 1. The-sub-information
satisfying the -attribute reasoning condition is intelligently separated and identified within in the order of , andwhere in Formula (26), .
Proof. Given information , is the attribute set of information , the attribute of information element satisfies: ; under the condition that the attribute is constantly supplemented in , generates in turn, and , at the same time, generates -sub-information with synchronization, , easy to know , , , clearly, . That is: the -sub-information is intelligently separated and identified within in the order of , and . □
Theorem 4. Separation identification theorem of -sub-information
If,and attribute,meet Formula (20), then
1-sub-informationis intelligently separated and identified Outside of, that is 2 The information coefficientof-sub-informationand the information coefficientofsatisfy Inference 2. The-sub-informationsatisfying the-attribute reasoning condition is intelligently separated and identified Outside ofin the order of, and The proofs of Theorem 4 and Inference 2 are similar to those of Theorem 3 and Inference 1, respectively, and the proofs are omitted. It is easy to deduce Inferences 3 and 4 from Theorems 3 and 4.
Inference 3. The sufficient and necessary condition for the simultaneous intelligent separation and identification of -sub-information and -sub-information is that the attribute of -sub-information and the attribute of -sub-information meet Inference 4. -sub-information satisfying -attribute reasoning condition constitutes -sub-information chain, 5. -Sub-Information Intelligent Separation Identification Algorithm
In order for this part to correspond to the example in
Section 6, only
-sub-information
intelligent separation identification algorithm will be given, which is a part of the intelligent separation identification algorithm of
-sub-information
; the complete sub-information
intelligent separation identification algorithm is composed of
-sub-information
intelligent separation identification algorithm and
-sub-information
intelligent separation identification algorithm. The
-sub-information
intelligent separation identification algorithm is shown in
Figure 2.
The detailed process of the algorithm is as follows:
- (1)
Algorithm preparation: information and its attribute set are given
- (2)
Under the condition that the attribute is continuously obtained and supplemented, generates multiple ; generates multiple , .
- (3)
Under -attribute reasoning, -inference base is intelligently generated.
- (4)
Select attribute reasoning in the inference base to obtain -sub-information one by one, .
- (5)
Define as target -sub-information, compare in step 3 with target sub-information ; if , return to steps (3) and (4), start the algorithm cycle at this time; if , compare with to confirm -sub-information , that is, is identified.
- (6)
The algorithm ends.
6. Application of Intelligent Separation Identification of Case Information
The application example is taken from the reconnaissance and detection of case
information, which is a part of the complete example. For some special reasons, the information of case
is represented by (
x), and the information element
in
represents the suspect of case
, the attribute obtained at the scene of case
is indicated by
, and the names of
and
are omitted. The main idea of the example is as follows: under the condition that attribute
is gradually obtained, the
-sub-information
(the principal offender of the case) of
is intelligently separated and identified from
. The initial information
and attribute set
of case
are respectively:
I. If new attribute
are obtained and certified for the
times, then according to Formula (3) in
Section 2, the attribute set
is
Using
-attribute reasoning Formula (19), under the condition of
, according to the Formula (1) in
Section 2, it is obtained that
-sub-information
is
II. If the new attribute
is obtained and certified for the
times, then according to Formula (3) in
Section 2, the attribute set
is
Using
-attribute reasoning Formula (19), under the condition of
, according to the Formula (1) in
Section 2, it is obtained that
-sub-information
is
satisfying Formulas (34) and (36) are deleted from , is generated by , is intelligently separated and identified from . Before the new attribute is obtained, are hidden in , and no one knows.
Analysis and certification of case :
- (1)
It can be seen from Formulas (34) and (35) that, since are supplemented to , Formula (33) becomes Formula (34) and Formula (32) becomes Formula (35), each in satisfies the attribute conjunction extension: , or element in has attribute , , and satisfy Theorem 3, so there is , so that , according to Theorem 1, is separated and identified in , and all suspects are examined.
- (2)
As the investigation of the case deepens, new attributes are continuously obtained and supplemented to , Formula (34) becomes Formula (36) and Formula (35) becomes Formula (37), each in satisfies the attribute conjunction extension: , or element in has attribute , , and satisfy Theorem 3, so there is , so that , and , according to Theorem 1, is separated and identified in . Case was uncovered and five suspects were arrested, including three major suspects and two minor suspects.
7. Discussion
The concept of sub-information is presented in this paper using the mathematical model of P-sets, and the dynamic attribute change rule of the information element in information is accurately described using the joint expansion contraction feature of the attribute. Through the investigation of the properties of the information element attribute combination, we can discover useful information hidden in the information that is not immediately apparent to people. On the basis of these, attribute reasoning and sub-information attribute characteristics are used to derive the sub-information separation identification theorem, and a specific algorithm is provided. In fact, dynamic characteristics are inherent in information systems. Compared with similar research, this paper proposes a new method to solve intelligent information mining and identification in dynamic information systems, and the algorithm design given is more practical.
The study of criminology in public security systems and information science is combined, conditional information is refined and made simpler, and theoretical results with significant practical value are obtained using a dynamic mathematical model. The examples in this paper are the compression and simplification of real examples. For some reasons, the original appearance of the examples has been omitted. The mathematical model used in this study is linked to the background of the application, and the theoretical results obtained match that background. The research presented in this paper has expanded the theoretical and practical applications of information systems.