Font Size: a A A

Safety And Application Research Of Hiding Knowledge-Hiding Law

Posted on:2010-12-06Degree:DoctorType:Dissertation
Country:ChinaCandidate:H Y FuFull Text:PDF
GTID:1100360278474307Subject:System theory
Abstract/Summary:PDF Full Text Request
Since Professor Z.Pawlak put forward rough sets in 1982, rough sets has been widely applied in many fields. But we met with trouble when to research some dynamic system, dynamic data mining and dynamic knowledge discovery by using Z.Pawlak rough sets, which is rough sets with static characteristic, and no dynamic characteristic. Later, Chinese scholar professor Shi Kaiquan proposed S-rough sets in 2002, it extends applications of rough sets from static problem to dynamic one, and provides theory basis for dynamic data mining and law discovery. However, we also met with trouble when to process law mining-law discovery by using Z.Pawlak rough sets and S-rough sets, which have no law characteristic. Therefore, professor Shi improved S-rough sets and Z.Pawlak rough sets, and proposed function S-rough sets in 2005. Applications of rough sets are generalized from data mining to law mining. Function S-rough sets has properties of law, heredity and memory, and it is a new mathematical tool for law research of dynamic systems. In this paper, taking as Z.Pawlak rough sets, S-rough sets and function S-rough sets as theory basis, Z.Pawlak rough sets, S-rough sets and function S-rough sets are penetrated and crossed with the issue comprehensive evaluation, knowledge hiding discovery, dynamic economic system law forecast and information safety research, and give researches and discussions. This paper can be separated into six sections. Main research content and creative points can be generalized as:Ⅰ. Research content1. Combining fuzzy sets with rough sets theory, the paper investigates the clustering analyses and evaluation of weighting, and proposes a new com- prehensive evaluation system-the comprehensive evaluation system based on FCM algorithm and weighting mining by rough sets (briefly FCM-WMRS). Furthermore, it develops the system of the region technology ability evaluation of China. Finally, it processes clustering analyses and weighting mining on the judgement of the region technology ability evaluation of China based on the judge index system and involved data supported by the research group of continuous development in the Institute of China Science from 2000 to 2003, and presents new judged results.2. S-rough sets have dynamic, hereditary, mnemonic and hiding properties. By using S-rough sets, the paper gives the discussion of S-rough sets and hiding knowledge discovery. On one hand, based on one direction S-rough sets, it gives the concepts of f - hiding knowledge, F -hiding knowledge, hiding degree and dependence degree, and proposes hiding theorem and hiding dependence theorem of hiding knowledge and knowledge discovery principle of F -hiding, furthermore, an application of F -hiding knowledge to system malfunction state find-recognition is discussed. On the other hand, based on two direction S-rough sets, it gives the concepts of (f,(?)) - hiding knowledge, F-hiding knowledge, hiding degree and dependence degree, and proposes hiding theorem and hiding dependence theorem of hiding knowledge and knowledge discovery principle of F -hiding, then, an application of F -hiding knowledge to profit fluctuating analysis is discussed. Hiding knowledge and its applications of hiding properties are a new research direction of S-rough sets.3. Function S-rough sets has the properties of dynamics, law, and law hiding, and it is a new mathematical tool for dynamic system law research. Engrafting function S-rough sets with the issue of dynamic economic law, the paper gives the discussion of economic system law hiding and law forecast, and proposes a new forecast model-two law forecast model based on function S-rough sets, including upper law forecast model and lower law forecast model. Then its implement algorithm is given. Finally, the validity of the model is demonstrated by the forecast for region economic development of Hainan Province.4. With the development of information network, the safety of datum arouses people's attention. By engrafting, crossing, and penetrating between the ellipse curve encryption theory in information security and function S-rough sets, discussions of safety hiding and authentication of knowledge and two law forecast are given. The fusion and share between S-rough sets, function S-rough sets and information security theory is a new research direction of the application of information security in information system.5. Sum up discussions in this paper, presents content which isn't given in this paper, and gives research thought and analysis.Ⅱ. Creative points in this paperCreative point 1. Proposing a new comprehensive evaluation model-the comprehensive evaluation model based on FCM algorithm and weighting mining by rough setsThe paper investigates the clustering analyses and evaluation of weighting, and proposes a new comprehensive evaluation system-the comprehensive evaluation system based on FCM algorithm and weighting mining by rough sets. Then it develops the system of the region technology ability evaluation of China. Finally, it processes clustering analyses and weighting mining on the judgement of the region technology ability evaluation of China based on the judge index system and involved data supported by the research group of continuous development in the Institute of China Science from 2000 to 2003, and presents new judged results.Content of creative point 1 is listed in section 2.Creative point 2. Giving the discussion of S-rough sets and hiding knowledge discovery(1) . Using one direction S-rough sets, the paper proposes the concept of F - hiding knowledge, F -hiding degree and F -dependence degree, and obtains hiding theorem and hiding dependence theorem of F -hiding knowledge and knowledge discovery principle of F -hiding knowledge and F -hiding dependence, furthermore, an application of F -hiding knowledge is discussed.(2) . Using two direction S-rough sets, the paper proposes the concept of F- hiding knowledge, F-hiding degree and F-dependence degree, and obtains hiding theorem and hiding dependence theorem of F -hiding knowledge and knowledge discovery principle of F-hiding knowledge and F-hiding dependence, furthermore, an application of F -hiding knowledge is discussed.Content of creative point 2 is listed in section 3.Creative point 3. Proposing law forecast model of dynamic economic system-two law forecast model based on function S-rough setsTwo law forecast model includes upper law forecast model and lower law forecast model. And the paper gives the concepts of law relation approach degree (f-law relation approach degree and (?)-law relation approach degree), then obtains the minimum cost f-forecast law (?), the maximum cost f-forecast law (?),the minimum benefit (?) -forecast law (?) and the maximum benefit (?) -forecast law (?). (?) (the minimum cost f -forecast law (?), the maximum benefit (?) -forecast law (?) make up of the two law forecast generated by function S-rough sets and dual of function S-rough sets. Moreover, it's implement algorithm is given. Finally, the validity of the model is demonstrated by the forecast for region economic development of Hainan Province.Content of creative point 3 is listed in section 4.Creative point 4. Proposing encryption hiding-decryption discovery and authentication scheme of knowledge and forecast lawThe safety of knowledge [x]f ([x]d can't be stolen from[x]) depends on the safety of the attribute setαf of [x]f. In other words, it depends on the safety of attribute values in the attribute setαf, or Pf = {P1f ,P2f ,...,Ptf} with respect toαf={α1,α2,,,…,αλ,α'}, where Pif is the attribute value ofαi∈αf, andαi is single value attribute. While the safety of economic forecast results (two law forecast) depends on the safety of discrete data points (1,y1),(2,y2),...,(n,yn) of two law. In order to avoid knowledge [x]f and economic forecast results been stolen or juggled, by engrafting, crossing, and penetrating the theory of elliptic curve encryption in the information security with S-rough sets and function S-rough sets, the paper discusses encryption hiding-decryption discovery and authentication of knowledge and two law forecast, and presents three kinds of schemes. Finally, an application is given. The fusion and share between function S-rough sets and information security theory is a new research direction of the application of information safety in information system.Content of creative point 4 is listed in section 5.
Keywords/Search Tags:FCM-WMRS method, knowledge hiding, law hiding, law forecast, safety and authentication of knowledge-law
PDF Full Text Request
Related items