• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zuo Yayao, Tang Yong, Shu Zhongmei. Subtraction Operation between Temporal Points with Granularities Based on Granularity Hierarchy Mapping[J]. Journal of Computer Research and Development, 2012, 49(11): 2320-2327.
Citation: Zuo Yayao, Tang Yong, Shu Zhongmei. Subtraction Operation between Temporal Points with Granularities Based on Granularity Hierarchy Mapping[J]. Journal of Computer Research and Development, 2012, 49(11): 2320-2327.

Subtraction Operation between Temporal Points with Granularities Based on Granularity Hierarchy Mapping

More Information
  • Published Date: November 14, 2012
  • Temporal modeling and calculus are the fundamental logic problems in temporal information system. The subtraction operation between two temporal points with any granularity is the basis of the temporal assertion, which is hard to deal with. From the point view of granular computing, the semantics and properties of temporal granularities are discussed according to the temporal partition. Temporal primitives are characterized based on the temporal granularities. Furthermore, the method of the granularity subtraction operation is proposed based on the mapping and conversion of different granularity hierarchies. The temporal points could be mapped to the countable set with any temporal granularity, and the subtraction operation between two temporal points could be converted to the subtraction operation between two natural numbers. The equality between temporal domain T and natural set N and continuity of the mapping are discussed and proved, which supports that the proposed method is correct, and the effect of the flexible temporal granularity is overcome. Finally, an algorithm for temporal granularity converting functions is proposed in the context of the calendar system. The proposed method could be adapted to the subtraction operation between two temporal points from any irregular temporal points set or userdefined temporal points set.
  • Related Articles

    [1]Zeng Zhi, Zhao Shuqing, Liu Huan, Zhao Xiang, Luo Minnan. Event-Driven Hypergraph Convolutional Network Based Rumor Detection Method[J]. Journal of Computer Research and Development, 2024, 61(8): 1982-1992. DOI: 10.7544/issn1000-1239.202440136
    [2]Xiao Mengnan, He Ruifang, Ma Jinsong. Event Detection Based on Hierarchical Latent Semantic-Driven Network[J]. Journal of Computer Research and Development, 2024, 61(1): 184-195. DOI: 10.7544/issn1000-1239.202220447
    [3]Shi Shengfei, Zhang Wei, Li Jianzhong. A Complex Event Detection Algorithm Based on Correlation Analysis[J]. Journal of Computer Research and Development, 2014, 51(8): 1871-1879. DOI: 10.7544/issn1000-1239.2014.20120813
    [4]Xu Xiaolong, Geng Weijian, Yang Geng, Li Lingjuan, Yang Zhen. An Efficient Fault-Tolerant Event and Event Boundary Detection Algorithm for Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2014, 51(5): 997-1008.
    [5]Tong Ming, Ding Liwei, and Ji Chenglong. Fusion of HCRF and AAM Highlight Events Detection in Soccer Videos[J]. Journal of Computer Research and Development, 2014, 51(1): 225-236.
    [6]Cao Kening, Wang Yongheng, Li Renfa, Wang Fengjuan. A Distributed Context-Aware Complex Event Processing Method for Internet of Things[J]. Journal of Computer Research and Development, 2013, 50(6): 1163-1176.
    [7]Li Xiang, Fan Yushun, Wang Hongan, Qiao Ying. Estimation on Worst-Case Execution Time of Real-Time Complex Event Processing[J]. Journal of Computer Research and Development, 2012, 49(10): 2054-2065.
    [8]Peng Shanglian, Li Zhanhuai, Li Qiang, Chen Qun, Liu Hailong. Multiple Objects Event Detection over RFID Data Streams[J]. Journal of Computer Research and Development, 2012, 49(9): 1910-1925.
    [9]Liu Jiahong, Wu Quanyuan, Gan Liang, Zhang Bing. A Time Model for Complex Event in InforSIB[J]. Journal of Computer Research and Development, 2009, 46(3): 390-397.
    [10]Zhang Kuo, Li Juanzi, Wu Gang, and Wang Kehong. Term-Committee-Based Event Identification Within Topics[J]. Journal of Computer Research and Development, 2009, 46(2): 245-252.

Catalog

    Article views (697) PDF downloads (609) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return